aboutsummaryrefslogtreecommitdiffstats
path: root/lib/private/Authentication/Token/DefaultToken.php
Commit message (Collapse)AuthorAgeFilesLines
* Remove default token which is deprecated since Nextcloud 13Joas Schilling2021-12-011-209/+0
| | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* Fix ArrayAccess and JsonSerializable return typesCôme Chilliet2021-11-231-1/+1
| | | | | | First round of modifications for PHP 8.1 Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* Update php licensesJohn Molakvoæ (skjnldsv)2021-06-041-1/+0
| | | | Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Format code to a single space around binary operatorsChristoph Wurst2020-10-051-1/+1
| | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Add visibility to all constantsChristoph Wurst2020-04-101-1/+1
| | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Format control structures, classes, methods and functionChristoph Wurst2020-04-101-1/+0
| | | | | | | | | | | | | | | To continue this formatting madness, here's a tiny patch that adds unified formatting for control structures like if and loops as well as classes, their methods and anonymous functions. This basically forces the constructs to start on the same line. This is not exactly what PSR2 wants, but I think we can have a few exceptions with "our" style. The starting of braces on the same line is pracrically standard for our code. This also removes and empty lines from method/function bodies at the beginning and end. Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Update license headersChristoph Wurst2019-12-051-2/+6
| | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Add interface INamedTokenDaniel Kesselberg2019-02-021-2/+5
| | | | | | Remove $token instanceof DefaultToken || $token instanceof PublicKeyToken Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* Use constant for token versionRoeland Jago Douma2018-06-181-2/+2
| | | | | | | And don't set the version in the constructor. That would possible cause to many updates. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Initial PKT implementationRoeland Jago Douma2018-06-181-0/+7
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Certain tokens can expireRoeland Jago Douma2018-05-171-0/+15
| | | | | | | | However due to the nature of what we store in the token (encrypted passwords etc). We can't just delete the tokens because that would make the oauth refresh useless. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Allow the rotation of tokensRoeland Jago Douma2018-05-161-2/+8
| | | | | | This for example will allow rotating the apptoken for oauth Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Refix scopeRoeland Jago Douma2018-05-151-2/+4
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Fix testsRoeland Jago Douma2018-05-151-10/+22
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Make the Token Auth code strictRoeland Jago Douma2018-05-151-48/+33
| | | | | | In preparation for #9441 Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Update license headersMorris Jobke2017-11-061-0/+1
| | | | Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* explicit typesRobin Appelman2016-11-161-5/+11
| | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
* cast to intRobin Appelman2016-11-161-2/+2
| | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
* phpdocRobin Appelman2016-11-161-2/+1
| | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
* fix setscopeRobin Appelman2016-11-161-2/+2
| | | | Signed-off-by: Robin Appelman <icewind@owncloud.com>
* allow configuring filesystem accessRobin Appelman2016-11-161-2/+13
| | | | Signed-off-by: Robin Appelman <icewind@owncloud.com>
* app password scope wipRobin Appelman2016-11-161-1/+5
| | | | Signed-off-by: Robin Appelman <icewind@owncloud.com>
* read lockdown scope from tokenRobin Appelman2016-11-161-0/+13
| | | | Signed-off-by: Robin Appelman <icewind@owncloud.com>
* bring back remember-meChristoph Wurst2016-11-021-0/+7
| | | | | | | | | | * try to reuse the old session token for remember me login * decrypt/encrypt token password and set the session id accordingly * create remember-me cookies only if checkbox is checked and 2fa solved * adjust db token cleanup to store remembered tokens longer * adjust unit tests Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Fix othersJoas Schilling2016-07-211-1/+2
|
* store last check timestamp in token instead of sessionChristoph Wurst2016-06-171-0/+23
|
* Create session tokens for apache auth usersChristoph Wurst2016-05-311-1/+0
|
* Update license headersLukas Reschke2016-05-261-1/+0
|
* when generating browser/device token, save the login name for later password ↵Christoph Wurst2016-05-241-1/+17
| | | | checks
* add button to invalidate browser sessions/device tokensChristoph Wurst2016-05-231-3/+1
|
* list user's auth tokens on the personal settings pageChristoph Wurst2016-05-231-1/+11
|
* a single token provider sufficesChristoph Wurst2016-05-181-0/+9
|
* fix PHPDoc and other minor issuesChristoph Wurst2016-05-111-1/+1
|
* PHPDoc and other minor fixesChristoph Wurst2016-05-111-0/+14
|
* Add token auth for OCS APIsChristoph Wurst2016-05-111-0/+4
|
* Add index on 'last_activity'Christoph Wurst2016-05-111-0/+5
| | | | | | add token type column and delete only temporary tokens in the background job debounce token updates; fix wrong class import
* Check if session token is valid and log user out if the check failsChristoph Wurst2016-05-111-6/+1
| | | | | * Update last_activity timestamp of the session token * Check user backend credentials once in 5 minutes
* invalidate (delete) session token on logoutChristoph Wurst2016-05-111-1/+6
| | | | add 'last_activity' column to session tokens and delete old ones via a background job
* token based authChristoph Wurst2016-05-111-0/+58
* Add InvalidTokenException * add DefaultTokenMapper and use it to check if a auth token exists * create new token for the browser session if none exists hash stored token; save user agent * encrypt login password when creating the token