summaryrefslogtreecommitdiffstats
path: root/lib/private
Commit message (Collapse)AuthorAgeFilesLines
* Merge pull request #22443 from nextcloud/backport/22421/stable18Roeland Jago Douma2020-10-011-1/+3
|\ | | | | [stable18] show better quota warning for group folders and external storage
| * show better quota warning for group folders and external storageRobin Appelman2020-09-291-1/+3
| | | | | | | | | | | | instead of showing the generic 'Your storage is full' message, better explain that it's the group folder/external storage that is full Signed-off-by: Robin Appelman <robin@icewind.nl>
* | Merge pull request #23088 from nextcloud/backport/23013/stable18Roeland Jago Douma2020-10-011-2/+3
|\ \ | | | | | | [stable18] Show federation and email results also with exact user match unless c…
| * | Show federation and email results also with exact user match unless containing @Joas Schilling2020-10-011-2/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Before when you have a user "smith" and a federated user "smith@example.com" you could see the federation result with "smit" but not with "smith" anymore. With most LDAP configurations and local backend setups this is disturbing and causes issues. The idea of not showing the email and federation on a matching user was with: Local user registered with "smith@example.com" user id and having that same email / cloud id in your contacts addressbook. So we now only hide those "side results" when the search does contain an @ Signed-off-by: Joas Schilling <coding@schilljs.com>
* | | Merge pull request #22802 from nextcloud/backport/stable18/22116-22648-22761Roeland Jago Douma2020-10-011-0/+5
|\ \ \ | | | | | | | | [stable18] Fix share transfer of single files and on the transfered node
| * | | Transfer shares of the transferred root nodeJulius Härtl2020-09-171-0/+5
| |/ / | | | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | | Merge pull request #23091 from nextcloud/backport/23074/stable18Roeland Jago Douma2020-09-291-2/+2
|\ \ \ | | | | | | | | [stable18] Do not match sharees on an empty email address
| * | | Do not match sharees on an empty email addressChristoph Wurst2020-09-291-2/+2
| |/ / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When asking for sharees we compare not only UID and displayname but also the email address. And if that matches we return the sharee as an exact match. This logic had a flaw as in that it also matched the empty string to users with no email address. This is most noticeable when you disable sharee enumeration and open the ownership transfer dialog. It suggested other users of the instance before. This has stopped now. Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* | | Merge pull request #22743 from nextcloud/backport/22589/stable18Joas Schilling2020-09-291-1/+2
|\ \ \ | |/ / |/| | [stable18] Allow additional personal settings via normal registration
| * | Allow additional personal settings via normal registrationJoas Schilling2020-09-091-1/+2
| | | | | | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | | fix: file quota was not applied in all caseskorelstar2020-09-171-2/+2
| | |
* | | makes LDAP's group updater dispatch type eventsArthur Schiwon2020-09-101-4/+0
| | | | | | | | | | | | | | | | | | * fixes group share updates on added users Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | | Fix reading empty files from objectstorageRoeland Jago Douma2020-09-091-0/+5
| | | | | | | | | | | | | | | | | | | | | | | | Since we try to do range requests this will fail hard. However since empty files are not that interesting to read anyways we just read from an emptry memory stream. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | | Merge pull request #22746 from nextcloud/backport/22646/stable18Morris Jobke2020-09-091-1/+7
|\ \ \ | | | | | | | | [stable18] Fix detecting text/x-php mimetype and secure mimetype mapping
| * | | Properly add both mimetypes to secure mimetype mappingJulius Härtl2020-09-091-1/+7
| |/ / | | | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* / / Warn about adding NotNull columns with nullable defaultJoas Schilling2020-09-071-0/+5
|/ / | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | Use the correct root to determinate the webroot for the resourceJoas Schilling2020-09-041-2/+2
| | | | | | | | | | | | | | Since all the compiled routes are based on the server webroot, we have to use this, independent from which app this belongs to. Signed-off-by: Joas Schilling <coding@schilljs.com>
* | Fix app password updating out of boundsRoeland Jago Douma2020-09-043-0/+61
| | | | | | | | | | | | | | | | | | | | | | | | | | | | When your password changes out of bounds your Nextcloud tokens will become invalid. There is no real way around that. However we should make sure that if you successfully log in again your passwords are all updates * Added event listener to the PostLoggedInEvent so that we can act on it - Only if it is not a token login * Make sure that we actually reset the invalid state when we update a token. Else it keeps being marked invalid and thus not used. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | Only disable zip64 if the size is knownRoeland Jago Douma2020-09-011-1/+5
| | | | | | | | | | | | | | | | Else we might run into the issue that for an external storage where the size is not known yet we do not use zip64. Which then of course fails on large zip files. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | Merge pull request #22518 from nextcloud/backport/22517/stable18Roeland Jago Douma2020-09-011-1/+1
|\ \ | | | | | | [stable18] set the mount id before calling storage wrapper
| * | set the mount id before calling storage wrapperRobin Appelman2020-08-311-1/+1
| |/ | | | | | | | | | | this allows the storage wrapper to use the mount id for it's own logic Signed-off-by: Robin Appelman <robin@icewind.nl>
* | Only update the filecache entry once the file has been written to S3Roeland Jago Douma2020-08-311-2/+11
