summaryrefslogtreecommitdiffstats
path: root/tests/Core
Commit message (Collapse)AuthorAgeFilesLines
* Check getRedirectUri() for queriesRussellAult2019-11-131-3/+12
| | | | | | | | Resolves Issue #17885 Check getRedirectUri() for queries, and add a '&' instead of a '?' to $redirectUri if it already has them; otherwise, $redirectUri might end up with two '?'. Signed-off-by: RussellAult <russellault@users.noreply.github.com>
* Harden middleware checkRoeland Jago Douma2019-10-251-4/+85
| | | | | | | These annotations will allow for extra checks. And thus make it harder to break things. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Merge pull request #17411 from kinolaev/fix-oauth2-redirectRoeland Jago Douma2019-10-071-1/+2
|\ | | | | Fix oauth client redirect
| * fix oauth client redirectSergej Nikolaev2019-10-041-1/+2
| | | | | | | | Signed-off-by: Sergej Nikolaev <kinolaev@gmail.com>
* | Add Fatal logging optionTim Terhorst2019-10-021-0/+2
|/ | | | Signed-off-by: Tim Terhorst <mynamewastaken+gitlab@gmail.com>
* Move settings to an appChristoph Wurst2019-09-281-1/+1
| | | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at> Signed-off-by: npmbuildbot[bot] <npmbuildbot[bot]@users.noreply.github.com>
* Add test case for existing user with token nullDaniel Kesselberg2019-08-181-0/+16
| | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* Return the disabled user mock instead of the existingDaniel Kesselberg2019-08-181-1/+1
| | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* Fix login flow form actionsRoeland Jago Douma2019-08-111-0/+6
| | | | | | | | So fun fact. Chrome considers a redirect after submitting a form part of the form actions. Since we redirect to a new protocol (nc://login/). Causing the form submission to work but the redirect failing hard. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Merge pull request #16544 from nextcloud/bugfix/16540Roeland Jago Douma2019-07-311-5/+15
|\ | | | | Add missing password reset page to vue
| * Move actual password reset to vueJulius Härtl2019-07-311-5/+15
| | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | Use proper exception in lostControllerRoeland Jago Douma2019-07-271-3/+9
|/ | | | | | | | | | There is no need to log the expcetion of most of the stuff here. We should properly log them but an exception is excessive. This moves it to a proper exception which we can catch and then log. The other exceptions will still be fully logged. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Merge pull request #16308 from nextcloud/fix/undefined-offset-0Morris Jobke2019-07-101-24/+27
|\ | | | | Prevent undefined offset 0 in findByUserIdOrMail
| * Return first value from $usersDaniel Kesselberg2019-07-091-24/+27
| | | | | | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* | Don't send executionContexts for Clear-Site-DataDaniel Kesselberg2019-07-091-2/+2
|/ | | | | | | | | | There are plans to remove executionContexts from the spec: https://github.com/w3c/webappsec-clear-site-data/issues/59 Firefox already removed it https://bugzilla.mozilla.org/show_bug.cgi?id=1548034 Chromium implementation is not finish: https://bugs.chromium.org/p/chromium/issues/detail?id=898503&q=clear-site-data&sort=-modified&colspec=ID%20Pri%20M%20Stars%20ReleaseBlock%20Component%20Status%20Owner%20Summary%20OS%20Modified Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* Fix subscription testsJulius Härtl2019-06-171-0/+2
| | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* Vueify the login pageChristoph Wurst2019-05-291-39/+69
| | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Stop decryption when maintenance mode is enabled, fixes #8311Ruben Homs2019-05-212-8/+54
| | | | Signed-off-by: Ruben Homs <ruben@homs.codes>
* Remote wipe supportRoeland Jago Douma2019-05-201-0/+120
| | | | | | | | This allows a user to mark a token for remote wipe. Clients that support this can then wipe the device properly. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl> Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Merge pull request #15304 from nextcloud/enh/2fa_setup_at_loginRoeland Jago Douma2019-05-172-3/+158
|\ | | | | 2FA setup during login
| * Allow 2FA to be setup on first loginRoeland Jago Douma2019-05-172-3/+158
| | | | | | | | | | | | | | | | | | Once 2FA is enforced for a user and they have no 2FA setup yet this will now prompt them with a setup screen. Given that providers are enabled that allow setup then. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl> Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* | Allow clients to delete their own apptokenRoeland Jago Douma2019-05-171-0/+57
|/ | | | | | Fixes #15480 Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Add a login chain to reduce the complexity of LoginController::tryLoginChristoph Wurst2019-05-071-327/+110
| | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Make appstore app:enable test more robust by using only shipped appsMorris Jobke2019-03-141-3/+8
| | | | Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* Add an event to the Autocomplete Controller to allow to filter the resultsJoas Schilling2019-02-261-3/+9
| | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* Login flow V2Roeland Jago Douma2019-02-251-0/+321
