tenseleyflow/rcal / 816267c

Browse files

Document Microsoft setup for release

Authored by mfwolffe <wolffemf@dukes.jmu.edu>
SHA
816267cc16625dad0e37b49c49a02b48bf6f9239
Parents
f21746c
Tree
ccc50c9

6 changed files

StatusFile+-
M Cargo.toml 7 0
A LICENSE 620 0
M README.md 71 6
M src/cli.rs 1 0
M src/config.rs 3 0
M src/providers.rs 108 25
Cargo.tomlmodified
@@ -2,6 +2,13 @@
2
 name = "rcal"
2
 name = "rcal"
3
 version = "0.1.0"
3
 version = "0.1.0"
4
 edition = "2024"
4
 edition = "2024"
5
+authors = ["Matthew Forrester Wolffe"]
6
+description = "A responsive terminal calendar with local events, reminders, and Microsoft Graph sync"
7
+license = "GPL-3.0-only"
8
+repository = "https://github.com/tenseleyFlow/rcal"
9
+readme = "README.md"
10
+keywords = ["calendar", "tui", "terminal", "microsoft-graph"]
11
+categories = ["command-line-utilities", "date-and-time"]
5
 
12
 
6
 [dependencies]
13
 [dependencies]
7
 crossterm = "0.29.0"
14
 crossterm = "0.29.0"
LICENSEadded
@@ -0,0 +1,620 @@
1
+GNU GENERAL PUBLIC LICENSE
2
+Version 3, 29 June 2007
3
+
4
+Copyright (C) 2007 Free Software Foundation, Inc. <https://fsf.org/>
5
+Everyone is permitted to copy and distribute verbatim copies
6
+of this license document, but changing it is not allowed.
7
+
8
+Preamble
9
+
10
+The GNU General Public License is a free, copyleft license for software and
11
+other kinds of works.
12
+
13
+The licenses for most software and other practical works are designed to take
14
+away your freedom to share and change the works. By contrast, the GNU General
15
+Public License is intended to guarantee your freedom to share and change all
16
+versions of a program--to make sure it remains free software for all its users.
17
+We, the Free Software Foundation, use the GNU General Public License for most
18
+of our software; it applies also to any other work released this way by its
19
+authors. You can apply it to your programs, too.
20
+
21
+When we speak of free software, we are referring to freedom, not price. Our
22
+General Public Licenses are designed to make sure that you have the freedom
23
+to distribute copies of free software (and charge for them if you wish), that
24
+you receive source code or can get it if you want it, that you can change the
25
+software or use pieces of it in new free programs, and that you know you can
26
+do these things.
27
+
28
+To protect your rights, we need to prevent others from denying you these rights
29
+or asking you to surrender the rights. Therefore, you have certain
30
+responsibilities if you distribute copies of the software, or if you modify it:
31
+responsibilities to respect the freedom of others.
32
+
33
+For example, if you distribute copies of such a program, whether gratis or for
34
+a fee, you must pass on to the recipients the same freedoms that you received.
35
+You must make sure that they, too, receive or can get the source code. And you
36
+must show them these terms so they know their rights.
37
+
38
+Developers that use the GNU GPL protect your rights with two steps: (1) assert
39
+copyright on the software, and (2) offer you this License giving you legal
40
+permission to copy, distribute and/or modify it.
41
+
42
+For the developers' and authors' protection, the GPL clearly explains that
43
+there is no warranty for this free software. For both users' and authors' sake,
44
+the GPL requires that modified versions be marked as changed, so that their
45
+problems will not be attributed erroneously to authors of previous versions.
46
+
47
+Some devices are designed to deny users access to install or run modified
48
+versions of the software inside them, although the manufacturer can do so. This
49
+is fundamentally incompatible with the aim of protecting users' freedom to
50
+change the software. The systematic pattern of such abuse occurs in the area of
51
+products for individuals to use, which is precisely where it is most
52
+unacceptable. Therefore, we have designed this version of the GPL to prohibit
53
+the practice for those products. If such problems arise substantially in other
54
+domains, we stand ready to extend this provision to those domains in future
55
+versions of the GPL, as needed to protect the freedom of users.
56
+
57
+Finally, every program is threatened constantly by software patents. States
58
+should not allow patents to restrict development and use of software on
59
+general-purpose computers, but in those that do, we wish to avoid the special
60
+danger that patents applied to a free program could make it effectively
61
+proprietary. To prevent this, the GPL assures that patents cannot be used to
62
+render the program non-free.
63
+
64
+TERMS AND CONDITIONS
65
+
66
+0. Definitions.
67
+
68
+"This License" refers to version 3 of the GNU General Public License.
69
+
70
+"Copyright" also means copyright-like laws that apply to other kinds of works,
71
+such as semiconductor masks.
72
+
73
+"The Program" refers to any copyrightable work licensed under this License.
74
+Each licensee is addressed as "you". "Licensees" and "recipients" may be
75
+individuals or organizations.
76
+
77
+To "modify" a work means to copy from or adapt all or part of the work in a
78
+fashion requiring copyright permission, other than the making of an exact copy.
79
+The resulting work is called a "modified version" of the earlier work or a work
80
+"based on" the earlier work.
81
+
82
+A "covered work" means either the unmodified Program or a work based on the
83
+Program.
84
+
85
+To "propagate" a work means to do anything with it that, without permission,
86
+would make you directly or secondarily liable for infringement under applicable
87
+copyright law, except executing it on a computer or modifying a private copy.
88
+Propagation includes copying, distribution (with or without modification),
89
+making available to the public, and in some countries other activities as well.
90
+
91
+To "convey" a work means any kind of propagation that enables other parties to
92
+make or receive copies. Mere interaction with a user through a computer
93
+network, with no transfer of a copy, is not conveying.
94
+
95
+An interactive user interface displays "Appropriate Legal Notices" to the
96
+extent that it includes a convenient and prominently visible feature that (1)
97
+displays an appropriate copyright notice, and (2) tells the user that there is
98
+no warranty for the work (except to the extent that warranties are provided),
99
+that licensees may convey the work under this License, and how to view a copy
100
+of this License. If the interface presents a list of user commands or options,
101
+such as a menu, a prominent item in the list meets this criterion.
102
+
103
+1. Source Code.
104
+
105
+The "source code" for a work means the preferred form of the work for making
106
+modifications to it. "Object code" means any non-source form of a work.
107
+
108
+A "Standard Interface" means an interface that either is an official standard
109
+defined by a recognized standards body, or, in the case of interfaces specified
110
+for a particular programming language, one that is widely used among developers
111
+working in that language.
112
+
113
+The "System Libraries" of an executable work include anything, other than the
114
+work as a whole, that (a) is included in the normal form of packaging a Major
115
+Component, but which is not part of that Major Component, and (b) serves only
116
+to enable use of the work with that Major Component, or to implement a Standard
117
+Interface for which an implementation is available to the public in source code
118
