Closed PVince81 closed 5 years ago
Below is the diff I have collected based on the following criteria:
The diff of the files are as shown below master v/s stable10
Excluding files with Copyright year diff and info.xml
5c5
< * @copyright Copyright (c) 2017, ownCloud GmbH
---
> * @copyright Copyright (c) 2018, ownCloud GmbH
35c35
< if (\version_compare('10.0.3', $installedVersion, '>=') === true) {
---
> if (version_compare('10.0.3', $installedVersion, '>=') === true) {
47a48,49
>
>
106,107d105
< $("#encryptionRecoveryPassword").val("");
< $("#repeatEncryptionRecoveryPassword").val("");
6c6
< * @copyright Copyright (c) 2017, ownCloud GmbH
---
> * @copyright Copyright (c) 2018, ownCloud GmbH
61a62
>
100,101c101,102
< foreach ($this->userManager->getBackends() as $backend) {
< $name = \get_class($backend);
---
> foreach($this->userManager->getBackends() as $backend) {
> $name = get_class($backend);
118c119
< } while (\count($users) >= $limit);
---
> } while(count($users) >= $limit);
122a124
>
5c5
< * @copyright Copyright (c) 2017, ownCloud GmbH
---
> * @copyright Copyright (c) 2018, ownCloud GmbH
21a22
>
130a132
>
172a175
>
182a186
>
198a203
>
240c245
< $this->decryptAll->decryptAll($input, $output);
---
> $this->decryptAll->decryptAll($input,$output);
258a264
>
5c5
< * @copyright Copyright (c) 2017, ownCloud GmbH
---
> * @copyright Copyright (c) 2018, ownCloud GmbH
21a22
>
52a54
>
81c83
< if ($this->config->getAppValue('core', 'encryption_enabled', 'no') === 'no') {
---
> if($this->config->getAppValue('core', 'encryption_enabled', 'no') === 'no') {
90c92
< $userKeysNotEnabled = ($this->config->getAppValue('encryption', 'userSpecificKey', '') === '');
---
> $userKeysNotEnabled = ($this->config->getAppValue('encryption','userSpecificKey', '') === '');
93,94c95,96
< if (!$freshInstallation) {
< if (!$masterKeyNotEnabled) {
---
> if(!$freshInstallation) {
> if(!$masterKeyNotEnabled) {
102c104
< if ($encryptionType === "masterkey") {
---
> if($encryptionType === "masterkey") {
120a123
>
122a126
>
7c7
< * @copyright Copyright (c) 2017, ownCloud GmbH
---
> * @copyright Copyright (c) 2018, ownCloud GmbH
25a26
>
122c123
< return new DataResponse(['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
---
> return new DataResponse (['data' => ['message' => $errorMessage]], Http::STATUS_BAD_REQUEST);
161a163
>
179a182
>
187a191
>
6c6
< * @copyright Copyright (c) 2017, ownCloud GmbH
---
> * @copyright Copyright (c) 2018, ownCloud GmbH
97a98
>
143c144
< ['message' => (string)$this->l->t('Private key password successfully updated.')]
---
> ['message' => (string) $this->l->t('Private key password successfully updated.')]
147c148
< ['message' => (string)$errorMessage],
---
> ['message' => (string) $errorMessage],
150a152
>
6c6
< * @copyright Copyright (c) 2017, ownCloud GmbH
---
> * @copyright Copyright (c) 2018, ownCloud GmbH
22a23
>
24a26
>
59a62
>
62c65
< switch ($this->session->getStatus()) {
---
> switch( $this->session->getStatus()) {
93a97
>
5c5
< * @copyright Copyright (c) 2017, ownCloud GmbH
---
> * @copyright Copyright (c) 2018, ownCloud GmbH
21a22
>
23a25
>
133c135
< if (!$input->hasOption('method') && !\in_array($input->getOption('method'), ['recovery', 'password'])) {
---
> if(!$input->hasOption('method') && !in_array($input->getOption('method'),['recovery', 'password'])) {
200c202,203
< }
---
> }
>
7c7
< * @copyright Copyright (c) 2017, ownCloud GmbH
---
> * @copyright Copyright (c) 2018, ownCloud GmbH
23a24
>
128a130
>
135c137
< $this->output->writeln(\str_pad('', \strlen($headline), '='));
---
> $this->output->writeln(str_pad('', strlen($headline), '='));
178c180
< foreach ($this->userManager->getBackends() as $backend) {
---
> foreach($this->userManager->getBackends() as $backend) {
197c199
< } while (\count($users) >= $limit);
---
> } while(count($users) >= $limit);
212c214
< $numberOfUsers = \count($this->userPasswords);
---
> $numberOfUsers = count($this->userPasswords);
224a227
>
234c237
< foreach ($this->userManager->getBackends() as $backend) {
---
> foreach($this->userManager->getBackends() as $backend) {
245c248
< } while (\count($users) >= $limit);
---
> } while(count($users) >= $limit);
256a260
>
259c263
< $directories[] = '/' . $uid . '/files';
---
> $directories[] = '/' . $uid . '/files';
261c265
< while ($root = \array_pop($directories)) {
---
> while($root = array_pop($directories)) {
275c279
< if ($this->encryptFile($path) === false) {
---
> if($this->encryptFile($path) === false) {
290a295
>
292c297
< $target = $path . '.encrypted.' . \time() . '.part';
---
> $target = $path . '.encrypted.' . $this->getTimeStamp() . '.part';
296c301
< if ($version > 0) {
---
> if ($version > 0) {
361c366
< \fputcsv($fp, $pwd);
---
> fputcsv($fp, $pwd);
363c368
< \fclose($fp);
---
> fclose($fp);
384a390,398
> * get current timestamp
> *
> * @return int
> */
> protected function getTimeStamp() {
> return \time();
> }
>
> /**
403c417
< $progress = new ProgressBar($this->output, \count($this->userPasswords));
---
> $progress = new ProgressBar($this->output, count($this->userPasswords));
453a468
>
462a478
>
464c480
< $html->assign('password', $password);
---
> $html->assign ('password', $password);
468c484
< $plainText->assign('password', $password);
---
> $plainText->assign ('password', $password);
472a489
>
10c10
< * @copyright Copyright (c) 2017, ownCloud GmbH
---
> * @copyright Copyright (c) 2018, ownCloud GmbH
28a29
>
42a44
>
107a110
>
165c168
< * This is helpful for revision increment during move operation between storage.
---
> * This is helpful for revision increment during move operation between storage.
211c214
< if (Scanner::isPartialFile($path)) {
---
> if(Scanner::isPartialFile($path)) {
301a305
>
306c310
< while (\strlen($data) > 0) {
---
> while (strlen($data) > 0) {
310c314
< $remainingLength = \strlen($data);
---
> $remainingLength = strlen($data);
327a332
>
331c336
< $chunk = \substr($data, 0, $this->unencryptedBlockSizeSigned);
---
> $chunk = substr($data, 0, $this->unencryptedBlockSizeSigned);
338c343,344
< $data = \substr($data, $this->unencryptedBlockSizeSigned);
---
> $data = substr($data, $this->unencryptedBlockSizeSigned);
>
339a346
>
373a381
>
384a393
>
404a414
>
428,429c438,439
< $parts = \explode('/', $path);
< if (\count($parts) < 4) {
---
> $parts = explode('/', $path);
> if (count($parts) < 4) {
512a523
>
519c530
< $parts = \explode('/', $path);
---
> $parts = explode('/', $path);
521,523c532,534
< $realPath = '/' . $parts[1] . '/files/' . \implode('/', \array_slice($parts, 3));
< $length = \strrpos($realPath, '.');
< $realPath = \substr($realPath, 0, $length);
---
> $realPath = '/' . $parts[1] . '/files/' . implode('/', array_slice($parts, 3));
> $length = strrpos($realPath, '.');
> $realPath = substr($realPath, 0, $length);
537,539c548,550
< if (\pathinfo($path, PATHINFO_EXTENSION) === 'part') {
< $pos = \strrpos($path, '.', -6);
< $path = \substr($path, 0, $pos);
---
> if (pathinfo($path, PATHINFO_EXTENSION) === 'part') {
> $pos = strrpos($path, '.', -6);
> $path = substr($path, 0, $pos);
7c7
< * @copyright Copyright (c) 2017, ownCloud GmbH
---
> * @copyright Copyright (c) 2018, ownCloud GmbH
34c34
< if (empty($userId)) {
---
> if(empty($userId)) {
38a39
>
5c5
< * @copyright Copyright (c) 2017, ownCloud GmbH
---
> * @copyright Copyright (c) 2018, ownCloud GmbH
31c31
< if (empty($userId)) {
---
> if(empty($userId)) {
35a36
>
6c6
< * @copyright Copyright (c) 2017, ownCloud GmbH
---
> * @copyright Copyright (c) 2018, ownCloud GmbH
24a25
>
27a29
>
36c38
< if (\is_array($instances)) {
---
> if (is_array($instances)) {
42a45
>
57a61
>
58a63
>
8c8
< * @copyright Copyright (c) 2017, ownCloud GmbH
---
> * @copyright Copyright (c) 2018, ownCloud GmbH
26a27
>
32a34
>
92c94
< $users = \OC::$server->getUserManager()->search('', $limit, $offset);
---
> $users = \OCP\User::getUsers('', $limit, $offset);
94c96
< $this->reorganizeFolderStructureForUser($user->getUID());
---
> $this->reorganizeFolderStructureForUser($user);
97c99
< } while (\count($users) >= $limit);
---
> } while (count($users) >= $limit);
103a106
>
118a122
>
171c175
< if ($row['configkey'] !== 'installed_version') {
---
> if ($row['configkey'] !== 'installed_version' ) {
194c198
< $backupDir = 'encryption_migration_backup_' . \date("Y-m-d_H-i-s");
---
> $backupDir = 'encryption_migration_backup_' . date("Y-m-d_H-i-s");
208c212
< $backupDir = $user . '/encryption_migration_backup_' . \date("Y-m-d_H-i-s");
---
> $backupDir = $user . '/encryption_migration_backup_' . date("Y-m-d_H-i-s");
221,224c225,228
< $this->createPathForKeys('/files_encryption/' . $this->moduleId);
< if (\is_resource($dh)) {
< while (($privateKey = \readdir($dh)) !== false) {
< if (!\OC\Files\Filesystem::isIgnoredDir($privateKey)) {
---
> $this->createPathForKeys('/files_encryption/' . $this->moduleId );
> if (is_resource($dh)) {
> while (($privateKey = readdir($dh)) !== false) {
> if (!\OC\Files\Filesystem::isIgnoredDir($privateKey) ) {
231c235
< \closedir($dh);
---
> closedir($dh);
241c245
< $publicKey = \substr($privateKey, 0, \strrpos($privateKey, '.privateKey')) . '.publicKey';
---
> $publicKey = substr($privateKey,0 , strrpos($privateKey, '.privateKey')) . '.publicKey';