| | | | | | | | This adds the new login flow. The desktop client will open up a browser and poll a returned endpoint at regular intervals to check if the flow is done. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Merge pull request #14066 from nextcloud/feature/noid/casted-system-valuesJoas Schilling2019-02-222-2/+2
|\ | | | | Get typed system values
| * Fix unit testsJoas Schilling2019-02-222-2/+2
| | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | Use contacts instead of logreaderDaniel Kesselberg2019-02-191-3/+3
| | | | | | | | | | | | Logreader is not distributed by app store because shipped by default. Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* | Add install logic for enable commandDaniel Kesselberg2019-02-191-3/+3
| | | | | | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* | Strict Types, Return TypesDaniel Kesselberg2019-02-192-4/+9
| | | | | | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* | Disable multiple apps at onceDaniel Kesselberg2019-02-191-0/+84
| | | | | | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* | Enable multiple apps at onceDaniel Kesselberg2019-02-191-0/+89
|/ | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* Emit event if app password createdDaniel Kesselberg2019-02-182-50/+23
| | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* Publish activity for app token created by client login flowDaniel Kesselberg2019-02-171-1/+35
| | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* Publish activity for app token created by ocs apiDaniel Kesselberg2019-02-171-1/+24
| | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* Merge pull request #13969 from ↵Morris Jobke2019-02-072-8/+8
|\ | | | | | | | | nextcloud/enh/additional_scripts_no_on_public_pages No need to emit additonalscript event on public pages
| * Add StandaloneTemplateResponseRoeland Jago Douma2019-02-062-8/+8
| | | | | | | | | | | | | | This can be used by pages that do not have the full Nextcloud UI. So notifications etc do not load there. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | Remove public interface that was only needed for testingMorris Jobke2019-02-071-1/+0
| | | | | | | | Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* | Implement guest avatar endpointMichael Weimann2019-02-072-2/+92
|/ | | | Signed-off-by: Michael Weimann <mail@michael-weimann.eu>
* Clean pending 2FA authentication on password resetRoeland Jago Douma2019-01-291-1/+6
| | | | | | | | | | | When a password is reste we should make sure that all users are properly logged in. Pending states should be cleared. For example a session where the 2FA code is not entered yet should be cleared. The token is now removed so the session will be killed the next time this is checked (within 5 minutes). Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Honor remember_login_cookie_lifetimeRoeland Jago Douma2019-01-231-0/+24
| | | | | | | | | | | | If the remember_login_cookie_lifetime is set to 0 this means we do not want to use remember me at all. In that case we should also not creatae a remember me cookie and should create a proper temp token. Further this specifies that is not 0 the remember me time should always be larger than the session timeout. Because else the behavior is not really defined. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Fix template paramterRoeland Jago Douma2019-01-181-1/+1
| | | | | | Else we get shown an error page instead of the correct 403. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Fix testsRoeland Jago Douma2019-01-151-9/+23
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Fix testsJohn Molakvoæ (skjnldsv)2018-11-291-64/+0
| | | | Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Use the proper server for the apptoken flow loginRoeland Jago Douma2018-11-011-2/+8
| | | | | | | | | | | | | If a user can't authenticate normally (because they have 2FA that is not available on their devices for example). The redirect that is generated should be of the proper format. This means 1. Include the protocol 2. Include the possible subfolder Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* adapted automated test for autocomplete changesRayn0r2018-10-301-6/+14
| | | | Signed-off-by: Rayn0r <Andre.Weidemann@web.de>
* Keep list of icons in a separate file for use in the accessibility appJulius Härtl2018-10-251-1/+3
| | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* Remove cookies from Clear-Site-Data HeaderPatrick Conrad2018-10-151-2/+2
| | | | | | | | | | | | | In https://github.com/nextcloud/server/commit/2f87fb6b456fd109c90a5093c31b7a3f62a32040 this header was introduced. The referenced documentation says: > When delivered with a response from https://example.com/clear, the following header will cause cookies associated with the origin https://example.com to be cleared, as well as cookies on any origin in the same registered domain (e.g. https://www.example.com/ and https://more.subdomains.example.com/). This also applies if `https://nextcloud.example.com/` sends the `Clear-Site-Data: "cookies"` header. This is not the behavior we want at this point! So I removed the deletion of cookies from the header. This has no effect on the logout process as this header is supported only recently and the logout works in old browsers as well. Signed-off-by: Patrick Conrad <conrad@iza.org>
* Merge pull request #11765 from nextcloud/feature/mandatory-2fa-for-groupsMorris Jobke2018-10-151-12/+49
|\ | | | | Mandatory 2FA for groups