You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1.1 Bugfix - Creating self group-reshare should not not share to self: #38581 (Client related)
Android: correct behaviour ✅
iOS: correct behaviour ✅
1.2 Bugfix - Regenerate session after authenticate a password protected public share: #38693 (Client related)
This one affects web browser, not apps themselves. I took a look to reproduce the problem and check if it is fixed. It works fine. Using the chrome://inspect/#devices and the incognito mode, it is reproducible with previous version and fixed with the current one. ✅
Using a mobile device, not every available browser is suitable to reproduce this exploit. F. ex. Safari browser over iOS does not allow to handle cookies, only deleting (at least in an easy way, a deep hacking would be posible? maybe, but not in the target of the current testing).
Public links are removed in the server when the expiration date passes. During the last day, the link is still available. Clients fetch the list of available links from server via API.
Android: correct behaviour ✅
iOS: correct behaviour ✅
2. Smoke testing
2.1 Beta Phase
Server version: 10.8.0-beta1
OAuth2 version: 0.4.4
Android
Device & Android version: Google Pixel 2, Android11
Mobile
1. Changelog items
1.1 Bugfix - Creating self group-reshare should not not share to self: #38581 (Client related)
Android: correct behaviour ✅
iOS: correct behaviour ✅
1.2 Bugfix - Regenerate session after authenticate a password protected public share: #38693 (Client related)
This one affects web browser, not apps themselves. I took a look to reproduce the problem and check if it is fixed. It works fine. Using the
chrome://inspect/#devices
and the incognito mode, it is reproducible with previous version and fixed with the current one. ✅Using a mobile device, not every available browser is suitable to reproduce this exploit. F. ex. Safari browser over iOS does not allow to handle cookies, only deleting (at least in an easy way, a deep hacking would be posible? maybe, but not in the target of the current testing).
1.3 Bugfix - Always allow renaming shared mounts: #38794(Client related)
Android: Reproducible and fixed ✅
iOS: Reproducible and fixed ✅
1.4 Bugfix - #4324
Public links are removed in the server when the expiration date passes. During the last day, the link is still available. Clients fetch the list of available links from server via API.
Android: correct behaviour ✅
iOS: correct behaviour ✅
2. Smoke testing
2.1 Beta Phase
Server version:
10.8.0-beta1
OAuth2 version: 0.4.4
Android
Device & Android version: Google Pixel 2, Android11
Android app version:2.18
2. Select Move, and a new location
2. Select Copy, and a location to copy to
2. Select Delete
2. In web app, upload some files in the folder
3. Long press to sync the folder
Add new content to the folder
New content is availble offline
Serenity report: serenity_android.zip
iOS
Device & iOS version: iPhone XR, iOS14.6
iOS app version: 11.6.1
2. Select Move, and a new location
2. Select Copy, and a location to copy to
2. Select Copy, and a location to copy to
2. Select Delete
Serenity report: serenity_ios.zip
2.2 RC Phase
Server version:
10.8.0-RC1
OAuth2 version: 0.4.4
Android
Device & Android version: Google Pixel 2, Android11
Android app version:2.18
2. Select Move, and a new location
2. Select Copy, and a location to copy to
2. Select Delete
2. In web app, upload some files in the folder
3. Long press to sync the folder
Add new content to the folder
New content is availble offline
Serenity report: serenity_android_rc1.zip
iOS
Device & iOS version: iPhone XR, iOS14.6
iOS app version: 11.6.1
2. Select Move, and a new location
2. Select Copy, and a location to copy to
2. Select Copy, and a location to copy to
2. Select Delete
Serenity report: serenity_ios_rc1.zip
From my side, everything OK for the release
The text was updated successfully, but these errors were encountered: