Commit graph

50748 commits

Author SHA1 Message Date
Georg Ehrke
c5feb6e5a7 Convert various columns in oc_mounts to bigint
Signed-off-by: Georg Ehrke <developer@georgehrke.com>
2019-12-09 20:39:45 +00:00
Roeland Jago Douma
9d8c0c262b
Merge pull request #18247 from nextcloud/backport/18241/stable17
[stable17] Allow to unfavorite all files
2019-12-09 21:27:47 +01:00
Nextcloud bot
0a1ec86ee5
[tx-robot] updated from transifex 2019-12-09 02:16:38 +00:00
Nextcloud bot
4905e80d3f
[tx-robot] updated from transifex 2019-12-08 02:17:41 +00:00
John Molakvoæ
2668ca73f3
[stable 17] Fix removing groups that have a slash in the name (#18257)
[stable 17] Fix removing groups that have a slash in the name
2019-12-07 09:46:28 +01:00
Gary Kim
e98b6f761d
Fix removing groups that have a slash in the name
Signed-off-by: Gary Kim <gary@garykim.dev>
2019-12-07 10:18:13 +08:00
Nextcloud bot
8052b32237
[tx-robot] updated from transifex 2019-12-07 02:16:47 +00:00
Nextcloud bot
a675bbb846
[tx-robot] updated from transifex 2019-12-06 02:17:10 +00:00
Roeland Jago Douma
a6f9a0809c
Merge pull request #18252 from nextcloud/17/bugfix/noid/tooltip-hide-date
Hide the tooltip if the list row is rerendered
2019-12-05 20:47:03 +01:00
Julius Härtl
7b6eb80f72
Hide the tooltip if the list row is rerendered
Signed-off-by: Julius Härtl <jus@bitgrid.net>
2019-12-05 14:46:22 +01:00
Joas Schilling
17dc1bc0ba Allow to unfavorite all files
Signed-off-by: Joas Schilling <coding@schilljs.com>
2019-12-05 10:36:51 +00:00
Nextcloud bot
adc4416043
[tx-robot] updated from transifex 2019-12-05 02:17:02 +00:00
Roeland Jago Douma
f032b88c55
Merge pull request #18205 from nextcloud/stable17-backport/18120
[stable17] Backport #18120
2019-12-04 14:12:30 +01:00
Roeland Jago Douma
d4adc27792
Merge pull request #18221 from nextcloud/backport/17850/stable17
[stable17] Mark "Talk" active on /call/token URLs
2019-12-04 14:11:17 +01:00
Nextcloud bot
658c951d68
[tx-robot] updated from transifex 2019-12-04 09:24:22 +00:00
Joas Schilling
c17d86c081
Mark "Talk" active on /call/token URLs
Signed-off-by: Joas Schilling <coding@schilljs.com>
2019-12-04 10:13:44 +01:00
Nextcloud bot
f7732ace10
[tx-robot] updated from transifex 2019-12-04 02:17:01 +00:00
Georg Ehrke
7aec7f6685
respect shareapi_allow_share_dialog_user_enumeration in Principal backend for Sabre/DAV
Signed-off-by: Georg Ehrke <developer@georgehrke.com>
2019-12-03 14:25:32 +01:00
Christoph Wurst
3d65375307
Merge pull request #18198 from nextcloud/backport/17443/stable17
[stable17] Throw an invalid token exception is token is marked outdated
2019-12-03 13:12:27 +01:00
Roeland Jago Douma
a7f596d241 Throw an invalid token exception is token is marked outdated
This avoids hitting the backend with multiple requests for the same
token. And will help avoid quick LDAP lockouts.

Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2019-12-03 08:25:12 +00:00
Roeland Jago Douma
d1b0f0288a
Merge pull request #18189 from nextcloud/backport/17939/stable17
[stable17] Handle token insert conflicts
2019-12-03 07:49:03 +01:00
Nextcloud bot
1402d1b153
[tx-robot] updated from transifex 2019-12-03 02:16:56 +00:00
Christoph Wurst
55b5e13e15
Handle token insert conflicts
Env-based SAML uses the "Apache auth" mechanism to log users in. In this
code path, we first delete all existin auth tokens from the database,
before a new one is inserted. This is problematic for concurrent
requests as they might reach the same code at the same time, hence both
trying to insert a new row wit the same token (the session ID). This
also bubbles up and disables user_saml.

As the token might still be OK (both request will insert the same data),
we can actually just check if the UIDs of the conflict row is the same
as the one we want to insert right now. In that case let's just use the
existing entry and carry on.

Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2019-12-02 14:20:51 +01:00
Roeland Jago Douma
ebcb7b76c2
Merge pull request #18156 from nextcloud/backport/18135/stable17
[stable17] Trim the login name
2019-12-02 08:53:37 +01:00
Nextcloud bot
1e67be443d
[tx-robot] updated from transifex 2019-12-02 02:17:03 +00:00
Nextcloud bot
59a4349650
[tx-robot] updated from transifex 2019-12-01 02:18:24 +00:00
John Molakvoæ
c4561be550
[stable17] Fix provisioning_api getUsers types (#18157)
[stable17] Fix provisioning_api getUsers types
2019-11-30 11:21:50 +01:00
Nextcloud bot
c302033e5f
[tx-robot] updated from transifex 2019-11-30 02:16:58 +00:00
John Molakvoæ (skjnldsv)
f452ab09df Fix provisioning_api getUsers types
Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
2019-11-29 08:09:02 +00:00
Christoph Wurst
f28a23cdd8 Trim the login name
Otherwise we keep on using it with leading or trailing whitespaces for
app tokens and other logic. The reason this doesn't throw an error
immediately with local users is that (My)SQL compares strings regardless
of their padding by default. So we look up 'uid ' and get the row for
the user 'uid'.
Other back-ends will lead to a hard error, though, and the user is
unable to log out as all request fail.

Ref https://stackoverflow.com/a/10495807/2239067

Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
2019-11-29 07:50:52 +00:00
Nextcloud bot
611e6a0f7d
[tx-robot] updated from transifex 2019-11-29 02:17:03 +00:00
Nextcloud bot
c75cc61226
[tx-robot] updated from transifex 2019-11-28 02:17:04 +00:00
Roeland Jago Douma
de26578025
Merge pull request #17919 from nextcloud/backport/17905/update-searchdav
[stable17] Bump icewind/searchdav
2019-11-27 08:37:22 +01:00
Nextcloud bot
8cb7149de8
[tx-robot] updated from transifex 2019-11-27 02:16:34 +00:00
Roeland Jago Douma
f6aa0d5f4f
Merge pull request #18100 from nextcloud/backport/18027/stable17
[stable17] Incorrect integer value: '' for column 'password_invalid' while migra…
2019-11-26 14:39:38 +01:00
Nextcloud bot
902c75a1a9
[tx-robot] updated from transifex 2019-11-26 02:16:05 +00:00
Łukasz Buśko
7fae44c4c7 Incorrect integer value: '' for column 'password_invalid' while migrating from pg to mysql #14920
Signed-off-by: Łukasz Buśko <busko.lukasz@pm.me>
2019-11-25 10:38:39 +00:00
Roeland Jago Douma
09a739de83
Merge pull request #18054 from nextcloud/backport/18016/stable17
[stable17] make chunksize (used to check for gone LDAP users) configurable
2019-11-25 08:40:25 +01:00
Roeland Jago Douma
a0a9f702b0
Merge pull request #18075 from nextcloud/backport/17696/stable17
[stable17] Remove objectstore credentials
2019-11-25 08:38:21 +01:00
John Molakvoæ
66ddb89180
[stable17] Quickfix #17515 (#18094)
[stable17] Quickfix #17515
2019-11-25 07:09:46 +01:00
Nextcloud bot
f715e77607
[tx-robot] updated from transifex 2019-11-25 02:16:04 +00:00
Robin Windey
ff2f7a7d1a Revert changes and add css-rule to correct file inside files-app 2019-11-24 14:58:41 +00:00
Nextcloud bot
030dd9e01e
[tx-robot] updated from transifex 2019-11-24 02:17:04 +00:00
Nextcloud bot
2d0fa72171
[tx-robot] updated from transifex 2019-11-23 02:16:17 +00:00
Daniel Kesselberg
956c459465 Add information about credentials
Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
2019-11-22 13:27:16 +00:00
Daniel Kesselberg
33dc7333a6 Remove objectstore credentials
Also remove the username for Swift v2 and add todo for unclear keys.

Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
2019-11-22 13:27:16 +00:00
Daniel Kesselberg
d77d94b1a0 Remove objectstore credentials
S3: key and secret
Swift v3: user.name and user.password

Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
2019-11-22 13:27:15 +00:00
Nextcloud bot
99420445cc
[tx-robot] updated from transifex 2019-11-22 02:16:26 +00:00
Arthur Schiwon
5f32b62a63 make chunksize (used to check for gone LDAP users) configurable
Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2019-11-21 10:06:44 +00:00
blizzz
f9aa207440
Merge pull request #18047 from nextcloud/backport/18030/stable17
[stable17] uid can be false when the user record does not exit
2019-11-21 11:01:26 +01:00