Commit Graph

42941 Commits

Author SHA1 Message Date
Nextcloud bot 7afee0e583
[tx-robot] updated from transifex 2018-11-08 01:12:37 +00:00
Nextcloud bot af858c257a
[tx-robot] updated from transifex 2018-11-07 01:12:49 +00:00
Morris Jobke 1cac241318
Merge pull request #12298 from nextcloud/backport/12127/stable13
[13] A folder should get a folder mimetype
2018-11-06 18:13:45 +01:00
Roeland Jago Douma fc49fa1620
A folder should get a folder mimetype
If doing achunked upload the mimetype of the folder would otherwise be
guessed from the path. Which always returned application/octet-stream.

If an access control rule to block that is in place this means that all
chunked uploads fail hard in directories as the isCreatable on the
directory always fails.

Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2018-11-06 08:02:48 +01:00
Nextcloud bot 450b9e2a20
[tx-robot] updated from transifex 2018-11-06 01:12:56 +00:00
Nextcloud bot 30666be2f0
[tx-robot] updated from transifex 2018-11-05 01:12:55 +00:00
Nextcloud bot 374bfbeaca
[tx-robot] updated from transifex 2018-11-04 01:14:21 +00:00
Nextcloud bot 0e125b810a
[tx-robot] updated from transifex 2018-11-03 01:12:58 +00:00
Morris Jobke afed9ae664
Merge pull request #12212 from nextcloud/backport/12140/stable13
[13] Expired tokens should not trigger bruteforce protection
2018-11-02 12:33:31 +01:00
Roeland Jago Douma 40d1202076
Error out early on an expired token
Fixes #12131

If we hit an expired token there is no need to continue checking. Since
we know it is a token.

We also should not register this with the bruteforce throttler as it is
actually a valid token. Just expired. Instead the authentication should
fail. And buisness continues as usual.

Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2018-11-02 11:41:00 +01:00
Roeland Jago Douma 04617a28d4
Move ExpiredTokenException to the correct namespace
Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2018-11-02 11:39:42 +01:00
Roeland Jago Douma 3aaeaf1316
Merge pull request #12208 from nextcloud/backport/12130/stable13
[13] Reset bruteforce on token refresh OAuth
2018-11-02 11:38:13 +01:00
Roeland Jago Douma 6971ecef9d
Reset bruteforce on token refresh OAuth
When using atoken obtained via OAuth the token expires. Resulting in
brute force attempts hitting the requesting IP.

This resets the brute force attempts for that UID on a valid refresh of
the token.

Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2018-11-02 10:54:50 +01:00
Nextcloud bot 4708a2529e
[tx-robot] updated from transifex 2018-11-02 01:13:56 +00:00
Nextcloud bot 68c17136dd
[tx-robot] updated from transifex 2018-11-01 01:13:22 +00:00
Nextcloud bot ea7f80206b
[tx-robot] updated from transifex 2018-10-31 01:13:13 +00:00
Roeland Jago Douma aa6f50aa91
Merge pull request #12142 from nextcloud/backport/12054/stable13
[stable13] LDAP: announce display name changes so that addressbook picks it up
2018-10-30 16:28:27 +01:00
Arthur Schiwon 82bb002eaa
adjust tests to 13 codebase
Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2018-10-30 14:10:35 +01:00
Arthur Schiwon 908e6be07e
Backport of #12054 to stable13
only write when the displayname differs, but then announce it

refs #5212 and fixes #9112

Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>

do not run into UniqueConstraintViolationException

… when an unmapped user logs in for the first time when background job
mode is ajax and no memcache was configured.

Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2018-10-30 14:10:21 +01:00
Nextcloud bot d90385caf6
[tx-robot] updated from transifex 2018-10-30 01:13:14 +00:00
Roeland Jago Douma 661062271f
Merge pull request #12123 from nextcloud/backport/12107/stable13
[stable13] remove unneeded empty search attribute values, fixes #12086
2018-10-29 20:06:24 +01:00
Arthur Schiwon c4df29afb0
remove unneeded empty search attribute values, fixes #12086
Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2018-10-29 17:29:32 +01:00
Morris Jobke 061846c7d0
Merge pull request #12112 from nextcloud/backport/12038/stable13
[13] Implement the size of an assembly stream
2018-10-29 17:22:03 +01:00
Morris Jobke 4e911226c6
Merge pull request #12109 from nextcloud/backport/11862/stable13
[13] Double check for failed cache with a shared storage
2018-10-29 17:20:21 +01:00
Roeland Jago Douma 8dcc7fc0f5
Implement the size of an assembly stream
This will make it possible to act propely on moves of future files if we
need to know the size (like for max size virus scanning).

Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2018-10-29 15:19:55 +01:00
Roeland Jago Douma f903a7637b
Double check for failed cache with a shared storage
When obtaining the SourceRootInfo we can call init. If this fails the
cache is set to a failed cache and the storage to a failed storage.
However we did not check for this. Which means that if the storage was
invalid it would fail later on.

Now we will properly error out.

Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2018-10-29 15:13:21 +01:00
Nextcloud bot 7686c03111
[tx-robot] updated from transifex 2018-10-29 01:13:27 +00:00
Nextcloud bot aa021a9407
[tx-robot] updated from transifex 2018-10-28 00:13:07 +00:00
Nextcloud bot 4e148133c9
[tx-robot] updated from transifex 2018-10-27 00:12:54 +00:00
Morris Jobke 9223159d42
Merge pull request #12060 from mikaelh/stable13
Actually return the root folder when traversing up the tree
2018-10-26 11:02:50 +02:00
Roeland Jago Douma d8a581e426 Actually return the root folder when traversing up the tree
If you now keep calling $node->getParent() you will at some point get
the RootFolder back. This is a nice termination check and will prevent
endless loops if an exit condition is slightly off.

Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2018-10-26 08:36:21 +02:00
Nextcloud bot ae061c69f1
[tx-robot] updated from transifex 2018-10-26 00:13:08 +00:00
Nextcloud bot 3d54e261ee
[tx-robot] updated from transifex 2018-10-25 00:13:24 +00:00
Morris Jobke 1a28789db1
Merge pull request #12006 from iPaat/Backport13/Fix11847
[stable13] Remove cookies from Clear-Site-Data Header
2018-10-24 14:35:54 +02:00
Patrick Conrad 06e43bb46a
Remove cookies from Clear-Site-Data Header
In 2f87fb6b45 this header was introduced. The referenced documentation says:

> When delivered with a response from https://example.com/clear, the following header will cause cookies associated with the origin https://example.com to be cleared, as well as cookies on any origin in the same registered domain (e.g. https://www.example.com/ and https://more.subdomains.example.com/).

This also applies if `https://nextcloud.example.com/` sends the `Clear-Site-Data: "cookies"` header.
This is not the behavior we want at this point!

So I removed the deletion of cookies from the header. This has no effect on the logout process as this header is supported only recently and the logout works in old browsers as well.

