Skip to content

Conversation

@mgallien
Copy link
Collaborator

No description provided.

@mgallien mgallien added this to the 3.18.0 milestone Sep 10, 2025
@mgallien mgallien force-pushed the bugfix/usbTokenReconnect branch from be20ecb to 1b9c095 Compare September 10, 2025 14:26
@mgallien mgallien marked this pull request as ready for review September 10, 2025 14:41
@mgallien mgallien force-pushed the bugfix/usbTokenReconnect branch from 1f4878a to aaa7095 Compare September 10, 2025 14:41
@mgallien mgallien force-pushed the bugfix/usbTokenReconnect branch 2 times, most recently from 1d36765 to 48e6058 Compare September 11, 2025 15:38
@mgallien mgallien force-pushed the bugfix/usbTokenReconnect branch from 48e6058 to 64ff75d Compare September 12, 2025 07:00
@mgallien mgallien marked this pull request as draft September 12, 2025 07:18
@mgallien
Copy link
Collaborator Author

seems broken again

@mgallien mgallien force-pushed the bugfix/usbTokenReconnect branch 2 times, most recently from 16d8796 to 78ba1f7 Compare September 18, 2025 14:29
@mgallien mgallien force-pushed the bugfix/usbTokenReconnect branch from 78ba1f7 to d76fb31 Compare September 19, 2025 08:28
@mgallien mgallien force-pushed the bugfix/usbTokenReconnect branch from d76fb31 to fa63283 Compare September 29, 2025 15:27
@mgallien mgallien marked this pull request as ready for review September 30, 2025 08:59
@mgallien mgallien requested a review from Aiiaiiio as a code owner September 30, 2025 08:59
@mgallien mgallien force-pushed the bugfix/usbTokenReconnect branch from fa63283 to 3ce8afd Compare September 30, 2025 09:00
@mgallien mgallien enabled auto-merge September 30, 2025 16:09
will enable token automated recovery in case of errors

Signed-off-by: Matthieu Gallien <[email protected]>
if the client looses the connection with the USB secure token, we need
to setup the session again and retry teh encryption or decryption
operation

Signed-off-by: Matthieu Gallien <[email protected]>
should better detect when the USB token session is broken and needs a
reset

Signed-off-by: Matthieu Gallien <[email protected]>
we need to destroy all handles to any resources before the pkcs#11
library context is destroyed itself to avoid wrong memory access

Signed-off-by: Matthieu Gallien <[email protected]>
@mgallien mgallien force-pushed the bugfix/usbTokenReconnect branch from 3ce8afd to 9e6e967 Compare September 30, 2025 16:09
@github-actions
Copy link

Artifact containing the AppImage: nextcloud-appimage-pr-8724.zip

Digest: sha256:1da8779d5e93c689a609b7d94dd53c35402fd6068fe424c8d3245ecce740556e

To test this change/fix you can download the above artifact file, unzip it, and run it.

Please make sure to quit your existing Nextcloud app and backup your data.

@sonarqubecloud
Copy link

Quality Gate Failed Quality Gate failed

Failed conditions
Image 2 Security Hotspots
Image 1.2% Coverage on New Code (required ≥ 80%)
Image 291 New Code Smells (required ≤ 0)
Image D Maintainability Rating on New Code (required ≥ A)

See analysis details on SonarQube Cloud

Image Catch issues before they fail your Quality Gate with our IDE extension Image SonarQube for IDE

@mgallien mgallien merged commit 188011b into master Sep 30, 2025
21 of 22 checks passed
@mgallien mgallien deleted the bugfix/usbTokenReconnect branch September 30, 2025 16:51
@camilasan
Copy link
Member

/backport to stable-3.17

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants