summaryrefslogtreecommitdiffstats
path: root/build/integration
Commit message (Collapse)AuthorAgeFilesLines
* Better check reshare permissions when creating a shareJoas Schilling2019-07-031-0/+60
| | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* Add integration test for increasing sub reshare permissionsDaniel Calviño Sánchez2019-06-272-0/+43
| | | | | | | | The tests check an user share and a link share; there is a slight difference in style between them as each one is based on the test above it, which tests increasing reshare permissions. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Do not create folders with admin userDaniel Calviño Sánchez2019-06-271-3/+5
| | | | | | | | | | The admin user is not deleted after each integration test is run, so folders created by the admin user in one test are still there when the next tests run; tests should be independent one from each other, so a regular user that is created and deleted for each test should be used instead. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* add LDAP integr. test for receiving share candidates with group limitationArthur Schiwon2019-06-149-102/+106
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* set the ldapGroupMemberAssocAttr for group testsArthur Schiwon2019-05-222-6/+10
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* Add integration tests for updating folder sharesJulius Härtl2019-04-162-0/+49
| | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* add an integration test that ensures deletion of LDAP usersArthur Schiwon2019-03-141-0/+10
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* Disable failing federated sharing testsMorris Jobke2019-03-131-31/+31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fails with: * build/integration/federation_features/federated.feature:183 * build/integration/federation_features/federated.feature:232 * build/integration/federation_features/federated.feature:247 * build/integration/federation_features/federated.feature:263 <details><summary>Show full log</summary> ``` Scenario: Reshare a federated shared file # /drone/src/github.com/nextcloud/server/build/integration/federation_features/federated.feature:183 Given Using server "REMOTE" # FederationContext::usingServer() And user "user1" exists # FederationContext::assureUserExists() And user "user2" exists # FederationContext::assureUserExists() And Using server "LOCAL" # FederationContext::usingServer() And user "user0" exists # FederationContext::assureUserExists() And User "user0" from server "LOCAL" shares "/textfile0.txt" with user "user1" from server "REMOTE" # FederationContext::federateSharing() And User "user1" from server "REMOTE" accepts last pending share # FederationContext::acceptLastPendingShare() And Using server "REMOTE" # FederationContext::usingServer() And As an "user1" # FederationContext::asAn() When creating a share with # FederationContext::creatingShare() | path | /textfile0 (2).txt | | shareType | 0 | | shareWith | user2 | | permissions | 19 | Then the OCS status code should be "100" # FederationContext::theOCSStatusCodeShouldBe() Failed asserting that SimpleXMLElement Object &000000007d8e0d3c00000000403fd08a ( 0 => '404' ) matches expected '100'. ... {"message":"Can not find share with ID: 8"} Scenario: Overwrite a federated shared folder as recipient # /drone/src/github.com/nextcloud/server/build/integration/federation_features/federated.feature:232 Given Using server "REMOTE" # FederationContext::usingServer() And user "user1" exists # FederationContext::assureUserExists() And user "user2" exists # FederationContext::assureUserExists() And Using server "LOCAL" # FederationContext::usingServer() And user "user0" exists # FederationContext::assureUserExists() And User "user0" from server "LOCAL" shares "/PARENT" with user "user1" from server "REMOTE" # FederationContext::federateSharing() And User "user1" from server "REMOTE" accepts last pending share # FederationContext::acceptLastPendingShare() And Using server "REMOTE" # FederationContext::usingServer() And As an "user1" # FederationContext::asAn() And User "user1" modifies text of "/textfile0.txt" with text "BLABLABLA" # FederationContext::modifyTextOfFile() When User "user1" uploads file "../../data/user1/files/textfile0.txt" to "/PARENT (2)/textfile0.txt" # FederationContext::userUploadsAFileTo() Client error: `PUT http://localhost:8180/remote.php/webdav/PARENT%20(2)/textfile0.txt` resulted in a `404 Not Found` response: <?xml version="1.0" encoding="utf-8"?