aboutsummaryrefslogtreecommitdiffstats
path: root/lib/private/User
Commit message (Collapse)AuthorAgeFilesLines
...
| | * | Lower log level about invalid session tokenPatrick Fischer2023-11-061-1/+1
| | | |
| * | | feat: Add out-of-office message APIChristoph Wurst2023-11-092-0/+174
| |/ / | | | | | | | | | | | | | | | | | | [skipci] Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at> Signed-off-by: Richard Steinmetz <richard@steinmetz.cloud>
| * | fix(session): Log why session renewal failedChristoph Wurst2023-10-111-1/+2
| | | | | | | | | | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
| * | Merge pull request #39756 from nextcloud/enh/add-disabled-users-endpointCôme Chilliet2023-10-101-0/+30
| |\ \ | | | | | | | | Add endpoint for getting disabled user list
| | * | Add endpoint for getting disabled user listCôme Chilliet2023-10-091-0/+30
| | | | | | | | | | | | | | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
| * | | fix: Log critical session renewal and logout pathsChristoph Wurst2023-10-091-5/+33
| |/ / | | | | | | | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
| * | fix(user): Log affected user of app token login name mismatchChristoph Wurst2023-10-061-0/+2
| | | | | | | | | | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
| * | Merge pull request #39216 from shdehnavi/replace_substr_calls_in_lib_privateRobin Appelman2023-09-211-1/+1
| |\ \ | | |/ | |/| Refactor "substr" calls in lib/private to improve code readability
| | * Refactor "substr" calls to improve code readabilityHamid Dehnavi2023-07-071-1/+1
| | | | | | | | | | | | Signed-off-by: Hamid Dehnavi <hamid.dev.pro@gmail.com>
* | | Refactor `OC\Server::getCsrfTokenManager`Andrew Summers2023-08-291-1/+2
|/ / | | | | | | Signed-off-by: Andrew Summers <18727110+summersab@users.noreply.github.com>
* | Merge pull request #40079 from ↵Joas Schilling2023-08-281-4/+4
|\ \ | | | | | | | | | | | | nextcloud/techdebt/noid/user-IThrottler-interface-for-DI techdebt(DI): Use public IThrottler interface which exists since 25
| * | techdebt(DI): Use public IThrottler interface which exists since Nextcloud 25Joas Schilling2023-08-281-4/+4
| | | | | | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | | fix(cache): Remove displayname cache entry on deleteJoas Schilling2023-08-281-0/+6
|/ / | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | fix!: Move getEventDispatcher usage to IEventDispatcherJoas Schilling2023-07-281-2/+4
| | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | fix!: Remove symfony EventDispatcherInterface from UserJoas Schilling2023-07-272-28/+9
| | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | fix!: Remove User events which have a typed event replacementJoas Schilling2023-07-271-4/+0
|/ | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* chore: Replace \OC::$server->query with \OCP\Server::get in /libChristoph Wurst2023-07-062-4/+4
| | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Merge pull request #34443 from nextcloud/feat/add-enabled-user-backendCôme Chilliet2023-07-031-9/+31
|\ | | | | Add IProvideEnabledStateBackend interface
| * Fix since annotations and add boolean return type for setUserEnabledCôme Chilliet2023-06-201-3/+3
| | | | | | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
| * Fix user tests, avoid setting enabled state to the same valueCôme Chilliet2023-05-231-3/+4
| | | | | | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
| * Add user enabled state backend featureCôme Chilliet2023-05-231-9/+30
| | | | | | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* | Merge pull request #38261 from fsamapoor/replace_strpos_calls_in_lib_privateRobin Appelman2023-06-012-2/+2
|\ \ | | | | | | Refactors "strpos" calls in lib/private to improve code readability.
