summaryrefslogtreecommitdiffstats
path: root/lib/private/User
diff options
context:
space:
mode:
authorChristoph Wurst <christoph@owncloud.com>2016-05-06 16:31:40 +0200
committerThomas Müller <thomas.mueller@tmit.eu>2016-05-11 13:36:46 +0200
commit46bdf6ea2b1e10c2f4d2fae214ecc81b188fa981 (patch)
tree56c5fb779556bea6489463a315affa6726d81655 /lib/private/User
parent3ffa7d986a3bb2a67ae37e017f3e34097774cbf2 (diff)
downloadnextcloud-server-46bdf6ea2b1e10c2f4d2fae214ecc81b188fa981.tar.gz
nextcloud-server-46bdf6ea2b1e10c2f4d2fae214ecc81b188fa981.zip
fix PHPDoc and other minor issues
Diffstat (limited to 'lib/private/User')
-rw-r--r--lib/private/User/Session.php45
1 files changed, 21 insertions, 24 deletions
diff --git a/lib/private/User/Session.php b/lib/private/User/Session.php
index 297ebb2aaf0..0351125b5d9 100644
--- a/lib/private/User/Session.php
+++ b/lib/private/User/Session.php
@@ -97,11 +97,14 @@ class Session implements IUserSession, Emitter {
/**
* @var User $activeUser
+ */
protected $activeUser;
/**
* @param IUserManager $manager
* @param ISession $session
+ * @param ITimeFactory $timeFacory
+ * @param IProvider $tokenProvider
* @param IProvider[] $tokenProviders
*/
public function __construct(IUserManager $manager, ISession $session, ITimeFactory $timeFacory, $tokenProvider,
@@ -219,7 +222,7 @@ class Session implements IUserSession, Emitter {
} catch (InvalidTokenException $ex) {
// Session was invalidated
$this->logout();
- return false;
+ return;
}
// Check whether login credentials are still valid
@@ -231,15 +234,13 @@ class Session implements IUserSession, Emitter {
if ($this->manager->checkPassword($user->getUID(), $pwd) === false) {
// Password has changed -> log user out
$this->logout();
- return false;
+ return;
}
$this->session->set('last_login_check', $now);
}
// Session is valid, so the token can be refreshed
$this->updateToken($this->tokenProvider, $token);
-
- return true;
}
/**
@@ -301,9 +302,7 @@ class Session implements IUserSession, Emitter {
$this->manager->emit('\OC\User', 'preLogin', array($uid, $password));
$user = $this->manager->checkPassword($uid, $password);
if ($user === false) {
- // Password auth failed, maybe it's a token
- $request = \OC::$server->getRequest();
- if ($this->validateToken($request, $password)) {
+ if ($this->validateToken($password)) {
$user = $this->getUser();
}
}
@@ -349,9 +348,8 @@ class Session implements IUserSession, Emitter {
* @return boolean if the login was successful
*/
public function tryBasicAuthLogin(IRequest $request) {
- // TODO: use $request->server instead of super globals
- if (!empty($_SERVER['PHP_AUTH_USER']) && !empty($_SERVER['PHP_AUTH_PW'])) {
- $result = $this->login($_SERVER['PHP_AUTH_USER'], $_SERVER['PHP_AUTH_PW']);
+ if (!empty($request->server['PHP_AUTH_USER']) && !empty($request->server['PHP_AUTH_PW'])) {
+ $result = $this->login($request->server['PHP_AUTH_USER'], $request->server['PHP_AUTH_PW']);
if ($result === true) {
/**
* Add DAV authenticated. This should in an ideal world not be
@@ -363,14 +361,14 @@ class Session implements IUserSession, Emitter {
$this->session->set(
Auth::DAV_AUTHENTICATED, $this->getUser()->getUID()
);
+ return true;
}
- return $result;
}
return false;
}
private function loginWithToken($uid) {
- //$this->manager->emit('\OC\User', 'preTokenLogin', array($uid));
+ // TODO: $this->manager->emit('\OC\User', 'preTokenLogin', array($uid));
$user = $this->manager->get($uid);
if (is_null($user)) {
// user does not exist
@@ -379,7 +377,7 @@ class Session implements IUserSession, Emitter {
//login
$this->setUser($user);
- //$this->manager->emit('\OC\User', 'postTokenLogin', array($user));
+ // TODO: $this->manager->emit('\OC\User', 'postTokenLogin', array($user));
return true;
}
@@ -410,16 +408,15 @@ class Session implements IUserSession, Emitter {
}
/**
- * @param IRequest $request
* @param string $token
* @return boolean
*/
- private function validateToken(IRequest $request, $token) {
+ private function validateToken($token) {
foreach ($this->tokenProviders as $provider) {
try {
$token = $provider->validateToken($token);
if (!is_null($token)) {
- $result = $this->loginWithToken($token->getUid());
+ $result = $this->loginWithToken($token->getUID());
if ($result) {
// Login success
$this->updateToken($provider, $token);
@@ -458,13 +455,13 @@ class Session implements IUserSession, Emitter {
// No auth header, let's try session id
try {
$sessionId = $this->session->getId();
- return $this->validateToken($request, $sessionId);
+ return $this->validateToken($sessionId);
} catch (SessionNotAvailableException $ex) {
return false;
}
} else {
$token = substr($authHeader, 6);
- return $this->validateToken($request, $token);
+ return $this->validateToken($token);
}
}
@@ -530,9 +527,9 @@ class Session implements IUserSession, Emitter {
public function setMagicInCookie($username, $token) {
$secureCookie = OC::$server->getRequest()->getServerProtocol() === 'https';
$expires = time() + OC::$server->getConfig()->getSystemValue('remember_login_cookie_lifetime', 60 * 60 * 24 * 15);
- setcookie("oc_username", $username, $expires, OC::$WEBROOT, '', $secureCookie, true);
- setcookie("oc_token", $token, $expires, OC::$WEBROOT, '', $secureCookie, true);
- setcookie("oc_remember_login", "1", $expires, OC::$WEBROOT, '', $secureCookie, true);
+ setcookie('oc_username', $username, $expires, OC::$WEBROOT, '', $secureCookie, true);
+ setcookie('oc_token', $token, $expires, OC::$WEBROOT, '', $secureCookie, true);
+ setcookie('oc_remember_login', '1', $expires, OC::$WEBROOT, '', $secureCookie, true);
}
/**
@@ -542,9 +539,9 @@ class Session implements IUserSession, Emitter {
//TODO: DI for cookies and IRequest
$secureCookie = OC::$server->getRequest()->getServerProtocol() === 'https';
- unset($_COOKIE["oc_username"]); //TODO: DI
- unset($_COOKIE["oc_token"]);
- unset($_COOKIE["oc_remember_login"]);
+ unset($_COOKIE['oc_username']); //TODO: DI
+ unset($_COOKIE['oc_token']);
+ unset($_COOKIE['oc_remember_login']);
setcookie('oc_username', '', time() - 3600, OC::$WEBROOT, '', $secureCookie, true);
setcookie('oc_token', '', time() - 3600, OC::$WEBROOT, '', $secureCookie, true);
setcookie('oc_remember_login', '', time() - 3600, OC::$WEBROOT, '', $secureCookie, true);