aboutsummaryrefslogtreecommitdiffstats
path: root/lib/private
Commit message (Collapse)AuthorAgeFilesLines
* bring back remember-meChristoph Wurst2016-11-0210-39/+126
| | | | | | | | | | * try to reuse the old session token for remember me login * decrypt/encrypt token password and set the session id accordingly * create remember-me cookies only if checkbox is checked and 2fa solved * adjust db token cleanup to store remembered tokens longer * adjust unit tests Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Merge pull request #1966 from nextcloud/fix-csrf-token-generationRoeland Jago Douma2016-11-021-3/+3
|\ | | | | Fix CSRF token generation / validation
| * Fix CSRF token generation / validationLeon Klingele2016-11-021-3/+3
| | | | | | | | | | | | | | Operate on raw bytes instead of base64-encoded strings. Issue was introduced in a977465 Signed-off-by: Leon Klingele <git@leonklingele.de>
* | find and show share-by mail linksBjoern Schiessle2016-11-011-0/+10
| | | | | | | | Signed-off-by: Bjoern Schiessle <bjoern@schiessle.org>
* | send mail for share-by-mail sharesBjoern Schiessle2016-11-011-1/+3
| | | | | | | | Signed-off-by: Bjoern Schiessle <bjoern@schiessle.org>
* | add method to check if a share provider for a given type is loadedBjoern Schiessle2016-11-011-0/+14
| | | | | | | | Signed-off-by: Bjoern Schiessle <bjoern@schiessle.org>
* | add share by mail share providerBjoern Schiessle2016-11-012-0/+52
| | | | | | | | Signed-off-by: Bjoern Schiessle <bjoern@schiessle.org>
* | introduce share by mail, ui partBjoern Schiessle2016-11-011-2/+2
|/ | | | Signed-off-by: Bjoern Schiessle <bjoern@schiessle.org>
* Fix merging backend resultsRoeland Jago Douma2016-11-012-2/+11
| | | | | | | | * Merge share types correctly * Filter share types * Order share types Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Stricter signatureRoeland Jago Douma2016-10-312-2/+3
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Add getShareTypesInFolder to optimize folder listeningRobin Appelman2016-10-313-0/+57
| | | | Signed-off-by: Robin Appelman <icewind@owncloud.com>
* Merge pull request #1937 from nextcloud/ros-for-notification-messageRoeland Jago Douma2016-10-311-12/+55
|\ | | | | Allow rich object strings in messages as well
| * Type hints already make sure it is an arrayJoas Schilling2016-10-311-16/+6
| | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
| * Allow rich object strings in messages as wellJoas Schilling2016-10-311-0/+53
| | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | Cleanup usagesRoeland Jago Douma2016-10-292-20/+0
|/ | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Remove legacy l10nRoeland Jago Douma2016-10-281-343/+0
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Fix more testsRoeland Jago Douma2016-10-281-3/+3
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Move away from OC_L10NRoeland Jago Douma2016-10-284-4/+8
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Proper DI of configRoeland Jago Douma2016-10-281-12/+13
| | | | | | * Fixed comments Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Use callForSeenUsers for avatar migrationMorris Jobke2016-10-281-24/+22
| | | | Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* introduce callForSeenUsers and countSeenUsers (#26361)Jörn Friedrich Dreyer2016-10-283-56/+119
| | | | | | | | | | * introduce callForSeenUsers and countSeenUsers * add tests * oracle should support not null on clob * since 9.2.0
* Merge pull request #1800 from nextcloud/nextcloud-rich-object-stringsMorris Jobke2016-10-274-2/+181
|\ | | | | Nextcloud rich object strings
| * Allow rich object subjects for NotificationsJoas Schilling2016-10-202-2/+67
| | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
| * Add Rich Object Definitions and a validatorJoas Schilling2016-10-202-0/+114
| | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | Merge pull request #1929 from nextcloud/share_email_to_OCSLukas Reschke2016-10-271-80/+0
|\ \ | | | | | | Remove notify recipient function
| * | Remove internal share mail functionRoeland Jago Douma2016-10-261-80/+0
| | | | | | | | | | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | | Fix avatar on exif rotated imagesRoeland Jago Douma2016-10-261-0/+27
|/ / | | | | | | | | | | Fixes #1928 Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | Merge pull request #1920 from ↵Roeland Jago Douma2016-10-263-4/+4
|\ \ | | | | | | | | | | | | nextcloud/legacy-pages-should-also-receive-the-nonce Add nonce also to legacy CSP
| * | Identify Chromium as ChromeJoas Schilling2016-10-262-3/+3
| | | | | | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
| * | Add nonce also to legacy CSPLukas Reschke2016-10-261-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Pages that do not use the AppFramework have its CSP inherited from `\OC_Response::addSecurityHeaders`. While those are not many anymore, there are some examples such as the "Help" page. To stay completely backwards-compatible we should also add the nonce to the legacy CSP response. To test that open your browser console and open the help page. Without this you will get a JS error. With this you won't. Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* | | Merge pull request #1738 from ↵Morris Jobke2016-10-262-0/+84
|\ \ \ | |/ / |/| | | | | | | | nextcloud/comments-provide-displaynames-with-mentions comment mentions: show displayname not uid
| * | resolve displayname via manager and registerable resolversArthur Schiwon2016-10-191-0/+47
| | | | | | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
| * | move mention extraction to (I)Comment and report mentions via DAVArthur Schiwon2016-10-191-0/+37
| | | | | | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | | Missing returns + autoloader fileLukas Reschke2016-10-252-2/+1
| | | | | | | | | | | | Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* | | Inlince oc.js if possible!Roeland Jago Douma2016-10-251-1/+17
| | | | | | | | | | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | | Move browserSupportsCspV3 to CSPNonceManagerRoeland Jago Douma2016-10-254-22/+40
| | | | | | | | | | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | | Move oc.js to a proper classRoeland Jago Douma2016-10-252-1/+246
| | | | | | | | | | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | | Merge pull request #1891 from nextcloud/downstream-26430Lukas Reschke2016-10-251-29/+34
|\ \ \ | | | | | | | | add upgrade command before repair, handle NeedsUpgradeException better
| * | | add upgrade command before repair, handle NeedsUpgradeExcaption betterJörn Friedrich Dreyer2016-10-241-29/+34
| | | |
* | | | Merge pull request #1871 from nextcloud/use-csp-noncesMorris Jobke2016-10-256-6/+116
|\ \ \ \ | | | | | | | | | | Use CSP nonces
| * | | | Add ContentSecurityPolicyNonceManagerLukas Reschke2016-10-242-0/+67
| | | | | | | | | | | | | | | | | | | | Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
| * | | | Add support for CSP noncesLukas Reschke2016-10-244-6/+49
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | CSP nonces are a feature available with CSP v2. Basically instead of saying "JS resources from the same domain are ok to be served" we now say "Ressources from everywhere are allowed as long as they add a `nonce` attribute to the script tag with the right nonce. At the moment the nonce is basically just a `<?php p(base64_encode($_['requesttoken'])) ?>`, we have to decode the requesttoken since `:` is not an allowed value in the nonce. So if somebody does on their own include JS files (instead of using the `addScript` public API, they now must also include that attribute.) IE does currently not implement CSP v2, thus there is a whitelist included that delivers the new CSP v2 policy to newer browsers. Check http://caniuse.com/#feat=contentsecuritypolicy2 for the current browser support list. An alternative approach would be to just add `'unsafe-inline'` as well as `'unsafe-inline'` is ignored by CSPv2 when a nonce is set. But this would make this security feature unusable at all in IE. Not worth it at the moment IMO. Implementing this offers the following advantages: 1. **Security:** As we host resources from the same domain by design we don't have to worry about 'self' anymore being in the whitelist 2. **Performance:** We can move oc.js again to inline JS. This makes the loading way quicker as we don't have to load on every load of a new web page a blocking dynamically non-cached JavaScript file. If you want to toy with CSP see also https://csp-evaluator.withgoogle.com/ Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* | | | | Merge pull request #1890 from nextcloud/downstream-25428Morris Jobke2016-10-252-2/+28
|\ \ \ \ \ | | | | | | | | | | | | fixing php 32 bit (arm) filemtime on large file issue (#18971) (#25428)
| * | | | | Add check for linux osLukas Reschke2016-10-251-1/+5
| | | | | | | | | | | | | | | | | | | | | | | | Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
| * | | | | Move function to LargeFileHelperLukas Reschke2016-10-252-1/+16
| | | | | | | | | | | | | | | | | | | | | | | | Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
| * | | | | fixing php 32 bit (arm) filemtime on large file issue (#18971) (#25428)Boris Rybalkin2016-10-251-2/+9
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * fixing php 32 bit (arm) filemtime on large file issue (#18971) * cast to int
* | | | | | Remove not existent function callLukas Reschke2016-10-252-12/+2
|/ / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - Removes a not existent function call - Removes a fallback for Windows Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
* | | | | Merge pull request #1884 from nextcloud/downstream-26292Lukas Reschke2016-10-251-0/+3
|\ \ \ \ \ | | | | | | | | | | | | Fix logClientIn for non-existing users (#26292)
| * | | | | Fix logClientIn for non-existing users (#26292)Vincent Petry2016-10-251-0/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The check for two factor enforcement would return true for non-existing users. This fix makes it return false in order to be able to perform the regular login which will then fail and return false. This prevents throwing PasswordLoginForbidden for non-existing users.
* | | | | | Merge pull request #1452 from nextcloud/appconfig-endpointJoas Schilling2016-10-251-0/+1
|\ \ \ \ \ \ | | | | | | | | | | | | | | Appconfig endpoint