Commit Graph

3933 Commits

Author SHA1 Message Date
opencloudeu
17e6153f80 [tx] updated from transifex 2025-08-26 00:02:29 +00:00
Jörn Friedrich Dreyer
100ac1ec36 Merge pull request #1372 from rhafer/watchfs-test
[full-ci] Bump reva to latest main
2025-08-25 11:08:15 +02:00
opencloudeu
869871c795 [tx] updated from transifex 2025-08-25 00:02:34 +00:00
opencloudeu
c1565b4d1e [tx] updated from transifex 2025-08-22 00:03:03 +00:00
Ralf Haferkamp
88dd36b636 Drop the unsupported and unused S3 driver
It was dropped from reva in https://github.com/opencloud-eu/reva/pull/309
because of unmaintained dependencies. Remember: We have the decomposeds3
driver.
2025-08-21 11:15:35 +02:00
Ralf Haferkamp
4993336899 Merge pull request #1373 from opencloud-eu/directly-call-frontend
directly connect to frontend
2025-08-21 09:10:41 +02:00
opencloudeu
c89e8fec64 [tx] updated from transifex 2025-08-21 00:02:32 +00:00
Jörn Friedrich Dreyer
2c3ee68f08 ack tag events
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2025-08-20 14:43:46 +02:00
opencloudeu
1228c4ed20 [tx] updated from transifex 2025-08-20 00:02:32 +00:00
Jörn Friedrich Dreyer
2751cfee2c directly connect to frontend
The STORAGE_USERS_DATA_GATEWAY_URL env var is used in the `tokens` `datagateway_endpoint` reva configuration. That `DataGatewayEndpoint` is used by the decomposedfs driver to create urls:
```go
// URL returns a url to download an upload
func (session *DecomposedFsSession) URL(_ context.Context) (string, error) {
       // [ ... ]
	return joinurl(session.store.tknopts.DataGatewayEndpoint, tkn), nil
}
```
As the comment points out this URL is internally used when emitting events. Either in:
```go
func (session *DecomposedFsSession) FinishUploadDecomposed(ctx context.Context) error {
                // [ ... ]
		s, err := session.URL(ctx)
		if err != nil {
			return err
		}

		var iu *userpb.User
		if utils.ExistsInOpaque(u.Opaque, "impersonating-user") {
			iu = &userpb.User{}
			if err := utils.ReadJSONFromOpaque(u.Opaque, "impersonating-user", iu); err != nil {
				return err
			}
		}

		if err := events.Publish(ctx, session.store.pub, events.BytesReceived{
			UploadID:          session.ID(),
			URL:               s,
```

or in
```go

// Postprocessing starts the postprocessing result collector
func (fs *Decomposedfs) Postprocessing(ch <-chan events.Event) {
                        // [ ... ]
			s, err := session.URL(ctx)
			if err != nil {
				sublog.Error().Err(err).Msg("could not create url")
				continue
			}

			metrics.UploadSessionsRestarted.Inc()

			// restart postprocessing
			if err := events.Publish(ctx, fs.stream, events.BytesReceived{
				UploadID:      session.ID(),
				URL:           s,
```

So, we do not need to go throught the proxy here.
2025-08-19 14:58:30 +02:00
opencloudeu
20adc6754b [tx] updated from transifex 2025-08-19 00:02:29 +00:00
Ralf Haferkamp
80ae9e4259 Merge pull request #1353 from rhafer/issue/1277
fix(proxy): First login fails in auto provision setups
2025-08-18 07:59:15 +02:00
Benedikt Kulmann
692de314b9 feat: add defaultAppId option for the web config.json 2025-08-14 16:02:01 +02:00
Ralf Haferkamp
3a8b370a08 fix(proxy): First login fails in auto provision setups
Redeclaring the `err` variable inside the if statement made the
later error check fail even when the user was successfully created.

Fixes: #1277
2025-08-14 15:36:23 +02:00
opencloudeu
8565ed9277 [tx] updated from transifex 2025-08-12 00:01:50 +00:00
Viktor Scharf
b940b0c457 chore: bump web to v3.3.0 (#1329)
* chore: bump web to v3.3.0

* trigger ci

* exclude mobile-view tests
2025-08-11 16:44:05 +02:00
opencloudeu
b1968591b1 [tx] updated from transifex 2025-08-08 00:01:44 +00:00
Michael Stingl
9659e97056 Fix posix driver documentation in STORAGE_USERS_DRIVER description (#1305)
- Add 'posix' to the list of supported values
- Correct the default value from 'decomposed' to 'posix'
- Add brief description of the posix driver

