aboutsummaryrefslogtreecommitdiffstats
path: root/build/integration
Commit message (Collapse)AuthorAgeFilesLines
* chore(deps-dev): bump guzzlehttp/guzzle in /build/integrationdependabot/composer/build/integration/guzzlehttp/guzzle-7.9.3dependabot[bot]2025-03-291-18/+18
| | | | | | | | | | | | | | | Bumps [guzzlehttp/guzzle](https://github.com/guzzle/guzzle) from 7.9.2 to 7.9.3. - [Release notes](https://github.com/guzzle/guzzle/releases) - [Changelog](https://github.com/guzzle/guzzle/blob/7.9/CHANGELOG.md) - [Commits](https://github.com/guzzle/guzzle/compare/7.9.2...7.9.3) --- updated-dependencies: - dependency-name: guzzlehttp/guzzle dependency-type: direct:development update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com>
* fix(tests): Sort activities by id to get the last onefix/fix-public-download-activityCôme Chilliet2025-03-252-1/+3
| | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* feat: Add context and test steps for activity in sharingCôme Chilliet2025-03-254-4/+45
| | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* feat: add integration test for sharing activityCôme Chilliet2025-03-251-0/+36
| | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* chore(test): use consistent tabs for indention in behat testschore/behat-indentionFerdinand Thiessen2025-03-192-38/+38
| | | | Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* feat: Support deleting metadata from WebDAVartonge/feat/allow_deleting_metadataLouis Chemineau2025-03-043-0/+145
| | | | | | The `$value` will be `null` if the update is wrapped inside a `<d:remove>...</d:remove>` block. Signed-off-by: Louis Chemineau <louis@chmn.me>
* Merge pull request #51000 from nextcloud/fix/federatedfilesharing/group-cleanupStephan Orbaugh2025-03-031-0/+23
|\ | | | | fix(FederatedShareProvider): Delete external shares when groups are deleted or users removed from a group
| * fix(Share20): Convert broken hooks to IEventListenerprovokateurin2025-03-031-0/+23
| | | | | | | | Signed-off-by: provokateurin <kate@provokateurin.de>
* | build(integration): Disable password_policy appbuild/integration/disable-password_policy-appprovokateurin2025-03-031-0/+2
| | | | | | | | Signed-off-by: provokateurin <kate@provokateurin.de>
* | fix: Fix test by scanning group before using itbug/noid/weird-ldap-cachingCôme Chilliet2025-02-271-1/+1
|/ | | | Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
* bump behat/behat from 3.18.1 to 3.19.0 in /build/integrationdependabot/composer/build/integration/behat/behat-3.19.0dependabot[bot]2025-02-181-15/+15
| | | | | | | | | | --- updated-dependencies: - dependency-name: behat/behat dependency-type: direct:development update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
* fix(provisioning_api): Correct limit for `editUser`Ferdinand Thiessen2025-02-063-1/+19
| | | | Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* fix(sharing): Ensure download restrictions are not droppedfix/proper-download-checkFerdinand Thiessen2025-02-041-0/+73
| | | | | | | | When a user receives a share with share-permissions but also with download restrictions (hide download or the modern download permission attribute), then re-shares of that share must always also include those restrictions. Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* Merge pull request #50137 from ↵dependabot[bot]2025-01-301-84/+233
|\ | | | | | | nextcloud/dependabot/composer/build/integration/behat/behat-3.18.1
| * build(deps-dev): bump behat/behat in /build/integrationdependabot/composer/build/integration/behat/behat-3.18.1dependabot[bot]2025-01-111-84/+233
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Bumps [behat/behat](https://github.com/Behat/Behat) from 3.16.0 to 3.18.1. - [Release notes](https://github.com/Behat/Behat/releases) - [Changelog](https://github.com/Behat/Behat/blob/master/CHANGELOG.md) - [Commits](https://github.com/Behat/Behat/compare/v3.16.0...v3.18.1) --- updated-dependencies: - dependency-name: behat/behat dependency-type: direct:development update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