+form. A "Major Component", in this context, means a major essential component
119
+(kernel, window system, and so on) of the specific operating system (if any) on
120
+which the executable work runs, or a compiler used to produce the work, or an
121
+object code interpreter used to run it.
122
+
123
+The "Corresponding Source" for a work in object code form means all the source
124
+code needed to generate, install, and (for an executable work) run the object
125
+code and to modify the work, including scripts to control those activities.
126
+However, it does not include the work's System Libraries, or general-purpose
127
+tools or generally available free programs which are used unmodified in
128
+performing those activities but which are not part of the work. For example,
129
+Corresponding Source includes interface definition files associated with source
130
+files for the work, and the source code for shared libraries and dynamically
131
+linked subprograms that the work is specifically designed to require, such as
132
+by intimate data communication or control flow between those subprograms and
133
+other parts of the work.
134
+
135
+The Corresponding Source need not include anything that users can regenerate
136
+automatically from other parts of the Corresponding Source.
137
+
138
+The Corresponding Source for a work in source code form is that same work.
139
+
140
+2. Basic Permissions.
141
+
142
+All rights granted under this License are granted for the term of copyright on
143
+the Program, and are irrevocable provided the stated conditions are met. This
144
+License explicitly affirms your unlimited permission to run the unmodified
145
+Program. The output from running a covered work is covered by this License only
146
+if the output, given its content, constitutes a covered work. This License
147
+acknowledges your rights of fair use or other equivalent, as provided by
148
+copyright law.
149
+
150
+You may make, run and propagate covered works that you do not convey, without
151
+conditions so long as your license otherwise remains in force. You may convey
152
+covered works to others for the sole purpose of having them make modifications
153
+exclusively for you, or provide you with facilities for running those works,
154
+provided that you comply with the terms of this License in conveying all
155
+material for which you do not control copyright. Those thus making or running
156
+the covered works for you must do so exclusively on your behalf, under your
157
+direction and control, on terms that prohibit them from making any copies of
158
+your copyrighted material outside their relationship with you.
159
+
160
+Conveying under any other circumstances is permitted solely under the
161
+conditions stated below. Sublicensing is not allowed; section 10 makes it
162
+unnecessary.
163
+
164
+3. Protecting Users' Legal Rights From Anti-Circumvention Law.
165
+
166
+No covered work shall be deemed part of an effective technological measure
167
+under any applicable law fulfilling obligations under article 11 of the WIPO
168
+copyright treaty adopted on 20 December 1996, or similar laws prohibiting or
169
+restricting circumvention of such measures.
170
+
171
+When you convey a covered work, you waive any legal power to forbid
172
+circumvention of technological measures to the extent such circumvention is
173
+effected by exercising rights under this License with respect to the covered
174
+work, and you disclaim any intention to limit operation or modification of the
175
+work as a means of enforcing, against the work's users, your or third parties'
176
+legal rights to forbid circumvention of technological measures.
177
+
178
+4. Conveying Verbatim Copies.
179
+
180
+You may convey verbatim copies of the Program's source code as you receive it,
181
+in any medium, provided that you conspicuously and appropriately publish on
182
+each copy an appropriate copyright notice; keep intact all notices stating that
183
+this License and any non-permissive terms added in accord with section 7 apply
184
+to the code; keep intact all notices of the absence of any warranty; and give
185
+all recipients a copy of this License along with the Program.
186
+
187
+You may charge any price or no price for each copy that you convey, and you may
188
+offer support or warranty protection for a fee.
189
+
190
+5. Conveying Modified Source Versions.
191
+
192
+You may convey a work based on the Program, or the modifications to produce it
193
+from the Program, in the form of source code under the terms of section 4,
194
+provided that you also meet all of these conditions:
195
+
196
+a) The work must carry prominent notices stating that you modified it, and
197
+giving a relevant date.
198
+
199
+b) The work must carry prominent notices stating that it is released under this
200
+License and any conditions added under section 7. This requirement modifies the
201
+requirement in section 4 to "keep intact all notices".
202
+
203
+c) You must license the entire work, as a whole, under this License to anyone
204
+who comes into possession of a copy. This License will therefore apply, along
205
+with any applicable section 7 additional terms, to the whole of the work, and
206
+all its parts, regardless of how they are packaged. This License gives no
207
+permission to license the work in any other way, but it does not invalidate
208
+such permission if you have separately received it.
209
+
210
+d) If the work has interactive user interfaces, each must display Appropriate
211
+Legal Notices; however, if the Program has interactive interfaces that do not
212
+display Appropriate Legal Notices, your work need not make them do so.
213
+
214
+A compilation of a covered work with other separate and independent works,
215
+which are not by their nature extensions of the covered work, and which are not
216
+combined with it such as to form a larger program, in or on a volume of a
217
+storage or distribution medium, is called an "aggregate" if the compilation and
218
+its resulting copyright are not used to limit the access or legal rights of the
219
+compilation's users beyond what the individual works permit. Inclusion of a
220
+covered work in an aggregate does not cause this License to apply to the other
221
+parts of the aggregate.
222
+
223
+6. Conveying Non-Source Forms.
224
+
225
+You may convey a covered work in object code form under the terms of sections
226
+4 and 5, provided that you also convey the machine-readable Corresponding
227
+Source under the terms of this License, in one of these ways:
228
+
229
+a) Convey the object code in, or embodied in, a physical product (including a
230
+physical distribution medium), accompanied by the Corresponding Source fixed on
231
+a durable physical medium customarily used for software interchange.
232
+
233
+b) Convey the object code in, or embodied in, a physical product (including a
234
+physical distribution medium), accompanied by a written offer, valid for at
235
+least three years and valid for as long as you offer spare parts or customer
236
+support for that product model, to give anyone who possesses the object code
237
+either (1) a copy of the Corresponding Source for all the software in the
238
+product that is covered by this License, on a durable physical medium
239
+customarily used for software interchange, for a price no more than your
240
+reasonable cost of physically performing this conveying of source, or (2)
241
+access to copy the Corresponding Source from a network server at no charge.
242
+
243
+c) Convey individual copies of the object code with a copy of the written
