mirror of
https://github.com/opencloud-eu/opencloud.git
synced 2026-05-12 22:39:34 -05:00
Merge pull request #8837 from owncloud/update-changelog
Forward port stable branches, Update changelog
This commit is contained in:
@@ -0,0 +1,6 @@
|
||||
Bugfix: fix wrong compile date
|
||||
|
||||
We fixed that current date is always printed.
|
||||
|
||||
https://github.com/owncloud/ocis/pull/6132
|
||||
https://github.com/owncloud/ocis/issues/6124
|
||||
@@ -0,0 +1,5 @@
|
||||
Enhancement: Update to go 1.22
|
||||
|
||||
We have updated go to version 1.22.
|
||||
|
||||
https://github.com/owncloud/ocis/pull/8597
|
||||
@@ -0,0 +1,12 @@
|
||||
Bugfix: Update reva to include bugfixes and improvements
|
||||
|
||||
## Changelog for reva 2.13.4
|
||||
|
||||
* Bugfix [cs3org/reva#4398](https://github.com/cs3org/reva/pull/4398): Fix ceph build
|
||||
* Bugfix [cs3org/reva#4396](https://github.com/cs3org/reva/pull/4396): Allow an empty credentials chain in the auth middleware
|
||||
* Bugfix [cs3org/reva#4423](https://github.com/cs3org/reva/pull/4423): Fix disconnected traces
|
||||
* Bugfix [cs3org/reva#4590](https://github.com/cs3org/reva/pull/4590): Fix uploading via a public link
|
||||
* Bugfix [cs3org/reva#4470](https://github.com/cs3org/reva/pull/4470): Keep failed processing status
|
||||
* Enhancement [cs3org/reva#4397](https://github.com/cs3org/reva/pull/4397): Introduce UploadSessionLister interface
|
||||
|
||||
https://github.com/owncloud/ocis/pull/8718
|
||||
@@ -0,0 +1,13 @@
|
||||
Bugfix: Update reva to v2.19.4
|
||||
|
||||
We updated reva to v2.19.4
|
||||
|
||||
* Bugfix [cs3org/reva#4612](https://github.com/cs3org/reva/pull/4612): Use gateway selector in jsoncs3 to scale the service
|
||||
|
||||
https://github.com/owncloud/ocis/pull/8787
|
||||
|
||||
We updated reva to v2.19.3
|
||||
|
||||
* Bugfix[cs3org/reva#4607](https://github.com/cs3org/reva/pull/4607): Mask user email in output
|
||||
|
||||
https://github.com/owncloud/ocis/pull/8781
|
||||
@@ -0,0 +1,14 @@
|
||||
Bugfix: Make IDP cookies same site strict
|
||||
|
||||
To enhance the security of our application and prevent Cross-Site Request Forgery (CSRF) attacks, we have updated the
|
||||
SameSite attribute of the build in Identity Provider (IDP) cookies to Strict.
|
||||
|
||||
This change restricts the browser from sending these cookies with any cross-site requests,
|
||||
thereby limiting the exposure of the user's session to potential threats.
|
||||
|
||||
This update does not impact the existing functionality of the application but provides an additional layer of security
|
||||
where needed.
|
||||
|
||||
This only affects cookies set by the built-in IDP. Production systems should not be affected.
|
||||
|
||||
https://github.com/owncloud/ocis/pull/8716
|
||||
@@ -0,0 +1,5 @@
|
||||
Bugfix: Fix the create personal space cache
|
||||
|
||||
We fixed a problem with the config for the create personal space cache which resulted in the cache never being used.
|
||||
|
||||
https://github.com/owncloud/ocis/pull/8799
|
||||
@@ -0,0 +1,8 @@
|
||||
Bugfix: Fix restarting of postprocessing
|
||||
|
||||
When an upload is not found, the logic to restart postprocessing was bunked. Additionally we extended the upload sessions
|
||||
command to be able to restart the uploads without using a second command.
