summaryrefslogtreecommitdiffstats
path: root/build/integration
Commit message (Collapse)AuthorAgeFilesLines
* Revert "[stable18] Fix password changes in link and mail shares"Morris Jobke2020-05-299-905/+11
|
* Add integration tests for video verificationDaniel Calviño Sánchez2020-05-293-0/+577
| | | | | | | | | | | | | | Enabling the "send password by Talk" property of shares require that Talk is installed and enabled, so the Drone step that runs them has to first clone the Talk repository. When the integration tests are run on a local development instance, however, it is not guaranteed that Talk is installed. Due to this the "@Talk" tag was added, which ensures that any feature or scenario marked with it will first check if Talk is installed and, if not, skip the scenario (instead of failing). Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Add integration tests for creating and updating a mail shareDaniel Calviño Sánchez2020-05-295-1/+307
| | | | | | | | | | | | | | | | | | | | | In most cases, when a mail share is created or updated an e-mail is sent to the sharee, which is done by connecting to the SMTP server set in the configuration. If the server can not be contacted then the creation or update of the mail share fails. To make possible to test mail shares without using a real SMTP server a fake one has been added. The original script, which is MIT licensed, was based on inetd, so it was slightly modified to run on its own. In order to use it from the integration tests the "Given dummy mail server is listening" step has to be called in the scenarios in which the mail server is needed. For now that is the only available step; things like checking the sent mails, while possible (as the script can log the mails to certain file), have not been added yet. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Generalize integration test steps to download last shareDaniel Calviño Sánchez2020-05-292-4/+18
| | | | | | | Note that the "last link share can be downloaded" step was kept as it tests the "url" property specific of link shares. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Remove unused variablesDaniel Calviño Sánchez2020-05-292-10/+7
| | | | | | The step names were adjusted accordingly. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Update public link share permission codeRoeland Jago Douma2020-05-261-2/+2
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Adjust integration tests to new permissionsJulius Härtl2020-05-261-3/+3
| | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* Don't show link shares hash in inherited share listRoeland Jago Douma2020-01-151-22/+4
| | | | | | This adds no value at all. Just showing the text "(Shared link)" now. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Fix testsJohn Molakvoæ (skjnldsv)2019-12-101-0/+1
| | | | Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Update license headersChristoph Wurst2019-12-0525-33/+75
| | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* integration testsMaxence Lange2019-12-031-0/+80
| | | | | | | | | | | | | | | Signed-off-by: Maxence Lange <maxence@artificial-owl.com> add tests on non-owner pov Signed-off-by: Maxence Lange <maxence@artificial-owl.com> duplicate Signed-off-by: Maxence Lange <maxence@artificial-owl.com> small fixes Signed-off-by: Maxence Lange <maxence@artificial-owl.com> removed tags Signed-off-by: Maxence Lange <maxence@artificial-owl.com>
* Merge pull request #18159 from nextcloud/tests/comments-integrationRoeland Jago Douma2019-12-021-2/+6
|\ | | | | Do not call count on null
| * Do not call count on nullJulius Härtl2019-11-291-2/+6
| | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | Fix integrationRoeland Jago Douma2019-11-281-1/+1
|/ | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Accept incoming shares in integration testsDaniel Calviño Sánchez2019-11-2012-0/+167
| | | | | | | | | Now all incoming shares need to be explicitly accepted before being able to use the shared file or get information about a reshare (although getting the information of the incoming share is possible before accepting it). Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Replace direct calls to share API with specific share stepsDaniel Calviño Sánchez2019-11-205-35/+35
| | | | | | | This makes possible to use steps that reference the last share, which will be needed to accept pending shares. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Remove extra spaces at the end of linesDaniel Calviño Sánchez2019-11-202-7/+7
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Extend data returned when searching remote sharesJohn Molakvoæ (skjnldsv)2019-10-292-2/+2
| | | | Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Add more integration tests for getting sharesDaniel Calviño Sánchez2019-10-262-2/+126
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Add integration tests for getting shares including subfilesDaniel Calviño Sánchez2019-10-252-0/+294
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Replace fully qualified name with aliasDaniel Calviño Sánchez2019-10-251-10/+11
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Fix shares read permissionsJohn Molakvoæ (skjnldsv)2019-10-042-4/+34
| | | | | | | A user with reshare permissions on a file is now able to get any share of that file (just like the owner). Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Add assorted integration tests for sharesDaniel Calviño Sánchez2019-10-043-0/+100