254c258
< $this->createPathForKeys(\dirname($newPrivateKey));
---
> $this->createPathForKeys(dirname($newPrivateKey));
268c272
< $this->createPathForKeys(\dirname($newPublicKey));
---
> $this->createPathForKeys(dirname($newPublicKey));
280a285
>
288,289c293,294
< if (\is_resource($dh)) {
< while (($file = \readdir($dh)) !== false) {
---
> if (is_resource($dh)) {
> while (($file = readdir($dh)) !== false) {
296c301
< $this->createPathForKeys(\dirname($target));
---
> $this->createPathForKeys(dirname($target));
307c312
< \closedir($dh);
---
> closedir($dh);
333c338
< $filePath = \substr($keyPath, \strlen('/files_trashbin/keys/'));
---
> $filePath = substr($keyPath, strlen('/files_trashbin/keys/'));
336c341
< $filePath = \substr($keyPath, \strlen('/files_encryption/keys/'));
---
> $filePath = substr($keyPath, strlen('/files_encryption/keys/'));
346c351
< if (\strpos($normalized, $normalizedMountPoint) === 0) {
---
> if (strpos($normalized, $normalizedMountPoint) === 0)
348d352
< }
350,352c354
< } elseif ($trash === false && $this->view->file_exists('/' . $user . '/files/' . $filePath)) {
< return $targetDir;
< } elseif ($trash === true && $this->view->file_exists('/' . $user . '/files_trashbin/' . $filePath)) {
---
> } else if ($trash === false && $this->view->file_exists('/' . $user. '/files/' . $filePath)) {
354c356,358
< }
---
> } else if ($trash === true && $this->view->file_exists('/' . $user. '/files_trashbin/' . $filePath)) {
> return $targetDir;
> }
376c380
< $sub_dirs = \explode('/', $path);
---
> $sub_dirs = explode('/', $path);
7c7
< * @copyright Copyright (c) 2017, ownCloud GmbH
---
> * @copyright Copyright (c) 2018, ownCloud GmbH
62,63c62,63
< if ($status === null) {
< if (\OC::$server->getAppConfig()->getValue('encryption', 'useMasterKey', '0') !== '0'
---
> if (is_null($status)) {
> if(\OC::$server->getAppConfig()->getValue('encryption', 'useMasterKey', '0') !== '0'
80c80
< if ($key === null) {
---
> if (is_null($key)) {
93c93
< if ($key === null) {
---
> if (is_null($key)) {
141c141
< if (($uid === null) && $this->decryptAllModeActivated()) {
---
> if (is_null($uid) && $this->decryptAllModeActivated()) {
143c143
< } elseif ($uid === null) {
---
> } elseif (is_null($uid)) {
158c158
< if (($privateKey === null) && $this->decryptAllModeActivated()) {
---
> if (is_null($privateKey) && $this->decryptAllModeActivated()) {
160c160
< } elseif ($privateKey === null) {
---
> } elseif (is_null($privateKey)) {
177a178
>
7c7
< * @copyright Copyright (c) 2017, ownCloud GmbH
---
> * @copyright Copyright (c) 2018, ownCloud GmbH
23a24
>
25a27
>
175,176c177,178
< $parts = \explode('/', $path, 3);
< if (\count($parts) > 1) {
---
> $parts = explode('/', $path, 3);
> if (count($parts) > 1) {
181a184
>
196a200
>
6c6
< if (isset($_['expiration'])) {
---
> if ( isset($_['expiration']) ) {
16c16
< <?php print_unescaped("\n" . $theme->getBaseUrl());
---
> <?php print_unescaped("\n".$theme->getBaseUrl());
9,10c9,10
< <td bgcolor="<?php p($theme->getMailHeaderColor()); ?>" width="20px"> </td>
< <td bgcolor="<?php p($theme->getMailHeaderColor()); ?>">
---
> <td bgcolor="<?php p($theme->getMailHeaderColor());?>" width="20px"> </td>
> <td bgcolor="<?php p($theme->getMailHeaderColor());?>">
31c31
