Skip to content

Conversation

@blizzz
Copy link
Member

@blizzz blizzz commented Jul 30, 2020

  1. Have two Nextcloud instances with LDAP and User IDs from UUIDs
  2. Make those instances trusted and ensure that addressbooks are exchanged
  3. Do a remote share from one instance to the other
  4. As recipient, have a look at your notifications

Before

Screenshot_20200730_211335

After:

Screenshot_20200730_211355

Hint for reviewers: have a look at the first commit, the second contains code style changes only.

@blizzz
Copy link
Member Author

blizzz commented Jul 30, 2020

/backport to stable19

}

try {
return $this->getDisplayNameFromContact($user . '@https://' . $server);
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

https first? :)

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

didn't touch the order. can switch. actually i do wonder whether there is a valid use case for those two fall backs?


if ($property === 'CLOUD' && preg_match('/[^a-zA-Z0-9 _.@\-\']/', $pattern) === 1) {
// There can be no chars in cloud ids which are not valid for user ids
if ($property === 'CLOUD' && preg_match('/[^a-zA-Z0-9 :_.@\/\-\']/', $pattern) === 1) {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

D'oh!

);

$initiator = $params[0];
$initiatorDisplay = isset($params[3]) ? $params[3] : null;
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

then we can revert the change where this was added?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

some details (formating, error information) are still in place.

blizzz and others added 3 commits August 3, 2020 11:05
Signed-off-by: Joas Schilling <[email protected]>
@faily-bot

This comment has been minimized.

@juliusknorr
Copy link
Member

Any reason not to backport this to stable18 ?

@blizzz
Copy link
Member Author

blizzz commented Oct 16, 2020

Any reason not to backport this to stable18 ?

I don't remember if it was affected or not. If it is, and the fix applies, then nothing speaks against a backport.

@ChristophWurst
Copy link
Member

/backport to stable18

@ChristophWurst
Copy link
Member

/backport b79e34c ac3d8d1 79027c8 to stable18

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants