Releases: cs3org/reva
v2.9.0
Changelog for reva 2.9.0 (2022-09-08)
The following sections list the changes in reva 2.9.0 relevant to
reva users. The changes are ordered by importance.
Summary
- Fix #3206: Add spaceid when listing share jail mount points
- Fix #3194: Adds the rootinfo to storage spaces
- Fix #3201: Fix shareid on PROPFIND
- Fix #3176: Forbid duplicate shares
- Fix #3208: Prevent panic in time conversion
- Fix #3207: Align ocs status code for permission error on publiclink update
- Enh #3193: Add shareid to PROPFIND
- Enh #3180: Add canDeleteAllHomeSpaces permission
- Enh #3203: Added "delete-all-spaces" permission
- Enh #3200: OCS get share now also handle received shares
- Enh #3185: Improve ldap authprovider's error reporting
- Enh #3179: Improve tokeninfo endpoint
- Enh #3171: Cs3 to jsoncs3 share manager migration
- Enh #3204: Make the function flockFile private
- Enh #3192: Enable space members to update shares
Details
- Bugfix #3206: Add spaceid when listing share jail mount points
- Bugfix #3194: Adds the rootinfo to storage spaces
The sympton of the bug were search results not containing permissions
- Bugfix #3201: Fix shareid on PROPFIND
Shareid was still not working properly. We need to parse it from the path
- Bugfix #3176: Forbid duplicate shares
When sending a CreateShare request twice two shares would be created, one being not
accessible. This was blocked by web so the issue wasn't obvious. Now it's forbidden to create
share for a user who already has a share on that same resource
- Bugfix #3208: Prevent panic in time conversion
- Bugfix #3881: Align ocs status code for permission error on publiclink update
The ocs status code returned for permission errors on updates of publiclink permissions is now
aligned with the documentation of the OCS share API and the behaviour of ownCloud 10
- Enhancement #3193: Add shareid to PROPFIND
Adds the shareid to the PROPFIND response (in case of shares only)
- Enhancement #3180: Add canDeleteAllHomeSpaces permission
We added a permission to the admin role in ocis that allows deleting homespaces on user delete.
#3180
#3202
https://github.com/owncloud/ocis/pull/4447/files
- Enhancement #3203: Added "delete-all-spaces" permission
We introduced a new permission "delete-all-spaces", users holding this permission are
allowed to delete any space of any type.
- Enhancement #4322: OCS get share now also handle received shares
Requesting a specific share can now also correctly map the path to the mountpoint if the
requested share is a received share.
- Enhancement #3185: Improve ldap authprovider's error reporting
The errorcode returned by the ldap authprovider driver is a bit more explicit now. (i.e. we
return a proper Invalid Credentials error now, when the LDAP Bind operation fails with that)
- Enhancement #3179: Improve tokeninfo endpoint
We added more information to the tokeninfo endpoint. aliaslink
is a bool value indicating if
the permissions are 0. id
is the full id of the file. Both are available to all users having the
link token. spaceType
(indicating the space type) is only available if the user has native
access
- Enhancement #3171: Cs3 to jsoncs3 share manager migration
We added a Load() to the jsoncs3 and Dump() to the sc3 share manager. The shareid might need to be
prefixed with a storageid and space id.
- Enhancement #3204: Make the function flockFile private
Having that function exported is tempting people to use the func to get the name for calling the
lock functions. That is wrong, as this function is just a helper to generate the lock file name
from a given file to lock.
- Enhancement #3192: Enable space members to update shares
Enabled space members to update shares which they have not created themselves.
v2.8.0
Changelog for reva 2.8.0 (2022-08-23)
The following sections list the changes in reva 2.8.0 relevant to
reva users. The changes are ordered by importance.
Summary
- Fix #3158: Add name to the propfind response
- Fix #3157: Fix locking response codes
- Fix #3152: Disable caching of not found stat responses
- Fix #4251: Disable caching
- Chg #3154: Dataproviders now return file metadata
- Enh #3143: Add /app/open-with-web endpoint
- Enh #3156: Added language option to the app provider
- Enh #3148: Add new jsoncs3 share manager
Details
- Bugfix #3158: Add name to the propfind response
Previously the file- or foldername had to be extracted from the href. This is not nice and
doesn't work for alias links.
- Bugfix #3157: Fix locking response codes
We've fixed the status codes for locking a file that is already locked.
owncloud/ocis#4366
#3157
#3003
- Bugfix #3152: Disable caching of not found stat responses
We no longer cache not found responses to prevent concurrent requests interfering with put
requests.
- Bugfix #4251: Disable caching
We disabled the cache, because there are race condtions that cause tests to fail.
- Change #3154: Dataproviders now return file metadata
Dataprovider drivers can now return file metadata. When the resource info contains a file id,
the mtime or an etag, these will be included in the response as the corresponding http headers.
- Enhancement #3143: Add /app/open-with-web endpoint
We've added an /app/open-with-web endpoint to the app provider, so that clients that are no
browser or have only limited browser access can also open apps with the help of a Web URL.
- Enhancement #3156: Added language option to the app provider
We've added an language option to the app provider which will in the end be passed to the app a user
opens so that the web ui is displayed in the users language.
owncloud/ocis#4367
#3156
owncloud/ocis#4399
- Enhancement #3148: Add new jsoncs3 share manager
We've added a new jsoncs3 share manager which splits the json file per storage space and caches
data locally.
v2.7.4
Changelog for reva 2.7.4 (2022-08-10)
The following sections list the changes in reva 2.7.4 relevant to
reva users. The changes are ordered by importance.
Summary
- Fix #3141: Check ListGrants permission when listing shares
Details
- Bugfix #3141: Check ListGrants permission when listing shares
We now check the ListGrants permission when listing outgoing shares. If this permission is
set, users can list all shares in all spaces.
v2.7.3
Changelog for reva 2.7.3 (2022-08-09)
The following sections list the changes in reva 2.7.3 relevant to
reva users. The changes are ordered by importance.
Summary
- Fix #3109: Fix missing check in MustCheckNodePermissions
- Fix #3086: Fix crash in ldap authprovider
- Fix #3094: Allow removing password from public links
- Fix #3096: Fix user filter
- Fix #3091: Project spaces need no real owner
- Fix #3088: Use correct sublogger
- Enh #3123: Allow stating links that have no permissions
- Enh #3087: Allow to set LDAP substring filter type
- Enh #3098: App provider http endpoint uses Form instead of Query
- Enh #3133: Admins can set quota on all spaces
- Enh #3117: Update go-ldap to v3.4.4
- Enh #3095: Upload expiration and cleanup
Details
-
Bugfix #3109: Fix missing check in MustCheckNodePermissions
We added a missing check to the MustCheckNodePermissions function, so space managers can see
disabled spaces. -
Bugfix #3086: Fix crash in ldap authprovider
We fixed possible crash in the LDAP authprovider caused by a null pointer derefence, when the
IDP settings of the userprovider are different from the authprovider. -
Bugfix #3094: Allow removing password from public links
When using cs3 public link share manager passwords would never be removed. We now remove the
password when getting an update request with empty password field -
Bugfix #3096: Fix user filter
We fixed the user filter to display the users drives properly and allow admins to list other
users drives. -
Bugfix #3091: Project spaces need no real owner
Make it possible to use a non existing user as a space owner.
-
Bugfix #3088: Use correct sublogger
We no longer log cache updated messages when log level is less verbose than debug.
-
Enhancement #3123: Allow stating links that have no permissions
We need a way to resolve the id when we have a token. This also needs to work for links that have no
permissions assigned -
Enhancement #3087: Allow to set LDAP substring filter type
We introduced new settings for the user- and groupproviders to allow configuring the LDAP
filter type for substring search. Possible values are: "initial", "final" and "any" to do
either prefix, suffix or full substring searches. -
Enhancement #3098: App provider http endpoint uses Form instead of Query
We've improved the http endpoint now uses the Form instead of Query to also support
application/x-www-form-urlencoded
parameters on the app provider http endpoint. -
Enhancement #3133: Admins can set quota on all spaces
Admins which have the correct permissions should be able to set quota on all spaces. This is
implemented via the existing permissions client. -
Enhancement #3117: Update go-ldap to v3.4.4
Updated go-ldap/ldap/v3 to the latest upstream release to include the latest bugfixes.
-
Enhancement #3095: Upload expiration and cleanup
We made storage providers aware of upload expiration and added an interface for FS which
support listing and purging expired uploads.We also implemented said interface for decomposedfs.
v2.7.2
Changelog for reva 2.7.2 (2022-07-18)
The following sections list the changes in reva 2.7.2 relevant to
reva users. The changes are ordered by importance.
Summary
- Fix #3079: Allow empty permissions
- Fix #3084: Spaces relatated permissions and providerid cleanup
- Fix #3083: Add space id to ItemTrashed event
Details
-
Bugfix #3079: Allow empty permissions
For alias link we need the ability to set no permission on an link. The permissions will then come
from the natural permissions the receiving user has on that file/folder -
Bugfix #3084: Spaces relatated permissions and providerid cleanup
Following the CS3 resource id refactoring we reverted a logic check when checking the list all
spaces permission, fixed some typos and made the storageprovider fill in a missing storage
provider id. -
Bugfix #3083: Add space id to ItemTrashed event
We fixed the resource IDs in the ItemTrashed events which were missing the recently introduced
space ID in the resource ID.
v2.7.1
Changelog for reva 2.7.1 (2022-07-15)
The following sections list the changes in reva 2.7.1 relevant to
reva users. The changes are ordered by importance.
Summary
Details
v2.7.0
Changelog for reva 2.7.0 (2022-07-15)
The following sections list the changes in reva 2.7.0 relevant to
reva users. The changes are ordered by importance.
Summary
- Fix #3075: Check permissions of the move operation destination
- Fix #3036: Fix revad with EOS docker image
- Fix #3037: Add uid- and gidNumber to LDAP queries
- Fix #4061: Forbid resharing with higher permissions
- Fix #3017: Removed unused gateway config "commit_share_to_storage_ref"
- Fix #3031: Return proper response code when detecting recursive copy/move operations
- Fix #3071: Make CS3 sharing drivers parse legacy resource id
- Fix #3035: Prevent cross space move
- Fix #3074: Send storage provider and space id to wopi server
- Fix #3022: Improve the sharing internals
- Fix #2977: Test valid filename on spaces tus upload
- Chg #3006: Use spaceID on the cs3api
- Enh #3043: Introduce LookupCtx for index interface
- Enh #3009: Prevent recursive copy/move operations
- Enh #2977: Skip space lookup on space propfind
Details
-
Bugfix #3075: Check permissions of the move operation destination
We now properly check the permissions on the target of move operations.
-
Bugfix #3036: Fix revad with EOS docker image
We've fixed the revad with EOS docker image. Previously the revad binary was build on Alpine and
not executable on the final RHEL based image. -
Bugfix #3037: Add uid- and gidNumber to LDAP queries
For the EOS storage to work correctly the uid- and gidNumber attributes need to be populated.
-
Bugfix #4061: Forbid resharing with higher permissions
When creating a public link from a viewer share a user was able to set editor permissions on that
link. This was because of a missing check that is added now -
Bugfix #3017: Removed unused gateway config "commit_share_to_storage_ref"
We've removed the unused gateway configuration option "commit_share_to_storage_ref".
-
Bugfix #3031: Return proper response code when detecting recursive copy/move operations
We changed the ocdav response code to "409 - Conflict" when a recursive operation was detected.
-
Bugfix #3071: Make CS3 sharing drivers parse legacy resource id
The CS3 public and user sharing drivers will now correct a resource id that is missing a spaceid
when it can split the storageid. -
Bugfix #3035: Prevent cross space move
Decomposedfs now prevents moving across space boundaries
-
Bugfix #3074: Send storage provider and space id to wopi server
We are now concatenating storage provider id and space id into the endpoint that is sent to the
wopiserver -
Bugfix #3022: Improve the sharing internals
We cleaned up the sharing code validation and comparisons.
-
Bugfix #2977: Test valid filename on spaces tus upload
Tus uploads in spaces now also test valid filenames.
-
Change #3006: Use spaceID on the cs3api
We introduced a new spaceID field on the cs3api to implement the spaces feature in a cleaner way.
-
Enhancement #3043: Introduce LookupCtx for index interface
The index interface now has a new LookupCtx that can look up multiple values so we can more
efficiently look up multiple shares by id. It also takes a context so we can pass on the trace
context to the CS3 backend -
Enhancement #3009: Prevent recursive copy/move operations
We changed the ocs API to prevent copying or moving a folder into one of its children.
-
Enhancement #2977: Skip space lookup on space propfind
We now construct the space id from the /dav/spaces URL intead of making a request to the
registry.owncloud/ocis#1277
owncloud/ocis#2144
owncloud/ocis#3073
#2977
v2.6.1
Changelog for reva 2.6.1 (2022-06-27)
The following sections list the changes in reva 2.6.1 relevant to
reva users. The changes are ordered by importance.
Summary
- Fix #2998: Fix 0-byte-uploads
- Enh #3983: Add capability for alias links
- Enh #3000: Make less stat requests
- Enh #3003: Distinguish GRPC FAILED_PRECONDITION and ABORTED codes
- Enh #3005: Remove unused HomeMapping variable
Details
-
Bugfix #2998: Fix 0-byte-uploads
We fixed a problem with 0-byte uploads by using TouchFile instead of going through TUS
(decomposedfs and owncloudsql storage drivers only for now). -
Enhancement #3983: Add capability for alias links
For better UX clients need a way to discover if alias links are supported by the server. We added a
capability under "files_sharing/public/alias" -
Enhancement #3000: Make less stat requests
The /dav/spaces endpoint now constructs a reference instead of making a lookup grpc call,
reducing the number of requests. -
Enhancement #3003: Distinguish GRPC FAILED_PRECONDITION and ABORTED codes
Webdav distinguishes between 412 precondition failed for if match errors for locks or etags,
uses 405 Method Not Allowed when trying to MKCOL an already existing collection and 409
Conflict when intermediate collections are missing.The CS3 GRPC status codes are modeled after
https://github.com/googleapis/googleapis/blob/master/google/rpc/code.proto. When
trying to use the error codes to distinguish these cases on a storageprovider CreateDir call we
can map ALREADY_EXISTS to 405, FAILED_PRECONDITION to 409 and ABORTED to 412.Unfortunately, we currently use and map FAILED_PRECONDITION to 412. I assume, because the
naming is very similar to PreconditionFailed. However the GRPC docs are very clear that
ABORTED should be used, specifically mentioning etags and locks.With this PR we internally clean up the usage in the decomposedfs and mapping in the ocdav
handler. -
Enhancement #3005: Remove unused HomeMapping variable
We have removed the unused HomeMapping variable from the gateway.
v2.6.0
Changelog for reva 2.6.0 (2022-06-21)
The following sections list the changes in reva 2.6.0 relevant to
reva users. The changes are ordered by importance.
Summary
- Fix #2985: Make stat requests route based on storage providerid
- Fix #2987: Let archiver handle all error codes
- Fix #2994: Fix errors when loading shares
- Fix #2996: Do not close share dump channels
- Fix #2993: Remove unused configuration
- Fix #2950: Fix sharing with space ref
- Fix #2991: Make sharesstorageprovider get accepted share
- Chg #2877: Enable resharing
- Chg #2984: Update CS3Apis
- Enh #3753: Add executant to the events
- Enh #2820: Instrument GRPC and HTTP requests with OTel
- Enh #2975: Leverage shares space storageid and type when listing shares
- Enh #3882: Explicitly return on ocdav move requests with body
- Enh #2932: Stat accepted shares mountpoints, configure existing share updates
- Enh #2944: Improve owncloudsql connection management
- Enh #2962: Per service TracerProvider
- Enh #2911: Allow for dumping and loading shares
- Enh #2938: Sharpen tooling
Details
-
Bugfix #2985: Make stat requests route based on storage providerid
The gateway now uses a filter mask to only fetch the root id of a space for stat requests. This
allows the spaces registry to determine the responsible storage provider without querying
the storageproviders. -
Bugfix #2987: Let archiver handle all error codes
We fixed the archiver handler to handle all error codes
-
Bugfix #2994: Fix errors when loading shares
We fixed a bug where loading shares and associated received shares ran into issues when
handling them simultaneously. -
Bugfix #2996: Do not close share dump channels
We no longer close the channels when dumping shares, it's the responsibility of the caller.
-
Bugfix #2993: Remove unused configuration
We've fixed removed unused configuration:
insecure
from the dataprovider -timeout
from the dataprovider -tmp_folder
from the
storageprovider
-
Bugfix #2950: Fix sharing with space ref
We've fixed a bug where share requests with
path
attribute present ignored thespace_ref
attribute. We now give thespace_ref
attribute precedence over thepath
attribute. -
Bugfix #2991: Make sharesstorageprovider get accepted share
The sharesstorageprovider now gets an accepted share instead of filtering all shares.
-
Change #2877: Enable resharing
This will allow resharing of files. - All Viewers and Editors are now able to reshare files and
folders - One can still edit their own shares, even when loosing share permissions - Viewers and
Editors in a space are not affected -
Change #2984: Update CS3Apis
Updated the CS3Apis to make use of field_mask and pagination for list requests.
-
Enhancement #3753: Add executant to the events
Added the executant field to all events.
