-
Notifications
You must be signed in to change notification settings - Fork 465
Disable "Public calls" #521
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Labels
Milestone
Comments
Yeah, makes sense. Nevertheless I could still see a usecase for "public calls" in your organisation: |
"New Public Call" (only as public as your nextcloud server) |
marcoambrosini
pushed a commit
that referenced
this issue
Oct 9, 2019
Forward all slots to multiselect
pboguslawski
added a commit
to ibpl/spreed
that referenced
this issue
Oct 2, 2022
Added spreed application config parameter `public_rooms_allowed` to disallow creating of rooms with public (guest via link) access (i.e. for internal Nextcloud setups). Use ``` occ config:app:set spreed public_rooms_allowed --value 'yes' ``` to allow (default if not set) and ``` occ config:app:set spreed public_rooms_allowed --value 'no' ``` to disallow creating of rooms with public access. Related: nextcloud#521 Author-Change-Id: IB#1126215 Signed-off-by: Pawel Boguslawski <[email protected]>
nickvergessen
pushed a commit
that referenced
this issue
Nov 16, 2022
Added spreed application config parameter `public_rooms_allowed` to disallow creating of rooms with public (guest via link) access (i.e. for internal Nextcloud setups). Use ``` occ config:app:set spreed public_rooms_allowed --value 'yes' ``` to allow (default if not set) and ``` occ config:app:set spreed public_rooms_allowed --value 'no' ``` to disallow creating of rooms with public access. Related: #521 Author-Change-Id: IB#1126215 Signed-off-by: Pawel Boguslawski <[email protected]>
nickvergessen
pushed a commit
that referenced
this issue
Nov 16, 2022
Added spreed application config parameter `public_rooms_allowed` to disallow creating of rooms with public (guest via link) access (i.e. for internal Nextcloud setups). Use ``` occ config:app:set spreed public_rooms_allowed --value 'yes' ``` to allow (default if not set) and ``` occ config:app:set spreed public_rooms_allowed --value 'no' ``` to disallow creating of rooms with public access. Related: #521 Author-Change-Id: IB#1126215 Signed-off-by: Pawel Boguslawski <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
In our organization we use Nextcloud only in our intranet.
In this use case, the feature "Public calls" has no sense because the generated URL is not reachable from outside.
It would be good to have a configuration option to remove the "New public call" button for this scenario.
Thanks.
The text was updated successfully, but these errors were encountered: