Merge pull request #6109 from owncloud/changelog-changes

[docs-only] Adjust changelog text
This commit is contained in:
Phil Davis
2023-04-21 16:05:41 +05:45
committed by GitHub
44 changed files with 54 additions and 54 deletions

View File

@@ -2,6 +2,6 @@ Bugfix: add missing env vars to docker compose
Tags: docker
Without setting `REVA_FRONTEND_URL` and `REVA_DATAGATEWAY_URL` uploads would default to locahost and fail if `OCIS_DOMAIN` was used to run ocis on a remote host.
Without setting `REVA_FRONTEND_URL` and `REVA_DATAGATEWAY_URL` uploads would default to localhost and fail if `OCIS_DOMAIN` was used to run ocis on a remote host.
https://github.com/owncloud/ocis/pull/392

View File

@@ -7,7 +7,7 @@ Tags: ocis-pkg
* Change - Roles manager: [#60](https://github.com/owncloud/ocis-pkg/pull/60)
* Change - Use go-micro's metadata context for account id: [#56](https://github.com/owncloud/ocis-pkg/pull/56)
* Bugfix - Remove redigo 2.0.0+incompatible dependency: [#33](https://github.com/owncloud/ocis-graph/pull/33)
* Change - Add middleware for x-access-token distmantling: [#46](https://github.com/owncloud/ocis-pkg/pull/46)
* Change - Add middleware for x-access-token dismantling: [#46](https://github.com/owncloud/ocis-pkg/pull/46)
* Enhancement - Add `ocis.id` and numeric id claims: [#50](https://github.com/owncloud/ocis-pkg/pull/50)
* Bugfix - Pass flags to micro service: [#44](https://github.com/owncloud/ocis-pkg/pull/44)
* Change - Add header to cors handler: [#41](https://github.com/owncloud/ocis-pkg/issues/41)

View File

@@ -10,7 +10,7 @@ Tags: ocs
* Bugfix - Use opaque ID of a user for signing keys: [#436](https://github.com/owncloud/ocis/issues/436)
* Enhancement - Add option to create user with uidnumber and gidnumber: [#34](https://github.com/owncloud/ocis-ocs/pull/34)
* Bugfix - Fix file descriptor leak: [#79](https://github.com/owncloud/ocis-accounts/issues/79)
* Enhancement - Add Group management for OCS Povisioning API: [#25](https://github.com/owncloud/ocis-ocs/pull/25)
* Enhancement - Add Group management for OCS Provisioning API: [#25](https://github.com/owncloud/ocis-ocs/pull/25)
* Enhancement - Basic Support for the User Provisioning API: [#23](https://github.com/owncloud/ocis-ocs/pull/23)
* Bugfix - Build docker images with alpine:latest instead of alpine:edge: [#20](https://github.com/owncloud/ocis-ocs/pull/20)
* Change - Initial release of basic version: [#1](https://github.com/owncloud/ocis-ocs/issues/1)

View File

@@ -630,7 +630,7 @@ Tags: storage, reva
Currently, cross storage etag propagation is not yet implemented, which prevents the desktop
client from detecting changes via the PROPFIND to /. / is managed by the root storage provider
which is independend of the home and oc storage providers. If a file changes in /home/foo, the
which is independent of the home and oc storage providers. If a file changes in /home/foo, the
etag change will only be propagated to the root of the home storage provider.
This change jails users into the `/home` namespace, and allows configuring the namespace to
@@ -701,7 +701,7 @@ Tags: storage, reva
* Enhancement - Update reva to v0.0.2-0.20200212114015-0dbce24f7e8b: [#91](https://github.com/owncloud/ocis-reva/pull/91)
Reva has seen a lot of changes that allow us to - reduce the configuration overhead - use the
autocreato home folder option - use the home folder path layout option - no longer start the root
autocreate home folder option - use the home folder path layout option - no longer start the root
storage
https://github.com/owncloud/ocis-reva/pull/91

View File

@@ -3,7 +3,7 @@ Bugfix: Fix button layout after phoenix update
Tags: accounts
With the phoenix update to v0.17.0 a new ODS version was released which has a breaking change for buttons regarding
their layouting. We adjusted the button layout in the accounts UI accordingly.
their layout. We adjusted the button layout in the accounts UI accordingly.
https://github.com/owncloud/ocis/pull/625