-
Enhancement #2820: Instrument GRPC and HTTP requests with OTel
We've added the enduser.id tag to the HTTP and GRPC requests. We've fixed the tracer names.
We've decorated the traces with the hostname. -
Enhancement #2975: Leverage shares space storageid and type when listing shares
The list shares call now also fills the storageid to allow the space registry to directly route
requests to the correct storageprovider. The spaces registry will now also skip
storageproviders that are not configured for a requested type, causing type 'personal'
requests to skip the sharestorageprovider. -
Enhancement #3882: Explicitly return on ocdav move requests with body
Added a check if a ocdav move request contains a body. If it does a 415 415 (Unsupported Media
Type) will be returned. -
Enhancement #2932: Stat accepted shares mountpoints, configure existing share updates
-
Enhancement #2944: Improve owncloudsql connection management
The owncloudsql storagedriver is now aware of the request context and will close db
connections when http connections are closed or time out. We also increased the max number of
open connections from 10 to 100 to prevent a corner case where all connections were used but idle
connections were not freed. -
Enhancement #2962: Per service TracerProvider
To improve tracing we create separate TracerProviders per service now. This is especially
helpful when running multiple reva services in a single process (like e.g. oCIS does). -
Enhancement #2911: Allow for dumping and loading shares
We now have interfaces for dumpable and loadable share manages which can be used to migrate
shares between share managers -
Enhancement #2938: Sharpen tooling
- We increased the linting timeout to 10min which caused some release builds to time out
v1.19.0
Changelog for reva 1.19.0 (2022-06-16)
The following sections list the changes in reva 1.19.0 relevant to
reva users. The changes are ordered by importance.
Summary
- Fix #2693: Support editnew actions from MS Office
- Fix #2588: Dockerfile.revad-ceph to use the right base image
- Fix #2216: Make hardcoded HTTP "insecure" options configurable
- Fix #2860: Use
eos-all
parent image - Fix #2499: Removed check DenyGrant in resource permission
- Fix #2712: Update Dockerfile.revad.eos to not break the image
- Fix #2789: Minor fixes in cephfs and eosfs
- Fix #2285: Accept new userid idp format
- Fix #2608: Respect the tracing_service_name config variable
- Fix #2841: Refactors logger to have ctx
- Fix #2759: Made uid, gid claims parsing more robust in OIDC auth provider
- Fix #2842: Fix download action in SDK
- Fix #2555: Fix site accounts endpoints
- Fix #2675: Updates Makefile according to latest go standards
- Fix #2572: Wait for nats server on middleware start
- Chg #2596: Remove hash from public link urls
- Chg #2559: Do not encode webDAV ids to base64
- Chg #2561: Merge oidcmapping auth manager into oidc
- Enh #2698: Make capabilities endpoint public, authenticate users is present
- Enh #2813: Support custom mimetypes in the WOPI appprovider driver
- Enh #2515: Enabling tracing by default if not explicitly disabled
- Enh #160: Implement the CS3 Lock API in the EOS storage driver
- Enh #2686: Features for favorites xattrs in EOS, cache for scope expansion
- Enh #2494: Use sys ACLs for file permissions
- Enh #2522: Introduce events
- Enh #2685: Enable federated account access
- Enh #2801: Use functional options for client gRPC connections
- Enh #2921: Use standard header for checksums
- Enh #2480: Group based capabilities
- Enh #1787: Add support for HTTP TPC
- Enh #2560: Mentix PromSD extensions
- Enh #2613: Externalize custom mime types configuration for storage providers
- Enh #2163: Nextcloud-based share manager for pkg/ocm/share
- Enh #2696: Preferences driver refactor and cbox sql implementation
- Enh #2052: New CS3API datatx methods
- Enh #2738: Site accounts site-global settings
- Enh #2672: Further Site Accounts improvements
- Enh #2549: Site accounts improvements
- Enh #2488: Cephfs support keyrings with IDs
- Enh #2514: Reuse ocs role objects in other drivers
- Enh #2752: Refactor the rest user and group provider drivers
- Enh #2946: Make user share indicators read from the share provider service
Details
-
Bugfix #2693: Support editnew actions from MS Office
This fixes the incorrect behavior when creating new xlsx and pptx files, as MS Office supports
the editnew action and it must be used for newly created files instead of the normal edit action. -
Bugfix #2588: Dockerfile.revad-ceph to use the right base image
In Aug2021 https://hub.docker.com/r/ceph/daemon-base was moved to quay.ceph.io and the
builds for this image were failing for some weeks after January. -
Bugfix #2216: Make hardcoded HTTP "insecure" options configurable
HTTP "insecure" options must be configurable and default to false.
-
Bugfix #2860: Use
eos-all
parent image -
Bugfix #2499: Removed check DenyGrant in resource permission
When adding a denial permission
-
Bugfix #2712: Update Dockerfile.revad.eos to not break the image
-
Bugfix #2789: Minor fixes in cephfs and eosfs
-
Bugfix #2285: Accept new userid idp format
The format for userid idp changed and
this broke the ocmd
tutorial
This PR makes the provider authorizer interceptor accept both the old and the new string
format. -
Bugfix #2608: Respect the tracing_service_name config variable
-
Bugfix #2841: Refactors logger to have ctx
This fixes the native library loggers which are not associated with the context and thus are not
handled properly in the reva runtime. -
Bugfix #2759: Made uid, gid claims parsing more robust in OIDC auth provider
This fix makes sure the uid and gid claims are defined at init time, and that the necessary
typecasts are performed correctly when authenticating users. A comment was added that in case
the uid/gid claims are missing AND that no mapping takes place, a user entity is returned with
uid = gid = 0. -
Bugfix #2842: Fix download action in SDK
The download action was no longer working in the SDK (used by our testing probes); this PR fixes
the underlying issue. -
Bugfix #2555: Fix site accounts endpoints
This PR fixes small bugs in the site accounts endpoints.
-
Bugfix #2675: Updates Makefile according to latest go standards
Earlier, we were using go get to install packages. Now, we are using go install to install
packages -
Bugfix #2572: Wait for nats server on middleware start
Use a retry mechanism to connect to the nats server when it is not ready yet
-
Change #2596: Remove hash from public link urls
Public link urls do not contain the hash anymore, this is needed to support the ocis and web
history mode. -
Change #2559: Do not encode webDAV ids to base64
We removed the base64 encoding of the IDs and use the format ! with a
!
delimiter. As a reserved delimiter it is URL safe. The IDs will be XML and JSON encoded as
necessary. -
Change #2561: Merge oidcmapping auth manager into oidc
The oidcmapping auth manager was created as a separate package to ease testing. As it has now
been tested also as a pure OIDC auth provider without mapping, and as the code is largely
refactored, it makes sense to merge it back so to maintain a single OIDC manager. -
Enhancement #2698: Make capabilities endpoint public, authenticate users is present
-
Enhancement #2813: Support custom mimetypes in the WOPI appprovider driver
Similarly to the storage provider, also the WOPI appprovider driver now supports custom mime
types. Also fixed a small typo. -
Enhancement #2515: Enabling tracing by default if not explicitly disabled
-
Enhancement #160: Implement the CS3 Lock API in the EOS storage driver
-
Enhancement #2686: Features for favorites xattrs in EOS, cache for scope expansion
-
Enhancement #2494: Use sys ACLs for file permissions
-
Enhancement #2522: Introduce events
This will introduce events into the system. Events are a simple way to bring information from
one service to another. Readpkg/events/example
and subfolders for more information -
Enhancement #2685: Enable federated account access
-
Enhancement #2801: Use functional options for client gRPC connections
This will add more ability to configure the client side gRPC connections.
-
Enhancement #2921: Use standard header for checksums
On HEAD requests, we currently expose checksums (when available) using the
ownCloud-specific header, which is typically consumed by the sync clients.This patch adds the standard Digest header using the standard format detailed at
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Digest. This is e.g. used
by GFAL/Rucio clients in the context of managed transfers of datasets. -
Enhancement #2480: Group based capabilities
We can now return specific capabilities for users who belong to certain configured groups.
-
Enhancement #1787: Add support for HTTP TPC
We have added support for HTTP Third Party Copy. This allows remote data transfers between
storages managed by either two different reva servers, or a reva server and a Grid
(WLCG/ESCAPE) site server.Such remote transfers are expected to be driven by
GFAL, the underlying library used by
FTS, and Rucio.In addition, the oidcmapping package has been refactored to support the standard OIDC use
cases as well when no mapping is defined. -
Enhancement #2560: Mentix PromSD extensions
The Mentix Prometheus SD scrape targets are now split into one file per service type, making
health checks configuration easier. Furthermore, the local file connector for mesh data and
the site registration endpoint have been dropped, as they aren't needed any...