summaryrefslogtreecommitdiffstats
path: root/lib
Commit message (Collapse)AuthorAgeFilesLines
* Merge pull request #22443 from nextcloud/backport/22421/stable18Roeland Jago Douma2020-10-011-1/+3
|\ | | | | [stable18] show better quota warning for group folders and external storage
| * show better quota warning for group folders and external storageRobin Appelman2020-09-291-1/+3
| | | | | | | | | | | | instead of showing the generic 'Your storage is full' message, better explain that it's the group folder/external storage that is full Signed-off-by: Robin Appelman <robin@icewind.nl>
* | Merge pull request #23088 from nextcloud/backport/23013/stable18Roeland Jago Douma2020-10-011-2/+3
|\ \ | | | | | | [stable18] Show federation and email results also with exact user match unless c…
| * | Show federation and email results also with exact user match unless containing @Joas Schilling2020-10-011-2/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Before when you have a user "smith" and a federated user "smith@example.com" you could see the federation result with "smit" but not with "smith" anymore. With most LDAP configurations and local backend setups this is disturbing and causes issues. The idea of not showing the email and federation on a matching user was with: Local user registered with "smith@example.com" user id and having that same email / cloud id in your contacts addressbook. So we now only hide those "side results" when the search does contain an @ Signed-off-by: Joas Schilling <coding@schilljs.com>
* | | Merge pull request #22802 from nextcloud/backport/stable18/22116-22648-22761Roeland Jago Douma2020-10-012-0/+12
|\ \ \ | | | | | | | | [stable18] Fix share transfer of single files and on the transfered node
| * | | Transfer shares of the transferred root nodeJulius Härtl2020-09-172-0/+12
| | | | | | | | | | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | | | [tx-robot] updated from transifexNextcloud bot2020-10-012-0/+2
| | | |
* | | | Merge pull request #23091 from nextcloud/backport/23074/stable18Roeland Jago Douma2020-09-291-2/+2
|\ \ \ \ | | | | | | | | | | [stable18] Do not match sharees on an empty email address
| * | | | Do not match sharees on an empty email addressChristoph Wurst2020-09-291-2/+2
| | |/ / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When asking for sharees we compare not only UID and displayname but also the email address. And if that matches we return the sharee as an exact match. This logic had a flaw as in that it also matched the empty string to users with no email address. This is most noticeable when you disable sharee enumeration and open the ownership transfer dialog. It suggested other users of the instance before. This has stopped now. Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* | | | Merge pull request #22743 from nextcloud/backport/22589/stable18Joas Schilling2020-09-291-1/+2
|\ \ \ \ | |/ / / |/| | | [stable18] Allow additional personal settings via normal registration
| * | | Allow additional personal settings via normal registrationJoas Schilling2020-09-091-1/+2
| | | | | | | | | | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | | | [tx-robot] updated from transifexNextcloud bot2020-09-202-0/+2
| | | |
* | | | [tx-robot] updated from transifexNextcloud bot2020-09-1818-2/+20
| |/ / |/| |
* | | fix: file quota was not applied in all caseskorelstar2020-09-171-2/+2
| | |
* | | [tx-robot] updated from transifexNextcloud bot2020-09-172-2/+2
| | |
* | | [tx-robot] updated from transifexNextcloud bot2020-09-152-2/+4
| | |
* | | Merge pull request #22781 from nextcloud/backport/22775/stable18Roeland Jago Douma2020-09-112-5/+0
|\ \ \ | | | | | | | | [stable18] makes LDAP's group updater dispatch type events
| * | | makes LDAP's group updater dispatch type eventsArthur Schiwon2020-09-102-5/+0
| | | | | | | | | | | | | | | | | | | | | | | | * fixes group share updates on added users Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | | | Annotate that writeStream can throw a GenericFileExceptionJulius Härtl2020-09-101-0/+3
|/ / / | | | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | | Fix reading empty files from objectstorageRoeland Jago Douma2020-09-091-0/+5
| | | | | | | | | | | | | | | | | | | | | | | | Since we try to do range requests this will fail hard. However since empty files are not that interesting to read anyways we just read from an emptry memory stream. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | | Merge pull request #22746 from nextcloud/backport/22646/stable18Morris Jobke2020-09-091-1/+7
|\ \ \ | | | | | | | | [stable18] Fix detecting text/x-php mimetype and secure mimetype mapping
| * | | Properly add both mimetypes to secure mimetype mappingJulius Härtl2020-09-091-1/+7
| |/ / | | | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* / / Warn about adding NotNull columns with nullable defaultJoas Schilling2020-09-071-0/+5
|/ / | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | [tx-robot] updated from transifexNextcloud bot2020-09-072-34/+52
| |
* | [tx-robot] updated from transifexNextcloud bot2020-09-062-0/+8
| |
* | Use the correct root to determinate the webroot for the resourceJoas Schilling2020-09-041-2/+2
| | | | | | | | | | | | | | Since all the compiled routes are based on the server webroot, we have to use this, independent from which app this belongs to. Signed-off-by: Joas Schilling <coding@schilljs.com>
* | Merge pull request #22570 from nextcloud/backport/22524/stable18Roeland Jago Douma2020-09-045-0/+63
|\ \ | | | | | | [stable18] Fix app password updating out of bounds
| * | Fix app password updating out of boundsRoeland Jago Douma2020-09-045-0/+63
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When your password changes out of bounds your Nextcloud tokens will become invalid. There is no real way around that. However we should make sure that if you successfully log in again your passwords are all updates * Added event listener to the PostLoggedInEvent so that we can act on it - Only if it is not a token login * Make sure that we actually reset the invalid state when we update a token. Else it keeps being marked invalid and thus not used. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | | [tx-robot] updated from transifexNextcloud bot2020-09-042-4/+4
|/ /
* | Only disable zip64 if the size is knownRoeland Jago Douma2020-09-011-1/+5
| | | | | | | | | | | | | | | | Else we might run into the issue that for an external storage where the size is not known yet we do not use zip64. Which then of course fails on large zip files. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | Merge pull request #22518 from nextcloud/backport/22517/stable18Roeland Jago Douma2020-09-011-1/+1
|\ \ | | | | | | [stable18] set the mount id before calling storage wrapper
| * | set the mount id before calling storage wrapperRobin Appelman2020-08-311-1/+1
| | | | | | | | | | | | | | | | | | this allows the storage wrapper to use the mount id for it's own logic Signed-off-by: Robin Appelman <robin@icewind.nl>
* | | Only update the filecache entry once the file has been written to S3Roeland Jago Douma2020-08-311-2/+11
| | | | | | | | | | | | | | | | | | | | | If we already update before we have no way to revert if the upload fails. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | | Don't lose filecache entry on s3 overwrite errorRoeland Jago Douma2020-08-311-5/+16
|/ / | | | | | | | | | | | | If the object store errors we should not always delete the filecache entry. As this might lead to people losing access to their files. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | [tx-robot] updated from transifexNextcloud bot2020-08-282-2/+2
| |
* | Merge pull request #22449 from nextcloud/stable18-phpdocRoeland Jago Douma2020-08-27222-223/+0
|\ \ | | | | | | [stable18] Add php docs build script
| * | Remove @package annotations from public namespaceJulius Härtl2020-08-27216-216/+0
| | | | | | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
| * | Remove wrongly annotated package namesJulius Härtl2020-08-276-7/+0
| | | | | | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | | [tx-robot] updated from transifexNextcloud bot2020-08-272-4/+4
| |/ |/|
* | Merge pull request #22411 from nextcloud/backport/22359/stable18Roeland Jago Douma2020-08-261-0/+10
|\ \ | |/ |/| [stable18] fix possible leaking scope in Flow
| * adjust since for 18Arthur Schiwon2020-08-251-1/+1
| | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
| * fix possible leaking scope in FlowArthur Schiwon2020-08-251-0/+10
| | | | | | | | | | | | | | | | | | - a configured flow can be brought into consideration, despite its event was not fired - it could either run through - or run into a RuntimeException and killing processing of valid flows Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | [tx-robot] updated from transifexNextcloud bot2020-08-262-0/+32
|/
* [tx-robot] updated from transifexNextcloud bot2020-08-234-2/+4
|
* Merge pull request #22306 from nextcloud/backport/22300/stable18Morris Jobke2020-08-201-1/+2
|\ | | | | [stable18] Allow to disable share emails
| * Allow to disable share emailsJoas Schilling2020-08-191-1/+2
| | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | [tx-robot] updated from transifexNextcloud bot2020-08-202-0/+2
|/
* [tx-robot] updated from transifexNextcloud bot2020-08-192-0/+2
|
* [tx-robot] updated from transifexNextcloud bot2020-08-182-0/+2
|
* [tx-robot] updated from transifexNextcloud bot2020-08-172-0/+2
|