244
+offer to provide the Corresponding Source. This alternative is allowed only
245
+occasionally and noncommercially, and only if you received the object code with
246
+such an offer, in accord with subsection 6b.
247
+
248
+d) Convey the object code by offering access from a designated place (gratis or
249
+for a charge), and offer equivalent access to the Corresponding Source in the
250
+same way through the same place at no further charge. You need not require
251
+recipients to copy the Corresponding Source along with the object code. If the
252
+place to copy the object code is a network server, the Corresponding Source may
253
+be on a different server (operated by you or a third party) that supports
254
+equivalent copying facilities, provided you maintain clear directions next to
255
+the object code saying where to find the Corresponding Source. Regardless of
256
+what server hosts the Corresponding Source, you remain obligated to ensure that
257
+it is available for as long as needed to satisfy these requirements.
258
+
259
+e) Convey the object code using peer-to-peer transmission, provided you inform
260
+other peers where the object code and Corresponding Source of the work are
261
+being offered to the general public at no charge under subsection 6d.
262
+
263
+A separable portion of the object code, whose source code is excluded from the
264
+Corresponding Source as a System Library, need not be included in conveying the
265
+object code work.
266
+
267
+A "User Product" is either (1) a "consumer product", which means any tangible
268
+personal property which is normally used for personal, family, or household
269
+purposes, or (2) anything designed or sold for incorporation into a dwelling.
270
+In determining whether a product is a consumer product, doubtful cases shall be
271
+resolved in favor of coverage. For a particular product received by a
272
+particular user, "normally used" refers to a typical or common use of that
273
+class of product, regardless of the status of the particular user or of the way
274
+in which the particular user actually uses, or expects or is expected to use,
275
+the product. A product is a consumer product regardless of whether the product
276
+has substantial commercial, industrial or non-consumer uses, unless such uses
277
+represent the only significant mode of use of the product.
278
+
279
+"Installation Information" for a User Product means any methods, procedures,
280
+authorization keys, or other information required to install and execute
281
+modified versions of a covered work in that User Product from a modified
282
+version of its Corresponding Source. The information must suffice to ensure
283
+that the continued functioning of the modified object code is in no case
284
+prevented or interfered with solely because modification has been made.
285
+
286
+If you convey an object code work under this section in, or with, or
287
+specifically for use in, a User Product, and the conveying occurs as part of a
288
+transaction in which the right of possession and use of the User Product is
289
+transferred to the recipient in perpetuity or for a fixed term (regardless of
290
+how the transaction is characterized), the Corresponding Source conveyed under
291
+this section must be accompanied by the Installation Information. But this
292
+requirement does not apply if neither you nor any third party retains the
293
+ability to install modified object code on the User Product (for example, the
294
+work has been installed in ROM).
295
+
296
+The requirement to provide Installation Information does not include a
297
+requirement to continue to provide support service, warranty, or updates for a
298
+work that has been modified or installed by the recipient, or for the User
299
+Product in which it has been modified or installed. Access to a network may be
300
+denied when the modification itself materially and adversely affects the
301
+operation of the network or violates the rules and protocols for communication
302
+across the network.
303
+
304
+Corresponding Source conveyed, and Installation Information provided, in accord
305
+with this section must be in a format that is publicly documented (and with an
306
+implementation available to the public in source code form), and must require
307
+no special password or key for unpacking, reading or copying.
308
+
309
+7. Additional Terms.
310
+
311
+"Additional permissions" are terms that supplement the terms of this License by
312
+making exceptions from one or more of its conditions. Additional permissions
313
+that are applicable to the entire Program shall be treated as though they were
314
+included in this License, to the extent that they are valid under applicable
315
+law. If additional permissions apply only to part of the Program, that part may
316
+be used separately under those permissions, but the entire Program remains
317
+governed by this License without regard to the additional permissions.
318
+
319
+When you convey a copy of a covered work, you may at your option remove any
320
+additional permissions from that copy, or from any part of it. (Additional
321
+permissions may be written to require their own removal in certain cases when
322
+you modify the work.) You may place additional permissions on material, added
323
+by you to a covered work, for which you have or can give appropriate copyright
324
+permission.
325
+
326
+Notwithstanding any other provision of this License, for material you add to a
327
+covered work, you may (if authorized by the copyright holders of that material)
328
+supplement the terms of this License with terms:
329
+
330
+a) Disclaiming warranty or limiting liability differently from the terms of
331
+sections 15 and 16 of this License; or
332
+
333
+b) Requiring preservation of specified reasonable legal notices or author
334
+attributions in that material or in the Appropriate Legal Notices displayed by
335
+works containing it; or
336
+
337
+c) Prohibiting misrepresentation of the origin of that material, or requiring
338
+that modified versions of such material be marked in reasonable ways as
339
+different from the original version; or
340
+
341
+d) Limiting the use for publicity purposes of names of licensors or authors of
342
+the material; or
343
+
344
+e) Declining to grant rights under trademark law for use of some trade names,
345
+trademarks, or service marks; or
346
+
347
+f) Requiring indemnification of licensors and authors of that material by
348
+anyone who conveys the material (or modified versions of it) with contractual
349
+assumptions of liability to the recipient, for any liability that these
350
+contractual assumptions directly impose on those licensors and authors.
351
+
352
+All other non-permissive additional terms are considered "further restrictions"
353
+within the meaning of section 10. If the Program as you received it, or any
354
+part of it, contains a notice stating that it is governed by this License along
355
+with a term that is a further restriction, you may remove that term. If a
356
+license document contains a further restriction but permits relicensing or
357
+conveying under this License, you may add to a covered work material governed
358
+by the terms of that license document, provided that the further restriction
359
+does not survive such relicensing or conveying.
360
+
361
+If you add terms to a covered work in accord with this section, you must place,
362
+in the relevant source files, a statement of the additional terms that apply to
363
+those files, or a notice indicating where to find the applicable terms.
364
+
365
+Additional terms, permissive or non-permissive, may be stated in the form of a
366
+separately written license, or stated as exceptions; the above requirements
367
+apply either way.
368
+
369
+8. Termination.
370
+
371
+You may not propagate or modify a covered work except as expressly provided
372
+under this License. Any attempt otherwise to propagate or modify it is void,
373
+and will automatically terminate your rights under this License (including any
374
+patent licenses granted under the third paragraph of section 11).
375
+
376
+However, if you cease all violation of this License, then your license from a
377
+particular copyright holder is reinstated (a) provisionally, unless and until
378
+the copyright holder explicitly and finally terminates your license, and (b)
379
+permanently, if the copyright holder fails to notify you of the violation by
380
+some reasonable means prior to 60 days after the cessation.
381
+
382
+Moreover, your license from a particular copyright holder is reinstated
383
+permanently if the copyright holder notifies you of the violation by some
384
+reasonable means, this is the first time you have received notice of violation
385
+of this License (for any work) from that copyright holder, and you cure the
386
+violation prior to 30 days after your receipt of the notice.
387
+
388
+Termination of your rights under this section does not terminate the licenses
389
+of parties who have received copies or rights from you under this License. If
390
+your rights have been terminated and not permanently reinstated, you do not
391
+qualify to receive new licenses for the same material under section 10.
392
+
393
+9. Acceptance Not Required for Having Copies.
394
+
395
+You are not required to accept this License in order to receive or run a copy
396
+of the Program. Ancillary propagation of a covered work occurring solely as a
397
+consequence of using peer-to-peer transmission to receive a copy likewise does
398
+not require acceptance. However, nothing other than this License grants you
399
+permission to propagate or modify any covered work. These actions infringe
400
+copyright if you do not accept this License. Therefore, by modifying or
401
+propagating a covered work, you indicate your acceptance of this License to do
402
+so.
403
+
404
+10. Automatic Licensing of Downstream Recipients.
405
+
406
+Each time you convey a covered work, the recipient automatically receives a
407
+license from the original licensors, to run, modify and propagate that work,
408
+subject to this License. You are not responsible for enforcing compliance by
409
+third parties with this License.
410
+
411
+An "entity transaction" is a transaction transferring control of an
412
+organization, or substantially all assets of one, or subdividing an
413
+organization, or merging organizations. If propagation of a covered work results
414
+from an entity transaction, each party to that transaction who receives a copy
415
+of the work also receives whatever licenses to the work the party's predecessor
416
+in interest had or could give under the previous paragraph, plus a right to
417
+possession of the Corresponding Source of the work from the predecessor in
418
+interest, if the predecessor has it or can get it with reasonable efforts.
419
+
420
+You may not impose any further restrictions on the exercise of the rights
421
+granted or affirmed under this License. For example, you may not impose a
422
+license fee, royalty, or other charge for exercise of rights granted under this
423
+License, and you may not initiate litigation (including a cross-claim or
424
+counterclaim in a lawsuit) alleging that any patent claim is infringed by
425
+making, using, selling, offering for sale, or importing the Program or any
426
+portion of it.
427
+
428
+11. Patents.
429
+
430
+A "contributor" is a copyright holder who authorizes use under this License of
431
+the Program or a work on which the Program is based. The work thus licensed is
432
+called the contributor's "contributor version".
433
+
434
+A contributor's "essential patent claims" are all patent claims owned or
435
+controlled by the contributor, whether already acquired or hereafter acquired,
436
+that would be infringed by some manner, permitted by this License, of making,
437
+using, or selling its contributor version, but do not include claims that would
438
+be infringed only as a consequence of further modification of the contributor
439
+version. For purposes of this definition, "control" includes the right to grant
440
+patent sublicenses in a manner consistent with the requirements of this
441
+License.
442
+
443
+Each contributor grants you a non-exclusive, worldwide, royalty-free patent
444
+license under the contributor's essential patent claims, to make, use, sell,
445
+offer for sale, import and otherwise run, modify and propagate the contents of
446
+its contributor version.
447
+
448
+In the following three paragraphs, a "patent license" is any express agreement
449
+or commitment, however denominated, not to enforce a patent (such as an express
450
+permission to practice a patent or covenant not to sue for patent
451
+infringement). To "grant" such a patent license to a party means to make such
452
+an agreement or commitment not to enforce a patent against the party.
453
+
454
+If you convey a covered work, knowingly relying on a patent license, and the
455
+Corresponding Source of the work is not available for anyone to copy, free of
456
+charge and under the terms of this License, through a publicly available
457
+network server or other readily accessible means, then you must either (1)
458
+cause the Corresponding Source to be so available, or (2) arrange to deprive
459
+yourself of the benefit of the patent license for this particular work, or (3)
460
+arrange, in a manner consistent with the requirements of this License, to
461
+extend the patent license to downstream recipients. "Knowingly relying" means
462
+you have actual knowledge that, but for the patent license, your conveying the
463
+covered work in a country, or your recipient's use of the covered work in a
464
+country, would infringe one or more identifiable patents in that country that
465
+you have reason to believe are valid.
466
+
467
+If, pursuant to or in connection with a single transaction or arrangement, you
468
+convey, or propagate by procuring conveyance of, a covered work, and grant a
469
+patent license to some of the parties receiving the covered work authorizing
470
+them to use, propagate, modify or convey a specific copy of the covered work,
471
+then the patent license you grant is automatically extended to all recipients
472
+of the covered work and works based on it.
473
+
474
+A patent license is "discriminatory" if it does not include within the scope of
475
+its coverage, prohibits the exercise of, or is conditioned on the non-exercise
476
+of one or more of the rights that are specifically granted under this License.
477
+You may not convey a covered work if you are a party to an arrangement with a
478
+third party that is in the business of distributing software, under which you
479
+make payment to the third party based on the extent of your activity of
480
+conveying the work, and under which the third party grants, to any of the
481
+parties who would receive the covered work from you, a discriminatory patent
482
+license (a) in connection with copies of the covered work conveyed by you (or
483
+copies made from those copies), or (b) primarily for and in connection with
484
+specific products or compilations that contain the covered work, unless you
485
+entered into that arrangement, or that patent license was granted, prior to 28
486
+March 2007.
487
+
488
+Nothing in this License shall be construed as excluding or limiting any implied
489
+license or other defenses to infringement that may otherwise be available to
490
+you under applicable patent law.
491
+
492
+12. No Surrender of Others' Freedom.
493
+
494
+If conditions are imposed on you (whether by court order, agreement or
495
+otherwise) that contradict the conditions of this License, they do not excuse
496
+you from the conditions of this License. If you cannot convey a covered work so
497
+as to satisfy simultaneously your obligations under this License and any other
498
+pertinent obligations, then as a consequence you may not convey it at all. For
499
+example, if you agree to terms that obligate you to collect a royalty for
500
+further conveying from those to whom you convey the Program, the only way you
501
+could satisfy both those terms and this License would be to refrain entirely
502
+from conveying the Program.
503
+
504
+13. Use with the GNU Affero General Public License.
505
+
506
+Notwithstanding any other provision of this License, you have permission to
507
+link or combine any covered work with a work licensed under version 3 of the
508
+GNU Affero General Public License into a single combined work, and to convey
509
+the resulting work. The terms of this License will continue to apply to the
510
+part which is the covered work, but the special requirements of the GNU Affero
511
+General Public License, section 13, concerning interaction through a network
512
+will apply to the combination as such.
513
+
514
+14. Revised Versions of this License.
515
+
516
+The Free Software Foundation may publish revised and/or new versions of the GNU
517
+General Public License from time to time. Such new versions will be similar in
518
+spirit to the present version, but may differ in detail to address new problems
519
+or concerns.
520
+
521
+Each version is given a distinguishing version number. If the Program specifies
522
+that a certain numbered version of the GNU General Public License "or any later
523
+version" applies to it, you have the option of following the terms and
524
+conditions either of that numbered version or of any later version published by
525
+the Free Software Foundation. If the Program does not specify a version number
526
+of the GNU General Public License, you may choose any version ever published by
527
+the Free Software Foundation.
528
+
529
+If the Program specifies that a proxy can decide which future versions of the
530
+GNU General Public License can be used, that proxy's public statement of
531
+acceptance of a version permanently authorizes you to choose that version for
532
+the Program.
533
+
534
+Later license versions may give you additional or different permissions.
535
+However, no additional obligations are imposed on any author or copyright
536
+holder as a result of your choosing to follow a later version.
537
+
538
+15. Disclaimer of Warranty.
539
+
540
+THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE
541
+LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR
542
+OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
543
+EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
544
+MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO
545
+THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM
546
+PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR
547
+CORRECTION.
548
+
549
+16. Limitation of Liability.
550
+
551
+IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
552
+COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM
553
+AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL,
554
+SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
555
+INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
556
+BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
557
+FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER
558
+OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
559
+
560
+17. Interpretation of Sections 15 and 16.
561
+
562
+If the disclaimer of warranty and limitation of liability provided above cannot
563
+be given local legal effect according to their terms, reviewing courts shall
564
+apply local law that most closely approximates an absolute waiver of all civil
565
+liability in connection with the Program, unless a warranty or assumption of
566
+liability accompanies a copy of the Program in return for a fee.
567
+
568
+END OF TERMS AND CONDITIONS
569
+
570
+How to Apply These Terms to Your New Programs
571
+
572
+If you develop a new program, and you want it to be of the greatest possible
573
+use to the public, the best way to achieve this is to make it free software
574
+which everyone can redistribute and change under these terms.
575
+
576
+To do so, attach the following notices to the program. It is safest to attach
577
+them to the start of each source file to most effectively state the exclusion
578
+of warranty; and each file should have at least the "copyright" line and a
579
+pointer to where the full notice is found.
580
+
581
+    rcal
582
+    Copyright (C) 2026 Matthew Forrester Wolffe
583
+
584
+    This program is free software: you can redistribute it and/or modify it
585
+    under the terms of the GNU General Public License as published by the Free
586
+    Software Foundation, either version 3 of the License, or (at your option)
587
+    any later version.
588
+
589
+    This program is distributed in the hope that it will be useful, but WITHOUT
590
+    ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
591
+    FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
592
+    more details.
593
+
594
+    You should have received a copy of the GNU General Public License along
595
+    with this program. If not, see <https://www.gnu.org/licenses/>.
596
+
597
+Also add information on how to contact you by electronic and paper mail.
598
+
599
+If the program does terminal interaction, make it output a short notice like
600
+this when it starts in an interactive mode:
601
+
602
+    rcal Copyright (C) 2026 Matthew Forrester Wolffe
603
+    This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
604
+    This is free software, and you are welcome to redistribute it under certain
605
+    conditions; type `show c' for details.
606
+
607
+The hypothetical commands `show w' and `show c' should show the appropriate
608
+parts of the General Public License. Of course, your program's commands might
609
+be different; for a GUI interface, you would use an "about box".
610
+
611
+You should also get your employer (if you work as a programmer) or school, if
612
+any, to sign a "copyright disclaimer" for the program, if necessary. For more
613
+information on this, and how to apply and follow the GNU GPL, see
614
+<https://www.gnu.org/licenses/>.
615
+
616
+The GNU General Public License does not permit incorporating your program into
617
+proprietary programs. If your program is a subroutine library, you may consider
618
+it more useful to permit linking proprietary applications with the library. If
619
+this is what you want to do, use the GNU Lesser General Public License instead
620
+of this License. But first, please read <https://www.gnu.org/licenses/why-not-lgpl.html>.
README.mdmodified
@@ -78,12 +78,77 @@ rcal providers microsoft calendars list --account work
78
 rcal providers microsoft sync --account work
78
 rcal providers microsoft sync --account work
79
 ```
79
 ```
80
 
80
 
81
-Users provide their own Azure app `client_id` and tenant in `config.toml`.
81
+For the current development release, users provide their own Microsoft Entra
82
-Tokens are stored in the OS keychain. The provider syncs configured calendars
82
+app registration `client_id` in `config.toml`. A future production release can
83
-through Graph `calendarView`, caches selected events separately from the local
83
+ship an rcal-owned public/native client ID so end users do not need to create an
84
-events JSON, and routes create/edit/delete/copy operations for Microsoft events
84
+Azure app. No client secret is used or stored; rcal stores user tokens in the OS
85
-back through Graph. Provider reminders fire from cached provider events after a
85
+keychain.
86
-sync; the reminder daemon does not sync remote calendars itself.
86
+
87
+### Microsoft Account Setup
88
+
89
+Create a config file:
90
+
91
+```sh
92
+rcal config init
93
+```
94
+
95
+Register a temporary local test app in the Microsoft Entra admin center:
96
+
97
+- Name: `rcal local test` or similar.
98
+- Supported account type:
99
+  - Personal Outlook/Hotmail/Live accounts: **Personal Microsoft accounts
100
+    only**.
101
+  - Work or school Microsoft 365 accounts: **Accounts in any organizational
102
+    directory**.
103
+- Redirect URI: platform **Mobile and desktop applications**, value
104
+  `http://localhost:8765/callback`.
105
+- API permissions: Microsoft Graph delegated `User.Read` and
106
+  `Calendars.ReadWrite`.
107
+- If Azure refuses the account type change with
108
+  `api.requestedAccessTokenVersion`, set the app manifest's
109
+  `requestedAccessTokenVersion` or `accessTokenAcceptedVersion` to `2`.
110
+
111
+Then edit `~/.config/rcal/config.toml`:
112
+
113
+```toml
114
+[providers]
115
+create_target = "microsoft" # or "local" to keep new events local-only
116
+
117
+[providers.microsoft]
118
+enabled = true
119
+default_account = "work"
120
+default_calendar = "CALENDAR_ID"
121
+sync_past_days = 30
122
+sync_future_days = 365
123
+
124
+[[providers.microsoft.accounts]]
125
+id = "work"
126
+client_id = "AZURE_APP_CLIENT_ID"
127
+tenant = "consumers"      # personal accounts
128
+# tenant = "organizations" # work/school accounts
129
+redirect_port = 8765
130
+calendars = ["CALENDAR_ID"]
131
+```
132
+
133
+Authenticate, list calendars, then copy the editable calendar ID into both
134
+`default_calendar` and `calendars`:
135
+
136
+```sh
137
+rcal providers microsoft auth login --account work --browser
138
+rcal providers microsoft calendars list --account work
139
+rcal providers microsoft sync --account work
140
+rcal
141
+```
142
+
143
+Use `rcal providers microsoft auth inspect --account work` to inspect safe
144
+token claims such as audience, scopes, tenant, and expiry. The command does not
145
+print the token body.
146
+
147
+The provider syncs configured calendars through Graph `calendarView`, caches
148
+selected events separately from the local events JSON, and routes
149
+create/edit/delete/copy operations for Microsoft events back through Graph.
150
+Provider reminders fire from cached provider events after a sync; the reminder
151
+daemon does not sync remote calendars itself.
87
 
152
 
88
 ## Controls
153
 ## Controls
89
 
154
 
src/cli.rsmodified
@@ -1261,6 +1261,7 @@ fn run_microsoft_action(
1261
                     "account={} authenticated=true",
1261
                     "account={} authenticated=true",
1262
                     inspection.account_id
1262
                     inspection.account_id
1263
                 );
1263
                 );
1264
+                let _ = writeln!(stdout, "token_format={}", inspection.token_format);
1264
                 let _ = writeln!(
1265
                 let _ = writeln!(
1265
                     stdout,
1266
                     stdout,
1266
                     "aud={}",
1267
                     "aud={}",
src/config.rsmodified
@@ -37,6 +37,9 @@ create_target = "local"
37
 
37
 
38
 [providers.microsoft]
38
 [providers.microsoft]
39
 # Microsoft Graph provider for Outlook / Microsoft 365 calendars.
39
 # Microsoft Graph provider for Outlook / Microsoft 365 calendars.
40
+# Current development builds require your own Microsoft Entra app client_id.
41
+# Use tenant = "consumers" for personal Outlook/Hotmail accounts and
42
+# tenant = "organizations" for work or school Microsoft 365 accounts.
40
 enabled = false
43
 enabled = false
41
 default_account = "work"
44
 default_account = "work"
42
 default_calendar = "CALENDAR_ID"
45
 default_calendar = "CALENDAR_ID"
src/providers.rsmodified
@@ -1410,6 +1410,7 @@ pub fn logout(
1410
 #[derive(Debug, Clone, PartialEq, Eq)]
1410
 #[derive(Debug, Clone, PartialEq, Eq)]
1411
 pub struct MicrosoftTokenInspection {
1411
 pub struct MicrosoftTokenInspection {
1412
     pub account_id: String,
1412
     pub account_id: String,
1413
+    pub token_format: String,
1413
     pub stored_expires_at_epoch_seconds: u64,
1414
     pub stored_expires_at_epoch_seconds: u64,
1414
     pub jwt_expires_at_epoch_seconds: Option<i64>,
1415
     pub jwt_expires_at_epoch_seconds: Option<i64>,
1415
     pub audience: Option<String>,
1416
     pub audience: Option<String>,
@@ -1432,14 +1433,21 @@ pub fn inspect_token(
1432
         ))
1433
         ))
1433
     })?;
1434
     })?;
1434
     let claims = access_token_claims(&token.access_token)?;
1435
     let claims = access_token_claims(&token.access_token)?;
1436
+    let claims_ref = claims.as_ref();
1435
     Ok(MicrosoftTokenInspection {
1437
     Ok(MicrosoftTokenInspection {
1436
         account_id: account_id.to_string(),
1438
         account_id: account_id.to_string(),
1439
+        token_format: if claims_ref.is_some() {
1440
+            "jwt"
1441
+        } else {
1442
+            "opaque"
1443
+        }
1444
+        .to_string(),
1437
         stored_expires_at_epoch_seconds: token.expires_at_epoch_seconds,
1445
         stored_expires_at_epoch_seconds: token.expires_at_epoch_seconds,
1438
-        jwt_expires_at_epoch_seconds: graph_i64(&claims, "exp"),
1446
+        jwt_expires_at_epoch_seconds: claims_ref.and_then(|claims| graph_i64(claims, "exp")),
1439
-        audience: graph_string(&claims, "aud"),
1447
+        audience: claims_ref.and_then(|claims| graph_string(claims, "aud")),
1440
-        scopes: graph_string(&claims, "scp"),
1448
+        scopes: claims_ref.and_then(|claims| graph_string(claims, "scp")),
1441
-        roles: claims
1449
+        roles: claims_ref
1442
-            .get("roles")
1450
+            .and_then(|claims| claims.get("roles"))
1443
             .and_then(Value::as_array)
1451
             .and_then(Value::as_array)
1444
             .map(|roles| {
1452
             .map(|roles| {
1445
                 roles
1453
                 roles
@@ -1449,10 +1457,10 @@ pub fn inspect_token(
1449
                     .collect()
1457
                     .collect()
1450
             })
1458
             })
1451
             .unwrap_or_default(),
1459
             .unwrap_or_default(),
1452
-        tenant_id: graph_string(&claims, "tid"),
1460
+        tenant_id: claims_ref.and_then(|claims| graph_string(claims, "tid")),
1453
-        issuer: graph_string(&claims, "iss"),
1461
+        issuer: claims_ref.and_then(|claims| graph_string(claims, "iss")),
1454
-        app_id: graph_string(&claims, "appid"),
1462
+        app_id: claims_ref.and_then(|claims| graph_string(claims, "appid")),
1455
-        authorized_party: graph_string(&claims, "azp"),
1463
+        authorized_party: claims_ref.and_then(|claims| graph_string(claims, "azp")),
1456
         has_refresh_token: !token.refresh_token.is_empty(),
1464
         has_refresh_token: !token.refresh_token.is_empty(),
1457
     })
1465
     })
1458
 }
1466
 }
@@ -1585,16 +1593,30 @@ fn login_browser(
1585
         .and_then(|path| path.split_once('?').map(|(_, query)| query))
1593
         .and_then(|path| path.split_once('?').map(|(_, query)| query))
1586
         .ok_or_else(|| ProviderError::Auth("OAuth callback did not include a query".to_string()))?;
1594
         .ok_or_else(|| ProviderError::Auth("OAuth callback did not include a query".to_string()))?;
1587
     let params = parse_query(query);
1595
     let params = parse_query(query);
1588
-    let code = params
1596
+    if let Some(error) = params.get("error") {
1589
-        .get("code")
1597
+        let description = params
1590
-        .ok_or_else(|| ProviderError::Auth("OAuth callback did not include code".to_string()))?;
1598
+            .get("error_description")
1599
+            .map(String::as_str)
1600
+            .unwrap_or("Microsoft did not provide an error description");
1601
+        let message = format!("{error}: {description}");
1602
+        let _ = write_oauth_callback_response(&mut stream, false, &message);
1603
+        return Err(ProviderError::Auth(message));
1604
+    }
1605
+    let code = params.get("code").ok_or_else(|| {
1606
+        let message = "OAuth callback did not include code".to_string();
1607
+        let _ = write_oauth_callback_response(&mut stream, false, &message);
1608
+        ProviderError::Auth(message)
1609
+    })?;
1591
     if params.get("state") != Some(&state) {
1610
     if params.get("state") != Some(&state) {
1592
-        return Err(ProviderError::Auth(
1611
+        let message = "OAuth callback state mismatch".to_string();
1593
-            "OAuth callback state mismatch".to_string(),
1612
+        let _ = write_oauth_callback_response(&mut stream, false, &message);
1594
-        ));
1613
+        return Err(ProviderError::Auth(message));
1595
-    }
1614
+    }
1596
-    let response_body = "HTTP/1.1 200 OK\r\nContent-Type: text/plain\r\n\r\nrcal Microsoft login complete. You can close this tab.\n";
1615
+    let _ = write_oauth_callback_response(
1597
-    let _ = stream.write_all(response_body.as_bytes());
1616
+        &mut stream,
1617
+        true,
1618
+        "rcal Microsoft login complete. You can close this tab.",
1619
+    );
1598
     let body = form_body(&[
1620
     let body = form_body(&[
1599
         ("grant_type", "authorization_code"),
1621
         ("grant_type", "authorization_code"),
1600
         ("client_id", account.client_id.as_str()),
1622
         ("client_id", account.client_id.as_str()),
@@ -1860,16 +1882,18 @@ fn token_from_response(response: MicrosoftHttpResponse) -> Result<MicrosoftToken
1860
     })
1882
     })
1861
 }
1883
 }
1862
 
1884
 
1863
-fn access_token_claims(access_token: &str) -> Result<Value, ProviderError> {
1885
+fn access_token_claims(access_token: &str) -> Result<Option<Value>, ProviderError> {
1864
-    let payload = access_token.split('.').nth(1).ok_or_else(|| {
1886
+    let Some(payload) = access_token.split('.').nth(1) else {
1865
-        ProviderError::Auth("stored Microsoft access token is not a JWT".to_string())
1887
+        return Ok(None);
1866
-    })?;
1888
+    };
1867
     let bytes = base64_url_decode_no_pad(payload).ok_or_else(|| {
1889
     let bytes = base64_url_decode_no_pad(payload).ok_or_else(|| {
1868
         ProviderError::Auth("stored Microsoft access token has invalid JWT encoding".to_string())
1890
         ProviderError::Auth("stored Microsoft access token has invalid JWT encoding".to_string())
1869
     })?;
1891
     })?;
1870
-    serde_json::from_slice(&bytes).map_err(|err| {
1892
+    serde_json::from_slice(&bytes)
1871
-        ProviderError::Auth(format!("stored Microsoft access token is invalid: {err}"))
1893
+        .map_err(|err| {
1872
-    })
1894
+            ProviderError::Auth(format!("stored Microsoft access token is invalid: {err}"))
1895
+        })
1896
+        .map(Some)
1873
 }
1897
 }
1874
 
1898
 
1875
 fn required_json_string(value: &Value, key: &str) -> Result<String, ProviderError> {
1899
 fn required_json_string(value: &Value, key: &str) -> Result<String, ProviderError> {
@@ -2381,6 +2405,26 @@ fn parse_query(query: &str) -> BTreeMap<String, String> {
2381
         .collect()
2405
         .collect()
2382
 }
2406
 }
2383
 
2407
 
2408
+fn write_oauth_callback_response(
2409
+    stream: &mut impl Write,
2410
+    success: bool,
2411
+    message: &str,
2412
+) -> io::Result<()> {
2413
+    let status = if success { "200 OK" } else { "400 Bad Request" };
2414
+    let heading = if success {
2415
+        "rcal Microsoft login complete"
2416
+    } else {
2417
+        "rcal Microsoft login failed"
2418
+    };
2419
+    let body = format!("{heading}\n\n{message}\n");
2420
+    write!(
2421
+        stream,
2422
+        "HTTP/1.1 {status}\r\nContent-Type: text/plain; charset=utf-8\r\nContent-Length: {}\r\nConnection: close\r\n\r\n{}",
2423
+        body.len(),
2424
+        body
2425
+    )
2426
+}
2427
+
2384
 fn pkce_verifier() -> String {
2428
 fn pkce_verifier() -> String {
2385
     let mut bytes = [0_u8; 32];
2429
     let mut bytes = [0_u8; 32];
2386
     if let Ok(mut file) = fs::File::open("/dev/urandom") {
2430
     if let Ok(mut file) = fs::File::open("/dev/urandom") {
@@ -2879,6 +2923,7 @@ mod tests {
2879
         let inspection = inspect_token("work", &store).expect("token inspects");
2923
         let inspection = inspect_token("work", &store).expect("token inspects");
2880
 
2924
 
2881
         assert_eq!(inspection.account_id, "work");
2925
         assert_eq!(inspection.account_id, "work");
2926
+        assert_eq!(inspection.token_format, "jwt");
2882
         assert_eq!(
2927
         assert_eq!(
2883
             inspection.audience.as_deref(),
2928
             inspection.audience.as_deref(),
2884
             Some("https://graph.microsoft.com")
2929
             Some("https://graph.microsoft.com")
@@ -2892,6 +2937,44 @@ mod tests {
2892
         assert!(inspection.has_refresh_token);
2937
         assert!(inspection.has_refresh_token);
2893
     }
2938
     }
2894
 
2939
 
2940
+    #[test]
2941
+    fn inspect_token_tolerates_opaque_access_tokens() {
2942
+        let store = MemoryTokenStore::default();
2943
+        store.tokens.borrow_mut().insert(
2944
+            "work".to_string(),
2945
+            MicrosoftToken {
2946
+                access_token: "opaque-consumer-token".to_string(),
2947
+                refresh_token: "refresh".to_string(),
2948
+                expires_at_epoch_seconds: 1_777_000_100,
2949
+            },
2950
+        );
2951
+
2952
+        let inspection = inspect_token("work", &store).expect("opaque token inspects");
2953
+
2954
+        assert_eq!(inspection.token_format, "opaque");
2955
+        assert_eq!(inspection.audience, None);
2956
+        assert_eq!(inspection.scopes, None);
2957
+        assert_eq!(inspection.jwt_expires_at_epoch_seconds, None);
2958
+        assert!(inspection.has_refresh_token);
2959
+    }
2960
+
2961
+    #[test]
2962
+    fn oauth_callback_response_surfaces_browser_errors() {
2963
+        let mut response = Vec::new();
2964
+
2965
+        write_oauth_callback_response(
2966
+            &mut response,
2967
+            false,
2968
+            "invalid_request: the application must use consumers",
2969
+        )
2970
+        .expect("response writes");
2971
+
2972
+        let response = String::from_utf8(response).expect("utf8 response");
2973
+        assert!(response.starts_with("HTTP/1.1 400 Bad Request"));
2974
+        assert!(response.contains("rcal Microsoft login failed"));
2975
+        assert!(response.contains("invalid_request"));
2976
+    }
2977
+
2895
     #[test]
2978
     #[test]
2896
     fn sync_writes_selected_calendar_cache_and_renders_provider_event() {
2979
     fn sync_writes_selected_calendar_cache_and_renders_provider_event() {
2897
         let cache_file = temp_path("sync/microsoft-cache.json");
2980
         let cache_file = temp_path("sync/microsoft-cache.json");