Fixes: #1304
2025-08-06 17:46:44 +02:00
André Duffeck
b9f48edd87 Try to find users by username or id, just like the ldap backend does 2025-08-05 17:10:59 +02:00
André Duffeck
926a2c2080 Filter users by tenant, add tenant ids to demo users 2025-08-05 17:10:59 +02:00
opencloudeu
7b3e8444d1 [tx] updated from transifex 2025-08-05 00:01:44 +00:00
Andre Duffeck
13c3f42396 Merge pull request #1306 from aduffeck/search-batches
Improve indexing performance using batches
2025-08-04 17:06:33 +02:00
André Duffeck
7c59e57d43 Make batch size configurable 2025-08-04 16:14:56 +02:00
André Duffeck
7a7d148dcf Fix tests 2025-08-04 15:39:27 +02:00
André Duffeck
3c8e2dacfd Improve indexing performance using batches 2025-08-04 15:15:54 +02:00
opencloudeu
77ddcc2d6b [tx] updated from transifex 2025-08-02 00:01:37 +00:00
André Duffeck
1afc1331af Do not run the timout func if the work func has run 2025-08-01 10:03:56 +02:00
opencloudeu
6d86b35651 [tx] updated from transifex 2025-08-01 00:01:13 +00:00
André Duffeck
4bafe2e611 Make sure to register prometheus collectors only once 2025-07-31 08:55:10 +02:00
Andre Duffeck
e15443d951 Merge pull request #1289 from aduffeck/fix-1285
Do not try to log metrics when we failed to get the consumer info
2025-07-30 08:49:33 +02:00
opencloudeu
ad9f8b3b4a [tx] updated from transifex 2025-07-30 00:01:35 +00:00
André Duffeck
b4cc781832 Do not try to log metrics when we failed to get the consumer info
Fixes #1285
2025-07-29 14:19:00 +02:00
Christian Richter
d3f73b13ff Revert optional remote.php path
Co-authored-by: André Duffeck <a.duffeck@opencloud.eu>

Signed-off-by: Christian Richter <c.richter@opencloud.eu>
2025-07-24 13:31:56 +02:00
Christian Richter
55f1d9e4d2 Add has-preview to search
Co-authored-by: André Duffeck <a.duffeck@opencloud.eu>
Signed-off-by: Christian Richter <c.richter@opencloud.eu>
2025-07-23 10:30:44 +02:00
André Duffeck
484f8bc66b Make "remote.php" part of thumbnail URLs optional 2025-07-22 10:43:35 +02:00
André Duffeck
4c2b723ab0 Implement $expand=thumbnails for sharedwithme 2025-07-22 10:43:00 +02:00
André Duffeck
683b979bdd Remove unused code 2025-07-22 10:42:46 +02:00
André Duffeck
a6cdbc710d Fix thumbnail URLs for sharedbyme 2025-07-22 10:42:22 +02:00
Christian Richter
49ab88e980 Add signed-url handling to thumbnail service
Co-authored-by: André Duffeck <a.duffeck@opencloud.eu>

Signed-off-by: Christian Richter <c.richter@opencloud.eu>
2025-07-22 08:51:16 +02:00
Jannik Stehle
e6b59783e9 chore: bump web to v3.2.0 2025-07-21 10:41:01 +02:00
Andre Duffeck
ebb7b1f2a0 Merge pull request #1242 from aduffeck/metrics
Metrics
2025-07-18 14:06:29 +02:00
André Duffeck
3bd7a61e46 Document the metrics exposed in search and postprocessing 2025-07-18 08:50:03 +02:00
André Duffeck
386e322050 Fix metric 2025-07-18 08:27:06 +02:00
André Duffeck
dbd6a4db71 Fix tests 2025-07-17 16:00:11 +02:00
André Duffeck
4704cedd3b Add metrics for the postprocessing duration 2025-07-17 15:23:57 +02:00
André Duffeck
791b4df173 Collect metrics about search and index durations 2025-07-17 15:23:57 +02:00
André Duffeck
273c0ed270 Expose nats metris for the postprocessing service 2025-07-17 15:23:57 +02:00
André Duffeck
400b9a5d30 Expose nats metrics of the search service 2025-07-17 14:33:23 +02:00
Ralf Haferkamp
4bdb3bf70f proxy(sign_url_auth): Allow to verify server signed URLs
With the ocdav service being able to provided signed download URLs we
need the proxy to be able to verify the signatures.
This should also be a first step towards phasing out the weird ocs based
client side signed urls.

Related Tickets: #1104
2025-07-17 12:01:59 +02:00
Ralf Haferkamp
601bb4c955 cleanup(proxy): Remove misleading comment
The signedurl middleware is already adding the user to the context.
2025-07-17 12:01:59 +02:00