Commit graph

50762 commits

Author SHA1 Message Date
Roeland Jago Douma
ba390f6943
Fix restoring shared versions
Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2019-12-11 12:45:30 +01:00
Roeland Jago Douma
624302d99a
Merge pull request #18337 from nextcloud/backport/18189/stable17
[stable17] Sharee API GS fixes
2019-12-11 07:51:44 +01:00
Nextcloud bot
1241380d79
[tx-robot] updated from transifex 2019-12-11 02:16:59 +00:00
Roeland Jago Douma
e5772bdc3d
Merge pull request #18332 from nextcloud/backport/18312/stable17
[stable17] Do not disable authentication apps
2019-12-10 19:29:05 +01:00
John Molakvoæ (skjnldsv)
08c4b86678
Query lookup by default
Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
2019-12-10 16:15:00 +01:00
Roeland Jago Douma
31645c615f
Expose capability if the lookup server should be queried by default
Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2019-12-10 15:58:00 +01:00
Roeland Jago Douma
05f12b8df4
Always do sharee lookup on lookup server in GS
Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2019-12-10 15:57:49 +01:00
Roeland Jago Douma
028ddde9e5
Merge pull request #18307 from nextcloud/backport/18299/stable17
[stable17] Convert various columns in oc_mounts to bigint
2019-12-10 14:54:25 +01:00
Roeland Jago Douma
ac5f77a796
Merge pull request #18306 from nextcloud/backport/18184/stable17
[stable17] Move overwritehost check to isTrustedDomain
2019-12-10 14:54:11 +01:00
Roeland Jago Douma
c0becec8ad Do not disable authentication apps
For #18249

If an app encounters an error during loading of app.php the app is
normally disabled. However. We should make sure that this doesn't happen
for authentication apps (looking at your user_saml).

Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2019-12-10 13:44:51 +00:00
Roeland Jago Douma
5623dff5ef
Merge pull request #18186 from nextcloud/backport/18149/stable17
[stable17] delay creation of the cert bundle
2019-12-10 13:38:58 +01:00
Nextcloud bot
babe78f20e
[tx-robot] updated from transifex 2019-12-10 02:16:53 +00:00
Georg Ehrke
c5feb6e5a7 Convert various columns in oc_mounts to bigint
Signed-off-by: Georg Ehrke <developer@georgehrke.com>
2019-12-09 20:39:45 +00:00
Julius Härtl
419df66251 Move overwritehost check to isTrustedDomain
Signed-off-by: Julius Härtl <jus@bitgrid.net>
2019-12-09 20:39:00 +00:00
Roeland Jago Douma
9d8c0c262b
Merge pull request #18247 from nextcloud/backport/18241/stable17
[stable17] Allow to unfavorite all files
2019-12-09 21:27:47 +01:00
Nextcloud bot
0a1ec86ee5
[tx-robot] updated from transifex 2019-12-09 02:16:38 +00:00
Nextcloud bot
4905e80d3f
[tx-robot] updated from transifex 2019-12-08 02:17:41 +00:00
John Molakvoæ
2668ca73f3
[stable 17] Fix removing groups that have a slash in the name (#18257)
[stable 17] Fix removing groups that have a slash in the name
2019-12-07 09:46:28 +01:00
Gary Kim
e98b6f761d
Fix removing groups that have a slash in the name
Signed-off-by: Gary Kim <gary@garykim.dev>
2019-12-07 10:18:13 +08:00
Nextcloud bot
8052b32237
[tx-robot] updated from transifex 2019-12-07 02:16:47 +00:00
Nextcloud bot
a675bbb846
[tx-robot] updated from transifex 2019-12-06 02:17:10 +00:00
Roeland Jago Douma
a6f9a0809c
Merge pull request #18252 from nextcloud/17/bugfix/noid/tooltip-hide-date
Hide the tooltip if the list row is rerendered
2019-12-05 20:47:03 +01:00
Julius Härtl
7b6eb80f72
Hide the tooltip if the list row is rerendered
Signed-off-by: Julius Härtl <jus@bitgrid.net>
2019-12-05 14:46:22 +01:00
Joas Schilling
17dc1bc0ba Allow to unfavorite all files
Signed-off-by: Joas Schilling <coding@schilljs.com>
2019-12-05 10:36:51 +00:00
Nextcloud bot
adc4416043
[tx-robot] updated from transifex 2019-12-05 02:17:02 +00:00
Roeland Jago Douma
f032b88c55
Merge pull request #18205 from nextcloud/stable17-backport/18120
[stable17] Backport #18120
2019-12-04 14:12:30 +01:00
Roeland Jago Douma
d4adc27792
Merge pull request #18221 from nextcloud/backport/17850/stable17
[stable17] Mark "Talk" active on /call/token URLs
2019-12-04 14:11:17 +01:00
Nextcloud bot
658c951d68
[tx-robot] updated from transifex 2019-12-04 09:24:22 +00:00
Joas Schilling
c17d86c081
Mark "Talk" active on /call/token URLs
Signed-off-by: Joas Schilling <coding@schilljs.com>
2019-12-04 10:13:44 +01:00
Nextcloud bot
f7732ace10
[tx-robot] updated from transifex 2019-12-04 02:17:01 +00:00
Georg Ehrke
7aec7f6685
respect shareapi_allow_share_dialog_user_enumeration in Principal backend for Sabre/DAV
Signed-off-by: Georg Ehrke <developer@georgehrke.com>
2019-12-03 14:25:32 +01:00
Christoph Wurst
3d65375307
Merge pull request #18198 from nextcloud/backport/17443/stable17
[stable17] Throw an invalid token exception is token is marked outdated
2019-12-03 13:12:27 +01:00
Roeland Jago Douma
a7f596d241 Throw an invalid token exception is token is marked outdated
This avoids hitting the backend with multiple requests for the same
token. And will help avoid quick LDAP lockouts.

Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2019-12-03 08:25:12 +00:00
Roeland Jago Douma
d1b0f0288a
Merge pull request #18189 from nextcloud/backport/17939/stable17
[stable17] Handle token insert conflicts
2019-12-03 07:49:03 +01:00
Nextcloud bot
1402d1b153
[tx-robot] updated from transifex 2019-12-03 02:16:56 +00:00
Christoph Wurst
55b5e13e15
Handle token insert conflicts
Env-based SAML uses the "Apache auth" mechanism to log users in. In this
code path, we first delete all existin auth tokens from the database,
before a new one is inserted. This is problematic for concurrent
requests as they might reach the same code at the same time, hence both
trying to insert a new row wit the same token (the session ID). This
also bubbles up and disables user_saml.

As the token might still be OK (both request will insert the same data),
we can actually just check if the UIDs of the conflict row is the same
as the one we want to insert right now. In that case let's just use the
existing entry and carry on.

Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2019-12-02 14:20:51 +01:00
Arthur Schiwon
ea3fc33beb
delay creation of the cert bundle
fixes #18148

Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2019-12-02 12:09:01 +01:00
Roeland Jago Douma
ebcb7b76c2
Merge pull request #18156 from nextcloud/backport/18135/stable17
[stable17] Trim the login name
2019-12-02 08:53:37 +01:00
Nextcloud bot
1e67be443d
[tx-robot] updated from transifex 2019-12-02 02:17:03 +00:00
Nextcloud bot
59a4349650
[tx-robot] updated from transifex 2019-12-01 02:18:24 +00:00
John Molakvoæ
c4561be550
[stable17] Fix provisioning_api getUsers types (#18157)
[stable17] Fix provisioning_api getUsers types
2019-11-30 11:21:50 +01:00
Nextcloud bot
c302033e5f
[tx-robot] updated from transifex 2019-11-30 02:16:58 +00:00
John Molakvoæ (skjnldsv)
f452ab09df Fix provisioning_api getUsers types
Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
2019-11-29 08:09:02 +00:00
Christoph Wurst
f28a23cdd8 Trim the login name
Otherwise we keep on using it with leading or trailing whitespaces for
app tokens and other logic. The reason this doesn't throw an error
immediately with local users is that (My)SQL compares strings regardless
of their padding by default. So we look up 'uid ' and get the row for
the user 'uid'.
Other back-ends will lead to a hard error, though, and the user is
unable to log out as all request fail.

Ref https://stackoverflow.com/a/10495807/2239067

Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2019-11-29 07:50:52 +00:00
Nextcloud bot
611e6a0f7d
[tx-robot] updated from transifex 2019-11-29 02:17:03 +00:00
Nextcloud bot
c75cc61226
[tx-robot] updated from transifex 2019-11-28 02:17:04 +00:00
Roeland Jago Douma
de26578025
Merge pull request #17919 from nextcloud/backport/17905/update-searchdav
[stable17] Bump icewind/searchdav
2019-11-27 08:37:22 +01:00
Nextcloud bot
8cb7149de8
[tx-robot] updated from transifex 2019-11-27 02:16:34 +00:00
Roeland Jago Douma
f6aa0d5f4f
Merge pull request #18100 from nextcloud/backport/18027/stable17
[stable17] Incorrect integer value: '' for column 'password_invalid' while migra…
2019-11-26 14:39:38 +01:00
Nextcloud bot
902c75a1a9
[tx-robot] updated from transifex 2019-11-26 02:16:05 +00:00