* | test: Reset sharing app config after testfix/share-api-create--permissionsFerdinand Thiessen2025-01-281-0/+1
| | | | | | | | Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* | fix(files_sharing): Respect permissions passed when creating link sharesFerdinand Thiessen2025-01-281-0/+58
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Given: User creates a link or email share with permissions=4 (create only = file drop). Problem: Currently the permissions are automatically extended to permissions = 5 (READ + CREATE). Work around was to create the share and directly update it. Solution: Respect what the user is requesting, create a file drop share. Co-authored-by: Ferdinand Thiessen <opensource@fthiessen.de> Co-authored-by: Côme Chilliet <91878298+come-nc@users.noreply.github.com> Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* | test: Add integration tests for moving a file from and to a shared folderadd-integration-tests-for-moving-a-file-from-and-to-a-shared-folderDaniel Calviño Sánchez2025-01-271-0/+27
| | | | | | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* | fix(dav): default calendar and address book not created on first loginRichard Steinmetz2025-01-232-0/+9
| | | | | | | | Signed-off-by: Richard Steinmetz <richard@steinmetz.cloud>
* | fix(files): more conversion tests and translate error messagesskjnldsv2025-01-171-0/+21
| | | | | | | | Signed-off-by: skjnldsv <skjnldsv@protonmail.com>
* | chore: add file conversion integration testsfeat/conversion-adjustingskjnldsv2025-01-166-13/+188
|/ | | | Signed-off-by: skjnldsv <skjnldsv@protonmail.com>
* chore(federation): cleanup SettingsController and legacy AddServerMiddlewarefeat/auto-accept-trusted-serverskjnldsv2025-01-091-2/+2
| | | | Signed-off-by: skjnldsv <skjnldsv@protonmail.com>
* chore(federation): add trusted server auto accept integration testsskjnldsv2025-01-093-52/+215
| | | | Signed-off-by: skjnldsv <skjnldsv@protonmail.com>
* Merge pull request #49966 from nextcloud/block-dav-move-parentStephan Orbaugh2025-01-072-0/+20
|\ | | | | fix: block moving files to it's own parent with dav
| * fix: block moving files to it's own parent with davblock-dav-move-parentRobin Appelman2025-01-032-0/+20
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
* | fix: explicitly ignore nested mounts when transfering ownershipmount-move-checksRobin Appelman2025-01-061-1/+1
|/ | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
* fix(logger): Prevent infinite recursion with log.condition => matchesbugfix/noid/prevent-infitnite-loopJoas Schilling2025-01-031-0/+39
| | | | | | | | | | When we need to check the log condition for a user matches, there is a risk that something on the way checks the log level and would result in an infinite loop. So we simply check if it's a nested call and use the default warning level in that case. Signed-off-by: Joas Schilling <coding@schilljs.com>
* feat(login): add origin check at loginBenjamin Gaussorgues2024-12-052-2/+11
| | | | Signed-off-by: Benjamin Gaussorgues <benjamin.gaussorgues@nextcloud.com>
* fix(ocm): switching to IdentityProofMaxence Lange2024-12-042-4/+22
| | | | Signed-off-by: Maxence Lange <maxence@artificial-owl.com>
* feat(ocm): signing ocm requestsMaxence Lange2024-12-041-0/+3
| | | | | Signed-off-by: Maxence Lange <maxence@artificial-owl.com>
* test(ExternalStorage): Send basic auth during integrations testsLouis Chemineau2024-11-282-19/+38
| | | | Signed-off-by: Louis Chemineau <louis@chmn.me>
* Revert "fix(dav): Always respond custom error page on exceptions"Daniel Kesselberg2024-11-222-11/+22
| | | | | | This reverts commit 9992e7d4395a773fec7148cf5b4111f894cb40b7. Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* Merge pull request #49244 from nextcloud/feat/profile-appKate2024-11-141-0/+1
|\
| * fix(profile): make sure the app cannot be disabled as it was in coreskjnldsv2024-11-141-0/+1
| | | | | | | | Signed-off-by: skjnldsv <skjnldsv@protonmail.com>
* | test(integration): Correctly cleanup logstest/integration/cleanup-logsprovokateurin2024-11-141-2/+9
|/ | | | Signed-off-by: provokateurin <kate@provokateurin.de>
* chore(deps-dev): Bump behat/behat in /build/integrationdependabot[bot]2024-11-091-31/+33
| | | | | | | | | | | | | | | Bumps [behat/behat](https://github.com/Behat/Behat) from 3.15.0 to 3.16.0. - [Release notes](https://github.com/Behat/Behat/releases) - [Changelog](https://github.com/Behat/Behat/blob/master/CHANGELOG.md) - [Commits](https://github.com/Behat/Behat/compare/v3.15.0...v3.16.0) --- updated-dependencies: - dependency-name: behat/behat dependency-type: direct:development update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
* ci: Bump behat/behat as wellci/noid/update-integration-test-stuffJoas Schilling2024-10-302-11/+10
| | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* ci: Align integration test dependencies with 3rdaprty/Joas Schilling2024-10-293-525/+412
| | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* fix(dav): Public WebDAV endpoint should allow `GET` requestsfix/public-getFerdinand Thiessen2024-10-098-6/+117
| | | | | | | `GET` should be allowed even without Ajax header to allow downloading files, or show files in the viewer. All other requests could be guarded, but this should not. Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* fix: provision api's status codesfix/provisionApi-status-codesHamza Mahjoubi2024-09-301-6/+6
| | | | Signed-off-by: Hamza Mahjoubi <hamzamahjoubi221@gmail.com>
* feat(files): Make the files download action use WebDAV zip downloadFerdinand Thiessen2024-09-282-29/+30
| | | | Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* feat(dav): New `ZipFolderPlugin` which allows to download folders using GET ↵Ferdinand Thiessen2024-09-284-2/+80
| | | | | | requests Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* chore(deps): Update nextcloud/coding-standard to v1.3.1provokateurin2024-09-195-37/+37
| | | | Signed-off-by: provokateurin <kate@provokateurin.de>
* fix(core): profile design and pronouns supportfieat/profile-pronouncesJohn Molakvoæ (skjnldsv)2024-09-181-727/+727
| | | | Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* feat: add profile pronounsJohn Molakvoæ (skjnldsv)2024-09-171-1/+4
| | | | Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* fix(files_sharing): adjust permissions from custom edit and delete check methodsskjnldsv2024-09-111-0/+83
| | | | Signed-off-by: skjnldsv <skjnldsv@protonmail.com>
* fix(files_sharing): Handle download permission the same way for public and ↵Ferdinand Thiessen2024-09-061-1/+1
| | | | | | internal shares Signed-off-by: Ferdinand Thiessen <opensource@fthiessen.de>
* chore: adjust code to adhere to coding standardAnna Larch2024-09-051-1/+1
| | | | Signed-off-by: Anna Larch <anna@nextcloud.com>
* fix(dav): Always respond custom error page on exceptionsLouis Chemineau2024-09-052-22/+11
| | | | Signed-off-by: Louis Chemineau <louis@chmn.me>
* fix: Fix unmodified placeholder replacing the actual value when updatingDaniel Calviño Sánchez2024-09-041-0/+32
| | | | | | | | | | | | | | When updating global storages and user storages a property is not updated by "StoragesService::updateStorage()" if the value matches the unmodified placeholder. However, userglobal storages are not updated through the "StoragesService"; as only the authentication mechanism is updated it is directly done with "saveBackendOptions()" in "IUserProvided" or "UserGlobalAuth". Due to this the unmodified placeholder value needs to be explicitly checked in those cases and replaced by the actual value (note that in this case it is not possible to just skip updating a specific property). Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>