View File

@@ -12,7 +12,7 @@ Other changes from upstream:
- Update Jenkins reporting plugin from checkstyle to recordIssues
- Remove extra kty key from JWKS top level document
- Fix regression which encodes URL fragments twice
- Avoid generating fragmet/query URLs with wrong order
- Avoid generating fragment/query URLs with wrong order
- Return state for oidc endsession response redirects
- Use server provided username to avoid case mismatch
- Use signed-out-uri if set as fallback for goodbye redirect on saml slo

View File

@@ -2,7 +2,7 @@ Enhancement: Update reva to v1.4.1-0.20201123062044-b2c4af4e897d
* Refactor the uploading files workflow from various clients [cs3org/reva#1285](https://github.com/cs3org/reva/pull/1285), [cs3org/reva#1314](https://github.com/cs3org/reva/pull/1314)
* [OCS] filter share with me requests [cs3org/reva#1302](https://github.com/cs3org/reva/pull/1302)
* Fix listing shares for nonexisting path [cs3org/reva#1316](https://github.com/cs3org/reva/pull/1316)
* Fix listing shares for nonexistent path [cs3org/reva#1316](https://github.com/cs3org/reva/pull/1316)
* prevent nil pointer when listing shares [cs3org/reva#1317](https://github.com/cs3org/reva/pull/1317)
* Sharee retrieves the information about a share -but gets response containing all the shares [owncloud/ocis-reva#260](https://github.com/owncloud/ocis-reva/issues/260)
* Deleting a public link after renaming a file [owncloud/ocis-reva#311](https://github.com/owncloud/ocis-reva/issues/311)

View File

@@ -1,5 +1,5 @@
Enhancement: Refactor graph API
We refactored the `/graph/v1.0/` endpoint which now relies on the internal acces token fer authentication, getting rid of any LDAP or OIDC code to authenticate requests. This allows using the graph api when using basic auth or any other auth mechanism provided by the CS3 auth providers / reva gateway / ocis proxy.
We refactored the `/graph/v1.0/` endpoint which now relies on the internal access token fer authentication, getting rid of any LDAP or OIDC code to authenticate requests. This allows using the graph api when using basic auth or any other auth mechanism provided by the CS3 auth providers / reva gateway / ocis proxy.
https://github.com/owncloud/ocis/pull/2277

View File

@@ -5,6 +5,6 @@ users- and groups-provider services to be able to do proper TLS configuration
for the LDAP clients. "ldap-cacert" is by default configured to add the bundled
glauth LDAP servers certificate to the trusted set for the LDAP clients.
"ldap-insecure" is set to "false" by default and can be used to disable
certificate checks (only advisable for development and test enviroments).
certificate checks (only advisable for development and test environments).
https://github.com/owncloud/ocis/pull/2492

View File

@@ -1,6 +1,6 @@
Enhancement: Add user setting capability
We've added a capability to communicate the existance of a user settings service to clients.
We've added a capability to communicate the existence of a user settings service to clients.
https://github.com/owncloud/ocis/pull/2655
https://github.com/owncloud/web/issues/5926

View File

@@ -1,7 +1,7 @@
Enhancement: Broaden bufbuild/Buf usage
We've switched the usage of bufbuild/Buf from a protoc replacement only to
also using it to confige the outputs and pinning dependencies.
also using it to configure the outputs and pinning dependencies.
https://github.com/owncloud/ocis/pull/2630
https://github.com/owncloud/ocis/pull/2616

View File

@@ -1,3 +1,3 @@
Enhancement: Add sharees additional info paramater config to ocs
Enhancement: Add sharees additional info parameter config to ocs
https://github.com/owncloud/ocis/pull/2637
https://github.com/owncloud/ocis/pull/2637

