summaryrefslogtreecommitdiffstats
path: root/build/integration
Commit message (Collapse)AuthorAgeFilesLines
* Don't show link shares hash in inherited share listRoeland Jago Douma2020-01-151-22/+4
| | | | | | This adds no value at all. Just showing the text "(Shared link)" now. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Fix testsJohn Molakvoæ (skjnldsv)2019-12-101-0/+1
| | | | Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Update license headersChristoph Wurst2019-12-0525-33/+75
| | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* integration testsMaxence Lange2019-12-031-0/+80
| | | | | | | | | | | | | | | Signed-off-by: Maxence Lange <maxence@artificial-owl.com> add tests on non-owner pov Signed-off-by: Maxence Lange <maxence@artificial-owl.com> duplicate Signed-off-by: Maxence Lange <maxence@artificial-owl.com> small fixes Signed-off-by: Maxence Lange <maxence@artificial-owl.com> removed tags Signed-off-by: Maxence Lange <maxence@artificial-owl.com>
* Merge pull request #18159 from nextcloud/tests/comments-integrationRoeland Jago Douma2019-12-021-2/+6
|\ | | | | Do not call count on null
| * Do not call count on nullJulius Härtl2019-11-291-2/+6
| | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | Fix integrationRoeland Jago Douma2019-11-281-1/+1
|/ | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Accept incoming shares in integration testsDaniel Calviño Sánchez2019-11-2012-0/+167
| | | | | | | | | Now all incoming shares need to be explicitly accepted before being able to use the shared file or get information about a reshare (although getting the information of the incoming share is possible before accepting it). Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Replace direct calls to share API with specific share stepsDaniel Calviño Sánchez2019-11-205-35/+35
| | | | | | | This makes possible to use steps that reference the last share, which will be needed to accept pending shares. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Remove extra spaces at the end of linesDaniel Calviño Sánchez2019-11-202-7/+7
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Extend data returned when searching remote sharesJohn Molakvoæ (skjnldsv)2019-10-292-2/+2
| | | | Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Add more integration tests for getting sharesDaniel Calviño Sánchez2019-10-262-2/+126
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Add integration tests for getting shares including subfilesDaniel Calviño Sánchez2019-10-252-0/+294
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Replace fully qualified name with aliasDaniel Calviño Sánchez2019-10-251-10/+11
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Fix shares read permissionsJohn Molakvoæ (skjnldsv)2019-10-042-4/+34
| | | | | | | A user with reshare permissions on a file is now able to get any share of that file (just like the owner). Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Add assorted integration tests for sharesDaniel Calviño Sánchez2019-10-043-0/+100
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Do not expect a 200 HTTP status code when updating a shareDaniel Calviño Sánchez2019-10-043-2/+8
| | | | | | | | | | | | | This will be needed to test scenarios in which updating a share return a different HTTP status code, like 401. The assertion for the 200 HTTP status code was added in those scenarios that tested updating a share (that is, those that were also checking the OCS status code), but not in those in which updating a share was just a preparatory step for the actual test (in the same way that the HTTP status code is not checked in those tests when creating a share). Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Move sharing integration tests to their own directoryJohn Molakvoæ (skjnldsv)2019-10-045-0/+50
| | | | Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Add helper script to run integration tests on a Docker containerJohn Molakvoæ (skjnldsv)2019-10-041-0/+261
| | | | | | | Copied and adjusted from "tests/integration/run-docker.sh" in Talk; see its commit history for further reference. Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Move settings to an appChristoph Wurst2019-09-281-0/+1
| | | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at> Signed-off-by: npmbuildbot[bot] <npmbuildbot[bot]@users.noreply.github.com>
* Better check reshare permissions when creating a shareJoas Schilling2019-07-031-0/+60
| | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* Add integration test for increasing sub reshare permissionsDaniel Calviño Sánchez2019-06-272-0/+43
| | | | | | | | The tests check an user share and a link share; there is a slight difference in style between them as each one is based on the test above it, which tests increasing reshare permissions. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Do not create folders with admin userDaniel Calviño Sánchez2019-06-271-3/+5
