- Jul 09, 2019
-
-
Daniel Kesselberg authored
There are plans to remove executionContexts from the spec: https://github.com/w3c/webappsec-clear-site-data/issues/59 Firefox already removed it https://bugzilla.mozilla.org/show_bug.cgi?id=1548034 Chromium implementation is not finish: https://bugs.chromium.org/p/chromium/issues/detail?id=898503&q=clear-site-data&sort=-modified&colspec=ID%20Pri%20M%20Stars%20ReleaseBlock%20Component%20Status%20Owner%20Summary%20OS%20Modified Signed-off-by:
Daniel Kesselberg <mail@danielkesselberg.de>
-
- May 29, 2019
-
-
Christoph Wurst authored
Signed-off-by:
Christoph Wurst <christoph@winzerhof-wurst.at>
-
- May 07, 2019
-
-
Christoph Wurst authored
Signed-off-by:
Christoph Wurst <christoph@winzerhof-wurst.at>
-
- Feb 06, 2019
-
-
Roeland Jago Douma authored
Fixes #12568 Since the clearing of the execution context causes another reload. We should not do the redirect_uri handling as this results in redirecting back to the logout page on login. This adds a simple middleware that will just check if the ClearExecutionContext session variable is set. If that is the case it will just redirect back to the login page. Signed-off-by:
Roeland Jago Douma <roeland@famdouma.nl>
-
- Jan 29, 2019
-
-
Michael Weimann authored
Signed-off-by:
Michael Weimann <mail@michael-weimann.eu>
-
- Jan 23, 2019
-
-
Roeland Jago Douma authored
If the remember_login_cookie_lifetime is set to 0 this means we do not want to use remember me at all. In that case we should also not creatae a remember me cookie and should create a proper temp token. Further this specifies that is not 0 the remember me time should always be larger than the session timeout. Because else the behavior is not really defined. Signed-off-by:
Roeland Jago Douma <roeland@famdouma.nl>
-
- Nov 20, 2018
-
-
Roeland Jago Douma authored
Fixes #11146 As documented when it is set to disabled the user can't request a lost password. Signed-off-by:
Roeland Jago Douma <roeland@famdouma.nl>
-
- Oct 30, 2018
-
-
Rayn0r authored
Signed-off-by:
Rayn0r <Andre.Weidemann@web.de>
-
- Oct 15, 2018
-
-
Patrick Conrad authored
In https://github.com/nextcloud/server/commit/2f87fb6b456fd109c90a5093c31b7a3f62a32040 this header was introduced. The referenced documentation says: > When delivered with a response from https://example.com/clear, the following header will cause cookies associated with the origin https://example.com to be cleared, as well as cookies on any origin in the same registered domain (e.g. https://www.example.com/ and https://more.subdomains.example.com/). This also applies if `https://nextcloud.example.com/` sends the `Clear-Site-Data: "cookies"` header. This is not the behavior we want at this point! So I removed the deletion of cookies from the header. This has no effect on the logout process as this header is supported only recently and the logout works in old browsers as well. Signed-off-by:
Patrick Conrad <conrad@iza.org>
-
- Oct 02, 2018
-
-
Roeland Jago Douma authored
* On weblogin check if we have invalid public key tokens * If so update them all with the new token This ensures that your marked as invalid tokens work again if you once login on the web. Signed-off-by:
Roeland Jago Douma <roeland@famdouma.nl>
-
Michael Weimann authored
Signed-off-by:
Michael Weimann <mail@michael-weimann.eu>
-
- Aug 13, 2018
-
-
Christoph Wurst authored
If a failed login is logged, we save the username as metadata in the bruteforce throttler. To prevent database error due to very long strings, this truncates the username at 64 bytes in the assumption that no real username is longer than that.long strings, Signed-off-by:
Christoph Wurst <christoph@winzerhof-wurst.at>
-
- Aug 08, 2018
-
-
Christoph Wurst authored
Signed-off-by:
Christoph Wurst <christoph@winzerhof-wurst.at>
-
Christoph Wurst authored
Fixes https://github.com/nextcloud/server/issues/10500 . Signed-off-by:
