summaryrefslogtreecommitdiffstats
path: root/lib
Commit message (Collapse)AuthorAgeFilesLines
...
| * | | Disable Client-Side Monitoring on AWS storageChristoph Wurst2020-06-171-1/+2
| |/ / | | | | | | | | | | | | | | | | | | | | | | | | The S3 client enables this by default and then tries to read `.aws/config`. This causes `open_basedir` restriction related error for some setups. So this patch disables the CSM because it's most likely unused anyway. Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* | | Merge pull request #21486 from nextcloud/backport/21482/stable18Roeland Jago Douma2020-06-211-1/+5
|\ \ \ | | | | | | | | [stable18] Don't log Keys
| * | | Don't log KeysJoas Schilling2020-06-191-1/+5
| | | | | | | | | | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | | | Merge pull request #21496 from nextcloud/backport/21483/stable18Roeland Jago Douma2020-06-201-1/+1
|\ \ \ \ | | | | | | | | | | [stable18] Give up after 10 seconds in SCSS timeout
| * | | | Give up after 10 seconds in SCSS timeoutRoeland Jago Douma2020-06-191-1/+1
| |/ / / | | | | | | | | | | | | | | | | | | | | Else we keep idling for ages which leads to bad UX Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* / / / [tx-robot] updated from transifexNextcloud bot2020-06-202-0/+2
|/ / /
* | | Merge pull request #21381 from nextcloud/backport/20447/stable18Roeland Jago Douma2020-06-191-2/+2
|\ \ \ | | | | | | | | [stable18] Increase max-height on button in welcome email template
| * | | Fix #13287 - Increase max-height on button in welcome email templateLiam JACK2020-06-121-2/+2
| |/ / | | | | | | | | | Signed-off-by: Liam JACK <liamjack@users.noreply.github.com>
* | | Clean up auth tokens when user is deletedChristoph Wurst2020-06-183-0/+74
| | | | | | | | | | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* | | [tx-robot] updated from transifexNextcloud bot2020-06-182-18/+18
|/ /
* | [tx-robot] updated from transifexNextcloud bot2020-06-114-6/+12
| |
* | [tx-robot] updated from transifexNextcloud bot2020-06-104-4/+10
| |
* | [tx-robot] updated from transifexNextcloud bot2020-06-094-44/+72
|/
* Merge pull request #21160 from nextcloud/backport/21152/stable18Roeland Jago Douma2020-06-061-5/+21
|\ | | | | [stable18] [stable18] Fix password changes in link and mail shares
| * Fix disabling send password by Talk without new password in mail sharesDaniel Calviño Sánchez2020-05-291-4/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When "send password by Talk" was disabled in a mail share it was possible to keep the same password as before, as it does not pose any security issue (unlike keeping it when "send password by Talk" is enabled, as in that case the password was already disclosed by mail). However, if a mail share is updated but the password is not set again only the hashed password will be available. In that case it would not make sense to send the password by mail, so now the password must be changed when disabling "send password by Talk". Note that, even if explicitly setting the same password again along with the "send password by Talk" property would work, this was also prevented for simplicity. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
| * Fix enabling send password by Talk with same password in mail sharesDaniel Calviño Sánchez2020-05-291-1/+11
| | | | | | | | | | | | | | | | | | | | | | | | | | When "send password by Talk" is enabled in a mail share a new password must be also set. However, when the passwords of the original and the new share were compared it was not taken into account that the original password is now hashed, while the new one is not (unless no new password was sent, in which case the password of the original share was set in the new share by the controller, but that was already prevented due to both passwords being literally the same), so it was possible to set the same password again. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
| * Fix enabling send password by Talk with empty password in link sharesDaniel Calviño Sánchez2020-05-291-0/+6
| | | | | | | | | | | | | | When "send password by Talk" is enabled in a link share now a non empty password is enforced. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* | [tx-robot] updated from transifexNextcloud bot2020-06-062-2/+2
| |
* | [tx-robot] updated from transifexNextcloud bot2020-06-052-4/+4
| |
* | Prevent harder to share your rootJoas Schilling2020-06-041-3/+1
| | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | [tx-robot] updated from transifexNextcloud bot2020-06-032-0/+4
| |
* | [tx-robot] updated from transifexNextcloud bot2020-06-014-0/+6
| |
* | [tx-robot] updated from transifexNextcloud bot2020-05-302-12/+12
|/
* Revert "[stable18] Fix password changes in link and mail shares"Morris Jobke2020-05-291-21/+5
|
* Fix disabling send password by Talk without new password in mail sharesDaniel Calviño Sánchez2020-05-291-4/+4
| | | | | | | | | | | | | | | | | | When "send password by Talk" was disabled in a mail share it was possible to keep the same password as before, as it does not pose any security issue (unlike keeping it when "send password by Talk" is enabled, as in that case the password was already disclosed by mail). However, if a mail share is updated but the password is not set again only the hashed password will be available. In that case it would not make sense to send the password by mail, so now the password must be changed when disabling "send password by Talk". Note that, even if explicitly setting the same password again along with the "send password by Talk" property would work, this was also prevented for simplicity. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Fix enabling send password by Talk with same password in mail sharesDaniel Calviño Sánchez2020-05-291-1/+11
| | | | | | | | | | | | | When "send password by Talk" is enabled in a mail share a new password must be also set. However, when the passwords of the original and the new share were compared it was not taken into account that the original password is now hashed, while the new one is not (unless no new password was sent, in which case the password of the original share was set in the new share by the controller, but that was already prevented due to both passwords being literally the same), so it was possible to set the same password again. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Fix enabling send password by Talk with empty password in link sharesDaniel Calviño Sánchez2020-05-291-0/+6
| | | | | | | When "send password by Talk" is enabled in a link share now a non empty password is enforced. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Merge pull request #21109 from nextcloud/backport/19793/stable18Roeland Jago Douma2020-05-281-5/+0
|\ | | | | [stable18] Fix resharing of federated shares that were created out of links
| * Link shares have reshare permission if outgoing federated shares are enabledJulius Härtl2020-05-261-5/+0
| | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | [tx-robot] updated from transifexNextcloud bot2020-05-274-2/+8
| |
* | Do not read certificate bundle from data dir by defaultMorris Jobke2020-05-251-7/+7
|/ | | | | | | | | | | Before the resources/config/ca-bundle.crt was only used when the list of custom certificates was empty and the instance was not installed. But it should also be used when the list is empty and the instance is installed. This is inverting the logic to stop if the instance is not installed to use the default bundle. And it also does this when the list is empty. Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* Merge pull request #20965 from nextcloud/backport/20033/stable18Morris Jobke2020-05-254-21/+218
|\ | | | | [stable18] Enable fseek for files in S3 storage
| * harden seekable http stream a bit against failuresRobin Appelman2020-05-221-3/+13
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
| * update autoloaderRobin Appelman2020-05-203-9/+9
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
| * add basic tests for s3 seeking and add some error handling if reopen return ↵Robin Appelman2020-05-201-8/+18
| | | | | | | | | | | | the wrong range Signed-off-by: Robin Appelman <robin@icewind.nl>
| * make seekable s3 stream genericRobin Appelman2020-05-202-57/+106
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
| * Enable fseek for files in S3 storageLukas Stabe2020-05-202-19/+147
| | | | | | | | Signed-off-by: Lukas Stabe <lukas@stabe.de>
* | [tx-robot] updated from transifexNextcloud bot2020-05-252-0/+4
| |
* | [tx-robot] updated from transifexNextcloud bot2020-05-234-2/+6
| |
* | [tx-robot] updated from transifexNextcloud bot2020-05-224-0/+6
| |
* | [tx-robot] updated from transifexNextcloud bot2020-05-214-2/+4
| |
* | Compress the appstore requests by defaultMorris Jobke2020-05-201-3/+2
| | | | | | | | | | | | In test it reduced the transfered data from 5 MB to 2 MB. This should reduce the load on the appstore significantly. Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* | Cache appstore requests for 60 instead of 5 minutesMorris Jobke2020-05-201-2/+2
| | | | | | | | Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* | [tx-robot] updated from transifexNextcloud bot2020-05-206-2/+12
| |
* | [tx-robot] updated from transifexNextcloud bot2020-05-192-48/+52
| |
* | Merge pull request #20994 from nextcloud/backport/19540/stable18Morris Jobke2020-05-181-0/+4
|\ \ | | | | | | [stable18] Fix issues with Keystone auth v3 in files_external app
| * | Fix issues with Keystone auth v3 in files_external appJulien Lutran2020-05-151-0/+4
| | | | | | | | | | | | Signed-off-by: Julien Lutran <julien.lutran@corp.ovh.com>
* | | [tx-robot] updated from transifexNextcloud bot2020-05-188-0/+14
| | |
* | | [tx-robot] updated from transifexNextcloud bot2020-05-1722-0/+42
| | |
* | | [tx-robot] updated from transifexNextcloud bot2020-05-16130-256/+256
|/ /