Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/nextcloud/server.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
path: root/lib
AgeCommit message (Collapse)Author
2020-10-01Merge pull request #22784 from nextcloud/backport/22234/stable19Roeland Jago Douma
[stable19] Use user mount with matching shared storage only
2020-10-01Merge pull request #23087 from nextcloud/backport/23013/stable19Roeland Jago Douma
[stable19] Show federation and email results also with exact user match unless c…
2020-10-01Merge pull request #23090 from nextcloud/backport/23074/stable19Roeland Jago Douma
[stable19] Do not match sharees on an empty email address
2020-10-01[tx-robot] updated from transifexNextcloud bot
2020-09-29Generate exception to log on php errorsJulius Härtl
Signed-off-by: Julius Härtl <jus@bitgrid.net>
2020-09-29Do not match sharees on an empty email addressChristoph Wurst
When asking for sharees we compare not only UID and displayname but also the email address. And if that matches we return the sharee as an exact match. This logic had a flaw as in that it also matched the empty string to users with no email address. This is most noticeable when you disable sharee enumeration and open the ownership transfer dialog. It suggested other users of the instance before. This has stopped now. Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2020-09-29Show federation and email results also with exact user match unless containing @Joas Schilling
Before when you have a user "smith" and a federated user "smith@example.com" you could see the federation result with "smit" but not with "smith" anymore. With most LDAP configurations and local backend setups this is disturbing and causes issues. The idea of not showing the email and federation on a matching user was with: Local user registered with "smith@example.com" user id and having that same email / cloud id in your contacts addressbook. So we now only hide those "side results" when the search does contain an @ Signed-off-by: Joas Schilling <coding@schilljs.com>
2020-09-28Merge pull request #22804 from nextcloud/backport/stable19/22116-22648-22761Roeland Jago Douma
[stable19] Fix share transfer of single files and on the transfered node
2020-09-28Merge pull request #22904 from nextcloud/backport/22636/stable19Roeland Jago Douma
[stable19] Make sure that getConfig is still called for browsers that do not support CSPv3
2020-09-20[tx-robot] updated from transifexNextcloud bot
2020-09-18[tx-robot] updated from transifexNextcloud bot
2020-09-17Transfer shares of the transferred root nodeJulius Härtl
Signed-off-by: Julius Härtl <jus@bitgrid.net>
2020-09-17Make sure that getConfig is still called for browsers that do not support CSPv3Julius Härtl
Signed-off-by: Julius Härtl <jus@bitgrid.net>
2020-09-17fix: file quota was not applied in all caseskorelstar
2020-09-17[tx-robot] updated from transifexNextcloud bot
2020-09-15[tx-robot] updated from transifexNextcloud bot
2020-09-11Merge pull request #22775 from ↵Roeland Jago Douma
nextcloud/fix/noid/stable19-ldap-group-update-events [stable19] makes LDAP's group updater dispatch type events
2020-09-10Use user mount with matching shared storage onlyJulius Härtl
Signed-off-by: Julius Härtl <jus@bitgrid.net>
2020-09-10makes LDAP's group updater dispatch type eventsArthur Schiwon
* fixes group share updates on added users Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2020-09-10Annotate that writeStream can throw a GenericFileExceptionJulius Härtl
Signed-off-by: Julius Härtl <jus@bitgrid.net>
2020-09-09Fix reading empty files from objectstorageRoeland Jago Douma
Since we try to do range requests this will fail hard. However since empty files are not that interesting to read anyways we just read from an emptry memory stream. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2020-09-09Merge pull request #22742 from nextcloud/backport/22589/stable19Morris Jobke
[stable19] Allow additional personal settings via normal registration
2020-09-09Merge pull request #22745 from nextcloud/backport/22646/stable19Morris Jobke
[stable19] Fix detecting text/x-php mimetype and secure mimetype mapping
2020-09-09Properly add both mimetypes to secure mimetype mappingJulius Härtl
Signed-off-by: Julius Härtl <jus@bitgrid.net>
2020-09-09Allow additional personal settings via normal registrationJoas Schilling
Signed-off-by: Joas Schilling <coding@schilljs.com>
2020-09-07Warn about adding NotNull columns with nullable defaultJoas Schilling
Signed-off-by: Joas Schilling <coding@schilljs.com>
2020-09-07[tx-robot] updated from transifexNextcloud bot
2020-09-06[tx-robot] updated from transifexNextcloud bot
2020-09-04Merge pull request #22515 from nextcloud/backport/22472/stable19Roeland Jago Douma
[stable19] Fix writing BLOBs to postgres with recent contacts interaction
2020-09-04Merge pull request #22579 from nextcloud/backport/22550/stable19Roeland Jago Douma
[stable19] Use the correct root to determinate the webroot for the resource
2020-09-04Merge pull request #22442 from nextcloud/backport/22421/stable19Roeland Jago Douma
[stable19] show better quota warning for group folders and external storage
2020-09-04Merge pull request #22569 from nextcloud/backport/22524/stable19Roeland Jago Douma
[stable19] Fix app password updating out of bounds
2020-09-04Use the correct root to determinate the webroot for the resourceJoas Schilling
Since all the compiled routes are based on the server webroot, we have to use this, independent from which app this belongs to. Signed-off-by: Joas Schilling <coding@schilljs.com>
2020-09-04[tx-robot] updated from transifexNextcloud bot
2020-09-03Fix app password updating out of boundsRoeland Jago Douma
When your password changes out of bounds your Nextcloud tokens will become invalid. There is no real way around that. However we should make sure that if you successfully log in again your passwords are all updates * Added event listener to the PostLoggedInEvent so that we can act on it - Only if it is not a token login * Make sure that we actually reset the invalid state when we update a token. Else it keeps being marked invalid and thus not used. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2020-09-01Only disable zip64 if the size is knownRoeland Jago Douma
Else we might run into the issue that for an external storage where the size is not known yet we do not use zip64. Which then of course fails on large zip files. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2020-08-31Merge pull request #22519 from nextcloud/backport/22517/stable19Julius Härtl
[stable19] set the mount id before calling storage wrapper
2020-08-31Only update the filecache entry once the file has been written to S3Roeland Jago Douma
If we already update before we have no way to revert if the upload fails. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2020-08-31Don't lose filecache entry on s3 overwrite errorRoeland Jago Douma
If the object store errors we should not always delete the filecache entry. As this might lead to people losing access to their files. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2020-08-31set the mount id before calling storage wrapperRobin Appelman
this allows the storage wrapper to use the mount id for it's own logic Signed-off-by: Robin Appelman <robin@icewind.nl>
2020-08-31Fix writing BLOBs to postgres with recent contacts interactionChristoph Wurst
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2020-08-28[tx-robot] updated from transifexNextcloud bot
2020-08-27Remove @package annotations from public namespaceJulius Härtl
Signed-off-by: Julius Härtl <jus@bitgrid.net>
2020-08-27Remove wrongly annotated package namesJulius Härtl
Signed-off-by: Julius Härtl <jus@bitgrid.net>
2020-08-27[tx-robot] updated from transifexNextcloud bot
2020-08-26show better quota warning for group folders and external storageRobin Appelman
instead of showing the generic 'Your storage is full' message, better explain that it's the group folder/external storage that is full Signed-off-by: Robin Appelman <robin@icewind.nl>
2020-08-26Merge pull request #22410 from nextcloud/backport/22359/stable19Roeland Jago Douma
[stable19] fix possible leaking scope in Flow
2020-08-26[tx-robot] updated from transifexNextcloud bot
2020-08-25adjust since for 19Arthur Schiwon
Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2020-08-25fix possible leaking scope in FlowArthur Schiwon
- a configured flow can be brought into consideration, despite its event was not fired - it could either run through - or run into a RuntimeException and killing processing of valid flows Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>