Skip to content
This repository has been archived by the owner on Jan 8, 2024. It is now read-only.

Fix provider state population to the server registry #210

Merged
merged 2 commits into from
Jul 31, 2018

Conversation

ChristophWurst
Copy link
Member

@ChristophWurst ChristophWurst commented Jul 31, 2018

Required for https://github.com/orgs/nextcloud/projects/4#card-10826964

This PR consists of two parts. First, a little refactoring to decouple some logic from the provider to decouple it from the necessary action on enabled/disabled state change via the server event system. Second, it adds a new state change listener that populates the state to the server's provider registry.

This is a 1:1 port of nextcloud/twofactor_totp#263 for this app.

@coveralls
Copy link

coveralls commented Jul 31, 2018

Coverage Status

Coverage remained the same at 85.714% when pulling 24d2da9 on fix/state-change-events into 3878a82 on master.

@ChristophWurst
Copy link
Member Author

Scrutinizer — Analysis: 7 new issues, 12 updated code elements – Tests: passed

Basically all just complaints about missing classes (which are provided by the server, though).

ChristophWurst added a commit to nextcloud/server that referenced this pull request Jul 31, 2018
Starting with Nextcloud 14, the server knows the enabled/disabled
state of 2fa providers. While it will query that information if it's
unknown (on first use), it won't notice any changes. Thus, providers
have to propagate that information themselves.

Ref nextcloud/twofactor_totp#263
Ref nextcloud/twofactor_u2f#210

Signed-off-by: Christoph Wurst <[email protected]>
ChristophWurst added a commit to nextcloud/server that referenced this pull request Jul 31, 2018
Starting with Nextcloud 14, the server knows the enabled/disabled
state of 2fa providers. While it will query that information if it's
unknown (on first use), it won't notice any changes. Thus, providers
have to propagate that information themselves.

Ref nextcloud/twofactor_totp#263
Ref nextcloud/twofactor_u2f#210

Signed-off-by: Christoph Wurst <[email protected]>
ChristophWurst added a commit to nextcloud/server that referenced this pull request Jul 31, 2018
Starting with Nextcloud 14, the server knows the enabled/disabled
state of 2fa providers. While it will query that information if it's
unknown (on first use), it won't notice any changes. Thus, providers
have to propagate that information themselves.

Ref nextcloud/twofactor_totp#263
Ref nextcloud/twofactor_u2f#210

Signed-off-by: Christoph Wurst <[email protected]>
Copy link
Member

@rullzer rullzer left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks sane. 🚀

@ChristophWurst
Copy link
Member Author

Thanks for your review 🕺

@ChristophWurst ChristophWurst merged commit 8235dff into master Jul 31, 2018
@ChristophWurst ChristophWurst deleted the fix/state-change-events branch July 31, 2018 11:35
ChristophWurst added a commit to nextcloud/server that referenced this pull request Aug 1, 2018
Starting with Nextcloud 14, the server knows the enabled/disabled
state of 2fa providers. While it will query that information if it's
unknown (on first use), it won't notice any changes. Thus, providers
have to propagate that information themselves.

Ref nextcloud/twofactor_totp#263
Ref nextcloud/twofactor_u2f#210

Signed-off-by: Christoph Wurst <[email protected]>
weeman1337 pushed a commit to nextcloud/server that referenced this pull request Aug 9, 2018
Starting with Nextcloud 14, the server knows the enabled/disabled
state of 2fa providers. While it will query that information if it's
unknown (on first use), it won't notice any changes. Thus, providers
have to propagate that information themselves.

Ref nextcloud/twofactor_totp#263
Ref nextcloud/twofactor_u2f#210

Signed-off-by: Christoph Wurst <[email protected]>
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants