Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/nextcloud/server.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2017-11-08Theming: theme flow redirection pageJulius Härtl
Signed-off-by: Julius Härtl <jus@bitgrid.net>
2017-09-06Fix testsMorris Jobke
Signed-off-by: Morris Jobke <hey@morrisjobke.de>
2017-08-30Properly allow \OCP\Authentication\IApacheBackend to specify logout URLLukas Reschke
Any `\OCP\Authentication\IApacheBackend` previously had to implement `getLogoutAttribute` which returns a string. This string is directly injected into the logout `<a>` tag, so returning something like `href="foo"` would result in `<a href="foo">`. This is rather error prone and also in Nextcloud 12 broken as the logout entry has been moved with 054e161eb5f4a5c5c13ee322ae8e93ce66f01b13 inside the navigation manager where one cannot simply inject attributes. Thus this feature is broken in Nextcloud 12 which effectively leads to the bug described at nextcloud/user_saml#112, people cannot logout anymore when using SAML using SLO. Basically in case of SAML you have a SLO url which redirects you to the IdP and properly logs you out there as well. Instead of monkey patching the Navigation manager I decided to instead change `\OCP\Authentication\IApacheBackend` to use `\OCP\Authentication\IApacheBackend::getLogoutUrl` instead where it can return a string with the appropriate logout URL. Since this functionality is only prominently used in the SAML plugin. Any custom app would need a small change but I'm not aware of any and there's simply no way to fix this properly otherwise. Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
2017-05-18Add tests for ClientFlowLoginControllerLukas Reschke
Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
2017-05-11Disable the API endpoints as wellJoas Schilling
Signed-off-by: Joas Schilling <coding@schilljs.com>
2017-05-10Automatic injection for CssControllerJoas Schilling
Signed-off-by: Joas Schilling <coding@schilljs.com>
2017-05-10Automatic injection for JsControllerJoas Schilling
Signed-off-by: Joas Schilling <coding@schilljs.com>
2017-05-04Update login flow redirectionMario Danic
Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
2017-04-26add contactsmenu popoverGeorg Ehrke
Signed-off-by: Georg Ehrke <developer@georgehrke.com>
2017-04-26Merge branch 'master' into contactsmenuJan-Christoph Borchardt
Signed-off-by: Jan-Christoph Borchardt <hey@jancborchardt.net>
2017-04-25Let apps register contact menu provider via info.xmlChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2017-04-25Contacts menuChristoph Wurst
* load list of contacts from the server * show last message of each contact Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2017-04-25AppToken to 72 charsRoeland Jago Douma
Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2017-04-25Add new auth flowLukas Reschke
This implements the basics for the new app-password based authentication flow for our clients. The current implementation tries to keep it as simple as possible and works the following way: 1. Unauthenticated client opens `/index.php/login/flow` 2. User will be asked whether they want to grant access to the client 3. If accepted the user has the chance to do so using existing App Token or automatically generate an app password. If the user chooses to use an existing app token then that one will simply be redirected to the `nc://` protocol handler. While we can improve on that in the future, I think keeping this smaller at the moment has its advantages. Also, in the near future we have to think about an automatic migration endpoint so there's that anyways :-) If the user chooses to use the regular login the following happens: 1. A session state token is written to the session 2. User is redirected to the login page 3. If successfully authenticated they will be redirected to a page redirecting to the POST controller 4. The POST controller will check if the CSRF token as well as the state token is correct, if yes the user will be redirected to the `nc://` protocol handler. This approach is quite simple but also allows to be extended in the future. One could for example allow external websites to consume this authentication endpoint as well. Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
2017-04-25Fix remember redirect_url on failed login attemptsChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2017-04-19Rename renderHTML to renderHtmlMorris Jobke
* fixes #4383 * improves consistency Signed-off-by: Morris Jobke <hey@morrisjobke.de>
2017-04-19Merge pull request #4350 from ↵Roeland Jago Douma
nextcloud/adjust-old-bruteforce-protection-annotations Adjust existing bruteforce protection code
2017-04-18Add bruteforce protection to changePersonalPasswordLukas Reschke
While the risk is actually quite low because one would already have the user session and could potentially do other havoc it makes sense to throttle here in case of invalid previous password attempts. Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
2017-04-14Adjust existing bruteforce protection codeLukas Reschke
