summaryrefslogtreecommitdiffstats
path: root/lib
Commit message (Collapse)AuthorAgeFilesLines
* [tx-robot] updated from transifexNextcloud bot2020-10-082-0/+2
|
* [tx-robot] updated from transifexNextcloud bot2020-10-072-4/+4
|
* Only run the query to get the account data onceJoas Schilling2020-10-061-5/+7
| | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* Merge pull request #22784 from nextcloud/backport/22234/stable19Roeland Jago Douma2020-10-011-4/+12
|\ | | | | [stable19] Use user mount with matching shared storage only
| * Use user mount with matching shared storage onlyJulius Härtl2020-09-101-4/+12
| | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | Merge pull request #23087 from nextcloud/backport/23013/stable19Roeland Jago Douma2020-10-011-2/+3
|\ \ | | | | | | [stable19] Show federation and email results also with exact user match unless c…
| * | Show federation and email results also with exact user match unless containing @Joas Schilling2020-09-291-2/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Before when you have a user "smith" and a federated user "smith@example.com" you could see the federation result with "smit" but not with "smith" anymore. With most LDAP configurations and local backend setups this is disturbing and causes issues. The idea of not showing the email and federation on a matching user was with: Local user registered with "smith@example.com" user id and having that same email / cloud id in your contacts addressbook. So we now only hide those "side results" when the search does contain an @ Signed-off-by: Joas Schilling <coding@schilljs.com>
* | | Merge pull request #23090 from nextcloud/backport/23074/stable19Roeland Jago Douma2020-10-011-2/+2
|\ \ \ | | | | | | | | [stable19] Do not match sharees on an empty email address
| * | | Do not match sharees on an empty email addressChristoph Wurst2020-09-291-2/+2
| |/ / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When asking for sharees we compare not only UID and displayname but also the email address. And if that matches we return the sharee as an exact match. This logic had a flaw as in that it also matched the empty string to users with no email address. This is most noticeable when you disable sharee enumeration and open the ownership transfer dialog. It suggested other users of the instance before. This has stopped now. Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* | | [tx-robot] updated from transifexNextcloud bot2020-10-012-0/+2
| | |
* | | Generate exception to log on php errorsJulius Härtl2020-09-291-2/+4
|/ / | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | Merge pull request #22804 from nextcloud/backport/stable19/22116-22648-22761Roeland Jago Douma2020-09-282-0/+12
|\ \ | | | | | | [stable19] Fix share transfer of single files and on the transfered node
| * | Transfer shares of the transferred root nodeJulius Härtl2020-09-172-0/+12
| | | | | | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | | Merge pull request #22904 from nextcloud/backport/22636/stable19Roeland Jago Douma2020-09-281-13/+15
|\ \ \ | | | | | | | | [stable19] Make sure that getConfig is still called for browsers that do not support CSPv3
| * | | Make sure that getConfig is still called for browsers that do not support CSPv3Julius Härtl2020-09-171-13/+15
| | | | | | | | | | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | | | [tx-robot] updated from transifexNextcloud bot2020-09-202-0/+2
| | | |
* | | | [tx-robot] updated from transifexNextcloud bot2020-09-1818-2/+20
| |/ / |/| |
* | | fix: file quota was not applied in all caseskorelstar2020-09-171-2/+2
|/ /
* | [tx-robot] updated from transifexNextcloud bot2020-09-172-2/+2
| |
* | [tx-robot] updated from transifexNextcloud bot2020-09-152-2/+4
| |
* | Merge pull request #22775 from ↵Roeland Jago Douma2020-09-112-5/+0
|\ \ | | | | | | | | | | | | nextcloud/fix/noid/stable19-ldap-group-update-events [stable19] makes LDAP's group updater dispatch type events
| * | makes LDAP's group updater dispatch type eventsArthur Schiwon2020-09-102-5/+0
| |/ | | | | | | | | | | * fixes group share updates on added users Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* / Annotate that writeStream can throw a GenericFileExceptionJulius Härtl2020-09-101-0/+3
|/ | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* Fix reading empty files from objectstorageRoeland Jago Douma2020-09-091-0/+5
| | | | | | | | Since we try to do range requests this will fail hard. However since empty files are not that interesting to read anyways we just read from an emptry memory stream. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Merge pull request #22742 from nextcloud/backport/22589/stable19Morris Jobke2020-09-091-1/+2
|\ | | | | [stable19] Allow additional personal settings via normal registration
| * Allow additional personal settings via normal registrationJoas Schilling2020-09-091-1/+2
| | | | | | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* | Merge pull request #22745 from nextcloud/backport/22646/stable19Morris Jobke2020-09-091-1/+7
|\ \ | | | | | | [stable19] Fix detecting text/x-php mimetype and secure mimetype mapping
| * | Properly add both mimetypes to secure mimetype mappingJulius Härtl2020-09-091-1/+7
| |/ | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* / Warn about adding NotNull columns with nullable defaultJoas Schilling2020-09-071-0/+5
|/ | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* [tx-robot] updated from transifexNextcloud bot2020-09-072-34/+52
|
* [tx-robot] updated from transifexNextcloud bot2020-09-062-0/+8
|
* Merge pull request #22515 from nextcloud/backport/22472/stable19Roeland Jago Douma2020-09-042-1/+8
|\ | | | | [stable19] Fix writing BLOBs to postgres with recent contacts interaction
| * Fix writing BLOBs to postgres with recent contacts interactionChristoph Wurst2020-08-312-1/+8
| | | | | | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* | Merge pull request #22579 from nextcloud/backport/22550/stable19Roeland Jago Douma2020-09-041-2/+2
|\ \ | | | | | | [stable19] Use the correct root to determinate the webroot for the resource
| * | Use the correct root to determinate the webroot for the resourceJoas Schilling2020-09-041-2/+2
| | | | | | | | | | | | | | | | | | | | | Since all the compiled routes are based on the server webroot, we have to use this, independent from which app this belongs to. Signed-off-by: Joas Schilling <coding@schilljs.com>
* | | Merge pull request #22442 from nextcloud/backport/22421/stable19Roeland Jago Douma2020-09-041-1/+3
|\ \ \ | | | | | | | | [stable19] show better quota warning for group folders and external storage
| * | | show better quota warning for group folders and external storageRobin Appelman2020-08-261-1/+3
| | | | | | | | | | | | | | | | | | | | | | | | instead of showing the generic 'Your storage is full' message, better explain that it's the group folder/external storage that is full Signed-off-by: Robin Appelman <robin@icewind.nl>
* | | | Merge pull request #22569 from nextcloud/backport/22524/stable19Roeland Jago Douma2020-09-045-0/+60
|\ \ \ \ | |_|/ / |/| | | [stable19] Fix app password updating out of bounds
| * | | Fix app password updating out of boundsRoeland Jago Douma2020-09-035-0/+60
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When your password changes out of bounds your Nextcloud tokens will become invalid. There is no real way around that. However we should make sure that if you successfully log in again your passwords are all updates * Added event listener to the PostLoggedInEvent so that we can act on it - Only if it is not a token login * Make sure that we actually reset the invalid state when we update a token. Else it keeps being marked invalid and thus not used. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | | | [tx-robot] updated from transifexNextcloud bot2020-09-042-4/+4
|/ / /
* | | Only disable zip64 if the size is knownRoeland Jago Douma2020-09-011-1/+5
| | | | | | | | | | | | | | | | | | | | | | | | Else we might run into the issue that for an external storage where the size is not known yet we do not use zip64. Which then of course fails on large zip files. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | | Merge pull request #22519 from nextcloud/backport/22517/stable19Julius Härtl2020-08-311-1/+1
|\ \ \ | | | | | | | | [stable19] set the mount id before calling storage wrapper
| * | | set the mount id before calling storage wrapperRobin Appelman2020-08-311-1/+1
| | |/ | |/| | | | | | | | | | | | | this allows the storage wrapper to use the mount id for it's own logic Signed-off-by: Robin Appelman <robin@icewind.nl>
* | | Only update the filecache entry once the file has been written to S3Roeland Jago Douma2020-08-311-2/+11
| | | | | | | | | | | | | | | | | | | | | If we already update before we have no way to revert if the upload fails. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | | Don't lose filecache entry on s3 overwrite errorRoeland Jago Douma2020-08-311-5/+16
|/ / | | | | | | | | | | | | If the object store errors we should not always delete the filecache entry. As this might lead to people losing access to their files. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* | [tx-robot] updated from transifexNextcloud bot2020-08-282-2/+2
| |
* | Remove @package annotations from public namespaceJulius Härtl2020-08-27217-217/+0
| | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | Remove wrongly annotated package namesJulius Härtl2020-08-276-7/+0
| | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | [tx-robot] updated from transifexNextcloud bot2020-08-272-4/+4
|/
* Merge pull request #22410 from nextcloud/backport/22359/stable19Roeland Jago Douma2020-08-261-0/+10
|\ | | | | [stable19] fix possible leaking scope in Flow