summaryrefslogtreecommitdiffstats
path: root/apps
Commit message (Collapse)AuthorAgeFilesLines
* [tx-robot] updated from transifexNextcloud bot2021-04-30152-258/+278
|
* Merge pull request #25973 from ↵Roeland Jago Douma2021-04-298-97/+471
|\ | | | | | | | | nextcloud/backport/25417/stable20-fix-account-data-visibility-after-disabling-public-addressbook-upload [stable20] Fix account data visibility after disabling public addressbook upload
| * Handle corrupted scope valuesDaniel Calviño Sánchez2021-04-232-8/+21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Due to a bug (fixed some commits ago) in the UsersController of the settings app the scope of the properties can be null (for example, if lookup server upload was disabled and the user then changed the display name in the profile information). In that case now the scope menu icon shows an error to inform the user. The scope value will not change when other properties are modified until the user chooses an explicit value from the menu. Note that until a scope is explicitly set the property will behave as if it is private. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
| * Fix settings scope menu hidden when lookup server upload is disabledDaniel Calviño Sánchez2021-04-235-32/+92
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When upload to the lookup server is disabled the scope menu was hidden in the personal information settings. However, even if the lookup server upload is disabled the personal information is still accesible from the local server as well as trusted servers. Users should be able to still set if their information is available to other users or if it is private, so now the scope menu is always show (although the "Public" option is hidden if the lookup server upload is disabled). If the user set the information as public before the upload to the lookup server was disabled the menu will also show the "Public" option as active, although disabled. Setting the visibility to any of the other options will hide the "Public" option from the menu (until the lookup server upload is enabled again). Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
| * Fix deleting properties of user settings when not given explicitlyDaniel Calviño Sánchez2021-04-232-13/+163
| | | | | | | | | | | | | | | | | | | | The controller can receive an optional subset of the properties of the user settings; values not given are set to "null" by default. However, those null values overwrote the previously existing values, so in practice any value not given was deleted from the user settings. Now only non null values overwrite the previous values. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
| * Fix TypeError when "email" is not given in the controller requestDaniel Calviño Sánchez2021-04-231-1/+1
| | | | | | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
| * Respect additional user settings not covered by the controllerDaniel Calviño Sánchez2021-04-232-13/+13
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | "AccountManager::updateUser()" wipes previous user data with whichever user data is given (except for some adjustments, like resetting the verified status when needed). As the controller overrode the properties those properties would lose some of their attributes even if they are not affected by the changes made by the controller. Now the controller only modifies the attributes set ("value" and "scope") to prevent that. Note that with this change the controller no longer removes the "verified" status, but this is not a problem because, as mentioned, "AccountManager::updateUser()" resets them when needed (for example, when the value of the website property changes). This change is a previous step to fix overwritting properties with null values, and it will prevent the controller from making unexpected changes if more attributes are added in the future. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
| * Add more unit tests for setting user settingsDaniel Calviño Sánchez2021-04-231-0/+145
| | | | | | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
| * Change default test data to values less similar to empty valuesDaniel Calviño Sánchez2021-04-231-12/+12
| | | | | | | | | | | | | | Right now it makes no difference, but this should make future tests clearer, specially in case of failure. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
| * Extract default test data to a helper getterDaniel Calviño Sánchez2021-04-231-42/+46
| | | | | | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
| * Use constants from interface rather than classDaniel Calviño Sánchez2021-04-232-36/+38
| | | | | | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* | Do not try to contact lookup server if not neededRoeland Jago Douma2021-04-291-1/+11
| | | | | | | | | | | | | | In some cases (for example you never send data to the lookup server) there is no need for this job to even try. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | [tx-robot] updated from transifexNextcloud bot2021-04-29130-192/+202
| |
* | Merge pull request #26798 from nextcloud/backport/26785/stable20Julius Härtl2021-04-284-3/+49
|\ \ | | | | | | [stable20] LDAP: do not bother to search after the last page
| * | do not try to search after the last pageArthur Schiwon2021-04-274-3/+49
| | | | | | | | | | | | | | | | | | | | | - saves an LDAP requests in these cases - prevents a Protocol Error logged on < 7.3 API (for backports) Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | | [tx-robot] updated from transifexNextcloud bot2021-04-28162-264/+312
|/ /
* | Merge pull request #26779 from nextcloud/backport/26765/stable20Morris Jobke2021-04-278-104/+7
|\ \ | | | | | | [stable20] No longer add trusted servers on federated share creation
| * | No longer add trusted servers on federated share creationRoeland Jago Douma2021-04-278-104/+7
| | | | | | | | | | | | | | | | | | | | | | | | It was disabled by default for ages. And often resulted in unwanted behavior. If admins want trusted servers they just have to do it manually. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | | Merge pull request #26705 from nextcloud/backport/26627/stable20Julius Härtl2021-04-2711-37/+52
|\ \ \ | |/ / |/| | [stable20] update icewind/smb to 3.4.1
| * | update icewind/smb to 3.4.1Robin Appelman2021-04-2211-37/+52
| | | | | | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
* | | [tx-robot] updated from transifexNextcloud bot2021-04-2712-122/+124
| | |
* | | Improve federated permission handlingRoeland Jago Douma2021-04-261-18/+2
| | | | | | | | | | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | | [tx-robot] updated from transifexNextcloud bot2021-04-2614-6/+30
| | |
* | | [tx-robot] updated from transifexNextcloud bot2021-04-2524-16/+128
| | |
* | | [tx-robot] updated from transifexNextcloud bot2021-04-2418-4/+30
| |/ |/|
* | [tx-robot] updated from transifexNextcloud bot2021-04-2378-44/+70
|/
* Merge pull request #26684 from nextcloud/backport/26474/stable20Morris Jobke2021-04-221-1/+1
|\ | | | | [stable20] Mention MariaDB in MySQL support warning
| * Mention MariaDB in MySQL support warningClaas Augner2021-04-211-1/+1
| |
* | [tx-robot] updated from transifexNextcloud bot2021-04-22396-764/+882
|/
* Continue iterating over diretory contents and just hide file if denied by aclJulius Härtl2021-04-211-1/+1
| | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* [tx-robot] updated from transifexNextcloud bot2021-04-2134-6/+520
|
* Update psalm baselineVincent Petry2021-04-201-0/+1
| | | | | | And backport error suppression from stable21 in SFTP class. Signed-off-by: Vincent Petry <vincent@nextcloud.com>
* Make lookup search explicitRoeland Jago Douma2021-04-201-1/+1
| | | | | | Speedsup sharee lookup quite a bit. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Merge pull request #26637 from nextcloud/backport/26615/stable20Morris Jobke2021-04-201-0/+8
|\ | | | | [stable20] Require read permissions for federated shares
| * Require read permissions for federated sharesRoeland Jago Douma2021-04-191-0/+8
| | | | | | | | | | | | | | Else they end up as weird shares that can't be properly utilized by other parties anyway. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | [tx-robot] updated from transifexNextcloud bot2021-04-2092-94/+544
|/
* Do not allow adding file drop shares to your own cloudRoeland Jago Douma2021-04-192-10/+23
| | | | | | | There is no reason for this and you can't create such shares normally anyway. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* [tx-robot] updated from transifexNextcloud bot2021-04-1928-42/+48
|
* [tx-robot] updated from transifexNextcloud bot2021-04-182-2/+2
|
* [tx-robot] updated from transifexNextcloud bot2021-04-1740-30/+78
|
* [tx-robot] updated from transifexNextcloud bot2021-04-1634-32/+130
|
* [tx-robot] updated from transifexNextcloud bot2021-04-1528-12/+120
|
* [tx-robot] updated from transifexNextcloud bot2021-04-1432-28/+118
|
* [tx-robot] updated from transifexNextcloud bot2021-04-1382-92/+48
|
* l10n: Add word user in FederatedShareProvider.phpValdnet2021-04-122-2/+2
| | | | | | Standardizing text strings with other Nextcloud applications. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* [tx-robot] updated from transifexNextcloud bot2021-04-124-2/+10
|
* [tx-robot] updated from transifexNextcloud bot2021-04-114-6/+6
|
* [tx-robot] updated from transifexNextcloud bot2021-04-1010-52/+50
|
* [tx-robot] updated from transifexNextcloud bot2021-04-098-18/+96
|
* [tx-robot] updated from transifexNextcloud bot2021-04-0818-26/+496
|