Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Set last-login-check on basic auth | Roeland Jago Douma | 2016-12-05 | 1 | -0/+5 |
| | | | | | | | | | Else the last-login-check fails hard because the session value is not set and thus defaults to 0. * Started with tests Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl> | ||||
* | do not remember session tokens by default | Christoph Wurst | 2016-11-27 | 1 | -1/+1 |
| | | | | | | | | We have to respect the value of the remember-me checkbox. Due to an error in the source code the default value for the session token was to remember it. Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at> | ||||
* | fix warning with token login | Robin Appelman | 2016-11-16 | 1 | -1/+1 |
| | | | | Signed-off-by: Robin Appelman <robin@icewind.nl> | ||||
* | read lockdown scope from token | Robin Appelman | 2016-11-16 | 1 | -2/+1 |
| | | | | Signed-off-by: Robin Appelman <icewind@owncloud.com> | ||||
* | basic lockdown logic | Robin Appelman | 2016-11-16 | 1 | -0/+2 |
| | | | | Signed-off-by: Robin Appelman <icewind@owncloud.com> | ||||
* | @since 9.2.0 to @since 11.0.0 | Roeland Jago Douma | 2016-11-15 | 1 | -2/+2 |
| | | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl> | ||||
* | Introduce an event for first time login based on the last login time stamp | Thomas Müller | 2016-11-14 | 3 | -15/+23 |
| | | | | | | | | | | | | Use firstLogin event to trigger creation of default calendar and default address book Delay login of admin user after setup so that firstLogin event can properly be processed for the admin Fixing tests ... Skeleton files are not copied over -> only 3 cache entries are remaining Use updateLastLoginTimestamp to properly setup lastLogin value for a test user | ||||
* | inject ISecureRandom into user session and use injected config too | Christoph Wurst | 2016-11-02 | 1 | -11/+18 |
| | | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at> | ||||
* | bring back remember-me | Christoph Wurst | 2016-11-02 | 1 | -19/+51 |
| | | | | | | | | | | * try to reuse the old session token for remember me login * decrypt/encrypt token password and set the session id accordingly * create remember-me cookies only if checkbox is checked and 2fa solved * adjust db token cleanup to store remembered tokens longer * adjust unit tests Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at> | ||||
* | Proper DI of config | Roeland Jago Douma | 2016-10-28 | 1 | -12/+13 |
| | | | | | | * Fixed comments Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl> | ||||
* | introduce callForSeenUsers and countSeenUsers (#26361) | Jörn Friedrich Dreyer | 2016-10-28 | 1 | -19/+116 |
| | | | | | | | | | | * introduce callForSeenUsers and countSeenUsers * add tests * oracle should support not null on clob * since 9.2.0 | ||||
* | Fix logClientIn for non-existing users (#26292) | Vincent Petry | 2016-10-25 | 1 | -0/+3 |
| | | | | | | | The check for two factor enforcement would return true for non-existing users. This fix makes it return false in order to be able to perform the regular login which will then fail and return false. This prevents throwing PasswordLoginForbidden for non-existing users. | ||||
* | dont update the auth token twice | Robin Appelman | 2016-10-11 | 1 | -2/+0 |
| | | | | Signed-off-by: Robin Appelman <robin@icewind.nl> | ||||
* | Cache non existing DB user | Roeland Jago Douma | 2016-10-10 | 1 | -2/+7 |
| | | | | | | | | | We always query the database backend. Even if we use a different one (ldap for example). Now we do this everytime we try to get a user object so caching that a user is not in the DB safes some queries on each request then (at least 2 what I found). Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl> | ||||
* | Only trigger postDelete hooks when the user was deleted... | Joas Schilling | 2016-09-29 | 1 | -3/+3 |
| | | | | Signed-off-by: Joas Schilling <coding@schilljs.com> | ||||
* | Remove notifications upon user deletion | Joas Schilling | 2016-09-29 | 1 | -0/+4 |
| | | | | Signed-off-by: Joas Schilling <coding@schilljs.com> | ||||
* | Merge pull request #1087 from nextcloud/get-delay-twice | Lukas Reschke | 2016-08-30 | 1 | -2/+1 |
