Skip to content
Snippets Groups Projects
  1. Jan 26, 2015
    • Vincent Petry's avatar
      Catch storage exception in scanner for remote shares · f6e644b4
      Vincent Petry authored
      Whenever an exception occurs during scan of a remote share, the share is
      checked for availability. If the storage is gone, it will be removed
      automatically.
      
      Also, getDirectoryContent() will now skip unavailable storages.
      f6e644b4
  2. Jan 21, 2015
  3. Jan 20, 2015
    • Joas Schilling's avatar
    • Lukas Reschke's avatar
      Fix WebDAV auth for session authentication only · 476579b9
      Lukas Reschke authored
      \Sabre\DAV\Auth\Backend\AbstractBasic::authenticate was only calling \OC_Connector_Sabre_Auth::validateUserPass when the response of \Sabre\HTTP\BasicAuth::getUserPass was not null.
      
      However, there is a case where the value can be null and the user could be authenticated anyways: The authentication via ownCloud web-interface and then accessing WebDAV resources. This was not possible anymore with this patch because it never reached the code path in this scenario.
      
      This patchs allows authenticating with a session without isDavAuthenticated value stored (this is for ugly WebDAV clients that send the cookie in any case) and thus the functionality should work again.
      
      To test this go to the admin settings and test if the WebDAV check works fine. Furthermore all the usual stuff (WebDAV / Shibboleth / etc...) needs testing as well.
      476579b9
    • Jenkins for ownCloud's avatar
      [tx-robot] updated from transifex · 2ac01525
      Jenkins for ownCloud authored
      2ac01525
  4. Jan 19, 2015
  5. Jan 18, 2015
  6. Jan 17, 2015
    • Lukas Reschke's avatar
      Prioritise Basic Auth header over Cookie · dfbc405a
      Lukas Reschke authored
      There are a lot of clients that support multiple WebDAV accounts in the same application. However, they resent all the cookies they received from one of the accounts also to the other one. In the case of ownCloud this means that we will always show the user from the session and not the user that is specified in the basic authentication header.
      
      This patch adds a workaround the following way:
      
      1. If the user authenticates via the Sabre Auth Connector add a hint to the session that this was authorized via Basic Auth (this is to prevent logout CSRF)
      2. If the request contains this hint and the username specified in the basic auth header differs from the one in the session relogin the user using basic auth
      
      Fixes https://github.com/owncloud/core/issues/11400 and https://github.com/owncloud/core/issues/13245 and probably some other issues as well.
      
      This requires proper testing also considering LDAP / Shibboleth and whatever instances.
      dfbc405a
    • Jenkins for ownCloud's avatar
      [tx-robot] updated from transifex · 60c4cb1d
      Jenkins for ownCloud authored
      60c4cb1d
  7. Jan 16, 2015
  8. Jan 15, 2015
  9. Jan 14, 2015
  10. Jan 13, 2015
  11. Jan 12, 2015
Loading