Commit Graph

26082 Commits (ccf341abbc4b50890f48692f5eccacc07a86bccf)

Author SHA1 Message Date
Nextcloud bot e69e95f436
fix(l10n): Update translations from Transifex
Signed-off-by: Nextcloud bot <bot@nextcloud.com>
2025-12-06 00:13:35 +07:00
nfebe 0c437fc8b5 fix(sharing): Add isTrustedServer flag to lookup results
When `show_federated_shares_to_trusted_servers_as_internal` is enabled,
lookup server results were being filtered out because they lacked the
`isTrustedServer` flag. This adds the flag to lookup results by:

- Injecting TrustedServers service into LookupPlugin
- Adding `server` and `isTrustedServer` fields to each lookup result
- Updating tests to reflect new structure

This ensures lookup results from trusted servers appear in internal
sharing while non-trusted servers are correctly filtered out.

Signed-off-by: nfebe <fenn25.fn@gmail.com>
2025-12-04 11:50:36 +07:00
Andy Scherzinger 264c982cc0
Merge pull request #56573 from nextcloud/backport/56515/stable32
[stable32] Encode s3 metadata as base64 if needed
2025-12-04 08:09:41 +07:00
Nextcloud bot f2b675d4fd
fix(l10n): Update translations from Transifex
Signed-off-by: Nextcloud bot <bot@nextcloud.com>
2025-12-04 00:14:12 +07:00
Andy Scherzinger 92e3599a39
Merge pull request #56774 from nextcloud/backport/56410/stable32
[stable32] fix(Memcache): use different cache key when in maintenance mode
2025-12-03 22:32:31 +07:00
Daniel b8cf2a2894
Merge pull request #56821 from nextcloud/backport/56672/stable32
[stable32] fix(s3): make data integrity protections opt-in
2025-12-03 22:25:52 +07:00
nfebe 58991b1b19 fix(sharing): Allow public share access for everyone
When a logged-in user accesses a public share link in the same browser,
the system was incorrectly checking if that user's groups were excluded
from creating link shares. This caused share not found errors for users
in excluded groups, even though public shares should be accessible to anyone
with the link.

The group exclusion setting (`shareapi_allow_links_exclude_groups`) is
intended to restrict share creation, not share access. Public shares
are meant to be anonymous and accessible regardless of the viewer identity
or group membership.

We now check the exclusion for the share creator and not the viewer.

Signed-off-by: nfebe <fenn25.fn@gmail.com>
2025-12-03 19:53:17 +07:00
Daniel Kesselberg 9af9395d5c fix(s3): make data integrity protections opt-in
Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
2025-12-03 19:52:17 +07:00
Ferdinand Thiessen 2cc0420cce fix(Memcache): use different cache key when in maintenance mode
Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
2025-12-03 19:35:39 +07:00
nfebe 3e2582c4e6
feat(objectstore): add configurable S3 retry attempts
Add retriesMaxAttempts parameter to S3 objectstore configuration
to allow customization of AWS SDK retry behavior for handling
unreliable network conditions or proxy issues.

Defaults to 5 retries (AWS SDK default) if not specified.

Signed-off-by: nfebe <fenn25.fn@gmail.com>
Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
2025-12-03 12:48:52 +07:00
provokateurin 57734fbd01 feat(ObjectStore): Allow overriding arguments per bucket
Signed-off-by: provokateurin <kate@provokateurin.de>
2025-12-01 16:44:55 +07:00
Andy Scherzinger 8c09cdd07d
Merge pull request #56766 from nextcloud/backport/52749/stable32
[stable32] feat(CertificateManager): Add option to specify the default certificates bundle path
2025-12-01 14:54:10 +07:00
provokateurin 6b2c19df98
feat(CertificateManager): Add option to specify the default certificates bundle path
Signed-off-by: provokateurin <kate@provokateurin.de>
2025-12-01 11:55:11 +07:00
Carl Schwan 11beba6e2c feat(profiler): Use gzdecode/gzencode to parse profiles
See 42a80727f9/src/Symfony/Component/HttpKernel/Profiler/FileProfilerStorage.php (L299)