View File

@@ -25,7 +25,7 @@ This update includes:
* Enh [cs3org/reva#2212](https://github.com/cs3org/reva/pull/2212): Filter root path according to the agent that makes the request
* Enh [cs3org/reva#2237](https://github.com/cs3org/reva/pull/2237): Skip get user call in eosfs in case previous ones also failed
* Enh [cs3org/reva#2266](https://github.com/cs3org/reva/pull/2266): Callback for the EOS UID cache to retry fetch for failed keys
* Enh [cs3org/reva#2215](https://github.com/cs3org/reva/pull/2215): Aggregrate resource info properties for virtual views
* Enh [cs3org/reva#2215](https://github.com/cs3org/reva/pull/2215): Aggregate resource info properties for virtual views
* Enh [cs3org/reva#2271](https://github.com/cs3org/reva/pull/2271): Revamp the favorite manager and add the cbox sql driver
* Enh [cs3org/reva#2248](https://github.com/cs3org/reva/pull/2248): Cache whether a user home was created or not
* Enh [cs3org/reva#2282](https://github.com/cs3org/reva/pull/2282): Return a proper NOT_FOUND error when a user or group is not found

View File

@@ -1,6 +1,6 @@
Bugfix: Fix retry handling for LDAP connections
We've fixed the handling of network issues (e.g. connection loss) during LDAP Write Operations
to correcty retry the request.
to correctly retry the request.
https://github.com/owncloud/ocis/issues/2974

View File

@@ -74,7 +74,7 @@ We updated reva to the version 2.0.0.
* Enh [cs3org/reva#2397](https://github.com/cs3org/reva/pull/2397) : Product field in OCS version
* Enh [cs3org/reva#2393](https://github.com/cs3org/reva/pull/2393) : Update tus/tusd to version 1.8.0
* Enh [cs3org/reva#2522](https://github.com/cs3org/reva/pull/2522) : Introduce events
* Enh [cs3org/reva#2528](https://github.com/cs3org/reva/pull/2528) : Use an exclcusive write lock when writing multiple attributes
* Enh [cs3org/reva#2528](https://github.com/cs3org/reva/pull/2528) : Use an exclusive write lock when writing multiple attributes
* Enh [cs3org/reva#2595](https://github.com/cs3org/reva/pull/2595) : Add integration test for the groupprovider
* Enh [cs3org/reva#2439](https://github.com/cs3org/reva/pull/2439) : Ignore handled errors when creating spaces
* Enh [cs3org/reva#2500](https://github.com/cs3org/reva/pull/2500) : Invalidate listproviders cache

View File

@@ -1,4 +1,4 @@
Bugfix: Network configuration in individiual_services example
Bugfix: Network configuration in individual_services example
Tidy up the deployments/examples/ocis_individual_services example so that the instructions work.

View File

@@ -1,6 +1,6 @@
Enhancement: Add password reset link to login page
Added a configurable passwort reset link to the login page.
Added a configurable password reset link to the login page.
It can be set via `IDP_PASSWORD_RESET_URI`. If the option is not set
the link will not be shown.

View File

@@ -1,5 +1,5 @@
Bugfix: replace public mountpoint fileid with grant fileid
We now show the same resoucre id for resources when accessing them via a public links as when using a logged in user. This allows the web ui to start a WOPI session with the correct resource id.
We now show the same resource id for resources when accessing them via a public links as when using a logged in user. This allows the web ui to start a WOPI session with the correct resource id.
https://github.com/owncloud/ocis/pull/3349

View File

@@ -4,7 +4,7 @@ Updated reva to version 2.1.0. This update includes:
* Fix [cs3org/reva#2636](https://github.com/cs3org/reva/pull/2636): Delay reconnect log for events
* Fix [cs3org/reva#2645](https://github.com/cs3org/reva/pull/2645): Avoid warning about missing .flock files
* Fix [cs3org/reva#2625](https://github.com/cs3org/reva/pull/2625): Fix locking on publik links and the decomposed filesystem
* Fix [cs3org/reva#2625](https://github.com/cs3org/reva/pull/2625): Fix locking on public links and the decomposed filesystem
* Fix [cs3org/reva#2643](https://github.com/cs3org/reva/pull/2643): Emit linkaccessfailed event when share is nil
* Fix [cs3org/reva#2646](https://github.com/cs3org/reva/pull/2646): Replace public mountpoint fileid with grant fileid in ocdav
* Fix [cs3org/reva#2612](https://github.com/cs3org/reva/pull/2612): Adjust the scope handling to support the spaces architecture

View File

@@ -1,5 +1,5 @@
Enhancement: Introduce ADR
We will keep track of [Architectual Decision Records using Markdown](https://adr.github.io/madr/) in `/docs/adr`.
We will keep track of [Architectural Decision Records using Markdown](https://adr.github.io/madr/) in `/docs/adr`.
https://github.com/owncloud/ocis/pull/1042
https://github.com/owncloud/ocis/pull/1042