< <br><a href="<?php p($theme->getBaseUrl()); ?>"><?php p($theme->getBaseUrl()); ?></a>
---
> <br><a href="<?php p($theme->getBaseUrl()); ?>"><?php p($theme->getBaseUrl());?></a>
9c9
< <?php if (!$_["initStatus"] and (\OC::$server->getAppConfig()->getValue('encryption', 'useMasterKey', '0') !== '0'
---
> <?php if(!$_["initStatus"] and (\OC::$server->getAppConfig()->getValue('encryption', 'useMasterKey', '0') !== '0'
17c17
< if ($masterKey !== '0') {
---
> if($masterKey !== '0') {
20c20
< if ($userSpecificKey !== "") {
---
> if($userSpecificKey !== "") {
32c32
< <button id="select-mode" type="button" class="hidden"><?php p($l->t("Permanently select this mode")); ?></button>
---
> <button id="select-mode" type="button" class="hidden"><?php p($l->t("Permanently select this mode"));?></button>
34,35c34,35
< <div id="masterKeyVal" data-master-key="<?php echo \OC::$server->getAppConfig()->getValue("encryption", "useMasterKey", ""); ?>"></div>
< <div id="userSpecificKey" data-user-specific-key="<?php echo \OC::$server->getAppConfig()->getValue("encryption", "userSpecificKey", ""); ?>"></div>
---
> <div id="masterKeyVal" data-master-key="<?php echo \OC::$server->getAppConfig()->getValue("encryption", "useMasterKey", "");?>"></div>
> <div id="userSpecificKey" data-user-specific-key="<?php echo \OC::$server->getAppConfig()->getValue("encryption", "userSpecificKey", "");?>"></div>
41,45c41,43
< value="1" <?php if ($_['encryptHomeStorage']) {
< print_unescaped('checked="checked"');
< } ?> />
< <label for="encryptHomeStorage"><?php p($l->t('Encrypt the home storage')); ?></label></br>
< <em><?php p($l->t("Enabling this option encrypts all files stored on the main storage, otherwise only files on external storage will be encrypted")); ?></em>
---
> value="1" <?php if ($_['encryptHomeStorage']) print_unescaped('checked="checked"'); ?> />
> <label for="encryptHomeStorage"><?php p($l->t('Encrypt the home storage'));?></label></br>
> <em><?php p( $l->t( "Enabling this option encrypts all files stored on the main storage, otherwise only files on external storage will be encrypted" ) ); ?></em>
48c46
< <?php if ($_['masterKeyEnabled'] === false): ?>
---
> <?php if($_['masterKeyEnabled'] === false): ?>
50c48
< <?php $_["recoveryEnabled"] === '0' ? p($l->t("Enable recovery key")) : p($l->t("Disable recovery key")); ?>
---
> <?php $_["recoveryEnabled"] === '0' ? p($l->t("Enable recovery key")) : p($l->t("Disable recovery key")); ?>
69c67
< value="<?php $_["recoveryEnabled"] === '0' ? p($l->t("Enable recovery key")) : p($l->t("Disable recovery key")); ?>"/>
---
> value="<?php $_["recoveryEnabled"] === '0' ? p($l->t("Enable recovery key")) : p($l->t("Disable recovery key")); ?>"/>
73,75c71
< <p name="changeRecoveryPasswordBlock" id="encryptionChangeRecoveryKey" <?php if ($_['recoveryEnabled'] === '0') {
< print_unescaped('class="hidden"');
< } ?>>
---
> <p name="changeRecoveryPasswordBlock" id="encryptionChangeRecoveryKey" <?php if($_['recoveryEnabled'] === '0') print_unescaped('class="hidden"');?>>
9c9
< <?php if ($_["initialized"] === \OCA\Encryption\Session::NOT_INITIALIZED): ?>
---
> <?php if ($_["initialized"] === \OCA\Encryption\Session::NOT_INITIALIZED ): ?>
13c13
< <?php elseif ($_["initialized"] === \OCA\Encryption\Session::INIT_EXECUTED): ?>
---
