summaryrefslogtreecommitdiffstats
path: root/lib/private/user.php
Commit message (Collapse)AuthorAgeFilesLines
* Move non PSR-4 files from lib/private root to legacyRoeland Jago Douma2016-04-301-639/+0
| | | | | | As discussed we move all old style classes (OC_FOO_BAR) to legacy. Then from there we can evaluate the need to convert them back or if they can be fully deprecated/deleted.
* Merge pull request #23903 from ↵Thomas Müller2016-04-191-0/+4
|\ | | | | | | | | owncloud/fix-user-data-folder-creation-for-apache-login Ensure the user's data folder is created for IApacheBackend authentication
| * Fixes #23899Thomas Müller2016-04-111-0/+4
| |
* | Move logout to controllerLukas Reschke2016-04-181-10/+8
|/ | | | Testable code. Yay.
* Add DAV authenticated also to other scopesLukas Reschke2016-03-071-1/+14
| | | | Fixes https://github.com/owncloud/core/issues/22893
* Remove Scrutinizer Auto FixerLukas Reschke2016-03-011-1/+0
|
* Update author informationLukas Reschke2016-03-011-1/+1
| | | | Probably nice for the people that contributed to 9.0 to see themselves in the AUTHORS file :)
* Scrutinizer Auto-FixesScrutinizer Auto-Fixer2016-02-081-1/+1
| | | | This commit consists of patches automatically generated for this project on https://scrutinizer-ci.com
* Regenerate CSRF token upon loginLukas Reschke2016-01-251-0/+2
| | | | Otherwise somebody else might be able to note down the CSRF token before login on a shared computer.
* Add new CSRF manager for unit testing purposesLukas Reschke2016-01-251-1/+1
| | | | This adds a new CSRF manager for unit testing purposes, it's interface is based upon https://github.com/symfony/security-csrf. Due to some of our required custom changes it is however not possible to use the Symfony component directly.
* move methods to correct interface, deprecate private interfaceJörn Friedrich Dreyer2016-01-141-2/+2
|
* Happy new year!Thomas Müller2016-01-121-6/+4
|
* getMediumStrengthGenerator is deprecated and does not do anything anymoreRoeland Jago Douma2016-01-111-1/+1
|
* Move regeneration of session ID into session classesLukas Reschke2016-01-041-1/+0
| | | | There were code paths that nowadays call ISession::login directly thus bypassing the desired regeneration of the session ID. This moves the session regeneration deeper into the session handling and thus ensures that it is always called. Furthermore, I also added the session regeneration to the remember me cookie plus added some test case expectations for this.
* Use SystemConfig internallyRoeland Jago Douma2015-12-181-2/+2
|
* Get rid of legacy OC_ConfigRoeland Jago Douma2015-12-181-2/+2
| | | | | We were still using the lecagy class OC_Config all over the place. Which was a wrapper around the new class OC\Config
* Removed deprecated function OC_User::deleteUserRoeland Jago Douma2015-12-171-18/+0
| | | | Replaced with proper OCP calls
* Removed unused deprecated methodsRoeland Jago Douma2015-12-171-38/+0
|
* Removed deprecated private OC_User::createUserRoeland Jago Douma2015-12-171-18/+0
| | | | | All function calls are replaced with the recommended (which was already the body of the function).
* Remove deprecated function OC_User::getManagerRoeland Jago Douma2015-12-171-29/+21
| | | | | Private deprecated function => removed Replaced all instances with suggested replacement
* Update license headersLukas Reschke2015-10-261-1/+1
|
* Add remark that $run is not supported anymoreLukas Reschke2015-10-021-0/+2
| | | | Fixes https://github.com/owncloud/core/issues/16908
* Move dummy backend to Tests namespaceLukas Reschke2015-09-221-0/+4
|
* Repeated calls to loginWithApache() should not not try to set user ↵Thomas Müller2015-09-211-4/+6
| | | | information in the session again
* Escape ampersand in logout URLMorris Jobke2015-07-211-1/+1
| | | | * fixes #17757
* Remove OC_LogThomas Müller2015-07-031-4/+4
|
* update license headers and authorsMorris Jobke2015-06-251-0/+1
|
* Merge pull request #16499 from owncloud/fix-phpdoc-annotationsLukas Reschke2015-05-211-1/+1
|\ | | | | Fix PHPDoc :see_no_evil:
| * Fix PHPDoc :see_no_evil:Lukas Reschke2015-05-211-1/+1
| | | | | | | | *sigh*
* | wait with copying the skeleton untill login and setupfs are doneRobin Appelman2015-05-181-1/+4
|/
* Fix namespace duplication and other issues in repairlegacystoragesJoas Schilling2015-04-131-1/+1
|
* Update license headersJenkins for ownCloud2015-03-261-12/+30
|
* Revert "Updating license headers"Morris Jobke2015-02-261-31/+29
| | | | This reverts commit 6a1a4880f0d556fb090f19a5019fec31916f5c36.