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Do not expect a 200 HTTP status code when updating a shareDaniel Calviño Sánchez2019-10-043-2/+8
| | | | | | | | | | | | | This will be needed to test scenarios in which updating a share return a different HTTP status code, like 401. The assertion for the 200 HTTP status code was added in those scenarios that tested updating a share (that is, those that were also checking the OCS status code), but not in those in which updating a share was just a preparatory step for the actual test (in the same way that the HTTP status code is not checked in those tests when creating a share). Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Move sharing integration tests to their own directoryJohn Molakvoæ (skjnldsv)2019-10-045-0/+50
| | | | Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Add helper script to run integration tests on a Docker containerJohn Molakvoæ (skjnldsv)2019-10-041-0/+261
| | | | | | | Copied and adjusted from "tests/integration/run-docker.sh" in Talk; see its commit history for further reference. Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Move settings to an appChristoph Wurst2019-09-281-0/+1
| | | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at> Signed-off-by: npmbuildbot[bot] <npmbuildbot[bot]@users.noreply.github.com>
* Better check reshare permissions when creating a shareJoas Schilling2019-07-031-0/+60
| | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* Add integration test for increasing sub reshare permissionsDaniel Calviño Sánchez2019-06-272-0/+43
| | | | | | | | The tests check an user share and a link share; there is a slight difference in style between them as each one is based on the test above it, which tests increasing reshare permissions. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Do not create folders with admin userDaniel Calviño Sánchez2019-06-271-3/+5
| | | | | | | | | | The admin user is not deleted after each integration test is run, so folders created by the admin user in one test are still there when the next tests run; tests should be independent one from each other, so a regular user that is created and deleted for each test should be used instead. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* add LDAP integr. test for receiving share candidates with group limitationArthur Schiwon2019-06-149-102/+106
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* set the ldapGroupMemberAssocAttr for group testsArthur Schiwon2019-05-222-6/+10
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* Add integration tests for updating folder sharesJulius Härtl2019-04-162-0/+49
| | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* add an integration test that ensures deletion of LDAP usersArthur Schiwon2019-03-141-0/+10
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* Disable failing federated sharing testsMorris Jobke2019-03-131-31/+31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fails with: * build/integration/federation_features/federated.feature:183 * build/integration/federation_features/federated.feature:232 * build/integration/federation_features/federated.feature:247 * build/integration/federation_features/federated.feature:263 <details><summary>Show full log</summary> ``` Scenario: Reshare a federated shared file # /drone/src/github.com/nextcloud/server/build/integration/federation_features/federated.feature:183 Given Using server "REMOTE" # FederationContext::usingServer() And user "user1" exists # FederationContext::assureUserExists() And user "user2" exists # FederationContext::assureUserExists() And Using server "LOCAL" # FederationContext::usingServer() And user "user0" exists # FederationContext::assureUserExists() And User "user0" from server "LOCAL" shares "/textfile0.txt" with user "user1" from server "REMOTE" # FederationContext::federateSharing() And User "user1" from server "REMOTE" accepts last pending share # FederationContext::acceptLastPendingShare() And Using server "REMOTE" # FederationContext::usingServer() And As an "user1" # FederationContext::asAn() When creating a share with # FederationContext::creatingShare() | path | /textfile0 (2).txt | | shareType | 0 | | shareWith | user2 | | permissions | 19 | Then the OCS status code should be "100" # FederationContext::theOCSStatusCodeShouldBe() Failed asserting that SimpleXMLElement Object &000000007d8e0d3c00000000403fd08a ( 0 => '404' ) matches expected '100'. ... {"message":"Can not find share with ID: 8"} Scenario: Overwrite a federated shared folder as recipient # /drone/src/github.com/nextcloud/server/build/integration/federation_features/federated.feature:232 Given Using server "REMOTE" # FederationContext::usingServer() And user "user1" exists # FederationContext::assureUserExists() And user "user2" exists # FederationContext::assureUserExists() And Using server "LOCAL" # FederationContext::usingServer() And user "user0" exists # FederationContext::assureUserExists() And User "user0" from server "LOCAL" shares "/PARENT" with user "user1" from server "REMOTE" # FederationContext::federateSharing() And User "user1" from server "REMOTE" accepts last pending share # FederationContext::acceptLastPendingShare() And Using server "REMOTE" # FederationContext::usingServer() And As an "user1" # FederationContext::asAn() And User "user1" modifies text of "/textfile0.txt" with text "BLABLABLA" # FederationContext::modifyTextOfFile() When User "user1" uploads file "../../data/user1/files/textfile0.txt" to "/PARENT (2)/textfile0.txt" # FederationContext::userUploadsAFileTo() Client error: `PUT http://localhost:8180/remote.php/webdav/PARENT%20(2)/textfile0.txt` resulted in a `404 Not Found` response: <?xml version="1.0" encoding="utf-8"?> <d:error xmlns:d="DAV:" xmlns:s="http://sabredav.org/ns"> <s:exception>Sabre\DA (truncated...) (GuzzleHttp\Exception\ClientException) ... {"message":"Can not find share with ID: 10"} Scenario: Overwrite a federated shared file as recipient using old chunking # /drone/src/github.com/nextcloud/server/build/integration/federation_features/federated.feature:247 Given Using server "REMOTE" # FederationContext::usingServer() And user "user1" exists # FederationContext::assureUserExists() And user "user2" exists # FederationContext::assureUserExists() And Using server "LOCAL" # FederationContext::usingServer() And user "user0" exists # FederationContext::assureUserExists() And User "user0" from server "LOCAL" shares "/textfile0.txt" with user "user1" from server "REMOTE" # FederationContext::federateSharing() And User "user1" from server "REMOTE" accepts last pending share # FederationContext::acceptLastPendingShare() And Using server "REMOTE" # FederationContext::usingServer() And As an "user1" # FederationContext::asAn() And user "user1" uploads chunk file "1" of "3" with "AAAAA" to "/textfile0 (2).txt" # FederationContext::userUploadsChunkFileOfWithToWithChecksum() Client error: `PUT http://localhost:8180/remote.php/webdav/textfile0%20(2).txt-chunking-42-3-0` resulted in a `404 Not Found` response: <?xml version="1.0" encoding="utf-8"?> <d:error xmlns:d="DAV:" xmlns:s="http://sabredav.org/ns"> <s:exception>Sabre\DA (truncated...) (GuzzleHttp\Exception\ClientException) ... {"message":"Can not find share with ID: 11"} Scenario: Overwrite a federated shared folder as recipient using old chunking # /drone/src/github.com/nextcloud/server/build/integration/federation_features/federated.feature:263 Given Using server "REMOTE" # FederationContext::usingServer() And user "user1" exists # FederationContext::assureUserExists() And user "user2" exists # FederationContext::assureUserExists() And Using server "LOCAL" # FederationContext::usingServer() And user "user0" exists # FederationContext::assureUserExists() And User "user0" from server "LOCAL" shares "/PARENT" with user "user1" from server "REMOTE" # FederationContext::federateSharing() And User "user1" from server "REMOTE" accepts last pending share # FederationContext::acceptLastPendingShare() And Using server "REMOTE" # FederationContext::usingServer() And As an "user1" # FederationContext::asAn() And user "user1" uploads chunk file "1" of "3" with "AAAAA" to "/PARENT (2)/textfile0.txt" # FederationContext::userUploadsChunkFileOfWithToWithChecksum() Client error: `PUT http://localhost:8180/remote.php/webdav/PARENT%20(2)/textfile0.txt-chunking-42-3-0` resulted in a `404 Not Found` response: <?xml version="1.0" encoding="utf-8"?> <d:error xmlns:d="DAV:" xmlns:s="http://sabredav.org/ns"> <s:exception>Sabre\DA (truncated...) (GuzzleHttp\Exception\ClientException) ... {"message":"Can not find share with ID: 12"} ``` </details> Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* add missing config bits to integration testsArthur Schiwon2019-03-062-0/+7
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* with LDAP server set offline, config cannot be controlled via ocs anymoreArthur Schiwon2019-03-051-0/+8
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* fix nested group retrieval also for 2 other casesArthur Schiwon2019-03-052-0/+93
| | | | | | and also consolidate logic in one method Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* Add install logic for enable commandDaniel Kesselberg2019-02-191-2/+0
| | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* Strict Types, Return TypesDaniel Kesselberg2019-02-191-4/+4
| | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* Mock name for integration testDaniel Kesselberg2019-02-041-0/+1
| | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* integration test: pages search scenario with multiple basesArthur Schiwon2019-01-281-0/+22
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* typoArthur Schiwon2019-01-281-1/+1
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* Fix testsRoeland Jago Douma2018-11-011-2/+2
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Update sabre/dav requirement from 3.2.2 to 3.2.3 in /build/integrationdependabot[bot]2018-10-221-1/+1
| | | | | | | | Updates the requirements on [sabre/dav](https://github.com/sabre-io/dav) to permit the latest version. - [Release notes](https://github.com/sabre-io/dav/releases) - [Changelog](https://github.com/sabre-io/dav/blob/master/CHANGELOG.md) - [Commits](https://github.com/sabre-io/dav/commits/3.2.3) Signed-off-by: dependabot[bot] <support@dependabot.com>
* Merge pull request #11037 from nextcloud/trash-webui-davMorris Jobke2018-09-285-77/+195
|\ | | | | Use trashbin dav endpoint to list trash in webui
| * fix sharing trashbin integration testsRobin Appelman2018-09-202-3/+23
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
| * more trashbin integration testsRobin Appelman2018-09-202-26/+101
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
| * fix trashbin integration tests and add a few moreRobin Appelman2018-09-203-66/+85
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
| * quote paths in behat.ymlRobin Appelman2018-09-201-10/+10
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>