> <?php elseif ( $_["initialized"] === \OCA\Encryption\Session::INIT_EXECUTED ): ?>
17c17
< <em><?php p($l->t("Your private key password no longer matches your log-in password.")); ?></em>
---
> <em><?php p( $l->t( "Your private key password no longer matches your log-in password." ) ); ?></em>
20,22c20,22
< <?php p($l->t("Set your old private key password to your current log-in password:")); ?>
< <?php if ($_["recoveryEnabledForUser"]):
< p($l->t(" If you don't remember your old password you can ask your administrator to recover your files."));
---
> <?php p( $l->t( "Set your old private key password to your current log-in password:" ) ); ?>
> <?php if ( $_["recoveryEnabledForUser"] ):
> p( $l->t( " If you don't remember your old password you can ask your administrator to recover your files." ) );
29c29
< <label for="oldPrivateKeyPassword"><?php p($l->t("Old log-in password")); ?></label>
---
> <label for="oldPrivateKeyPassword"><?php p($l->t( "Old log-in password" )); ?></label>
35c35
< <label for="newRecoveryPassword"><?php p($l->t("Current log-in password")); ?></label>
---
> <label for="newRecoveryPassword"><?php p($l->t( "Current log-in password" )); ?></label>
40c40
< disabled><?php p($l->t("Update Private Key Password")); ?>
---
> disabled><?php p($l->t( "Update Private Key Password" )); ?>
45c45
< <?php elseif ($_["recoveryEnabled"] && $_["privateKeySet"] && $_["initialized"] === \OCA\Encryption\Session::INIT_SUCCESSFUL): ?>
---
> <?php elseif ( $_["recoveryEnabled"] && $_["privateKeySet"] && $_["initialized"] === \OCA\Encryption\Session::INIT_SUCCESSFUL ): ?>
48c48
< <label for="userEnableRecovery"><?php p($l->t("Enable password recovery:")); ?></label>
---
> <label for="userEnableRecovery"><?php p( $l->t( "Enable password recovery:" ) ); ?></label>
51c51
< <em><?php p($l->t("Enabling this option will allow you to reobtain access to your encrypted files in case of password loss")); ?></em>
---
> <em><?php p( $l->t( "Enabling this option will allow you to reobtain access to your encrypted files in case of password loss" ) ); ?></em>
58,59c58,59
< <?php echo($_["recoveryEnabledForUser"] ? 'checked="checked"' : ''); ?> />
< <label for="userEnableRecoveryCheckbox"><?php p($l->t("Enabled")); ?></label>
---
> <?php echo ( $_["recoveryEnabledForUser"] ? 'checked="checked"' : '' ); ?> />
> <label for="userEnableRecoveryCheckbox"><?php p( $l->t( "Enabled" ) ); ?></label>
67,68c67,68
< <?php echo($_["recoveryEnabledForUser"] === false ? 'checked="checked"' : ''); ?> />
< <label for="userDisableRecoveryCheckbox"><?php p($l->t("Disabled")); ?></label>
---
> <?php echo ( $_["recoveryEnabledForUser"] === false ? 'checked="checked"' : '' ); ?> />
> <label for="userDisableRecoveryCheckbox"><?php p( $l->t( "Disabled" ) ); ?></label>
In my next comment I will exclude the files which have diff's like space or adding \
before functions.
The file(s) which needs to be looked into ( real code difference ):
Code style was not getting checked for the bundled apps/encryption
code in core stable10
That is easy to fix. See PR https://github.com/owncloud/core/pull/35014
That will reduce lots of the "rubbish" diffs.
Other bits-and-pieces adjusted in https://github.com/owncloud/core/pull/35015 and #117 Now the diffs are a lot shorter.
diff -r apps/encryption/ apps-external/encryption/
diff -r apps/encryption/appinfo/info.xml apps-external/encryption/appinfo/info.xml
22a23
> <category>security</category>
29c30
< <owncloud min-version="10" max-version="10" />
---
> <owncloud min-version="10.2" max-version="11.0" />
Only in apps-external/encryption/: composer.json
Only in apps-external/encryption/: composer.lock
Only in apps-external/encryption/: .drone.yml
Only in apps-external/encryption/: .git
Only in apps-external/encryption/: .gitignore
diff -r apps/encryption/js/settings-admin.js apps-external/encryption/js/settings-admin.js
105a106,107
> $("#encryptionRecoveryPassword").val("");
> $("#repeatEncryptionRecoveryPassword").val("");
diff -r apps/encryption/l10n/fr.js apps-external/encryption/l10n/fr.js
26c26
< "Encryption App is enabled, but your keys are not initialized. Please log-out and log-in again." : "L'application de chiffrement est activé mais vos clés ne sont pas initialisées. Merci de vous déconnecter puis de vous reconnecter.",
---
> "Encryption App is enabled, but your keys are not initialized. Please log-out and log-in again." : "L'application de chiffrement est activée mais vos clés ne sont pas initialisées. Merci de vous déconnecter puis de vous reconnecter.",
36a37
> "Default encryption module" : "Module de chiffrement par défaut",
37a39,44
> "Encryption type: Master Key" : "Type de chiffrement : Clé principale",
> "Encryption type: User Specific Key" : "Type de chiffrement : Clé spécifique à l'utilisateur",
> "Please select an encryption option" : "Veuillez selectionner une option de chiffrement",
> "Master Key" : "Clé principale",
> "User-specific key" : "Clé spécifique à l'utilisateur",
> "Permanently select this mode" : "Selectionner ce mode de façon permanente",
diff -r apps/encryption/l10n/fr.json apps-external/encryption/l10n/fr.json
24c24
< "Encryption App is enabled, but your keys are not initialized. Please log-out and log-in again." : "L'application de chiffrement est activé mais vos clés ne sont pas initialisées. Merci de vous déconnecter puis de vous reconnecter.",
---
> "Encryption App is enabled, but your keys are not initialized. Please log-out and log-in again." : "L'application de chiffrement est activée mais vos clés ne sont pas initialisées. Merci de vous déconnecter puis de vous reconnecter.",
34a35
> "Default encryption module" : "Module de chiffrement par défaut",
35a37,42
> "Encryption type: Master Key" : "Type de chiffrement : Clé principale",
> "Encryption type: User Specific Key" : "Type de chiffrement : Clé spécifique à l'utilisateur",
> "Please select an encryption option" : "Veuillez selectionner une option de chiffrement",
> "Master Key" : "Clé principale",
> "User-specific key" : "Clé spécifique à l'utilisateur",
> "Permanently select this mode" : "Selectionner ce mode de façon permanente",
diff -r apps/encryption/l10n/it.js apps-external/encryption/l10n/it.js
37a38
> "Master Key" : "Chiave principale",
diff -r apps/encryption/l10n/it.json apps-external/encryption/l10n/it.json
35a36
> "Master Key" : "Chiave principale",
diff -r apps/encryption/l10n/nl.js apps-external/encryption/l10n/nl.js
36a37
> "Default encryption module" : "Standaard cryptomodule",
37a39,44
> "Encryption type: Master Key" : "Encryptietype: Mastersleutel",
> "Encryption type: User Specific Key" : "Encryptietype: Gebruikersspecifieke sleutel",
> "Please select an encryption option" : "Kies een encryptie-optie",
> "Master Key" : "Master Sleutel",
> "User-specific key" : "Gebruikersspecifieke sleutel",
> "Permanently select this mode" : "Kies deze modus permanent",
diff -r apps/encryption/l10n/nl.json apps-external/encryption/l10n/nl.json
34a35
> "Default encryption module" : "Standaard cryptomodule",
35a37,42
> "Encryption type: Master Key" : "Encryptietype: Mastersleutel",
> "Encryption type: User Specific Key" : "Encryptietype: Gebruikersspecifieke sleutel",
> "Please select an encryption option" : "Kies een encryptie-optie",
> "Master Key" : "Master Sleutel",
> "User-specific key" : "Gebruikersspecifieke sleutel",
> "Permanently select this mode" : "Kies deze modus permanent",
diff -r apps/encryption/l10n/pl.js apps-external/encryption/l10n/pl.js
37a38
> "Permanently select this mode" : "Wybierz ten tryb na stałe",
62c63
< "nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && (n%100<12 || n%100>=14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3);");
---
> "nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && (n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3);");
diff -r apps/encryption/l10n/pl.json apps-external/encryption/l10n/pl.json
35a36
> "Permanently select this mode" : "Wybierz ten tryb na stałe",
59c60
< },"pluralForm" :"nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && (n%100<12 || n%100>=14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3);"
---
> },"pluralForm" :"nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && (n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3);"
diff -r apps/encryption/l10n/sl.js apps-external/encryption/l10n/sl.js
37a38,40
> "Encryption type: User Specific Key" : "Vrsta šifriranja: uporabniški ključ",
> "Please select an encryption option" : "Izberite način šifriranja",
> "Master Key" : "Glavni ključ",
diff -r apps/encryption/l10n/sl.json apps-external/encryption/l10n/sl.json
35a36,38
> "Encryption type: User Specific Key" : "Vrsta šifriranja: uporabniški ključ",
> "Please select an encryption option" : "Izberite način šifriranja",
> "Master Key" : "Glavni ključ",
diff -r apps/encryption/l10n/sv.js apps-external/encryption/l10n/sv.js
36a37
> "Default encryption module" : "Standardmodul för kryptering",
37a39,44
> "Encryption type: Master Key" : "Krypteringstyp: Huvudnyckel",
> "Encryption type: User Specific Key" : "Krypteringstyp: Användarspecifik nyckel",
> "Please select an encryption option" : "Välj ett krypteringsalternativ",
> "Master Key" : "Huvudnyckel",
> "User-specific key" : "Användarspecifik nyckel",
> "Permanently select this mode" : "Välj detta läge permanent",
diff -r apps/encryption/l10n/sv.json apps-external/encryption/l10n/sv.json
34a35
> "Default encryption module" : "Standardmodul för kryptering",
35a37,42
> "Encryption type: Master Key" : "Krypteringstyp: Huvudnyckel",
> "Encryption type: User Specific Key" : "Krypteringstyp: Användarspecifik nyckel",
> "Please select an encryption option" : "Välj ett krypteringsalternativ",
> "Master Key" : "Huvudnyckel",
> "User-specific key" : "Användarspecifik nyckel",
> "Permanently select this mode" : "Välj detta läge permanent",
Only in apps-external/encryption/l10n: .tx
diff -r apps/encryption/lib/Migration.php apps-external/encryption/lib/Migration.php
92c92
< $users = \OCP\User::getUsers('', $limit, $offset);
---
> $users = \OC::$server->getUserManager()->search('', $limit, $offset);
94c94
< $this->reorganizeFolderStructureForUser($user);
---
> $this->reorganizeFolderStructureForUser($user->getUID());
Only in apps-external/encryption/: LICENSE
Only in apps-external/encryption/: Makefile
Only in apps-external/encryption/: .phan
Only in apps-external/encryption/: .php_cs.cache
Only in apps-external/encryption/: .php_cs.dist
Only in apps-external/encryption/: phpcs.xml
Only in apps-external/encryption/: phpstan.neon
Only in apps-external/encryption/: phpunit.xml
Only in apps-external/encryption/: README.md
Only in apps-external/encryption/tests: acceptance
Only in apps/encryption/tests: Command
Only in apps/encryption/tests: Controller
Only in apps/encryption/tests: Crypto
Only in apps/encryption/tests: HookManagerTest.php
Only in apps/encryption/tests: Hooks
Only in apps/encryption/tests: JWTTest.php
Only in apps/encryption/tests: KeyManagerTest.php
Only in apps/encryption/tests: MigrationTest.php
Only in apps/encryption/tests: Panels
Only in apps/encryption/tests: RecoveryTest.php
Only in apps/encryption/tests: SessionTest.php
Only in apps-external/encryption/tests: unit
Only in apps/encryption/tests: Users
Only in apps/encryption/tests: UtilTest.php
Only in apps-external/encryption/: vendor
Only in apps-external/encryption/: vendor-bin
most of that is translation diffs, and CI-script files in the app repo that support make,drone...
The unit tests are in tests/unit
in the app repo, and in apps/ebcryption/tests
in core. So to see the differences:
diff -r apps/encryption/tests/ apps-external/encryption/tests/unit/
There are more of those. They need to be looked at to see which versions are "best".
I just diffed the code base again - diff is not relevant -> close nothing to do anymore
Make sure that the code on core's stable10 is the same as here on master.
Prerequisite for Github release https://github.com/owncloud/encryption/issues/17
@sharidas can you diff and align ?