summaryrefslogtreecommitdiffstats
path: root/lib/private/legacy/user.php
Commit message (Collapse)AuthorAgeFilesLines
* Change @georgehrke's emailMorris Jobke2017-11-061-1/+1
| | | | Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* Update license headersMorris Jobke2017-11-061-1/+2
| | | | Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* Inject \OCP\IURLGenerator to make tests workLukas Reschke2017-08-181-2/+3
| | | | Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* Properly allow \OCP\Authentication\IApacheBackend to specify logout URLLukas Reschke2017-08-181-7/+5
| | | | | | | | | | | | | | | | | | | | Any `\OCP\Authentication\IApacheBackend` previously had to implement `getLogoutAttribute` which returns a string. This string is directly injected into the logout `<a>` tag, so returning something like `href="foo"` would result in `<a href="foo">`. This is rather error prone and also in Nextcloud 12 broken as the logout entry has been moved with 054e161eb5f4a5c5c13ee322ae8e93ce66f01b13 inside the navigation manager where one cannot simply inject attributes. Thus this feature is broken in Nextcloud 12 which effectively leads to the bug described at nextcloud/user_saml#112, people cannot logout anymore when using SAML using SLO. Basically in case of SAML you have a SLO url which redirects you to the IdP and properly logs you out there as well. Instead of monkey patching the Navigation manager I decided to instead change `\OCP\Authentication\IApacheBackend` to use `\OCP\Authentication\IApacheBackend::getLogoutUrl` instead where it can return a string with the appropriate logout URL. Since this functionality is only prominently used in the SAML plugin. Any custom app would need a small change but I'm not aware of any and there's simply no way to fix this properly otherwise. Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* Merge pull request #5939 from nextcloud/dont-have-set-uid-as-displaynameMorris Jobke2017-08-011-12/+0
|\ | | | | Remove setUidAsDisplayName
| * Remove setUidAsDisplayNameLukas Reschke2017-07-311-12/+0
| | | | | | | | | | | | This code is a leftover from the old Shibboleth implementation from ownCloud days, nowadays it causes more issues than it does good (such as https://github.com/nextcloud/user_saml/pull/137). Let's remove it for the future thus. Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* | Replace wrong PHPDocsLukas Reschke2017-08-011-1/+3
|/ | | | Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* Remove legacy OC_User_Backend and OC_User_InterfaceRoeland Jago Douma2017-07-241-1/+1
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Merge pull request #5855 from nextcloud/cleanup-legacy-user-classMorris Jobke2017-07-241-67/+1
|\ | | | | Cleanup legacy user class from unused methods
| * Cleanup legacy user class from unused methodsMorris Jobke2017-07-241-67/+1
| | | | | | | | Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* | Cleanup code of personal page to use public interfacesMorris Jobke2017-07-241-51/+0
|/ | | | | | | * public interfaces instead of static code calls * drop static private namespace methods Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* Refactor auth methodsJörn Friedrich Dreyer2017-04-261-2/+3
| | | | Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* Remove legacy class OC_Group and OC_UserMorris Jobke2017-03-091-1/+3
| | | | | | * basically a straight replacement of the wrapped code at the calling code parts Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* Don't force displayname if backend already provides oneLukas Reschke2017-02-161-1/+12
| | | | | | | | `\OC_User::loginWithApache` is used in combination with backend mechanisms like our SSO / SAML integration. Those can optionally already provide a displayname using other means. For example by mapping SAML attributes. The current approach makes it however impossible for backends using `\OCP\Authentication\IApacheBackend` to set a displayname on their own. Because the display name will simply be overwritten with the loginname. Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* Testing md5home (#26854)Vincent Petry2016-12-221-2/+9
| | | | | | | | | | | | | | | | | * Allow clearing default user backends in config.php When specifying "user_backends" in config.php, a new option "default" when set to false will prevent the default user backend to be registered. The default one is the database backend. This makes it possible to select exclusive user backends from apps. * Testing app provides test user backend for alternative homes The backend provide md5 result to getHome() * Only md5 the user home when it's not the admin Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* bring back remember-meChristoph Wurst2016-11-021-2/+3
| | | | | | | | | | * try to reuse the old session token for remember me login * decrypt/encrypt token password and set the session id accordingly * create remember-me cookies only if checkbox is checked and 2fa solved * adjust db token cleanup to store remembered tokens longer * adjust unit tests Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Update with robinJoas Schilling2016-07-211-1/+1
|
* Fix othersJoas Schilling2016-07-211-3/+4
|
* Create session tokens for apache auth usersChristoph Wurst2016-05-311-0/+2
|
* Update license headersLukas Reschke2016-05-261-4/+3
|
* fix setupChristoph Wurst2016-05-111-32/+0
|
* Check if session token is valid and log user out if the check failsChristoph Wurst2016-05-111-1/+1
| | | | | * Update last_activity timestamp of the session token * Check user backend credentials once in 5 minutes
* token based authChristoph Wurst2016-05-111-22/+3
| | | | | | | | * Add InvalidTokenException * add DefaultTokenMapper and use it to check if a auth token exists * create new token for the browser session if none exists hash stored token; save user agent * encrypt login password when creating the token
* Move OC_User_Database to \OC\User\DatabaseRoeland Jago Douma2016-05-101-1/+1
|
* Merge pull request #24410 from owncloud/fix_24182Björn Schießle2016-05-041-2/+5
|\ | | | | first call the post_login hooks, before we call getUserFolder.
| * first call the post_login hooks, before we call getUserFolder.Björn Schießle2016-05-031-2/+5
| | | | | | | | | | | | | | The login process needs to be completed before we can safely create the users home folder. For example we need to give encryption a chance to initialize the users encryption keys in order to copy the skeleton files correctly
* | Merge pull request #23844 from owncloud/disable-userThomas Müller2016-05-031-8/+6
|\ \ | | | | | | Add occ commands to enable and disable a user + a disabled user can n…
| * | Add occ commands to enable and disable a user + a disabled user can no ↵Thomas Müller2016-05-021-8/+6
| |/ | | | | | | longer login - fixes #23838
* / Allow login by email addressThomas Müller2016-05-021-3/+11
|/
* Move non PSR-4 files from lib/private root to legacyRoeland Jago Douma2016-04-301-0/+639
As discussed we move all old style classes (OC_FOO_BAR) to legacy. Then from there we can evaluate the need to convert them back or if they can be fully deprecated/deleted.