| * | Refactors "strpos" calls in lib/private to improve code readability.Faraz Samapoor2023-05-152-2/+2
| |/ | | | | | | Signed-off-by: Faraz Samapoor <fsamapoor@gmail.com>
* / fix(dav): Fix avatar size in system address bookJoas Schilling2023-05-261-1/+1
|/ | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* feat(users): Store and load a user's managerChristoph Wurst2023-05-122-0/+33
| | | | | Co-Authored-By: hamza221 <hamzamahjoubi221@gmail.com> Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* fix(user): Can change display nameChristopher Ng2023-05-041-1/+1
| | | | Signed-off-by: Christopher Ng <chrng8@gmail.com>
* fix(dav): Abort requests with 429 instead of waitingJoas Schilling2023-05-031-2/+2
| | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* Update version number in since and deprecated annotationsCôme Chilliet2023-04-271-1/+1
| | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* Make code clearer and bump @ deprecated annotationsCôme Chilliet2023-04-271-1/+1
| | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* Split new method in a new group backend interfaceCarl Schwan2023-04-272-5/+3
| | | | | | Better for backward compatibility, also move new interfaces to nc 26 Signed-off-by: Carl Schwan <carl@carlschwan.eu>
* Optimize retrieving display name when searching for users in a groupCarl Schwan2023-04-272-20/+29
| | | | | | | | | This is recurrent scenario that we are searching for users and then for each users we fetch the displayName. This is inefficient, so instead try to do one query to fetch everything (e.g. Database backend) or use the already existing DisplayNameCache helper. Signed-off-by: Carl Schwan <carl@carlschwan.eu>
* Use typed version of IConfig::getSystemValue as much as possibleCôme Chilliet2023-04-053-6/+6
| | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* Merge pull request #35561 from nextcloud/create-user-transactionJulius Härtl2023-03-151-11/+18
|\
| * Create the database user in a transactionThomas Citharel2023-03-151-11/+18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | In OC\User\Manager::createUserFromBackend the newly created user is read using getUserObject($uid, $backend) but that can cause causal read issues (wrote in DB primary, not yet in secondary). In OC\User\Database user backend the user cache is unset after the insert, so it can't be used by getRealUID() (which is called by getUserObject()). To avoid that we make sure the user cache is repopulated in a transaction. Signed-off-by: Thomas Citharel <tcit@tcit.fr>
* | Merge pull request #37227 from nextcloud/h1-dav-brute-force-protectionArthur Schiwon2023-03-151-10/+16
|\ \ | |/ |/| chore: use local variable for remote address
| * chore: use local variable for remote addressDaniel Kesselberg2023-03-101-10/+16
| | | | | | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* | fix: Recalculate storage statistics on updating the quotaJulius Härtl2023-03-061-0/+1
| | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | also cache backend for user in memory instead of always going to redisRobin Appelman2023-02-101-1/+2
|/ | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
* Fix setQuota on User on 32bitsCôme Chilliet2023-02-071-2/+6
| | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* composer run cs:fixCôme Chilliet2023-01-201-1/+0
| | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* spaces are allowed in useridsSimon L2023-01-101-2/+2
| | | | Signed-off-by: Simon L <szaimen@e.mail.de>
* Merge pull request #34772 from nextcloud/fix/clean-ldap-access-factory-usageCôme Chilliet2022-12-201-10/+10
|\ | | | | Make sure to use AccessFactory to create Access instances and use DI
| * Merge branch 'master' into fix/clean-ldap-access-factory-usageCôme Chilliet2022-11-211-4/+2
| |\ | | | | | | Signed-off-by: Côme Chilliet <91878298+come-nc@users.noreply.github.com>
| * | Fix return type for countUsers methodCôme Chilliet2022-10-251-10/+10
| | | | | | | | | | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* | | Validate if the user part of a "cloud id" can even be a valid user idJoas Schilling2022-12-091-26/+44
| | | | | | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | | feat: add event for failed loginsRoeland Jago Douma2022-11-241-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | Apps might also like to know about failed logins. This adds that event. The private interface changes are backwards compatible so all should be fine. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | | Remove potential mismatching dav session data during loginJulius Härtl2022-11-221-0/+1
| |/ |/| | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | Fix errors from PHP 8.2 testingCôme Chilliet2022-11-141-3/+1
| | | | | | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* | Fix unsuccessful token login logged as errorChristoph Wurst2022-11-071-1/+1
|/ | | | | | | | | | | | | The condition of a non-existent login token can happen for concurrent requests. Admins can not do anything about this. So this is to be expected to happen occasionally. This event is only bad if none of the requests is able to re-acquire a session. Luckily this happens rarely. If a login loop persists an admin can still lower the log level to find this info. But a default error log level will no longer write those infos about the failed cookie login of one request. Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* LDAP to no register new users when outside of fair use or over limitsArthur Schiwon2022-10-181-11/+6
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>