> <d:error xmlns:d="DAV:" xmlns:s="http://sabredav.org/ns"> <s:exception>Sabre\DA (truncated...) (GuzzleHttp\Exception\ClientException) ... {"message":"Can not find share with ID: 10"} Scenario: Overwrite a federated shared file as recipient using old chunking # /drone/src/github.com/nextcloud/server/build/integration/federation_features/federated.feature:247 Given Using server "REMOTE" # FederationContext::usingServer() And user "user1" exists # FederationContext::assureUserExists() And user "user2" exists # FederationContext::assureUserExists() And Using server "LOCAL" # FederationContext::usingServer() And user "user0" exists # FederationContext::assureUserExists() And User "user0" from server "LOCAL" shares "/textfile0.txt" with user "user1" from server "REMOTE" # FederationContext::federateSharing() And User "user1" from server "REMOTE" accepts last pending share # FederationContext::acceptLastPendingShare() And Using server "REMOTE" # FederationContext::usingServer() And As an "user1" # FederationContext::asAn() And user "user1" uploads chunk file "1" of "3" with "AAAAA" to "/textfile0 (2).txt" # FederationContext::userUploadsChunkFileOfWithToWithChecksum() Client error: `PUT http://localhost:8180/remote.php/webdav/textfile0%20(2).txt-chunking-42-3-0` resulted in a `404 Not Found` response: <?xml version="1.0" encoding="utf-8"?> <d:error xmlns:d="DAV:" xmlns:s="http://sabredav.org/ns"> <s:exception>Sabre\DA (truncated...) (GuzzleHttp\Exception\ClientException) ... {"message":"Can not find share with ID: 11"} Scenario: Overwrite a federated shared folder as recipient using old chunking # /drone/src/github.com/nextcloud/server/build/integration/federation_features/federated.feature:263 Given Using server "REMOTE" # FederationContext::usingServer() And user "user1" exists # FederationContext::assureUserExists() And user "user2" exists # FederationContext::assureUserExists() And Using server "LOCAL" # FederationContext::usingServer() And user "user0" exists # FederationContext::assureUserExists() And User "user0" from server "LOCAL" shares "/PARENT" with user "user1" from server "REMOTE" # FederationContext::federateSharing() And User "user1" from server "REMOTE" accepts last pending share # FederationContext::acceptLastPendingShare() And Using server "REMOTE" # FederationContext::usingServer() And As an "user1" # FederationContext::asAn() And user "user1" uploads chunk file "1" of "3" with "AAAAA" to "/PARENT (2)/textfile0.txt" # FederationContext::userUploadsChunkFileOfWithToWithChecksum() Client error: `PUT http://localhost:8180/remote.php/webdav/PARENT%20(2)/textfile0.txt-chunking-42-3-0` resulted in a `404 Not Found` response: <?xml version="1.0" encoding="utf-8"?> <d:error xmlns:d="DAV:" xmlns:s="http://sabredav.org/ns"> <s:exception>Sabre\DA (truncated...) (GuzzleHttp\Exception\ClientException) ... {"message":"Can not find share with ID: 12"} ``` </details> Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* add missing config bits to integration testsArthur Schiwon2019-03-062-0/+7
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* with LDAP server set offline, config cannot be controlled via ocs anymoreArthur Schiwon2019-03-051-0/+8
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* fix nested group retrieval also for 2 other casesArthur Schiwon2019-03-052-0/+93
| | | | | | and also consolidate logic in one method Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* Add install logic for enable commandDaniel Kesselberg2019-02-191-2/+0
| | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* Strict Types, Return TypesDaniel Kesselberg2019-02-191-4/+4
| | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* Mock name for integration testDaniel Kesselberg2019-02-041-0/+1
| | | | Signed-off-by: Daniel Kesselberg <mail@danielkesselberg.de>
* integration test: pages search scenario with multiple basesArthur Schiwon2019-01-281-0/+22
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* typoArthur Schiwon2019-01-281-1/+1
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* Fix testsRoeland Jago Douma2018-11-011-2/+2
| | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Update sabre/dav requirement from 3.2.2 to 3.2.3 in /build/integrationdependabot[bot]2018-10-221-1/+1
| | | | | | | | Updates the requirements on [sabre/dav](https://github.com/sabre-io/dav) to permit the latest version. - [Release notes](https://github.com/sabre-io/dav/releases) - [Changelog](https://github.com/sabre-io/dav/blob/master/CHANGELOG.md) - [Commits](https://github.com/sabre-io/dav/commits/3.2.3) Signed-off-by: dependabot[bot] <support@dependabot.com>
* Merge pull request #11037 from nextcloud/trash-webui-davMorris Jobke2018-09-285-77/+195
|\ | | | | Use trashbin dav endpoint to list trash in webui
| * fix sharing trashbin integration testsRobin Appelman2018-09-202-3/+23
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
| * more trashbin integration testsRobin Appelman2018-09-202-26/+101
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
| * fix trashbin integration tests and add a few moreRobin Appelman2018-09-203-66/+85
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
| * quote paths in behat.ymlRobin Appelman2018-09-201-10/+10
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
| * remove old trashbin endpointRobin Appelman2018-09-201-5/+9
| | | | | | | | Signed-off-by: Robin Appelman <robin@icewind.nl>
* | extend integration tests with users with numerical IDsArthur Schiwon2018-09-281-0/+31
