aboutsummaryrefslogtreecommitdiffstats
path: root/apps/files_sharing/lib
Commit message (Collapse)AuthorAgeFilesLines
* fix(files_sharing): Use session id as part of cache key to avoid concurrency ↵Côme Chilliet37 hours1-3/+3
| | | | | | | | | issues If several people are watching and seeking the same video file we do not want the cache key to be the same or it would flood activity again. Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* fix(files_sharing): Set higher priority for listeners that may abort the requestCôme Chilliet37 hours1-3/+3
| | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* fix: Avoid triggering several activities for Range request on the same fileCôme Chilliet37 hours1-2/+10
| | | | | | Avoids flooding activities when someone browse a video in the web player. Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* fix: Fix download activity for foldersCôme Chilliet37 hours3-105/+78
| | | | | | | | | Remove duplicate activity publishing from share controller download, listen to BeforeZipCreatedEvent to publish activity for folders, and cache folders activity to avoid sending activity for each file in the folder. Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* fix(sharing): Publish activity for download by public linkCôme Chilliet37 hours2-0/+121
| | | | | | Even if dav endpoint is now used. Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* perf(sharing): Use oc_share.{item_type, share_type} IN instead of OR equalsrefactor/use-in-instead-of-orMarcel Klehr43 hours2-10/+4
| | | | | | to improve performance by using the db index Signed-off-by: Marcel Klehr <mklehr@gmx.net>
* fix(files_sharing): skip expiration notify for invalid share recordfix-sharing-expiration-notifyLuka Trovic10 days1-1/+4
| | | | Signed-off-by: Luka Trovic <luka@nextcloud.com>
* fix(lookup-server): disable lookup server for non-global scale setupsFerdinand Thiessen2025-03-111-5/+5
| | | | Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* fix(lookup-server): do not query data by defaultFerdinand Thiessen2025-03-111-6/+3
| | | | Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* fix(files_sharing): Also list deleted team sharesfix/show-deleted-team-sharesFerdinand Thiessen2025-02-201-1/+2
| | | | Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* fix(files_sharing): block downloading if neededfix/download-permsFerdinand Thiessen2025-02-181-0/+5
| | | | Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* feat(files_sharing): Add opengraph meta tags for multimedia, change ↵solonovamax2025-02-171-2/+14
| | | | | | | | | | | | | | | | | opengraph type to website - Adds the following opengraph tags - images: - `og:image:type`: the mimetype of the image file - audio: - `og:audio`: a direct link to the audio file - `og:audio:type`: the mimetype of the audio file - video: - `og:video`: a direct link to the video file - `og:video:type`: the mimetype of the video file - Changes th `og:type` meta tag from `object` (which is not valid) to `website` Signed-off-by: solonovamax <solonovamax@12oclockpoint.com>
* feat(files_sharing): Add twitter meta tagssolonovamax2025-02-171-6/+18
| | | | | | | | | | | | Adds the following twitter meta tags - `twitter:card`: `summary_large_image` if the shared file is an image & it has a preview, otherwise `summary` - `twitter:title`: same as `og:title` - `twitter:description`: same as `og:description` - `twitter:image`: same as `og:image` Fixes nextcloud/server#49871 Signed-off-by: solonovamax <solonovamax@12oclockpoint.com>
* Merge pull request #50769 from nextcloud/checkStorageIdSetCacheChristoph Wurst2025-02-141-3/+2
|\ | | | | fix(SharedStorage): Check if storage ID is set on cache
| * fix(SharedStorage): Check if storage ID is set on cachecheckStorageIdSetCacheGit'Fellow2025-02-131-6/+6
| | | | | | | | Signed-off-by: Git'Fellow <12234510+solracsf@users.noreply.github.com>
* | chore: Apply new rector configuration to apps folderCôme Chilliet2025-02-1312-22/+36
| | | | | | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* | chore: re-apply current rector configuration to apps folderCôme Chilliet2025-02-131-5/+5
| | | | | | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* | fix: Replace isInstalled calls with isEnabledForAnyone or isEnabledForUserCôme Chilliet2025-02-131-1/+1
|/ | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* fix: don't use cached root info from shared cache if the watcher has ↵Robin Appelman2025-02-062-0/+9
| | | | | | detected an update Signed-off-by: Robin Appelman <robin@icewind.nl>
* refactor: Remove some deprecated containers and exceptionsnfebe2025-02-061-25/+28
| | | | Signed-off-by: nfebe <fenn25.fn@gmail.com>
* fix(sharing): Ensure download restrictions are not droppedfix/proper-download-checkFerdinand Thiessen2025-02-041-23/+41
| | | | | | | | When a user receives a share with share-permissions but also with download restrictions (hide download or the modern download permission attribute), then re-shares of that share must always also include those restrictions. Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* fix: Harden files scanner for invalid null accessFerdinand Thiessen2025-01-283-5/+6
| | | | | | Co-authored-by: Ferdinand Thiessen <opensource@fthiessen.de> Co-authored-by: Kate <26026535+provokateurin@users.noreply.github.com> Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* fix(files_sharing): Respect permissions passed when creating link sharesFerdinand Thiessen2025-01-281-101/+94
| | | | | | | | | | | | | | | | | Given: User creates a link or email share with permissions=4 (create only = file drop). Problem: Currently the permissions are automatically extended to permissions = 5 (READ + CREATE). Work around was to create the share and directly update it. Solution: Respect what the user is requesting, create a file drop share. Co-authored-by: Ferdinand Thiessen <opensource@fthiessen.de> Co-authored-by: Côme Chilliet <91878298+come-nc@users.noreply.github.com> Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* fix: Ensure `label` is always a stringFerdinand Thiessen2025-01-261-1/+4
| | | | Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* Merge pull request #49898 from nextcloud/fix/noid/no-emails-for-user-sharesAnna2025-01-161-4/+7
|\ | | | | fix(sharing): send share emails for internal users too
| * fix(sharing): send share emails for internal users toofix/noid/no-emails-for-user-sharesAnna Larch2025-01-131-4/+7
| | | | | | | | Signed-off-by: Anna Larch <anna@nextcloud.com>
* | feat(sharing): Respect admin custom tokens settingChristopher Ng2025-01-151-0/+3
| | | | | | | | Signed-off-by: Christopher Ng <chrng8@gmail.com>
* | feat(sharing): Add `custom_tokens` capabilityChristopher Ng2025-01-151-0/+2
| | | | | | | | Signed-off-by: Christopher Ng <chrng8@gmail.com>
* | feat(sharing): Fetch a unique generated tokenChristopher Ng2025-01-151-0/+24
| | | | | | | | Signed-off-by: Christopher Ng <chrng8@gmail.com>
* | feat(sharing): Allow updating share tokenChristopher Ng2025-01-151-1/+21
| | | | | | | | Signed-off-by: Christopher Ng <chrng8@gmail.com>
* | fix(files_sharing): Fix sharee search result typesprovokateurin2025-01-131-7/+14
| | | | | | | | Signed-off-by: provokateurin <kate@provokateurin.de>
* | fix(files_sharing): Gracefully handle fetching non-existent shareprovokateurin2025-01-131-14/+5
| | | | | | | | Signed-off-by: provokateurin <kate@provokateurin.de>
* | fix(files_sharing): Handle null userIdprovokateurin2025-01-132-11/+2
|/ | | | Signed-off-by: provokateurin <kate@provokateurin.de>
* feat(federatedfilesharing): auto-accept shares from trusted serversskjnldsv2025-01-091-29/+60
| | | | Signed-off-by: skjnldsv <skjnldsv@protonmail.com>
* refactor(OpenAPI): Adjust scopes to match previous behaviorprovokateurin2025-01-062-0/+5
| | | | Signed-off-by: provokateurin <kate@provokateurin.de>
* fix(federatedfilesharing): get share by token fallbackbackport/49973/masterskjnldsv2024-12-281-4/+58
| | | | Signed-off-by: skjnldsv <skjnldsv@protonmail.com>
* fix(activity): make emails for link share uploads true by defaultskjnldsv2024-12-061-1/+1
| | | | Signed-off-by: skjnldsv <skjnldsv@protonmail.com>
* feat(ocm): signing ocm requestsMaxence Lange2024-12-041-0/+1
| | | | | Signed-off-by: Maxence Lange <maxence@artificial-owl.com>
* Merge pull request #49569 from nextcloud/shared-watcher-perfStephan Orbaugh2024-12-031-13/+8
|\ | | | | perf: improve performance of SharedStorage::getWatcher
| * perf: improve performance of SharedStorage::getWatcherRobin Appelman2024-11-291-13/+8
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
* | chore: remove legacy action to test remote endpointBenjamin Gaussorgues2024-11-291-66/+0
|/ | | | Signed-off-by: Benjamin Gaussorgues <benjamin.gaussorgues@nextcloud.com>
* chore: stricter access to testremote endpointBenjamin Gaussorgues2024-11-281-1/+2
| | | | Signed-off-by: Benjamin Gaussorgues <benjamin.gaussorgues@nextcloud.com>
* Merge pull request #43025 from ↵Côme Chilliet2024-11-252-0/+89
|\ | | | | | | | | nextcloud/bugfix/error-on-reshare-after-transfer-ownership fix: update re-share if shared-by user has been revoked
| * fix(sharing): add command to fix broken shares after ownership transferringbugfix/error-on-reshare-after-transfer-ownershipLuka Trovic2024-11-182-0/+89
| | | | | | | | Signed-off-by: Luka Trovic <luka@nextcloud.com>
* | fix(files_sharing,files): Do not validate shares before adjusting the ownerprovokateurin2024-11-251-7/+11
| | | | | | | | Signed-off-by: provokateurin <kate@provokateurin.de>
* | feat(files_sharing): Allow users with share permission to manage shares on ↵provokateurin2024-11-251-0/+13
| | | | | | | | | | | | IShareOwnerlessMount Signed-off-by: provokateurin <kate@provokateurin.de>
* | fix(files_sharing): Remove duplicate link/email edit share logicprovokateurin2024-11-251-12/+0
| | | | | | | | Signed-off-by: provokateurin <kate@provokateurin.de>
* | fix(files_sharing): Fix error messages from password policyfix/fix-share-creation-error-messagesCôme Chilliet2024-11-191-4/+4
|/ | | | | | | | | Exceptions thrown from password_policy may bubble up in share creation or update when a password is used. Their message is meant to be shown to the user. This always the case for HintException so we catch that instead of the subclass GenericShareException. Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* feat(files_sharing): use share node or label as page titlefeat/sharing-titleskjnldsv2024-11-081-0/+4
| | | | Signed-off-by: skjnldsv <skjnldsv@protonmail.com>
* fix(OpenAPI): Adjust array syntax to avoid ambiguitiesfix/openapi/array-syntaxprovokateurin2024-11-058-62/+66
| | | | Signed-off-by: provokateurin <kate@provokateurin.de>