summaryrefslogtreecommitdiffstats
path: root/apps/oauth2/lib
Commit message (Collapse)AuthorAgeFilesLines
* Move OAuth down in admin security settingsRoeland Jago Douma2019-06-281-1/+1
| | | | | | For #16076 Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Use the proper names when setting entity typesRoeland Jago Douma2019-04-181-4/+4
| | | | | | Else this does :boom: Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* OAuth2 client identifier must be uniqueRoeland Jago Douma2019-01-071-0/+49
| | | | | | | | | Fixes #12981 This is highly unlikely to happen. But better to enforce it on the DB level as well! Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* OAuth2: Move to migrationsRoeland Jago Douma2018-12-101-0/+98
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Strict controllersRoeland Jago Douma2018-12-072-15/+6
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Strict repair stepRoeland Jago Douma2018-12-071-1/+2
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Strict ExceptionsRoeland Jago Douma2018-12-072-0/+2
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Move OAuth2 db code to QBMapper and make it strictRoeland Jago Douma2018-12-072-30/+35
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Fail gracefull if an unkown oauth2 client tries to authenticateRoeland Jago Douma2018-12-061-3/+20
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Move ExpiredTokenException to the correct namespaceRoeland Jago Douma2018-10-301-1/+1
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Reset bruteforce on token refresh OAuthRoeland Jago Douma2018-10-301-1/+9
| | | | | | | | | | When using atoken obtained via OAuth the token expires. Resulting in brute force attempts hitting the requesting IP. This resets the brute force attempts for that UID on a valid refresh of the token. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Remove filter_var flags due to PHP 7.3 deprecation, fixes #10894Patrik Kernstock2018-09-041-1/+1
| | | | Signed-off-by: Patrik Kernstock <info@pkern.at>
* Update SettingsController.phprakekniven2018-06-301-1/+1
| | | | Grammar fix. Uppercase URL See https://www.transifex.com/nextcloud/nextcloud/translate/#de/$/146983238?q=issue%3Aopen
* Validate OAuth2 redirect uriRoeland Jago Douma2018-06-261-1/+12
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Fix AdminTestsRoeland Jago Douma2018-06-191-22/+4
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Cleanup ControllerRoeland Jago Douma2018-06-191-7/+1
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Migrate OAuth Admin settings to vueRoeland Jago Douma2018-06-192-19/+36
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* The OAuth endpoint needs to support Basic AuthRoeland Jago Douma2018-05-291-0/+5
| | | | | | * Add test Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Don't use special chars to avoid confusionRoeland Jago Douma2018-05-221-0/+7
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Rotate tokenRoeland Jago Douma2018-05-221-11/+43
| | | | | | | | On a refresh token request: * rorate * reset expire Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Authenticate the clients on requesting a tokenRoeland Jago Douma2018-05-221-2/+45
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Fail if the response type is not properly setRoeland Jago Douma2018-05-221-1/+10
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Set OAuth token expirationRoeland Jago Douma2018-05-222-1/+80
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Use Bearer backend for SabreDAVLukas Reschke2017-05-182-0/+48
| | | | Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* Add tests for OAuth2 appLukas Reschke2017-05-182-8/+12
| | | | Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* Add OAuth state to sessionLukas Reschke2017-05-181-8/+9
| | | | Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* Cleanup codeLukas Reschke2017-05-181-1/+1
| | | | Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* delete auth token when client gets deletedBjoern Schiessle2017-05-184-4/+53
| | | | Signed-off-by: Bjoern Schiessle <bjoern@schiessle.org>
* handle case if no valid client identifier is givenBjoern Schiessle2017-05-181-0/+5
| | | | Signed-off-by: Bjoern Schiessle <bjoern@schiessle.org>
* It's a bearerLukas Reschke2017-05-181-1/+1
| | | | Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* Fetch signle rowLukas Reschke2017-05-181-1/+1
| | | | Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* Get a single rowLukas Reschke2017-05-182-8/+4
| | | | Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* Use query builderLukas Reschke2017-05-182-6/+14
| | | | Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* Add basic implementation for OAuth 2.0 Authorization Code FlowLukas Reschke2017-05-188-0/+535
Signed-off-by: Lukas Reschke <lukas@statuscode.ch>