| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
Signed-off-by: provokateurin <kate@provokateurin.de>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Previously there was a different behavior for public shares (link-shares) and internal shares,
if the user disabled the view permission.
The legacy UI for public shares simply "disabled" the context menu and hided all download actions.
With Nextcloud 31 all share types use the consistent permissions attributes,
which simplifies code, but caused a regression: Images can no longer been viewed.
Because on 30 and before the attribute was not set, previews for view-only files
were still allowed. Now with 31 we need a new way to allow "viewing" shares.
So this is allowing previews for those files, but only for internal usage.
This is done by settin a special header, which only works with custom requests,
and not by opening the URL directly.
Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Bumps [nextcloud/coding-standard](https://github.com/nextcloud/coding-standard) from 1.3.1 to 1.3.2.
- [Release notes](https://github.com/nextcloud/coding-standard/releases)
- [Changelog](https://github.com/nextcloud/coding-standard/blob/master/CHANGELOG.md)
- [Commits](https://github.com/nextcloud/coding-standard/compare/v1.3.1...v1.3.2)
---
updated-dependencies:
- dependency-name: nextcloud/coding-standard
dependency-type: direct:production
update-type: version-update:semver-patch
...
Signed-off-by: dependabot[bot] <support@github.com>
Signed-off-by: provokateurin <kate@provokateurin.de>
|
|
|
|
|
|
| |
from OC_Util
Signed-off-by: Julius Knorr <jus@bitgrid.net>
|
|
|
|
| |
Signed-off-by: provokateurin <kate@provokateurin.de>
|
|
|
|
| |
Signed-off-by: Anna Larch <anna@nextcloud.com>
|
|
|
|
| |
Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
|
|
|
|
| |
Signed-off-by: provokateurin <kate@provokateurin.de>
|
|
|
|
| |
Signed-off-by: Julius Härtl <jus@bitgrid.net>
|
|
|
|
| |
Signed-off-by: Julius Härtl <jus@bitgrid.net>
|
|
|
|
| |
Signed-off-by: provokateurin <kate@provokateurin.de>
|
|
|
|
| |
Signed-off-by: provokateurin <kate@provokateurin.de>
|
|\ |
|
| |
| |
| |
| | |
Signed-off-by: provokateurin <kate@provokateurin.de>
|
|\ \
| |/
|/| |
Avoid using partial file info as valid one
|
| |
| |
| |
| | |
Signed-off-by: Julius Härtl <jus@bitgrid.net>
|
| |
| |
| |
| | |
Signed-off-by: Julien Veyssier <julien-nc@posteo.net>
|
|/
|
|
| |
Signed-off-by: Marcel Klehr <mklehr@gmx.net>
|
|
|
|
|
|
| |
processing API
Signed-off-by: Julien Veyssier <julien-nc@posteo.net>
|
|
|
|
| |
Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
|
|\
| |
| | |
TaskProcessing follow-up
|
| |
| |
| |
| | |
Signed-off-by: Marcel Klehr <mklehr@gmx.net>
|
| |
| |
| |
| | |
Signed-off-by: Marcel Klehr <mklehr@gmx.net>
|
| |
| |
| |
| | |
Signed-off-by: Marcel Klehr <mklehr@gmx.net>
|
| |
| |
| |
| | |
Signed-off-by: Marcel Klehr <mklehr@gmx.net>
|
| |
| |
| |
| | |
Signed-off-by: Jonas <jonas@freesources.org>
|
|/
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Calling the public API endpoints will check for matching registered
reference providers that implement `IPublicReferenceProvider` and call
their respective functions. If no matching provider is found, the
default `LinkReferenceProvider` will be used to provide open graph data.
The frontend reference widget components will call these endpoints from
unauthorized sessions, e.g. in public shares.
If present, the sharing token of the origin URL is passed to
`resolveReferencePublic()` as additional information for the reference
provider to determine the access scope. This allows the respective
reference providers to determine whether the origin share has access to
the linked resource.
`getCacheKeyPublic` also gets the sharing token so it can scope the cached
entry to it.
Contributes to #45978
Signed-off-by: Jonas <jonas@freesources.org>
|
|
|
|
| |
Signed-off-by: Julien CHATY-CAPELLE <julien@chaty-capelle.fr>
|
|
|
|
|
|
|
|
|
| |
Allow clients to access the new filename validation options
and make frontend name validation possible.
Co-authored-by: Ferdinand Thiessen <opensource@fthiessen.de>
Co-authored-by: Kate <26026535+provokateurin@users.noreply.github.com>
Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
|
|
|
|
| |
Signed-off-by: Benjamin Gaussorgues <benjamin.gaussorgues@nextcloud.com>
|
|
|
|
| |
Signed-off-by: provokateurin <kate@provokateurin.de>
|
|\
| |
| | |
test: add tests for ProfilePageController
|
| |
| |
| |
| | |
Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
|
| |
| |
| |
| | |
Signed-off-by: provokateurin <kate@provokateurin.de>
|
| |
| |
| |
| | |
Signed-off-by: skjnldsv <skjnldsv@protonmail.com>
|
|/
|
|
| |
Signed-off-by: skjnldsv <skjnldsv@protonmail.com>
|
|\
| |
| | |
fix(Session): avoid password confirmation on SSO
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
SSO backends like SAML and OIDC tried a trick to suppress password
confirmations as they are not possible by design. At least for SAML it was
not reliable when existing user backends where used as user repositories.
Now we are setting a special scope with the token, and also make sure that
the scope is taken over when tokens are regenerated.
Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
|
|/
|
|
| |
Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
|
|
|
|
| |
Signed-off-by: Andy Scherzinger <info@andy-scherzinger.de>
|
|\
| |
| |
| | |
nextcloud/docs/taskprocessingapi/cleanup-endpoint-descriptions
|
| |
| |
| |
| | |
Signed-off-by: provokateurin <kate@provokateurin.de>
|
| |
| |
| |
| | |
Signed-off-by: provokateurin <kate@provokateurin.de>
|
| |
| |
| |
| | |
Signed-off-by: provokateurin <kate@provokateurin.de>
|
| |
| |
| |
| | |
Signed-off-by: provokateurin <kate@provokateurin.de>
|
|\ \
| |/
|/|
| |
| | |
nextcloud/bugfix/noid/limit-maximum-number-of-search-results
fix(search): Limit maximum number of search results
|
| |
| |
| |
| | |
Signed-off-by: Joas Schilling <coding@schilljs.com>
|
|\ \
| |/
|/| |
feat: TaskProcessing API
|
| |
| |
| |
| | |
Signed-off-by: Marcel Klehr <mklehr@gmx.net>
|
| |
| |
| |
| | |
Signed-off-by: Marcel Klehr <mklehr@gmx.net>
|