| | | | | | | | | | | | | | If we already update before we have no way to revert if the upload fails. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | Don't lose filecache entry on s3 overwrite errorRoeland Jago Douma2020-08-311-5/+16
|/ | | | | | | If the object store errors we should not always delete the filecache entry. As this might lead to people losing access to their files. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Allow to disable share emailsJoas Schilling2020-08-191-1/+2
| | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* Fix chmod on file descriptorJ0WI2020-08-121-1/+1
| | | | Signed-off-by: J0WI <J0WI@users.noreply.github.com>
* Merge pull request #21982 from nextcloud/backport/21628/stable18Morris Jobke2020-08-103-18/+36
|\ | | | | [stable18] fix moving files from external storage to object store trashbin
| * dont update mimetype when moving to trashRobin Appelman2020-07-311-1/+5
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
| * fix renameFromStorage messing with folder mimetypeRobin Appelman2020-07-311-7/+10
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
| * use exceptions for error signaling in writeStreamRobin Appelman2020-07-312-5/+19
| | | | | | | | | | | | this remove the ambiguity when writing zero length files Signed-off-by: Robin Appelman <robin@icewind.nl>
| * fix moving files from external storage to object store trashbinRobin Appelman2020-07-311-9/+6
| | | | | | | | | | | | | | | | | | | | | | | | having the "cache rename" after the "storage move" caused the target to get the fileid from the source file, without taking care that the object is stored under the original file id. By doing the "cache rename" first, we trigger the "update existing file" logic while moving the file to the object store and the object gets stored for the correct file id Signed-off-by: Robin Appelman <robin@icewind.nl>
* | Correctly remove usergroup shares on removing group membersJoas Schilling2020-07-302-1/+48
|/ | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* Merge pull request #21976 from nextcloud/backport/21658/stable18Morris Jobke2020-07-291-1/+4
|\ | | | | [stable18] allow admin to configure the max trashbin size
| * allow admin to configure the max trashbin sizeRobin Appelman2020-07-241-1/+4
| | | | | | | | | | | | | | | | this allows an admin to configure the max trashbin size instead of always relying on the users quota. The trashbin size can be configured using the `occ trash:size` command and can be set both globally and per-user Signed-off-by: Robin Appelman <robin@icewind.nl>
* | Ignore whitespace in sharing by mailonehappycat2020-07-241-0/+3
|/ | | | Signed-off-by: onehappycat <one.happy.cat@gmx.com>
* ensure home storage is initialized on first setupRobin Appelman2020-07-093-2/+6
| | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
* Use the correct mountpoint to calculateRoeland Jago Douma2020-07-091-1/+8
| | | | | | | If we use the owners mount point this results in null. And then the rest of the checks get called with null. Which doesn't work. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Merge pull request #21499 from lmamane/stable18-21285-onelinerMorris Jobke2020-07-081-1/+1
|\ | | | | fix #21285 as oneliner
| * Return correct loginname in credentials,Lionel Elie Mamane2020-06-201-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | even when token is invalid or has no password. Returning the uid as loginname is wrong, and leads to problems when these differ. E.g. the getapppassword API was creating app token with the uid as loginname. In a scenario with external authentication (such as LDAP), these tokens were then invalidated next time their underlying password was checked, and systematically ceased to function. Signed-off-by: Lionel Elie Mamane <lionel@mamane.lu>
* | Merge pull request #21670 from nextcloud/revert-21096-backport/21090/stable18Roeland Jago Douma2020-07-061-7/+7
|\ \ | | | | | | Revert "[stable18] Do not read certificate bundle from data dir by default"
| * | Revert "[stable18] Do not read certificate bundle from data dir by default"Roeland Jago Douma2020-07-031-7/+7
| | |
* | | Merge pull request #21388 from nextcloud/backport/21380/stable18Roeland Jago Douma2020-07-041-1/+1
|\ \ \ | |/ / |/| | [stable18] Increase timeout of the appstore requests
| * | Increase timeout of the appstore requestsJoas Schilling2020-07-031-1/+1
| |/ | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | Merge pull request #21572 from nextcloud/backport/21558/stable18Morris Jobke2020-07-021-7/+3
|\ \ | | | | | | [stable18] relax permissions mask check for detecting part file rename
| * | relax permissions mask check for detecting part file renameRobin Appelman2020-06-241-7/+3
| | | | | | | | | | | | | | | | | | with files drop uploads the original file name isn't always used for the '.ocTransferId' source path Signed-off-by: Robin Appelman <robin@icewind.nl>
* | | Merge pull request #21551 from nextcloud/backport/21535/stable18Roeland Jago Douma2020-07-022-28/+36
|\ \ \ | | | | | | | | [stable18] Fix language in share notes email for users
| * | | Fix language in share notes email for usersJoas Schilling2020-06-242-28/+36
| |/ / | | | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | | Fix IPv6 remote addresses from X_FORWARDED_FOR headers before validatingJoas Schilling2020-07-021-0/+6
| | | | | | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | | Fix PHP CSJoas Schilling2020-06-231-1/+0
| | | | | | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | | Move back to IGroupManager::displayNamesInGroup()Joas Schilling2020-06-231-10/+7
|/ / | | | | | | | | | | | | The problem is that despite it's name IGroup::searchDisplayName() only searches by userid and this is less fixable than changing back to this method here Signed-off-by: Joas Schilling <coding@schilljs.com>
* | Merge pull request #21448 from nextcloud/backport/21406/stable18Roeland Jago Douma2020-06-221-1/+2
|\ \ | | | | | | [stable18] Disable Client-Side Monitoring on AWS storage