Signed-off-by: Patrick Conrad <conrad@iza.org>
(cherry picked from commit 1806baaeaf)
2018-10-24 08:53:46 +02:00
Nextcloud bot ae17e55f42
[tx-robot] updated from transifex 2018-10-24 00:12:50 +00:00
Roeland Jago Douma c5b0efed3b
Merge pull request #11982 from nextcloud/bugfix-stable13/noid/forbid_freebusy_but_allow_local_delivery
[stable13] allow local delivery of schedule message while prohibiting FreeBusy requests
2018-10-23 21:15:08 +02:00
Roeland Jago Douma f4efa550c3
Merge pull request #11996 from nextcloud/stable13-11967-fix-opening-a-section-again-in-the-files-app
[stable13] Fix opening a section again in the Files app
2018-10-23 20:21:35 +02:00
Morris Jobke c3919b844b
Merge pull request #11997 from nextcloud/assemblly-stream-lazy-13
lazy open first source stream in assemblystream
2018-10-23 19:19:51 +02:00
Morris Jobke 56812b0ae5
Merge pull request #11962 from nextcloud/backport/11931/stable13
[13] Do not emit preHooks twice on non-part-storage
2018-10-23 18:16:04 +02:00
Robin Appelman 13317da19a
lazy open first source stream in assemblystream
Signed-off-by: Robin Appelman <robin@icewind.nl>
2018-10-23 17:46:09 +02:00
Daniel Calviño Sánchez 3fbb6e7034 Add acceptance tests for opening a section in the Files app
Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
2018-10-23 17:31:01 +02:00
Daniel Calviño Sánchez bc7e8cb362 Remove event handler no longer needed
The custom handler for "URL changed" events were added to reload the
file list whenever the sections for favorites and shares were opened;
this was used to fix the problem of not reloading the file lists when
opening them for a second time. However, besides that the handlers were
not really necessary, and as the root of the bug was fixed in the
previous commit those handlers are now removed.

The file list for tags uses the handler for a different purpose, though,
so that one was kept.

Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
2018-10-23 17:03:37 +02:00
Daniel Calviño Sánchez 4f5b072c74 Fix opening a section again in the Files app
When a section is open in the Files app a "show" event is triggered.
File list objects handle that event by reloading themselves, but only
if the file list was shown at least once. However, the file list objects
of plugins are created when the "show" event is triggered for the first
time for their section; as the file list objects register their handler
for the "show" event when they are created they never handle the first
triggered "show" event, as the handler is set while that event is being
already handled. Therefore, from the point of view of the handler, the
second time that a "show" event was triggered it was seen as if the file
list was shown for the first time, and thus it was not reloaded. Now the
"shown" property is explicitly set for those file lists that are created
while handling a "show" event, which causes them to be reloaded as
expected when opening their section again.

Note that it is not possible to just reload the file list whenever it is
shown; the file list is reloaded also when the directory changes, and
this can happen when the web page is initially loaded and the URL is
parsed. In that case, if file lists were reloaded when shown for the
first time then it could be reloaded twice, one with the default
parameters due to the "show" event and another one with the proper
parameters once the URL was parsed, and the files that appeard in the
list would depend on which response from the server was received the
last.

Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
2018-10-23 17:02:54 +02:00
Nextcloud bot 5de5db0280
[tx-robot] updated from transifex 2018-10-23 14:54:51 +00:00
Roeland Jago Douma b7524ee49e
Merge pull request #11978 from nextcloud/bugfix-stable13/9326/make_sure_usermanager_getByEmail_only_returns_IUser
[stable13] filter null values for UserManager::getByEmail
2018-10-23 15:14:56 +02:00
Roeland Jago Douma 18b4b6c324
Merge pull request #11992 from nextcloud/backport/11972/fix-l10n-fetching-from-theme-13
[stable13] Load apps/APP/l10n/*.js and themes/THEME/apps/APP/l10n/*.js
2018-10-23 11:50:34 +02:00
Morris Jobke 28fa1e3c7d
Load apps/APP/l10n/*.js and themes/THEME/apps/APP/l10n/*.js
Before it quit right after finding the theme version of the l10n file which results in a not translated part of the UI.

Signed-off-by: Morris Jobke <hey@morrisjobke.de>
2018-10-23 10:35:33 +02:00
Georg Ehrke aa94064cf5
move disableFreeBusy check from User principal backend to Scheduling Outbox collection. This allows to keep local delivery of scheduling messages while prohibiting FreeBusy requests
Signed-off-by: Georg Ehrke <developer@georgehrke.com>
2018-10-23 10:07:31 +02:00
Georg Ehrke 879538c22f
filter null values for UserManager::getByEmail
Signed-off-by: Georg Ehrke <developer@georgehrke.com>
2018-10-22 15:54:41 +02:00