|/ | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* Merge pull request #10663 from ↵Morris Jobke2018-08-201-1/+1
|\ | | | | | | | | nextcloud/dependabot/composer/build/integration/behat/behat-approx-3.5.0 Update behat/behat requirement from ~3.3.0 to ~3.5.0 in /build/integration
| * Update behat/behat requirement from ~3.3.0 to ~3.5.0 in /build/integrationdependabot[bot]2018-08-131-1/+1
| | | | | | | | | | | | | | | | Updates the requirements on [behat/behat](https://github.com/Behat/Behat) to permit the latest version. - [Release notes](https://github.com/Behat/Behat/releases) - [Changelog](https://github.com/Behat/Behat/blob/master/CHANGELOG.md) - [Commits](https://github.com/Behat/Behat/commits/v3.5.0) Signed-off-by: dependabot[bot] <support@dependabot.com>
* | don't add new LDAP configs if one is already presentArthur Schiwon2018-08-122-2/+8
| | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | improve fail info and disable cache for a caseArthur Schiwon2018-08-122-1/+2
| | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | Phpunit changed, use proper Assert classArthur Schiwon2018-08-121-7/+7
| | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | tests for user storage locationArthur Schiwon2018-08-103-11/+44
| | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | convert pagination testsArthur Schiwon2018-08-093-21/+83
| | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | convert connection testsArthur Schiwon2018-08-092-0/+31
| | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | fix prov testsArthur Schiwon2018-08-091-0/+1
| | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | simplify tests and move some out to a new feature as we need a pristineArthur Schiwon2018-08-092-27/+23
| | | | | | | | | | | | database for them Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | integration test to ensure entries without displayname don't cause troubleArthur Schiwon2018-08-092-12/+22
| | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | login does not save the responseArthur Schiwon2018-08-091-0/+1
| | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | convert LDAP offline and backup server integration testsArthur Schiwon2018-08-092-0/+40
| | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | integration test checking the group filterArthur Schiwon2018-08-092-0/+74
| | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | check user detailsArthur Schiwon2018-08-092-2/+29
| | | | | | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | behat integration tests for LDAP, basic setupArthur Schiwon2018-08-093-1/+36
|/ | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* Add integration test for creating room shares when Talk is not enabledDaniel Calviño Sánchez2018-08-082-0/+36
| | | | | | | | The test just ensures that the controller will gracefully reject the creation instead of failing miserably; the integration tests when Talk is enabled are in the Talk repository. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Add integration tests for searching files by commentsDaniel Calviño Sánchez2018-07-253-0/+357
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Fix transfering ownership of a share to user with same id as receiverDaniel Calviño Sánchez2018-07-241-0/+13
| | | | | | | | | When the ownership of a user share is transfered to the receiver the share is removed, as the receiver now owns the original file. However, due to a missing condition, any share with a group, link or remote with the same id as the user was removed, not only the user shares. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* add some integration testsBjoern Schiessle2018-07-112-0/+121
| | | | Signed-off-by: Bjoern Schiessle <bjoern@schiessle.org>
* Fix the behat version to 3.3.*Joas Schilling2018-07-091-1/+1
| | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* Fix integration tests for Federation 2.0Morris Jobke2018-07-041-0/+1
| | | | Signed-off-by: Morris Jobke <hey@morrisjobke.de>
* Extend integration tests to get the info of a group share as a shareeDaniel Calviño Sánchez2018-06-291-0/+73
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Check all paths for own files and sharesDaniel Calviño Sánchez2018-06-281-1/+7
| | | | | | | | Add "PARENT (2)" and its subdirectories to the paths to be checked, as before only the own "PARENT" folder was being checked, but not the shared one. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Fix filenames in sharing integration testsDaniel Calviño Sánchez2018-06-281-3/+3
| | | | | | | | | | | | | When a file is shared and the receiver of the share already has a file with the same name that file is left untouched, and "(2)" is appended to the name of the shared file. As "textfile0.txt" is included in the user folder skeleton all the users in the integration test have that file, so when it is shared the receiver sees the share as "/textfile0 (2).txt", and her own file as "/textfile0.txt". Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>