|\ | | | | | dont get bruteforce delay twice | ||||
| * | dont get bruteforce delay twice | Robin Appelman | 2016-08-29 | 1 | -2/+1 |
| | | |||||
* | | Fix issues where some user settings cannot be loaded when the user id ↵ | Thomas Müller | 2016-08-29 | 1 | -0/+10 |
|/ | | | | differs in case sensitivity - fixes #25684 (#25686) | ||||
* | Add PHPdoc | Roeland Jago Douma | 2016-08-15 | 1 | -3/+5 |
| | |||||
* | missing PHPDoc | Jörn Friedrich Dreyer | 2016-08-14 | 1 | -0/+1 |
| | |||||
* | Type compatability | Jörn Friedrich Dreyer | 2016-08-14 | 1 | -1/+1 |
| | |||||
* | Method is deprecated | Jörn Friedrich Dreyer | 2016-08-14 | 1 | -3/+3 |
| | |||||
* | Unreachable statement | Jörn Friedrich Dreyer | 2016-08-14 | 1 | -4/+1 |
| | |||||
* | Unnecessary fully qualified names | Jörn Friedrich Dreyer | 2016-08-14 | 4 | -17/+25 |
| | |||||
* | Apply password policy on user creation | michag86 | 2016-08-03 | 1 | -0/+2 |
| | |||||
* | Update with robin | Joas Schilling | 2016-07-21 | 5 | -5/+5 |
| | |||||
* | Fix others | Joas Schilling | 2016-07-21 | 7 | -13/+21 |
| | |||||
* | Mitigate race condition | Lukas Reschke | 2016-07-20 | 1 | -1/+4 |
| | |||||
* | Implement brute force protection | Lukas Reschke | 2016-07-20 | 1 | -5/+18 |
| | | | | | | | | | Class Throttler implements the bruteforce protection for security actions in Nextcloud. It is working by logging invalid login attempts to the database and slowing down all login attempts from the same subnet. The max delay is 30 seconds and the starting delay are 200 milliseconds. (after the first failed login) | ||||
* | Merge remote-tracking branch 'upstream/master' into master-sync-upstream | Lukas Reschke | 2016-07-01 | 1 | -40/+61 |
|\ | |||||
| * | Login hooks (#25260) | Christoph Wurst | 2016-06-27 | 1 | -40/+61 |
| | | | | | | | | | | | | | | | | | | | | | | | | * fix login hooks * adjust user session tests * fix login return value of successful token logins * trigger preLogin hook earlier; extract method 'loginWithPassword' * call postLogin hook earlier; add PHPDoc | ||||
* | | Merge remote-tracking branch 'upstream/master' into master-sync-upstream | Lukas Reschke | 2016-06-27 | 1 | -2/+11 |
|\| | |||||
| * | check login name when authenticating with client token | Christoph Wurst | 2016-06-24 | 1 | -2/+11 |
| | | |||||
* | | verify user password on change | Bjoern Schiessle | 2016-06-27 | 1 | -2/+8 |
|/ | |||||
* | Merge pull request #25172 from owncloud/token-login-validation | Vincent Petry | 2016-06-22 | 1 | -67/+108 |
|\ | | | | | Token login validation | ||||
| * | fix unit test warning/errors | Christoph Wurst | 2016-06-20 | 1 | -11/+9 |
| | | |||||
| * | fix nitpick | Christoph Wurst | 2016-06-20 | 1 | -2/+3 |
| | | |||||
| * | dont create a session token for clients, validate the app password instead | Christoph Wurst | 2016-06-17 | 1 | -8/+24 |
| | | |||||
| * | store last check timestamp in token instead of session | Christoph Wurst | 2016-06-17 | 1 | -52/+92 |
| | | |||||
| * | use token last_activity instead of session value | Christoph Wurst | 2016-06-17 | 1 | -16/+2 |
| | | |||||
* | | update session token password on user password change | Christoph Wurst | 2016-06-21 | 1 | -0/+17 |
| | | |||||
* | | add PasswordLoginForbiddenException | Christoph Wurst | 2016-06-17 | 1 | -17/+20 |
|/ | |||||
* | create session token only for clients that support cookies | Christoph Wurst | 2016-06-13 | 1 | -2/+11 |
| | |||||
* | create session token on all APIs | Christoph Wurst | 2016-06-13 | 1 | -2/+7 |
| | |||||
* | Merge pull request #25000 from owncloud/fix-email-login-dav | Vincent Petry | 2016-06-09 | 1 | -3/+14 |
|\ | | | | | Allow login by email address via webdav as well | ||||
| * | Allow login by email address via webdav as well - fixes #24791 | Thomas Müller | 2016-06-09 | 1 | -3/+14 |
| | | |||||
* | | catch sessionnotavailable exception if memory session is used | Christoph Wurst | 2016-06-08 | 1 | -5/+10 |
| | | |||||
* | | When creating a session token, make sure it's the login password and not a ↵ | Christoph Wurst | 2016-06-08 | 1 | -5/+28 |
|/ | | | | device token | ||||
* | Create session tokens for apache auth users | Christoph Wurst | 2016-05-31 | 1 | -4/+14 |
| |