|
||||
|
||||
NOTE: This also includes a breaking fix for the deprecated `ocis storage-users uploads list` command
|
||||
|
||||
https://github.com/owncloud/ocis/pull/8782
|
||||
@@ -32,7 +32,7 @@
|
||||
env:
|
||||
INSECURE: "false"
|
||||
TRAEFIK_ACME_MAIL: mbarz@owncloud.com
|
||||
OCIS_DOCKER_TAG: 5.0.0
|
||||
OCIS_DOCKER_TAG: 5.0.1
|
||||
OCIS_DOMAIN: ocis.ocis-keycloak.released.owncloud.works
|
||||
KEYCLOAK_DOMAIN: keycloak.ocis-keycloak.released.owncloud.works
|
||||
COMPOSE_FILE: docker-compose.yml:monitoring_tracing/docker-compose-additions.yml
|
||||
|
||||
@@ -32,7 +32,7 @@
|
||||
env:
|
||||
INSECURE: "false"
|
||||
TRAEFIK_ACME_MAIL: mbarz@owncloud.com
|
||||
OCIS_DOCKER_TAG: 5.0.0
|
||||
OCIS_DOCKER_TAG: 5.0.1
|
||||
OCIS_DOMAIN: ocis.ocis-ldap.released.owncloud.works
|
||||
LDAP_MANAGER_DOMAIN: ldap.ocis-ldap.released.owncloud.works
|
||||
COMPOSE_FILE: docker-compose.yml:monitoring_tracing/docker-compose-additions.yml
|
||||
|
||||
@@ -32,7 +32,7 @@
|
||||
env:
|
||||
INSECURE: "false"
|
||||
TRAEFIK_ACME_MAIL: mbarz@owncloud.com
|
||||
OCIS_DOCKER_TAG: 5.0.0
|
||||
OCIS_DOCKER_TAG: 5.0.1
|
||||
OCIS_DOMAIN: ocis.ocis-traefik.released.owncloud.works
|
||||
DEMO_USERS: "true"
|
||||
INBUCKET_DOMAIN: mail.ocis-traefik.released.owncloud.works
|
||||
|
||||
@@ -32,7 +32,7 @@
|
||||
env:
|
||||
INSECURE: "false"
|
||||
TRAEFIK_ACME_MAIL: mbarz@owncloud.com
|
||||
OCIS_DOCKER_TAG: 5.0.0
|
||||
OCIS_DOCKER_TAG: 5.0.1
|
||||
OCIS_DOMAIN: ocis.ocis-wopi.released.owncloud.works
|
||||
COMPANION_DOMAIN: companion.ocis-wopi.released.owncloud.works
|
||||
COMPANION_IMAGE: owncloud/uppy-companion:3.12.13-owncloud
|
||||
|
||||
@@ -144,6 +144,7 @@ type OCS struct {
|
||||
PublicShareMustHavePassword bool `yaml:"public_sharing_share_must_have_password" env:"OCIS_SHARING_PUBLIC_SHARE_MUST_HAVE_PASSWORD;FRONTEND_OCS_PUBLIC_SHARE_MUST_HAVE_PASSWORD" desc:"Set this to true if you want to enforce passwords on all public shares." introductionVersion:"5.0"`
|
||||
WriteablePublicShareMustHavePassword bool `yaml:"public_sharing_writeableshare_must_have_password" env:"OCIS_SHARING_PUBLIC_WRITEABLE_SHARE_MUST_HAVE_PASSWORD;FRONTEND_OCS_PUBLIC_WRITEABLE_SHARE_MUST_HAVE_PASSWORD" desc:"Set this to true if you want to enforce passwords for writable shares. Only effective if the setting for 'passwords on all public shares' is set to false." introductionVersion:"5.0"`
|
||||
IncludeOCMSharees bool `yaml:"include_ocm_sharees" env:"FRONTEND_OCS_INCLUDE_OCM_SHAREES" desc:"Include OCM sharees when listing sharees." introductionVersion:"5.0"`
|
||||
ShowUserEmailInResults bool `yaml:"show_email_in_results" env:"OCIS_SHOW_USER_EMAIL_IN_RESULTS" desc:"Mask user email addresses in responses." introductionVersion:"5.1"`
|
||||
}
|
||||
|
||||
type CacheWarmupDrivers struct {
|
||||
|
||||
@@ -338,7 +338,8 @@ func FrontendConfigFromStruct(cfg *config.Config, logger log.Logger) (map[string
|
||||
"productversion": version.GetString(),
|
||||
},
|
||||
},
|
||||
"include_ocm_sharees": cfg.OCS.IncludeOCMSharees,
|
||||
"include_ocm_sharees": cfg.OCS.IncludeOCMSharees,
|
||||
"show_email_in_results": cfg.OCS.ShowUserEmailInResults,
|
||||
},
|
||||
},
|
||||
},
|
||||
|
||||
@@ -19,7 +19,6 @@ type Config struct {
|
||||
Debug Debug `yaml:"debug"`
|
||||
|
||||
HTTP HTTP `yaml:"http"`
|
||||
API API `yaml:"api"`
|
||||
|
||||
GRPCClientTLS *shared.GRPCClientTLS `yaml:"grpc_client_tls"`
|
||||
GrpcClient client.Client `yaml:"-"`
|
||||
@@ -39,7 +38,3 @@ type SigningKeys struct {
|
||||
AuthUsername string `yaml:"username" env:"OCIS_CACHE_AUTH_USERNAME;OCS_PRESIGNEDURL_SIGNING_KEYS_STORE_AUTH_USERNAME" desc:"The username to authenticate with the store. Only applies when store type 'nats-js-kv' is configured." introductionVersion:"5.0"`
|
||||
AuthPassword string `yaml:"password" env:"OCIS_CACHE_AUTH_PASSWORD;OCS_PRESIGNEDURL_SIGNING_KEYS_STORE_AUTH_PASSWORD" desc:"The password to authenticate with the store. Only applies when store type 'nats-js-kv' is configured." introductionVersion:"5.0"`
|
||||
}
|
||||
|
||||
type API struct {
|
||||
ShowUserEmailInResults bool `yaml:"show_email_in_results" env:"OCIS_SHOW_USER_EMAIL_IN_RESULTS" desc:"Mask user email addresses in responses." introductionVersion:"5.1"`
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user