aboutsummaryrefslogtreecommitdiffstats
path: root/lib/private/Authentication/Token/IProvider.php
Commit message (Collapse)AuthorAgeFilesLines
* composer run cs:fixCôme Chilliet2023-01-201-2/+0
| | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* Fix typos in lib/private subdirectoryluz paz2022-07-271-1/+1
| | | | | | Found via `codespell -q 3 -S l10n -L jus ./lib/private` Signed-off-by: luz paz <luzpaz@github.com>
* Automatically cut the token name on the first levelJoas Schilling2022-03-231-1/+1
| | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* Type the autentication provider passwords as nullable stringsChristoph Wurst2021-10-131-1/+1
| | | | | | | | For historic reasons we couldn't add a nullable type hint before nullable type hints were supported by our target php versions. This is now possible. Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Update php licensesJohn Molakvoæ (skjnldsv)2021-06-041-1/+0
| | | | Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Use matching parameter names form interfaces and implementationsMorris Jobke2020-08-191-2/+2
| | | | | | Found by Psalm 3.14.1 Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* Update license headersChristoph Wurst2019-12-051-2/+6
| | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Make renewSessionToken return the new tokenRoeland Jago Douma2019-10-091-1/+2
| | | | | | | Avoids directly getting the token again. We just inserted it so it and have all the info. So that query is just a waste. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Error with exception on SSL errorMorris Jobke2019-07-181-0/+3
| | | | Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* Remote wipe supportRoeland Jago Douma2019-05-201-0/+3
| | | | | | | | This allows a user to mark a token for remote wipe. Clients that support this can then wipe the device properly. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl> Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Move ExpiredTokenException to the correct namespaceRoeland Jago Douma2018-10-301-0/+1
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Update all the publickey tokens if needed on web loginRoeland Jago Douma2018-10-021-0/+8
| | | | | | | | | | * On weblogin check if we have invalid public key tokens * If so update them all with the new token This ensures that your marked as invalid tokens work again if you once login on the web. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Mark token as invalid if the password doesn't matchRoeland Jago Douma2018-10-021-0/+8
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Just pass uid to the Token stuffRoeland Jago Douma2018-06-181-5/+4
| | | | | | We don't have user objects in the code everywhere Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Certain tokens can expireRoeland Jago Douma2018-05-171-0/+2
| | | | | | | | However due to the nature of what we store in the token (encrypted passwords etc). We can't just delete the tokens because that would make the oauth refresh useless. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Allow the rotation of tokensRoeland Jago Douma2018-05-161-0/+10
| | | | | | This for example will allow rotating the apptoken for oauth Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Fix testsRoeland Jago Douma2018-05-151-2/+2
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Make the Token Auth code strictRoeland Jago Douma2018-05-151-10/+17
| | | | | | In preparation for #9441 Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Update license headersMorris Jobke2017-11-061-0/+3
| | | | Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* Minor typosMarcel Waldvogel2017-07-211-1/+1
| | | | Signed-off-by: Marcel Waldvogel <marcel.waldvogel@uni-konstanz.de>
* allow configuring filesystem accessRobin Appelman2016-11-161-1/+10
| | | | Signed-off-by: Robin Appelman <icewind@owncloud.com>
* document what the method doesChristoph Wurst2016-11-021-0/+2
| | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Add missing tests and fix PHPDocLukas Reschke2016-11-021-0/+1
| | | | Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* bring back remember-meChristoph Wurst2016-11-021-1/+9
| | | | | | | | | | * try to reuse the old session token for remember me login * decrypt/encrypt token password and set the session id accordingly * create remember-me cookies only if checkbox is checked and 2fa solved * adjust db token cleanup to store remembered tokens longer * adjust unit tests Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* add invalidateOldTokens to IProvider interfaceChristoph Wurst2016-08-021-0/+5
|
* Fix othersJoas Schilling2016-07-211-1/+2
|
* Merge pull request #25172 from owncloud/token-login-validationVincent Petry2016-06-221-8/+8
|\ | | | | Token login validation
| * store last check timestamp in token instead of sessionChristoph Wurst2016-06-171-7/+7
| |
| * use token last_activity instead of session valueChristoph Wurst2016-06-171-1/+1
| |
* | update session token password on user password changeChristoph Wurst2016-06-211-0/+10
|/
* Create session tokens for apache auth usersChristoph Wurst2016-05-311-1/+3
|
* Update license headersLukas Reschke2016-05-261-1/+0
|
* when generating browser/device token, save the login name for later password ↵Christoph Wurst2016-05-241-1/+2
| | | | checks
* add button to invalidate browser sessions/device tokensChristoph Wurst2016-05-231-1/+9
|
* add button to add new device tokensChristoph Wurst2016-05-231-1/+2
|
* add method to query all user auth tokensChristoph Wurst2016-05-181-0/+12
|
* a single token provider sufficesChristoph Wurst2016-05-181-0/+37
|
* fix PHPDoc and other minor issuesChristoph Wurst2016-05-111-1/+1
|
* Add token auth for OCS APIsChristoph Wurst2016-05-111-1/+8
|
* token based authChristoph Wurst2016-05-111-0/+35
* Add InvalidTokenException * add DefaultTokenMapper and use it to check if a auth token exists * create new token for the browser session if none exists hash stored token; save user agent * encrypt login password when creating the token