| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|\
| |
| | |
Fix call to disk_free_space when a file is provided
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
In the case of shared files, we have to call free_space() on the file
name. This has the side-effect that when uploading to a local storage
without quota set, it will call disk_free_space with the file name,
which fails.
This fix uses the parent folder in case the given path is a file.
|
|\ \
| |/
|/| |
Add locking to the node api
|
| | |
|
|\ \
| | |
| | | |
allow availability recheck for external storages
|
| |/ |
|
|/
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
When calling `\OC\Files\View::copy` we should also keep the version to ensure that the file will always have the correct version attached and can be successfully decrypted.
To test this the following steps are necessary (from https://github.com/owncloud/core/issues/22781#issuecomment-191328982):
1. setup a new ownCloud 9.0 beta2
2. enable encryption
2. upload a docx (5.7MB large)
3. upload the same file again and overwrite the existing file
4. I can download the original file and the first version
5. I restore the first version
6. restored version can no longer be downloaded with the error described above
The manual cache operation in `\OCA\Files_Versions\Storage` is unfortunately necessary since `\OCA\Files_Versions\Storage::copyFileContents` is not using `\OCP\Files\Storage::moveFromStorage` in the case when an object storage is used. Due to the workaround added in https://github.com/owncloud/core/commit/54cea05271b887f1c8062c034741df869bc0f055 the stream is directly copied and thus bypassing the FS.
|
| |
|
| |
|
|
|
|
| |
Probably nice for the people that contributed to 9.0 to see themselves in the AUTHORS file :)
|
|\
| |
| | |
fix size propagation for new files
|
| | |
|
|/ |
|
|\
| |
| | |
Fix HTTPS support on external storages
|
| |
| |
| |
| | |
Otherwise debugging issues is a PITA
|
|\ \
| |/
|/| |
Heal unencrypted file sizes at download time (second approach)
|
| |
| |
| |
| | |
not correct
|
| |
| |
| |
| |
| |
| |
| |
| | |
This check will skip the background scan for the root storage
because there is nothing in the root storage that isn't already
in another (mostly user-) storage.
Fixes #22501
|
|\ \
| | |
| | | |
Check delete permission before attemping copy+delete
|
| |/
| |
| |
| |
| |
| |
| |
| | |
Some move operations when cross-storage will be replaced by copy and
delete. Before attempting this, first check whether the source storage
has delete permissions.
This also prevents renaming system-wide external storages.
|
|/
|
|
| |
This commit consists of patches automatically generated for this project on https://scrutinizer-ci.com
|
|\
| |
| | |
getRootFolder should not setup the FS for any user
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Fixes #22467
This can go wrong when an app (take the ldap app) DIs something that
needs the rootFolder. This break if we use cookie auth since then we
know the user at that point and thus try to setup the fs for that user.
However if there are then incomming shares from an ldap user they will
fails since the user manager can't find them yet.
Now getRootFolder does not setup the fs for any user.
|
|\ \
| | |
| | | |
cache result for getowner
|
| | | |
|
| |/ |
|
|/
|
|
|
|
|
|
|
| |
When overwriting shared files as recipient, the part file is written on
the uploader's storage before overwriting the target file.
If the uploader has no quota left, they should still be able to
overwrite that file with Webdav. To make this work, they need to be able
to write the part file to their own storage first.
|
|
|
|
| |
apps like files_versions still get the old signature version
|
| |
|
| |
|
|
|
|
| |
Prevents switching single blocks within the encrypted file.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
The encryption code uses partial cache entries for the part file (which
are not stored in the database) but are useful for other parts of the
code to retrieve the file size again.
This means that in the fixed code $info was empty, so getData() could
not be called.
The fix makes sure to support both cases when the cache entry exists and
doesn't.
|
|\
| |
| | |
better exists check for insert mount cache
|
| | |
|
|/ |
|
| |
|
|
|
|
| |
This commit consists of patches automatically generated for this project on https://scrutinizer-ci.com
|
|\
| |
| | |
split cache->insert from cache->put
|
| | |
|
|\ \
| | |
| | | |
Checksums
|
| |/
| |
| |
| |
| |
| |
| | |
* Add extra db column to filecache
* Bump version
* Update filecache code to actually handle checksum
* Webdav code to store/retrieve checksums
|
|/ |
|
|\
| |
| | |
Block shares that dont have the correct source permissions
|
| | |
|
|\ \
| |/
|/| |
Add fallback moveFromCache implementation
|
| | |
|
| | |
|