- Moves code to annotation - Adds the `throttle()` call on the responses on existing annotations Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
2017-04-14Make BruteForceProtection annotation more cleverLukas Reschke
This makes the new `@BruteForceProtection` annotation more clever and moves the relevant code into it's own middleware. Basically you can now set `@BruteForceProtection(action=$key)` as annotation and that will make the controller bruteforce protected. However, the difference to before is that you need to call `$responmse->throttle()` to increase the counter. Before the counter was increased every time which leads to all kind of unexpected problems. Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
2017-04-13Merge pull request #4308 from nextcloud/lost-password-emailLukas Reschke
Update email template for lost password email
2017-04-13Merge pull request #2424 from ↵Morris Jobke
nextcloud/fix-login-controller-test-consolidate-login Fix login controller test and consolidate login
2017-04-13Merge pull request #3043 from nextcloud/issue-3038-no-logentry-on-email-loginMorris Jobke
Dont create a log entry on email login
2017-04-12Update email template for lost password emailMorris Jobke
Signed-off-by: Morris Jobke <hey@morrisjobke.de>
2017-04-10Move OC_Defaults to OCP\DefaultsMorris Jobke
* currently there are two ways to access default values: OCP\Defaults or OC_Defaults (which is extended by OCA\Theming\ThemingDefaults) * our code used a mixture of both of them, which made it hard to work on theme values * this extended the public interface with the missing methods and uses them everywhere to only rely on the public interface Signed-off-by: Morris Jobke <hey@morrisjobke.de>
2017-04-07Dont create a log entry on email loginJoas Schilling
Signed-off-by: Joas Schilling <coding@schilljs.com>
2017-04-06do login routine only once when done via LoginControllerArthur Schiwon
Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2017-04-06fix login controller testsArthur Schiwon
Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2017-04-05Merge pull request #4123 from nextcloud/allow-password-reset-with-emailRoeland Jago Douma
Allow to reset the password with the email as an input
2017-03-29Fix gzip files for SafariMorris Jobke
* Safari support gzip only if the filename does not end on .gz - so this renames them to .gzip Signed-off-by: Morris Jobke <hey@morrisjobke.de>
2017-03-29Fix controller testsRoeland Jago Douma
Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2017-03-28Allow to reset the password with the email as an inputJoas Schilling
Signed-off-by: Joas Schilling <coding@schilljs.com>
2017-03-24TestsRoeland Jago Douma
Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2017-02-23Clean up single user modeMorris Jobke
Single user mode basically disables WebDAV, OCS and cron execution. Since we heavily rely on WebDAV and OCS also in the web UI it's basically useless. An admin only sees a broken interface and can't even change any settings nor sees any files. Also sharing is not possible. As this is at least the case since Nextcloud 9 and we haven't received any reports for this it seems that this feature is not used at all so I removed it. The encryption commands now rely on the well tested maintenance mode. Signed-off-by: Morris Jobke <hey@morrisjobke.de>
2017-02-02oc_token should be nc_tokenChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2017-01-31Merge pull request #2044 from nextcloud/login-credential-storeMorris Jobke
Login credential store
2017-01-25unify endpoints form core and the the provisioning apiBjoern Schiessle
Signed-off-by: Bjoern Schiessle <bjoern@schiessle.org>
2017-01-17Merge pull request #3023 from ↵Christoph Wurst
nextcloud/issue-2915-filter-out-sensitive-appconfigs Filter out sensitive appconfig values
2017-01-13Merge pull request #2918 from nextcloud/encryption-recovery-improvementsMorris Jobke
create new encryption keys on password reset and backup the old one
2017-01-12Fix testsJoas Schilling
Signed-off-by: Joas Schilling <coding@schilljs.com>
2017-01-11always allow remembered loginChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2017-01-11fix coding style and increase code coverageChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2017-01-11Fix testsCornelius Kölbel
Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
2017-01-10create new encryption keys on password reset and backup the old oneBjoern Schiessle
Signed-off-by: Bjoern Schiessle <bjoern@schiessle.org>
2017-01-06Adds CssControllerTestsRoeland Jago Douma
Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2016-12-30Merge pull request #2892 from nextcloud/usercontroller_testsRoeland Jago Douma
Adds user controller tests
2016-12-30Adds user controller testsRoeland Jago Douma
Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2016-12-30User command enable/disable testsRoeland Jago Douma
Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2016-12-29Add Group Command testsRoeland Jago Douma
Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2016-12-23Set redirect_url on 2FA challenge pageChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>