Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/nextcloud/server.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2016-02-09Consolidate getQuota and setQuota methods in User instanceArthur Schiwon
2016-02-01Move data protection check to javascriptVincent Chan
fixes #20199
2016-01-20Introduce IUser::setEMailAddress and add hook mechanismThomas Müller
2016-01-13Merge pull request #21653 from owncloud/update-license-headers-2016Thomas Müller
Update license headers 2016
2016-01-12Happy new year!Thomas Müller
2016-01-12Allow admins to add system wide root certificatesRobin Appelman
2016-01-07Add a warning on the apps list when the version is missingJoas Schilling
2016-01-06Inject OCSClientLukas Reschke
Fixes https://github.com/owncloud/core/issues/21451
2015-12-18Use OCP\Util::getVersion instead of the internal private implementationMorris Jobke
2015-12-07Scrutinizer Auto-FixesScrutinizer Auto-Fixer
This commit consists of patches automatically generated for this project on https://scrutinizer-ci.com
2015-12-04Only try to load avatars in the user list if there is anyRoeland Jago Douma
2015-12-02User IUser::getEMailAddress() all over the placeThomas Müller
2015-12-02Remove OC_Config from app management templateMorris Jobke
* add unit test for this case
2015-12-01Add code integrity checkLukas Reschke
This PR implements the base foundation of the code signing and integrity check. In this PR implemented is the signing and verification logic, as well as commands to sign single apps or the core repository. Furthermore, there is a basic implementation to display problems with the code integrity on the update screen. Code signing basically happens the following way: - There is a ownCloud Root Certificate authority stored `resources/codesigning/root.crt` (in this PR I also ship the private key which we obviously need to change before a release :wink:). This certificate is not intended to be used for signing directly and only is used to sign new certificates. - Using the `integrity:sign-core` and `integrity:sign-app` commands developers can sign either the core release or a single app. The core release needs to be signed with a certificate that has a CN of `core`, apps need to be signed with a certificate that either has a CN of `core` (shipped apps!) or the AppID. - The command generates a signature.json file of the following format: ```json { "hashes": { "/filename.php": "2401fed2eea6f2c1027c482a633e8e25cd46701f811e2d2c10dc213fd95fa60e350bccbbebdccc73a042b1a2799f673fbabadc783284cc288e4f1a1eacb74e3d", "/lib/base.php": "55548cc16b457cd74241990cc9d3b72b6335f2e5f45eee95171da024087d114fcbc2effc3d5818a6d5d55f2ae960ab39fd0414d0c542b72a3b9e08eb21206dd9" }, "certificate": "-----BEGIN CERTIFICATE-----MIIBvTCCASagAwIBAgIUPvawyqJwCwYazcv7iz16TWxfeUMwDQYJKoZIhvcNAQEF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\niG+UxI/MNcWV0uJg9S63LF8=\n-----END CERTIFICATE-----", "signature": "U29tZVNpZ25lZERhdGFFeGFtcGxl" } ``` `hashes` is an array of all files in the folder with their corresponding SHA512 hashes (this is actually quite cheap to calculate), the `certificate` is the certificate used for signing. It has to be issued by the ownCloud Root Authority and it's CN needs to be permitted to perform the required action. The `signature` is then a signature of the `hashes` which can be verified using the `certificate`. Steps to do in other PRs, this is already a quite huge one: - Add nag screen in case the code check fails to ensure that administrators are aware of this. - Add code verification also to OCC upgrade and unify display code more. - Add enforced code verification to apps shipped from the appstore with a level of "official" - Add enfocrced code verification to apps shipped from the appstore that were already signed in a previous release - Add some developer documentation on how devs can request their own certificate - Check when installing ownCloud - Add support for CRLs to allow revoking certificates **Note:** The upgrade checks are only run when the instance has a defined release channel of `stable` (defined in `version.php`). If you want to test this, you need to change the channel thus and then generate the core signature: ``` ➜ master git:(add-integrity-checker) ✗ ./occ integrity:sign-core --privateKey=resources/codesigning/core.key --certificate=resources/codesigning/core.crt Successfully signed "core" ``` Then increase the version and you should see something like the following: ![2015-11-04_12-02-57](https://cloud.githubusercontent.com/assets/878997/10936336/6adb1d14-82ec-11e5-8f06-9a74801c9abf.png) As you can see a failed code check will not prevent the further update. It will instead just be a notice to the admin. In a next step we will add some nag screen. For packaging stable releases this requires the following additional steps as a last action before zipping: 1. Run `./occ integrity:sign-core` once 2. Run `./occ integrity:sign-app` _for each_ app. However, this can be simply automated using a simple foreach on the apps folder.
2015-11-20Moved changedisplayname to usercontrollerRoeland Jago Douma
Killed the old static route to change a users display name and moved it to a properly testable controller.
2015-11-04fix subadmin user count for empty groupsMorris Jobke
2015-10-29Fix everyone count for subadminsVincent Petry
Also moved the logic to the UsersController
2015-10-29Drop OC_SubAdmin and replace usagesLukas Reschke
2015-10-27Merge pull request #19813 from owncloud/stay-on-apps-category-refreshThomas Müller
Improve settings/apps page
2015-10-26Use speaking idsJoas Schilling
2015-10-26Stay on the same category when refreshing the page on the apps listJoas Schilling
2015-10-26Update license headersLukas Reschke
2015-10-21Fix unit testRoeland Jago Douma
Now that OC_SubAdmin is just a wrapper around OC\SubAdmin some unit tests had to be fixed because they expected different behaviour. Eventually they should move to properly mocked instances of OC\SubAdmin of course
2015-10-20Fix memcached/memcache module checkRobin McCorkell
2015-10-09Use injected requestVincent Petry
2015-10-09fix IE8 user agent detectionMorris Jobke
2015-10-09Fix uploading avatar and root certs in IE8Vincent Petry
2015-10-08Don't perform checks for outdated TLS libs when no internet connectionLukas Reschke
This change makes the check return a positive result when: - The instance has been configured to not use the internet AND/OR - S2S AND the appstore is disabled
2015-10-08Fix comment syntaxLukas Reschke
2015-10-06Fix importing of certificatesLukas Reschke
Fixes https://github.com/owncloud/core/issues/19601
2015-10-06Merge pull request #19597 from owncloud/update-license-headersThomas Müller
update licence headers via script
2015-10-06deduplicate @xenopathicMorris Jobke
2015-10-06[admin] check for correct PHP memcached moduleMorris Jobke
2015-10-05update licence headers via scriptMorris Jobke
2015-09-10Update isCertificateImportAllowed() check to new APIRobin McCorkell
2015-09-02use config.php value instead of version stringMorris Jobke
2015-08-11Add setup check for reverse proxy header configurationRobin McCorkell
2015-08-11Merge pull request #17919 from rullzer/php_supported_checkThomas Müller
Display warning in security & setup warnings if php version is EOL
2015-08-04also block certificate management in the back-end if external storages are ↵Bjoern Schiessle
disabled for the user
2015-07-29Display warning in security & setup warnings if php version is EOLRoeland Jago Douma
2015-07-28Merge pull request #17912 from owncloud/detect-old-openssl-versionsRobin McCorkell
Detect old NSS and OpenSSL versions
2015-07-28Add unit testsLukas Reschke
2015-07-28set logger in constructorBjoern Schiessle
2015-07-28Detect old NSS and OpenSSL versionsLukas Reschke
This will detect old NSS and OpenSSL versions and show appropriate errors in the admin interface. Fixes https://github.com/owncloud/core/issues/17901
2015-07-17don't move keys if the key where already moved in a previous migration runBjoern Schiessle
2015-07-16Merge pull request #17500 from owncloud/encryption_migration_improvementsThomas Müller
Only clean up if migration finished succesfully
2015-07-13Handle returned null value in app level codeMorris Jobke
* getApplication on OCSClient can also return null this is now handled properly * fixes #17587
2015-07-08only cleanUp the remaining keys if the migration really finished succesfullyBjoern Schiessle
2015-06-29Add missing version fieldLukas Reschke
2015-06-29Merge pull request #17222 from owncloud/issue-17101-send-oc-version-to-app-storeLukas Reschke
Send OC version to appstore so it can reply with the right links