| | | | | | | | | | The admin user is not deleted after each integration test is run, so folders created by the admin user in one test are still there when the next tests run; tests should be independent one from each other, so a regular user that is created and deleted for each test should be used instead. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* add LDAP integr. test for receiving share candidates with group limitationArthur Schiwon2019-06-149-102/+106
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* set the ldapGroupMemberAssocAttr for group testsArthur Schiwon2019-05-222-6/+10
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* Add integration tests for updating folder sharesJulius Härtl2019-04-162-0/+49
| | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* add an integration test that ensures deletion of LDAP usersArthur Schiwon2019-03-141-0/+10
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* Disable failing federated sharing testsMorris Jobke2019-03-131-31/+31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fails with: * build/integration/federation_features/federated.feature:183 * build/integration/federation_features/federated.feature:232 * build/integration/federation_features/federated.feature:247 * build/integration/federation_features/federated.feature:263 <details><summary>Show full log</summary> ``` Scenario: Reshare a federated shared file # /drone/src/github.com/nextcloud/server/build/integration/federation_features/federated.feature:183 Given Using server "REMOTE" # FederationContext::usingServer() And user "user1" exists # FederationContext::assureUserExists() And user "user2" exists # FederationContext::assureUserExists() And Using server "LOCAL" # FederationContext::usingServer() And user "user0" exists # FederationContext::assureUserExists() And User "user0" from server "LOCAL" shares "/textfile0.txt" with user "user1" from server "REMOTE" # FederationContext::federateSharing() And User "user1" from server "REMOTE" accepts last pending share # FederationContext::acceptLastPendingShare() And Using server "REMOTE" # FederationContext::usingServer() And As an "user1" # FederationContext::asAn() When creating a share with # FederationContext::creatingShare() | path | /textfile0 (2).txt | | shareType | 0 | | shareWith | user2 | | permissions | 19 | Then the OCS status code should be "100" # FederationContext::theOCSStatusCodeShouldBe() Failed asserting that SimpleXMLElement Object &000000007d8e0d3c00000000403fd08a ( 0 => '404' ) matches expected '100'. ... {"message":"Can not find share with ID: 8"} Scenario: Overwrite a federated shared folder as recipient # /drone/src/github.com/nextcloud/server/build/integration/federation_features/federated.feature:232 Given Using server "REMOTE" # FederationContext::usingServer() And user "user1" exists # FederationContext::assureUserExists() And user "user2" exists # FederationContext::assureUserExists() And Using server "LOCAL" # FederationContext::usingServer() And user "user0" exists # FederationContext::assureUserExists() And User "user0" from server "LOCAL" shares "/PARENT" with user "user1" from server "REMOTE" # FederationContext::federateSharing() And User "user1" from server "REMOTE" accepts last pending share # FederationContext::acceptLastPendingShare() And Using server "REMOTE" # FederationContext::usingServer() And As an "user1" # FederationContext::asAn() And User "user1" modifies text of "/textfile0.txt" with text "BLABLABLA" # FederationContext::modifyTextOfFile() When User "user1" uploads file "../../data/user1/files/textfile0.txt" to "/PARENT (2)/textfile0.txt" # FederationContext::userUploadsAFileTo() Client error: `PUT http://localhost:8180/remote.php/webdav/PARENT%20(2)/textfile0.txt` resulted in a `404 Not Found` response: <?xml version="1.0" encoding="utf-8"?> <d:error xmlns:d="DAV:" xmlns:s="http://sabredav.org/ns"> <s:exception>Sabre\DA (truncated...) (GuzzleHttp\Exception\ClientException) ... {"message":"Can not find share with ID: 10"} Scenario: Overwrite a federated shared file as recipient using old chunking # /drone/src/github.com/nextcloud/server/build/integration/federation_features/federated.feature:247 Given Using server "REMOTE" # FederationContext::usingServer() And user "user1" exists # FederationContext::assureUserExists() And user "user2" exists # FederationContext::assureUserExists() And Using server "LOCAL" # FederationContext::usingServer() And user "user0" exists # FederationContext::assureUserExists() And User "user0" from server "LOCAL" shares "/textfile0.txt" with user "user1" from server "REMOTE" # FederationContext::federateSharing() And User "user1" from server "REMOTE" accepts last pending share # FederationContext::acceptLastPendingShare() And Using server "REMOTE" # FederationContext::usingServer() And As an "user1" # FederationContext::asAn() And user "user1" uploads chunk file "1" of "3" with "AAAAA" to "/textfile0 (2).txt" # FederationContext::userUploadsChunkFileOfWithToWithChecksum() Client error: `PUT http://localhost:8180/remote.php/webdav/textfile0%20(2).txt-chunking-42-3-0` resulted in a `404 Not Found` response: <?xml version="1.0" encoding="utf-8"?> <d:error xmlns:d="DAV:" xmlns:s="http://sabredav.org/ns"> <s:exception>Sabre\DA (truncated...) (GuzzleHttp\Exception\ClientException) ... {"message":"Can not find share with ID: 11"} Scenario: Overwrite a federated shared folder as recipient using old chunking # /drone/src/github.com/nextcloud/server/build/integration/federation_features/federated.feature:263 Given Using server "REMOTE" # FederationContext::usingServer() And user "user1" exists # FederationContext::assureUserExists() And user "user2" exists # FederationContext::assureUserExists() And Using server "LOCAL" # FederationContext::usingServer() And user "user0" exists # FederationContext::assureUserExists() And User "user0" from server "LOCAL" shares "/PARENT" with user "user1" from server "REMOTE" # FederationContext::federateSharing() And User "user1" from server "REMOTE" accepts last pending share # FederationContext::acceptLastPendingShare() And Using server "REMOTE" # FederationContext::usingServer() And As an "user1" # FederationContext::asAn() And user "user1" uploads chunk file "1" of "3" with "AAAAA" to "/PARENT (2)/textfile0.txt" # FederationContext::userUploadsChunkFileOfWithToWithChecksum() Client error: `PUT http://localhost:8180/remote.php/webdav/PARENT%20(2)/textfile0.txt-chunking-42-3-0` resulted in a `404 Not Found` response: <?xml version="1.0" encoding="utf-8"?> <d:error xmlns:d="DAV:" xmlns:s="http://sabredav.org/ns"> <s:exception>Sabre\DA (truncated...) (GuzzleHttp\Exception\ClientException) ... {"message":"Can not find share with ID: 12"} ``` </details> Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* add missing config bits to integration testsArthur Schiwon2019-03-062-0/+7
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* with LDAP server set offline, config cannot be controlled via ocs anymoreArthur Schiwon2019-03-051-0/+8
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* fix nested group retrieval also for 2 other casesArthur Schiwon2019-03-052-0/+93
| | | | | | and also consolidate logic in one method Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* Add install logic for enable commandDaniel Kesselberg2019-02-191-2/+0
| | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* Strict Types, Return TypesDaniel Kesselberg2019-02-191-4/+4
| | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* Mock name for integration testDaniel Kesselberg2019-02-041-0/+1
| | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* integration test: pages search scenario with multiple basesArthur Schiwon2019-01-281-0/+22
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* typoArthur Schiwon2019-01-281-1/+1
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* Fix testsRoeland Jago Douma2018-11-011-2/+2
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Update sabre/dav requirement from 3.2.2 to 3.2.3 in /build/integrationdependabot[bot]2018-10-221-1/+1
| | | | | | | | Updates the requirements on [sabre/dav](https://github.com/sabre-io/dav) to permit the latest version. - [Release notes](https://github.com/sabre-io/dav/releases) - [Changelog](https://github.com/sabre-io/dav/blob/master/CHANGELOG.md) - [Commits](https://github.com/sabre-io/dav/commits/3.2.3) Signed-off-by: dependabot[bot] <support@dependabot.com>
* Merge pull request #11037 from nextcloud/trash-webui-davMorris Jobke2018-09-285-77/+195
|\ | | | | Use trashbin dav endpoint to list trash in webui
| * fix sharing trashbin integration testsRobin Appelman2018-09-202-3/+23
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
| * more trashbin integration testsRobin Appelman2018-09-202-26/+101
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
| * fix trashbin integration tests and add a few moreRobin Appelman2018-09-203-66/+85
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
| * quote paths in behat.ymlRobin Appelman2018-09-201-10/+10
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
| * remove old trashbin endpointRobin Appelman2018-09-201-5/+9
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
* | extend integration tests with users with numerical IDsArthur Schiwon2018-09-281-0/+31
|/ | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* Merge pull request #10663 from ↵Morris Jobke2018-08-201-1/+1
|\ | | | | | | | | nextcloud/dependabot/composer/build/integration/behat/behat-approx-3.5.0 Update behat/behat requirement from ~3.3.0 to ~3.5.0 in /build/integration
| * Update behat/behat requirement from ~3.3.0 to ~3.5.0 in /build/integrationdependabot[bot]2018-08-131-1/+1
| | | | | | | | | | | | | | | | Updates the requirements on [behat/behat](https://github.com/Behat/Behat) to permit the latest version. - [Release notes](https://github.com/Behat/Behat/releases) - [Changelog](https://github.com/Behat/Behat/blob/master/CHANGELOG.md) - [Commits](https://github.com/Behat/Behat/commits/v3.5.0) Signed-off-by: dependabot[bot] <support@dependabot.com>
* | don't add new LDAP configs if one is already presentArthur Schiwon2018-08-122-2/+8
| | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | improve fail info and disable cache for a caseArthur Schiwon2018-08-122-1/+2
| | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | Phpunit changed, use proper Assert classArthur Schiwon2018-08-121-7/+7
| | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>