-
Notifications
You must be signed in to change notification settings - Fork 113
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[full-ci] Allow no permissions on Links #2687
Conversation
Signed-off-by: jkoberg <[email protected]>
22c536b
to
2b15385
Compare
Signed-off-by: jkoberg <[email protected]>
Signed-off-by: jkoberg <[email protected]>
Signed-off-by: jkoberg <[email protected]>
Signed-off-by: jkoberg <[email protected]>
This pull request introduces 1 alert when merging f3aed1b into fe9a8c2 - view on LGTM.com new alerts:
|
Signed-off-by: jkoberg <[email protected]>
Signed-off-by: jkoberg <[email protected]>
Signed-off-by: jkoberg <[email protected]>
Signed-off-by: jkoberg <[email protected]>
9918701
to
9955ce5
Compare
Signed-off-by: jkoberg <[email protected]>
9955ce5
to
e4cdf8b
Compare
Signed-off-by: jkoberg <[email protected]>
Signed-off-by: jkoberg <[email protected]>
Signed-off-by: jkoberg <[email protected]>
Signed-off-by: jkoberg <[email protected]>
why does it make sense to have two endpoints? when should clients use |
@butonic Clients should use the Of course this could also be done in one endpoint. But then we would need to duplicate authentication logic from the auth interceptor. By using different endpoints the auth middleware can take care of authentication, and future refactorings can be done in auth middleware only. IMO it was the simplest and stablest approach to use two endpoints and reuse existing code. |
could you move this to the ocs service instead of ocdav. this is not really webdav and being able to query this information as json is a lot nicer for the web clients. |
Signed-off-by: jkoberg <[email protected]>
@butonic I moved the handler to ocs. Please recheck! |
Signed-off-by: jkoberg <[email protected]>
Adds an endpoint to ocs service that exposes information about link tokens.
Usage:
curling the
unprotected
endpoint returns standard informationcurling a password protected link only returns minimal information
curling the
protected
endpoint returns full information if user has native accesscurling the
protected
endpoint returns same information asunprotected
endpoint if user does not have native accesscurling the
protected
endpoint without authentication returns401 Unauthorized