#
af2a4e8f |
| 14-Oct-2015 |
Michael Große <grosse@cosmocode.de> |
Use more extensive and robust logout cleaning
|
#
b2b9fbc7 |
| 14-Oct-2015 |
Michael Große <grosse@cosmocode.de> |
Reorder methods within class, no functional changes
|
#
523e6571 |
| 14-Oct-2015 |
Michael Große <grosse@cosmocode.de> |
Do not attempt another login if the first failed
The user was constantly forwarded to their oauth provider if the login did not succeed. To fix this the check for a valid session was moved to the fr
Do not attempt another login if the first failed
The user was constantly forwarded to their oauth provider if the login did not succeed. To fix this the check for a valid session was moved to the front to handle all non-get requests and requests which are not directed at doku.php.
Also delete the cookie if the (re-)login fails.
show more ...
|
#
827232fc |
| 13-Oct-2015 |
Michael Große <grosse@cosmocode.de> |
Refactor Login processing into method
|
#
9928f5ef |
| 13-Oct-2015 |
Michael Große <grosse@cosmocode.de> |
Refactor user processing and cookies into methods
|
#
f07c7607 |
| 13-Oct-2015 |
Michael Große <grosse@cosmocode.de> |
Refactor user creation
|
#
09623faa |
| 13-Oct-2015 |
Michael Große <grosse@cosmocode.de> |
Store and reload entire $_REQUEST
|
#
f2e164b0 |
| 13-Oct-2015 |
Michael Große <grosse@cosmocode.de> |
Only force relogins during GET request to doku.php
|
#
ebf681d1 |
| 08-Oct-2015 |
Michael Große <grosse@cosmocode.de> |
Use more existing functions
|
#
0aa332ff |
| 08-Oct-2015 |
Michael Große <grosse@cosmocode.de> |
Honor if registration is globally disabled in conf
|
#
213f4618 |
| 22-Jul-2015 |
Michael Große <grosse@cosmocode.de> |
Relogin if session is lost or auth_sec_timeout
If the session is lost, possibly to bad server configuration, try a silent relogin, if an cookie is present that indicates an oauth-session.
If auth_s
Relogin if session is lost or auth_sec_timeout
If the session is lost, possibly to bad server configuration, try a silent relogin, if an cookie is present that indicates an oauth-session.
If auth_security_timeout is triggered try to re-login based on the existing session data.
In both cases: Mostly correctly re-set the prvious state after re-login. Some actions do not work as expected, e.g. pagination in old revisions.
It was decided not to use refresh-tokens. The desired functionality can be achieved by an online-relogin just as good. Hence this should be prefered to the more user-security invasive refresh-token mechanism.
show more ...
|
#
936b9c9c |
| 22-Jul-2015 |
Michael Große <grosse@cosmocode.de> |
Delete auth cookie if auth cannot be verified
If one was logged out by the auth_security_timeout, one was unable to log in via the plain plugin, because the auth cookie was still set to oauth.
|
#
4485a349 |
| 16-Jul-2015 |
Michael Große <grosse@cosmocode.de> |
Redirect to original page, if the login is successful
|
#
6c23164d |
| 25-Nov-2014 |
Michael Große <mic.grosse+github@googlemail.com> |
Change [..] to array(..) for PHP 5.3 compatibility
|
#
6047eb11 |
| 25-Nov-2014 |
Michael Große <mic.grosse+github@googlemail.com> |
Do not save upstream groups locally.
Also replace createUser with triggerUserMod to conform to dokuwiki standard.
Fixes issue #9
|
#
a90c044e |
| 28-Jul-2014 |
Andreas Gohr <gohr@cosmocode.de> |
added a generic oAuth2 Adapter and implemented a Doorkeeper example
|
#
2e94f0b8 |
| 28-Jul-2014 |
Andreas Gohr <gohr@cosmocode.de> |
store no information in the redirect URL
Some providers need an exact matching redirect URL configured (Google) so we can not keep any dynamic info in the URL. Instead we store it in the user's sess
store no information in the redirect URL
Some providers need an exact matching redirect URL configured (Google) so we can not keep any dynamic info in the URL. Instead we store it in the user's session.
show more ...
|
#
caa5ded4 |
| 26-Jul-2014 |
Andreas Gohr <andi@splitbrain.org> |
send notification mail on new users
|
#
3c0138db |
| 26-Jul-2014 |
Andreas Gohr <andi@splitbrain.org> |
Allow logins to existing accounts only with associated accounts
To prevent people can log into existing account with a newly created social account with a forged email address. We only allow logins
Allow logins to existing accounts only with associated accounts
To prevent people can log into existing account with a newly created social account with a forged email address. We only allow logins with previously approved service providers.
When a user logs in for the first time, eg. the email does not exists, then the user is created and the social account is approved automatically.
show more ...
|
#
1025aad7 |
| 24-Jul-2014 |
Andreas Gohr <gohr@cosmocode.de> |
some smaller adjustments
|
#
a15394db |
| 23-Jul-2014 |
Andreas Gohr <andi@splitbrain.org> |
fix default group handling when adding new user
|
#
e32c3607 |
| 23-Jul-2014 |
Andreas Gohr <andi@splitbrain.org> |
fixed logging out. clean up session
|
#
f866280e |
| 23-Jul-2014 |
Andreas Gohr <andi@splitbrain.org> |
associate oauth logins with existing users, create new if needed
Users are uniquely identified by their email-address. A user can login with any oauth service - when it returns the same email, its t
associate oauth logins with existing users, create new if needed
Users are uniquely identified by their email-address. A user can login with any oauth service - when it returns the same email, its the same user.
show more ...
|
#
38378fbb |
| 23-Jul-2014 |
Andreas Gohr <gohr@cosmocode.de> |
stubs for mail based user ID
|
#
a7a8f46a |
| 23-Jul-2014 |
Andreas Gohr <gohr@cosmocode.de> |
remember oAuth logins in session
|