View File

@@ -1,8 +1,8 @@
Enhancement: Unify LDAP config settings accross services
Enhancement: Unify LDAP config settings across services
The storage services where updated to adapt for the recent changes of the LDAP
settings in reva.
Also we allow now to use a new set of top-level LDAP environment variables that
are shared between all LDAP-using services in ocis (graph, idp,
storage-auth-basic, storage-userprovider, storage-groupprovider, idm). This
@@ -33,7 +33,7 @@ LDAP_GROUP_SCHEMA_ID
LDAP_GROUP_SCHEMA_ID_IS_OCTETSTRING
Where need these can be overwritten by service specific variables. E.g. it is possible
to use STORAGE_LDAP_URI to overide the top-level LDAP_URI variable.
to use STORAGE_LDAP_URI to override the top-level LDAP_URI variable.
https://github.com/owncloud/ocis/pull/3476
https://github.com/owncloud/ocis/issues/3150

View File

@@ -2,9 +2,9 @@ Bugfix: Fix accounts initialization
Originally the accounts service relies on both the `settings` and `storage-metadata` to be up and running at the moment it starts. This is an antipattern as it will cause the entire service to panic if the dependants are not present.
We inverted this dependency and moved the default initialization data (i.e: creating roles, permissions, settings bundles) and instead of notifying the settings service that the account has to provide with such options, the settings is instead initialized with the options the accounts rely on. Essentially saving bandwith as there is no longer a gRPC call to the settings service.
We inverted this dependency and moved the default initialization data (i.e: creating roles, permissions, settings bundles) and instead of notifying the settings service that the account has to provide with such options, the settings is instead initialized with the options the accounts rely on. Essentially saving bandwidth as there is no longer a gRPC call to the settings service.
For the `storage-metadata` a retry mechanism was added that retries by default 20 times to fetch the `com.owncloud.storage.metadata` from the service registry every `500` miliseconds. If this retry expires the accounts panics, as its dependency on the `storage-metadata` service cannot be resolved.
For the `storage-metadata` a retry mechanism was added that retries by default 20 times to fetch the `com.owncloud.storage.metadata` from the service registry every `500` milliseconds. If this retry expires the accounts panics, as its dependency on the `storage-metadata` service cannot be resolved.
We also introduced a client wrapper that acts as middleware between a client and a server. For more information on how it works further read [here](https://github.com/sony/gobreaker)

View File

@@ -1,10 +1,10 @@
Enhancement: clarify expected failures
Some features, while covered by the ownCloud 10 acceptance tests, will not be implmented for now:
Some features, while covered by the ownCloud 10 acceptance tests, will not be implemented for now:
- blacklisted / ignored files, because ocis does not need to blacklist `.htaccess` files
- `OC-LazyOps` support was [removed from the clients](https://github.com/owncloud/client/pull/8398). We are thinking about [a state machine for uploads to properly solve that scenario and also list the state of files in progress in the web ui](https://github.com/owncloud/ocis/issues/214).
The expected failures files now have a dedicated _Won't fix_ section for these items.
https://github.com/owncloud/ocis/pull/1790
https://github.com/owncloud/client/pull/8398
https://github.com/owncloud/ocis/issues/214
https://github.com/owncloud/ocis/issues/214

View File

@@ -1,5 +1,5 @@
Enhancement: Parse config on supervised mode with run subcommand
Currenntly it is not possible to parse a single config file from an extension when running on supervised mode.
Currently it is not possible to parse a single config file from an extension when running on supervised mode.
https://github.com/owncloud/ocis/pull/1931

View File

@@ -1,7 +1,7 @@
Enhancement: Update reva to v1.6.1-0.20210414111318-a4b5148cbfb2
* enforce quota (https://github.com/cs3org/reva/pull/1557)
* Make additional info attribute configureable (https://github.com/cs3org/reva/pull/1588)
* Make additional info attribute configurable (https://github.com/cs3org/reva/pull/1588)
* check ENOTDIR for readlink (https://github.com/cs3org/reva/pull/1597)
* Add wrappers for EOS and EOS Home storage drivers (https://github.com/cs3org/reva/pull/1624)
* eos: fixes for enabling file sharing (https://github.com/cs3org/reva/pull/1619)

View File

@@ -1,5 +1,5 @@
Bugfix: Change the groups index to be case sensitive
Bugfix: Change the groups index to be case sensitive
Groups are considered to be case sensitive. The index must handle them case sensitive too otherwise we will have undeterministic behavior while editing or deleting groups.
Groups are considered to be case-sensitive. The index must handle them case-sensitive too otherwise we will have non-deterministic behavior while editing or deleting groups.
https://github.com/owncloud/ocis/pull/2109

View File

@@ -3,6 +3,6 @@ Bugfix: Fix configuration of mimetypes for the app registry
We've fixed the configuration option for mimetypes in the app registry.
Previously the default config would always be merged over the user provided
configuration. Now the default mimetype configuration is only used if the user does not
providy any mimetype configuration (like it is already done in the proxy with the routes configuration).
provide any mimetype configuration (like it is already done in the proxy with the routes configuration).
https://github.com/owncloud/ocis/pull/4411

View File

@@ -1,6 +1,6 @@
Bugfix: Rename extensions to services (leftover occurences)
Bugfix: Rename extensions to services (leftover occurrences)
We've already renamed extensions to services in previous PRs and this
PR peforms this rename for leftover occurences.
PR performs this rename for leftover occurrences.
https://github.com/owncloud/ocis/pull/4407

View File

@@ -1,5 +1,5 @@
Change: Enable privatelinks by default
Change: Enable private links by default
Enable privatelinks by default in the capabilities.
Enable private links by default in the capabilities.
https://github.com/owncloud/ocis/pull/4599/

View File

@@ -1,7 +1,7 @@
Bugfix: Remove unused transfer secret from app provider
We've fixed the startup of the app provider by removing the startup dependency
on a configured transfer secret, which was not used. This only happend if you
on a configured transfer secret, which was not used. This only happened if you
start the app provider without runtime (eg. `ocis app-provider server`) and didn't
have configured all oCIS secrets.

View File

@@ -1,6 +1,6 @@
Bugfix: Inconsistency env var naming for LDAP filter configuration
There was a naming inconsitency for the enviroment variables used to define
There was a naming inconsistency for the environment variables used to define
LDAP filters for user and groups queries. Some services used `LDAP_USER_FILTER`
while others used `LDAP_USERFILTER`. This is now changed to use `LDAP_USER_FILTER`
and `LDAP_GROUP_FILTER`.

View File

@@ -1,6 +1,6 @@
Bugfix: Fix the OIDC provider cache
We've fixed the OIDC provider cache. It never had a cache hit before this fix.
Under some circumstances it could cause a painfully slow OCIS if the IDP wellknown endpoint takes some time to respond.
Under some circumstances it could cause a painfully slow OCIS if the IDP well-known endpoint takes some time to respond.
https://github.com/owncloud/ocis/pull/4600

View File

@@ -1,7 +1,7 @@
Bugfix: Fix search report
There were multiple issues with REPORT search responses from webdav. Also we want it to be consistent with PROPFIND responses.
* the `remote.php` prefix was missing from the href (added even though not neccessary)
* the `remote.php` prefix was missing from the href (added even though not necessary)
* the ids were formatted wrong, they should look different for shares and spaces.
* the name of the resource was missing
* the shareid was missing (for shares)

View File

@@ -1,6 +1,6 @@
Bugfix: Mail notifications for group shares
We fixed multiple issues in the notifications service, which broke notifcation
We fixed multiple issues in the notifications service, which broke notification
mails new shares with groups.
https://github.com/owncloud/ocis/pull/4714

View File

@@ -1,7 +1,7 @@
Enhancement: Restrict admins from self-removal
Admin users are no longer allowed to remove their own account or
to edit their own role assigments. By this restriction we try to
to edit their own role assignments. By this restriction we try to
prevent situation where no administrative users is available
in the system anymore

View File

@@ -1,6 +1,6 @@
Enhancement: Allow to setup TLS for grpc services
We added config options to allow enabling TLS encrption for all reva and go-micro backed
We added config options to allow enabling TLS encryption for all reva and go-micro backed
grpc services.
https://github.com/owncloud/ocis/pull/4798

View File

@@ -1,6 +1,6 @@
Bugfix: idp: Check if CA certificate if present
Upon first start with the default configurtation the idm service creates
Upon first start with the default configuration the idm service creates
a server certificate, that might not be finished before the idp service
is starting. Add a check to idp similar to what the user, group, and
auth-providers implement.

View File

@@ -1,4 +1,4 @@
Bugfix: Initial role assingment with external IDM
Bugfix: Initial role assignment with external IDM
We've the initial user role assignment when using an external LDAP server.

View File

@@ -1,6 +1,6 @@
Enhancement: Secure the nats connection with TLS
Encyrpted the connection to the event broker using TLS.
Encrypted the connection to the event broker using TLS.
Per default TLS is not enabled but can be enabled by setting either `OCIS_EVENTS_ENABLE_TLS=true` or the respective service configs:
- `AUDIT_EVENTS_ENABLE_TLS=true`

View File

@@ -43,7 +43,7 @@ Changelog for reva 2.11.0 (2022-11-03)
* Enhancement [cs3org/reva#3376](https://github.com/cs3org/reva/pull/3376): Improve logging
* Enhancement [cs3org/reva#3250](https://github.com/cs3org/reva/pull/3250): Allow sharing the gateway caches
* Enhancement [cs3org/reva#3240](https://github.com/cs3org/reva/pull/3240): We now only encode &, < and > in PROPFIND PCDATA
* Enhancement [cs3org/reva#3334](https://github.com/cs3org/reva/pull/3334): Secure the nats connectin with TLS
* Enhancement [cs3org/reva#3334](https://github.com/cs3org/reva/pull/3334): Secure the nats connection with TLS
* Enhancement [cs3org/reva#3300](https://github.com/cs3org/reva/pull/3300): Do not leak existence of resources
* Enhancement [cs3org/reva#3233](https://github.com/cs3org/reva/pull/3233): Allow to override default broker for go-micro base ocdav service
* Enhancement [cs3org/reva#3258](https://github.com/cs3org/reva/pull/3258): Allow ocdav to share the registry instance with other services

View File

@@ -43,7 +43,7 @@ Updated reva to version 2.3.0. This update includes:
* Enhancement [cs3org/reva#2790](https://github.com/cs3org/reva/pull/2790): Fake providerids so API stays stable after beta
* Enhancement [cs3org/reva#2685](https://github.com/cs3org/reva/pull/2685): Enable federated account access
* Enhancement [cs3org/reva#1787](https://github.com/cs3org/reva/pull/1787): Add support for HTTP TPC
* Enhancement [cs3org/reva#2799](https://github.com/cs3org/reva/pull/2799): Add flag to enable unrestriced listing of spaces
* Enhancement [cs3org/reva#2799](https://github.com/cs3org/reva/pull/2799): Add flag to enable unrestricted listing of spaces
* Enhancement [cs3org/reva#2560](https://github.com/cs3org/reva/pull/2560): Mentix PromSD extensions
* Enhancement [cs3org/reva#2741](https://github.com/cs3org/reva/pull/2741): Meta path for user
* Enhancement [cs3org/reva#2613](https://github.com/cs3org/reva/pull/2613): Externalize custom mime types configuration for storage providers

View File

@@ -1,5 +1,5 @@
Enhancement: Better config for postprocessing service
The postporcessing service is now individually configurable. This is achieved by allowing a list of postprocessing steps that are processed in order of their appearance in the `POSTPROCESSING_STEPS` envvar.
The postprocessing service is now individually configurable. This is achieved by allowing a list of postprocessing steps that are processed in order of their appearance in the `POSTPROCESSING_STEPS` envvar.
https://github.com/owncloud/ocis/pull/5457

View File

@@ -1,4 +1,4 @@
Enhancement: Added possiblity to assign roles based on OIDC claims
Enhancement: Added possibility to assign roles based on OIDC claims
oCIS can now be configured to update a user's role assignment from the values of a claim provided
via the IDPs userinfo endpoint. The claim name and the mapping between claim values and ocis role

View File

@@ -1,5 +1,5 @@
Enhancement: Userlog
Enhane userlog service with proper api and messages
Enhance userlog service with proper api and messages
https://github.com/owncloud/ocis/pull/5699