summaryrefslogtreecommitdiffstats
path: root/Guard/Firewall
Commit message (Collapse)AuthorAgeFilesLines
* Added placeholders to all log messages instead of hardcoded valuesMartin Hasoň2015-12-291-1/+1
|
* Write the log message on a single line againnDiego Agulló2015-11-031-4/+1
|
* Check whether $this->logger is not null on GuardAuthenticationListenerDiego Agulló2015-11-011-1/+6
|
* Making all "debug" messages use the debug routerRyan Weaver2015-09-261-8/+8
| | | | | Only the "auth success" and "auth failed" messages remain at info. That's consistent with AbstractAuthenticationListener
* Updating behavior to not continue after an authenticator has set the responseRyan Weaver2015-09-261-0/+6
| | | | | | | This mirrors the behavior in core: *if* a listener sets a response (on success or failure), then the other listeners are not called. But if a response is *not* set (which is sometimes the case for success, like in BasicAuthenticationListener), then the other listeners are called, and can even fail.
* Fixing a bug where having an authentication failure would log you out.Ryan Weaver2015-09-201-1/+1
| | | | | | | | | | This solution is a copy of what AbstractAuthenticationListener does. Scenario: 1) Login 2) Go back to the log in page 3) Put in a bad user/pass You *should* still be logged in after a failed attempt. This commit gives that behavior.
* Adding logging on this step and switching the order - not for any huge reasonRyan Weaver2015-09-201-3/+7
|
* meaningless author and license changesRyan Weaver2015-09-201-2/+11
|
* A few more changes thanks to @iltarRyan Weaver2015-09-201-4/+4
|
* Adding periods at the end of exceptions, and changing one class name to ↵Ryan Weaver2015-09-201-1/+1
| | | | LogicException thanks to @iltar
* Updating interface method per suggestion - makes sense to me, Request is ↵Ryan Weaver2015-09-201-2/+2
| | | | redundant
* Thanks fabbot!Ryan Weaver2015-09-201-11/+11
|
* Renaming the tokens to be clear they are "post" and "pre" auth - also adding ↵Ryan Weaver2015-09-201-2/+2
| | | | | | | | | | | | | an interface The reason is that the GuardAuthenticationProvider *must* respond to *all* tokens created by the system - both "pre auth" and "post auth" tokens. The reason is that if a "post auth" token becomes not authenticated (e.g. because the user changes between requests), then it may be passed to the provider system. If no providers respond (which was the case before this commit), then AuthenticationProviderManager throws an exception. The next commit will properly handle these "post auth" + "no-longer-authenticated" tokens, which should cause a log out.
* Initial commit (but after some polished work) of the new Guard ↵Ryan Weaver2015-09-201-0/+180
authentication system