Signed-off-by: Carl Schwan <carl.schwan@nextcloud.com>
2025-11-30 19:23:01 +07:00
Anna Larch 96fe23b5e8 fix(logger): add back lost params for logger methods
Signed-off-by: Anna Larch <anna@nextcloud.com>
2025-11-27 14:55:27 +07:00
Kent Delante 10f557d503
Merge pull request #56617 from nextcloud/backport/56565/stable32
[stable32] feat: emit an event when an S3 bucket is created
2025-11-27 10:26:40 +07:00
Nextcloud bot 914c051cc5
fix(l10n): Update translations from Transifex
Signed-off-by: Nextcloud bot <bot@nextcloud.com>
2025-11-27 00:13:45 +07:00
Sebastian Krupinski f41ee3bea6
Merge pull request #56666 from nextcloud/backport/55476/stable32
[stable32] fix(l10n): do not consider user language when getting the generic one
2025-11-26 10:31:55 +07:00
Kent Delante e8802a57f4 feat: emit an event when an S3 bucket is created
Signed-off-by: Kent Delante <kent.delante@proton.me>
2025-11-26 08:18:09 +07:00
Richard Steinmetz bd760856bb fix(l10n): do not consider user language when getting the generic one
Signed-off-by: Richard Steinmetz <richard@steinmetz.cloud>
2025-11-25 15:43:32 +07:00
Louis Chmn 64fed0c712 fix(encryption): Increment lastChunkNr when size is off
When computing the unencrypted file size, we need the size of the last encrypted chunk as its size is usually not the regular 8192 bits.

To avoid reading the whole file, we seek directly to that last chunk based on the expected file size. When the expected file size is smaller than the actual one, we have a logic in place to continue reading until we reach the end of the file.

In that logic, we forgot to increment the `$lastChunkNr` which is important when we later check the signature of the chunk.

This commit adds that missing increment.

Signed-off-by: Louis Chmn <louis@chmn.me>
2025-11-25 09:19:23 +07:00
Nextcloud bot 49bb20831a
fix(l10n): Update translations from Transifex
Signed-off-by: Nextcloud bot <bot@nextcloud.com>
2025-11-23 00:13:43 +07:00
Robin Appelman d2b176fee8 fix: encode s3 metadata as base64 if needed
Signed-off-by: Robin Appelman <robin@icewind.nl>
2025-11-21 16:18:22 +07:00
Marcel Müller 6d1ad75b5d
Merge pull request #56526 from nextcloud/backport/56451/stable32
[stable32] feat: Add option to update the public key of a user
2025-11-20 17:24:09 +07:00
Nextcloud bot a1abff9e87
fix(l10n): Update translations from Transifex
Signed-off-by: Nextcloud bot <bot@nextcloud.com>
2025-11-20 00:14:24 +07:00
Marcel Müller 8b76146ac1 feat: Add option to update the public key of a user
Signed-off-by: Marcel Müller <marcel-mueller@gmx.de>
2025-11-19 12:43:12 +07:00
Nextcloud bot be81639660
fix(l10n): Update translations from Transifex
Signed-off-by: Nextcloud bot <bot@nextcloud.com>
2025-11-19 00:14:00 +07:00
Nextcloud bot 874aee22be
fix(l10n): Update translations from Transifex
Signed-off-by: Nextcloud bot <bot@nextcloud.com>
2025-11-18 00:14:30 +07:00
Côme Chilliet b51c1d7f8d feat(login): Add rememberme checkbox
Only present if allowed by configuration.

Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
2025-11-17 13:03:56 +07:00
Côme Chilliet 247b60869f chore: Improve typing and codestyle in LoginData
Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
2025-11-17 13:03:56 +07:00
Nextcloud bot 4055332b9f
fix(l10n): Update translations from Transifex
Signed-off-by: Nextcloud bot <bot@nextcloud.com>
2025-11-17 00:13:33 +07:00
Nextcloud bot 5b60bb2a02
fix(l10n): Update translations from Transifex
Signed-off-by: Nextcloud bot <bot@nextcloud.com>
2025-11-16 00:13:37 +07:00
Nextcloud bot 686c8f1fc0
fix(l10n): Update translations from Transifex
Signed-off-by: Nextcloud bot <bot@nextcloud.com>
2025-11-15 00:13:27 +07:00
Benjamin Frueh a25b0406ca fix: Clear mount cache when file storage changes during move
Signed-off-by: Benjamin Frueh <benjamin.frueh@gmail.com>
2025-11-13 14:09:23 +07:00
Nextcloud bot 554dce6bc7
fix(l10n): Update translations from Transifex
Signed-off-by: Nextcloud bot <bot@nextcloud.com>
2025-11-13 00:14:26 +07:00
Robin Appelman a784bdadcf
Merge pull request #56407 from nextcloud/backport/56255/stable32
[stable32] make failed availability check apply in the same request
2025-11-12 22:49:23 +07:00
Maxence Lange 166f43a80f
Merge pull request #55762 from nextcloud/backport/54953/stable32
[stable32] fix(team-api): get all teams details in a single request
2025-11-12 20:25:30 +07:00
Daniel Calviño Sánchez 14aef68eaf
Merge pull request #56393 from nextcloud/backport/52012/stable32-fix-user-collaborators-returned-when-searching-for-mail-collaborators
[stable32] Fix user collaborators returned when searching for mail collaborators
2025-11-12 18:46:20 +07:00
Robin Appelman dbf084054e chore: better type hints for `getAvailability`
Signed-off-by: Robin Appelman <robin@icewind.nl>
2025-11-12 17:45:55 +07:00
Robin Appelman 8b3f4da52f fix: make failed availability check apply in the same request
Signed-off-by: Robin Appelman <robin@icewind.nl>
2025-11-12 17:45:55 +07:00
Daniel Calviño Sánchez 16c26101d0 fix: Fix user collaborators returned when searching for mail collaborators
The MailPlugin collaborator returned results for both user and mail
collaborators, but it was registered only for mail collaborators. While
it might make sense to move the user results to the UserPlugin instead
that change would be more complex and riskier, so for now the MailPlugin
is now registered for both user and mail collaborators and the results
are limited only to the registered type.

As the plugins are registered only with their class and then resolved
when needed using dependency injection it is not possible (as far as I
know) to provide an explicit parameter in the constructor to
differentiate whether the MailPlugin should return user or mail
collaborators. To overcome this two subclasses are introduced,
MailByMailPlugin and UserByMailPlugin, which just hardcode in their
constructor the collaborator type that their parent MailPlugin must use,
and those subclasses are the ones registered instead of the MailPlugin
(which still contains all the logic).

Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
2025-11-12 13:22:25 +07:00
provokateurin 258956e09e fix(AppFramework): Check for responder existence
Signed-off-by: provokateurin <kate@provokateurin.de>
2025-11-12 10:46:36 +07:00
Joas Schilling 826fe1a918
feat(rate-limit): Allow overwriting the rate limit
Signed-off-by: Joas Schilling <coding@schilljs.com>
2025-11-12 10:55:06 +07:00
Nextcloud bot 72dd55e53e
fix(l10n): Update translations from Transifex
Signed-off-by: Nextcloud bot <bot@nextcloud.com>
2025-11-12 00:14:24 +07:00
Julien Veyssier d18ff2f677 fix(ai-apis): reject text inputs that are longer than 64K chars
Signed-off-by: Julien Veyssier <julien-nc@posteo.net>
2025-11-11 08:09:51 +07:00
Maxence Lange 83badb3427 fix(team-api): get all teams details in a single request
Signed-off-by: Maxence Lange <maxence@artificial-owl.com>
2025-11-10 16:55:55 +07:00
provokateurin c5b04713c4 fix(core): Fix TeamsApiController typing
Signed-off-by: provokateurin <kate@provokateurin.de>
Signed-off-by: Maxence Lange <maxence@artificial-owl.com>
2025-11-10 16:55:55 +07:00
Micke Nordin 0db7d64e50 fix(ocm): align discovery process with OCM spec
Signed-off-by: Micke Nordin <kano@sunet.se>
2025-11-10 09:55:19 +07:00
Nextcloud bot 337290c5d2
fix(l10n): Update translations from Transifex
Signed-off-by: Nextcloud bot <bot@nextcloud.com>
2025-11-10 00:13:33 +07:00
Louis Chmn a8695aef3c feat(EphemeralSessions): Introduce lax period
Signed-off-by: Louis Chmn <louis@chmn.me>
2025-11-06 10:24:34 +07:00