Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/nextcloud/server.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2021-12-16Enable strict types for the 2FA middlewareChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2021-12-10Fix setting up 2FA when no providers are set up but backup codesChristoph Wurst
2FA set up is allowed when only backup codes are set up but no other provider and no provider is failing. This patch syncs up the login controller check with the challenge controller check 10 lines above. Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2021-11-17Explicitly allow some routes without 2FAChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2021-10-04Allow "TwoFactor Nextcloud Notifications" to pull the state of the 2FA againJoas Schilling
Signed-off-by: Joas Schilling <coding@schilljs.com>
2021-09-06Remove 2FA exemption from PublicPage annotationLukas Reschke
Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
2021-07-30Fix setting up 2FA providers when 2FA is enforced and bc are generatedChristoph Wurst
When a user has backup codes generated and got their 2FA enforced then they should be able to set up TOTP and similar providers during the login. Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2021-07-21Improve provider checkLukas Reschke
Check if there is a provider missing. Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
2021-06-04Update php licensesJohn Molakvoæ (skjnldsv)
Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
2020-04-10Format control structures, classes, methods and functionChristoph Wurst
To continue this formatting madness, here's a tiny patch that adds unified formatting for control structures like if and loops as well as classes, their methods and anonymous functions. This basically forces the constructs to start on the same line. This is not exactly what PSR2 wants, but I think we can have a few exceptions with "our" style. The starting of braces on the same line is pracrically standard for our code. This also removes and empty lines from method/function bodies at the beginning and end. Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2020-04-10Use elseif instead of else ifChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2019-12-05Update license headersChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2019-10-25Harden middleware checkRoeland Jago Douma
These annotations will allow for extra checks. And thus make it harder to break things. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2019-05-17Allow 2FA to be setup on first loginRoeland Jago Douma
Once 2FA is enforced for a user and they have no 2FA setup yet this will now prompt them with a setup screen. Given that providers are enabled that allow setup then. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl> Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2019-02-20No need to check 2fa state on apptoken loginsRoeland Jago Douma
If you login with an apptoken there is no need to check 2FA state as this does not apply to apptokens. Not checking saves us a query on each request made from a client. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2017-11-06Update license headersMorris Jobke
Signed-off-by: Morris Jobke <hey@morrisjobke.de>
2017-08-01Remove explicit type hints for ControllerLukas Reschke
This is public API and breaks the middlewares of existing apps. Since this also requires maintaining two different code paths for 12 and 13 I'm at the moment voting for reverting this change. Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
2017-07-31Fix middleware implementations signaturesRoeland Jago Douma
Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2017-05-15Check whether the $_SERVER['REQUEST_*'] vars exist before using themJoas Schilling
Signed-off-by: Joas Schilling <coding@schilljs.com>
2016-08-24prevent infinite redirect loops if the there is no 2fa provider to passChristoph Wurst
This fixes infinite loops that are caused whenever a user is about to solve a 2FA challenge, but the provider app is disabled at the same time. Since the session value usually indicates that the challenge needs to be solved before we grant access we have to remove that value instead in this special case.
2016-08-12Throw exception if you don't handle itRoeland Jago Douma
2016-07-21Fix othersJoas Schilling
2016-06-07Allow to cancel 2FA after loginJoas Schilling
2016-06-01remember redirect_url when solving the 2FA challengeChristoph Wurst
2016-05-26Update license headersLukas Reschke
2016-05-23add OCC command to enable/disable 2FA for a userChristoph Wurst
2016-05-23Add two factor auth to coreChristoph Wurst