* Fix namespace of OC_Setup -> \OC\SetupThomas Müller2015-02-231-1/+1
|
* Merge pull request #13829 from owncloud/appmanager-listVincent Petry2015-02-231-5/+36
|\ | | | | Better caching for enabled apps
| * also set user in UserSession when doing OC_User::setUserIdRobin Appelman2015-02-171-5/+36
| |
* | Updating license headersJenkins for ownCloud2015-02-231-29/+31
|/
* URLEncode logout attributeLukas Reschke2015-02-131-1/+1
| | | | Otherwise logout can fail if the requesttoken contains a +
* Fix WebDAV auth for session authentication onlyLukas Reschke2015-01-201-1/+1
| | | | | | | | | | \Sabre\DAV\Auth\Backend\AbstractBasic::authenticate was only calling \OC_Connector_Sabre_Auth::validateUserPass when the response of \Sabre\HTTP\BasicAuth::getUserPass was not null. However, there is a case where the value can be null and the user could be authenticated anyways: The authentication via ownCloud web-interface and then accessing WebDAV resources. This was not possible anymore with this patch because it never reached the code path in this scenario. This patchs allows authenticating with a session without isDavAuthenticated value stored (this is for ugly WebDAV clients that send the cookie in any case) and thus the functionality should work again. To test this go to the admin settings and test if the WebDAV check works fine. Furthermore all the usual stuff (WebDAV / Shibboleth / etc...) needs testing as well.
* Merge pull request #12923 from owncloud/ultra-slim-version-of-incognito-modeLukas Reschke2014-12-191-0/+7
|\ | | | | Add ultra-slim hack for incognito mode
| * Add ultra-slim hack for incognito modeLukas Reschke2014-12-171-0/+7
| | | | | | | | As discussed at https://github.com/owncloud/core/pull/12912#issuecomment-67391155
* | Merge pull request #12901 from owncloud/move-ldap-check-to-managerRobin McCorkell2014-12-181-3/+0
|\ \ | | | | | | Move the Null-Byte LDAP check to the user manager
| * | Move the Null-Byte LDAP check to the user managerLukas Reschke2014-12-171-3/+0
| |/ | | | | | | | | | | The existing method is deprecated and just a wrapper around the manager method. Since in the future other code paths might call this function instead we need to perform that check here. Related to http://owncloud.org/security/advisory/?id=oc-sa-2014-020
* / Move basic auth login out of `isLoggedIn`Lukas Reschke2014-12-171-5/+9
|/ | | | | | | | | | | | Potentially fixes https://github.com/owncloud/core/issues/12915 and opens the door for potential other bugs... Please test very carefully, this includes: - Testing from OCS via cURL (as in #12915) - Testing from OCS via browser (Open the "Von Dir geteilt" shares overview) - WebDAV - CalDAV - CardDAV
* Add filter for 'backend' to user REST routeLukas Reschke2014-12-101-0/+1
| | | | | | | | This adds a "backend" type filter to the index REST route which is a pre-requisite for https://github.com/owncloud/core/issues/12620 For example when calling `index.php/settings/users/users?offset=0&limit=10&gid=&pattern=&backend=OC_User_Database` only users within the backend `OC_User_Database` would be shown. (requires sending a CSRF token as well) Depends upon https://github.com/owncloud/core/pull/12711
* Add REST route for user & group managementLukas Reschke2014-12-081-20/+5
| | | | First step of a somewhat testable user management. - I know, the JSON returns are in an ugly format but the JS expects it that way. So let's keep it that way until we have time to fix the JS in the future.
* logging changesCraig Morrissey2014-11-071-0/+3
|
* Remove confusingly names \OC\User\Manager::delete and fix the automatic ↵Robin Appelman2014-11-051-3/+0
| | | | cache cleanup instead
* better variable nameArthur Schiwon2014-10-221-3/+4
|
* set up FS by username, not login name\!Arthur Schiwon2014-10-221-1/+1
|