Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/nextcloud/server.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2019-12-05Update license headersChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2019-11-25Add return type hint to credential store and make it strictChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2019-11-22Some php-cs fixesRoeland Jago Douma
* Order the imports * No leading slash on imports * Empty line before namespace * One line per import * Empty after imports * Emmpty line at bottom of file Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2019-06-25Add event dispatcher to OCPChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2019-05-17Allow 2FA to be setup on first loginRoeland Jago Douma
Once 2FA is enforced for a user and they have no 2FA setup yet this will now prompt them with a setup screen. Given that providers are enabled that allow setup then. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl> Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2018-12-03Fix activatable/deactivatable 2fa provider interface typosChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2018-10-02Consolidate personal two-factor provider settingsChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2018-10-01Let 2FA providers provide their custom icons (dark/light)Christoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2018-10-01Emit event on enablign or disabling of 2FA providerRoeland Jago Douma
Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2018-09-25Only allow 2FA state changs if providers support the operationChristoph Wurst
Ref https://github.com/nextcloud/server/issues/11019. Add `twofactorauth:cleanup` command Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2018-09-10Add public interfaces for activable/deactivable 2FA providersChristoph Wurst
Fixes https://github.com/nextcloud/server/issues/11018. Required for https://github.com/nextcloud/server/issues/11019. Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2018-06-20Make 2FA providers statefulChristoph Wurst
This adds persistence to the Nextcloud server 2FA logic so that the server knows which 2FA providers are enabled for a specific user at any time, even when the provider is not available. The `IStatefulProvider` interface was added as tagging interface for providers that are compatible with this new API. Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2018-03-26Strict 2FARoeland Jago Douma
* make OCP\Authentication\TwoFactorAuth strict * scalar types * return types Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2018-01-25Dispatch event on twofactor failure and successRoeland Jago Douma
Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2017-11-06Update license headersMorris Jobke
Signed-off-by: Morris Jobke <hey@morrisjobke.de>
2017-08-26Merge pull request #6177 from nextcloud/properly-add-slo-urlMorris Jobke
Properly allow \OCP\Authentication\IApacheBackend to specify logout URL
2017-08-26Allow 2FA providers to specify their custom CSPChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2017-08-18Properly allow \OCP\Authentication\IApacheBackend to specify logout URLLukas Reschke
Any `\OCP\Authentication\IApacheBackend` previously had to implement `getLogoutAttribute` which returns a string. This string is directly injected into the logout `<a>` tag, so returning something like `href="foo"` would result in `<a href="foo">`. This is rather error prone and also in Nextcloud 12 broken as the logout entry has been moved with 054e161eb5f4a5c5c13ee322ae8e93ce66f01b13 inside the navigation manager where one cannot simply inject attributes. Thus this feature is broken in Nextcloud 12 which effectively leads to the bug described at nextcloud/user_saml#112, people cannot logout anymore when using SAML using SLO. Basically in case of SAML you have a SLO url which redirects you to the IdP and properly logs you out there as well. Instead of monkey patching the Navigation manager I decided to instead change `\OCP\Authentication\IApacheBackend` to use `\OCP\Authentication\IApacheBackend::getLogoutUrl` instead where it can return a string with the appropriate logout URL. Since this functionality is only prominently used in the SAML plugin. Any custom app would need a small change but I'm not aware of any and there's simply no way to fix this properly otherwise. Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
2017-05-12Thows exception if password not availableMorris Jobke
Signed-off-by: Morris Jobke <hey@morrisjobke.de>
2017-01-11fix @since annotations (9.1->12)Christoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2017-01-11add @since annotations and document methodsChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2017-01-11add login credential storeChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2017-01-11fix coding style and increase code coverageChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2017-01-11Update TwoFactorException.phpCornelius Kölbel
Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
2017-01-11Add a TwoFactorExceptionCornelius Kölbel
A Two Factor third party App may throw a TwoFactorException() with a more detailed error message in case the authentication fails. The 2FA Controller will then display the message of this Exception to the user. Working on #26593 Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
2016-07-21Fix othersJoas Schilling
2016-05-26Update license headersLukas Reschke
2016-05-23Add two factor auth to coreChristoph Wurst
2016-05-17Move \OCP\Authentication to PSR-4 (#24632)Roeland Douma