Christoph Wurst <christoph@winzerhof-wurst.at>
-
- Jul 21, 2018
-
-
Michael Weimann authored
Signed-off-by:
Michael Weimann <mail@michael-weimann.eu>
-
- Jun 20, 2018
-
-
Christoph Wurst authored
This adds persistence to the Nextcloud server 2FA logic so that the server knows which 2FA providers are enabled for a specific user at any time, even when the provider is not available. The `IStatefulProvider` interface was added as tagging interface for providers that are compatible with this new API. Signed-off-by:
Christoph Wurst <christoph@winzerhof-wurst.at>
-
- Apr 10, 2018
-
-
Roeland Jago Douma authored
Signed-off-by:
Roeland Jago Douma <roeland@famdouma.nl>
-
Morris Jobke authored
Signed-off-by:
Morris Jobke <hey@morrisjobke.de>
-
- Apr 06, 2018
-
-
Roeland Jago Douma authored
Signed-off-by:
Roeland Jago Douma <roeland@famdouma.nl>
-
Roeland Jago Douma authored
Signed-off-by:
Roeland Jago Douma <roeland@famdouma.nl>
-
Roeland Jago Douma authored
Fixes #8004 Signed-off-by:
Roeland Jago Douma <roeland@famdouma.nl>
-
- Feb 22, 2018
-
-
Arthur Schiwon authored
Signed-off-by:
Arthur Schiwon <blizzz@arthur-schiwon.de>
-
- Jan 15, 2018
-
-
Roeland Jago Douma authored
Signed-off-by:
Roeland Jago Douma <roeland@famdouma.nl>
-
- Dec 28, 2017
-
-
Julius Härtl authored
Signed-off-by:
Julius Härtl <jus@bitgrid.net>
-
- Nov 06, 2017
-
-
Morris Jobke authored
Signed-off-by:
Morris Jobke <hey@morrisjobke.de>
-
- Sep 07, 2017
-
-
Lukas Reschke authored
The URLGenerator doesn't support `` as target for absolute URLs, we need to link to `/` thus. Regression introduced with https://github.com/nextcloud/server/commit/46229a00f39e507249dbe3ceb7507277da3fa4f8 Signed-off-by:
Lukas Reschke <lukas@statuscode.ch>
-
- Sep 04, 2017
-
-
Morris Jobke authored
Signed-off-by:
Morris Jobke <hey@morrisjobke.de>
-
- Sep 02, 2017
-
-
Julius Härtl authored
Signed-off-by:
Julius Härtl <jus@bitgrid.net>
-
- Jul 27, 2017
-
-
Lukas Reschke authored
Fixes https://github.com/nextcloud/server/issues/5891 Signed-off-by:
Lukas Reschke <lukas@statuscode.ch>
-
- Jun 20, 2017
-
-
Lukas Reschke authored
This adds a Clear-Site-Data header to the logout response which will delete all relevant data in the caches which may contain potentially sensitive content. See https://w3c.github.io/webappsec-clear-site-data/#header for the definition of the types. Ref https://twitter.com/mikewest/status/877149667909406723 Signed-off-by:
Lukas Reschke <lukas@statuscode.ch>
-
- May 11, 2017
-
-
Ujjwal Bhardwaj authored
-
- Apr 25, 2017
-
-
Christoph Wurst authored
Signed-off-by:
Christoph Wurst <christoph@winzerhof-wurst.at>
-
- Apr 13, 2017
-
-
Lukas Reschke authored
This makes the new `@BruteForceProtection` annotation more clever and moves the relevant code into it's own middleware. Basically you can now set `@BruteForceProtection(action=$key)` as annotation and that will make the controller bruteforce protected. However, the difference to before is that you need to call `$responmse->throttle()` to increase the counter. Before the counter was increased every time which leads to all kind of unexpected problems. Signed-off-by:
Lukas Reschke <lukas@statuscode.ch>
-
- Apr 07, 2017
-
-
Joas Schilling authored
Signed-off-by:
Joas Schilling <coding@schilljs.com>
-
- Apr 06, 2017
-
-
Arthur Schiwon authored
Signed-off-by:
Arthur Schiwon <blizzz@arthur-schiwon.de>
-
Arthur Schiwon authored
Signed-off-by:
Arthur Schiwon <blizzz@arthur-schiwon.de>
-
- Feb 07, 2017
-
-
Sandro Lutz authored
Signed-off-by:
Sandro Lutz <sandro.lutz@temparus.ch>
-
- Feb 06, 2017
-
-
Sandro Lutz authored
Signed-off-by:
Sandro Lutz <sandro.lutz@temparus.ch>
-
- Feb 02, 2017
-
-
Christoph Wurst authored
Signed-off-by:
Christoph Wurst <christoph@winzerhof-wurst.at>
-
- Feb 01, 2017
-
-
Sandro Lutz authored
Signed-off-by:
Sandro Lutz <sandro.lutz@temparus.ch>
-