summaryrefslogtreecommitdiffstats
path: root/apps/files_sharing/tests/Controller
Commit message (Collapse)AuthorAgeFilesLines
* fix(lookup-server): disable lookup server for non-global scale setupsFerdinand Thiessen11 days1-6/+7
| | | | Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* fix(lookup-server): do not query data by defaultFerdinand Thiessen11 days1-1/+1
| | | | Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* fix(sharing): Ensure download restrictions are not droppedbackport/50642/stable30Ferdinand Thiessen2025-02-041-87/+106
| | | | | | | | When a user receives a share with share-permissions but also with download restrictions (hide download or the modern download permission attribute), then re-shares of that share must always also include those restrictions. Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* fix(files_sharing): Respect permissions passed when creating link sharesFerdinand Thiessen2025-01-311-180/+192
| | | | | | | | | | | | | | | | | Given: User creates a link or email share with permissions=4 (create only = file drop). Problem: Currently the permissions are automatically extended to permissions = 5 (READ + CREATE). Work around was to create the share and directly update it. Solution: Respect what the user is requesting, create a file drop share. Co-authored-by: Ferdinand Thiessen <opensource@fthiessen.de> Co-authored-by: Côme Chilliet <91878298+come-nc@users.noreply.github.com> Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* fix(files_sharing): Cleanup error messagesbackport/48918/stable30provokateurin2024-10-281-1/+1
| | | | Signed-off-by: provokateurin <kate@provokateurin.de>
* test: fix ShareControllerTest.phpRobin Appelman2024-09-191-1/+2
| | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
* test: fix ShareAPIControllerTest.phpRobin Appelman2024-09-191-1/+41
| | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
* fix(files_sharing): adjust permissions from custom edit and delete check methodsbackport/47339/stable30skjnldsv2024-09-111-0/+46
| | | | Signed-off-by: skjnldsv <skjnldsv@protonmail.com>
* feat(files_sharing): add public name prompt for files requestsskjnldsv2024-07-181-4/+10
| | | | Signed-off-by: skjnldsv <skjnldsv@protonmail.com>
* fix(files_sharing): phpunit & openapi fixesskjnldsv2024-07-121-17/+41
| | | | Signed-off-by: skjnldsv <skjnldsv@protonmail.com>
* chore: Add SPDX headerAndy Scherzinger2024-06-066-152/+16
| | | | Signed-off-by: Andy Scherzinger <info@andy-scherzinger.de>
* refactor(shareApiController): use contrusctor property promotion & DI loggerfenn-cs2024-04-181-58/+40
| | | | Signed-off-by: fenn-cs <fenn25.fn@gmail.com>
* fix(files_sharing): ShareesAPI - Return empty response when user is not ↵Ferdinand Thiessen2024-03-151-40/+74
| | | | | | | | allowed to share Resolves: https://github.com/nextcloud/server/issues/20950 Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* perf: switch places that always use the first getById result to getFirstNodeByIdRobin Appelman2024-03-042-70/+101
| | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
* feat(share): save date and time for expirationBenjamin Gaussorgues2024-02-221-0/+2
| | | | | | | | Because of timezones, not saving time can lead to unexpected behaviour when sharing an item sooner than timezone offset Example: sharing a file before 9am when in UTC+9 Signed-off-by: Benjamin Gaussorgues <benjamin.gaussorgues@nextcloud.com>
* fix: phpunitJohn Molakvoæ2024-02-131-2/+2
| | | | Signed-off-by: John Molakvoæ <skjnldsv@protonmail.com>
* feat: rename users to account or personVincent Petry2024-02-131-2/+2
| | | | | | Replace translated text in most locations Signed-off-by: Vincent Petry <vincent@nextcloud.com>
* fix(share): use user timezone to parse share expiration dateBenjamin Gaussorgues2024-01-091-1/+15
| | | | | | | | If an user in UTC+1 try to create a share at 00:00, it's day D for him, but D-1 for the server (UTC). This fix aims to apply the correct offset Signed-off-by: Benjamin Gaussorgues <benjamin.gaussorgues@nextcloud.com>
* chore: apply changes from Nextcloud coding standards 1.1.1Joas Schilling2023-11-234-22/+21
| | | | | Signed-off-by: Joas Schilling <coding@schilljs.com> Signed-off-by: Benjamin Gaussorgues <benjamin.gaussorgues@nextcloud.com>
* Fix unit tests on PHP 8.3Joas Schilling2023-10-161-0/+3
| | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* Fix unit testsJoas Schilling2023-10-121-1/+4
| | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* Convert isset ternary to null coalescing operatorHamid Dehnavi2023-09-281-2/+2
| | | | Signed-off-by: Hamid Dehnavi <hamid.dev.pro@gmail.com>
* files_sharing: Add OpenAPI specjld31032023-07-311-6/+0
| | | | Signed-off-by: jld3103 <jld3103yt@gmail.com>
* fix: adjust testingJohn Molakvoæ2023-07-111-32/+88
| | | | Signed-off-by: John Molakvoæ <skjnldsv@protonmail.com>
* Migrate files sharing to PSR LoggerInterfaceBenjamin Gaussorgues2023-07-061-3/+0
| | | | Signed-off-by: Benjamin Gaussorgues <benjamin.gaussorgues@nextcloud.com>
* Add SHARE_TYPE_SCIENCEMESHMichiel de Jong2023-03-081-2/+2
| | | | Signed-off-by: Michiel de Jong <michiel@unhosted.org>
* Pluggable share providerLouis Chemineau2023-02-021-1/+24
| | | | | Signed-off-by: Carl Schwan <carl@carlschwan.eu> Signed-off-by: Louis Chemineau <louis@chmn.me>
* Honor permissions of new link share via OCS APIJan-Philipp Litza2022-12-061-4/+4
| | | | | | | | | | | The API currently overrides the supplied permissions with "read only" when a file is shared via link. It allows to update the permissions later, however. This keeps the default to "read only" but honors the permissions supplied by API call if any. Signed-off-by: Jan-Philipp Litza <jpl@plutex.de>
* More fixesCarl Schwan2022-10-181-8/+18
| | | | Signed-off-by: Carl Schwan <carl@carlschwan.eu>
* Small progress with fixing unit testsCarl Schwan2022-10-111-167/+82
| | | | Signed-off-by: Carl Schwan <carl@carlschwan.eu>
* Only normalize data in public shares and not crudCarl Schwan2022-09-081-3/+3
| | | | Signed-off-by: Carl Schwan <carl@carlschwan.eu>
* Multiple fixesCarl Schwan2022-07-311-43/+144
| | | | | | | | | | | - Fix tests - Use non deprecated event stuff - Add a bit of type hinting to the new stuff - More safe handling of instanceOfStorage (share might not be the first wrapper) - Fix resharing Signed-off-by: Carl Schwan <carl@carlschwan.eu>
* Fix share attribute related tests + code styleVincent Petry2022-07-281-9/+25
| | | | Signed-off-by: Vincent Petry <vincent@nextcloud.com>
* Add share attributes + prevent download permissionVincent Petry2022-07-281-5/+44
| | | | | | Makes it possible to store download permission Signed-off-by: Vincent Petry <vincent@nextcloud.com>
* Fix unit testsJoas Schilling2022-06-071-5/+5
| | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* Remove at() matcher in files_sharing testsCôme Chilliet2022-05-241-15/+36
| | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* Adds a "Request password" button to the public share authentication page for ↵Cyrille Bollu2022-04-112-0/+6
| | | | | | | | | | | | | | | | | | shares of type TYPE_EMAIL, when the "video verification" checkbox isn't checked. Users accessing non-anonymous public shares (TYPE_EMAIL shares) can now request a temporary password themselves. - Creates a migration step for the files_sharing app to add the 'password_expiration_time' attribute to the oc_shares table. - Makes share temporary passwords' expiration time configurable via a system value. - Adds a system config value to allow permanent share passwords -Fixes a typo in a comment in apps/files_sharing/src/components/SharingEntryLink.vue See https://github.com/nextcloud/server/issues/31005 Signed-off-by: Cyrille Bollu <cyrpub@bollu.be>
* Merge pull request #31684 from nextcloud/user-share-permissions-mergeSimon L2022-04-051-0/+44
|\ | | | | take permissions from multiple paths into account for share permissions
| * take permissions from multiple paths into account for share permissionsRobin Appelman2022-03-311-0/+44
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
* | Merge pull request #31240 from nextcloud/Valdnet-patch-3Louis2022-03-311-1/+1
|\ \ | |/ |/| l10n: Add a dot
| * Fix testValdnet2022-03-311-1/+1
| | | | | | Signed-off-by: Valdnet <47037905+Valdnet@users.noreply.github.com>
* | Add test to spelling unificationLouis Chemineau2022-03-211-1/+1
|/ | | | Signed-off-by: Louis Chemineau <louis@chmn.me>
* Support CRUD share permissionsLouis Chemineau2022-02-151-0/+93
| | | | Signed-off-by: Louis Chemineau <louis@chmn.me>
* Revert "Add non-breaking space in the file size"szaimen2022-02-101-4/+4
| | | | Signed-off-by: szaimen <szaimen@e.mail.de>
* Add non-breaking space in the file sizeCarl Schwan2022-01-141-4/+4
| | | | Signed-off-by: Carl Schwan <carl@carlschwan.eu>
* Fix tests on PHP 8.1 for encryption, files_sharing, files_version,Côme Chilliet2021-12-161-0/+4
| | | | | | files_trashbin and theming apps Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* Limit more contact searchesJoas Schilling2021-12-081-2/+10
| | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* Merge pull request #28764 from nextcloud/feat/sharing-link-eventJohn Molakvoæ2021-09-101-3/+3
|\
| * Emit event on link share actionJohn Molakvoæ2021-09-101-3/+3
| | | | | | | | Signed-off-by: John Molakvoæ <skjnldsv@users.noreply.github.com>
* | use specific email getter where necessaryArthur Schiwon2021-09-091-4/+4
|/ | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>