summaryrefslogtreecommitdiffstats
path: root/build/integration
Commit message (Collapse)AuthorAgeFilesLines
* Update license headers for 19Christoph Wurst2020-04-2912-0/+12
| | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Merge pull request #19793 from nextcloud/bugfix/noid/link-to-federated-reshareMorris Jobke2020-04-271-3/+3
|\ | | | | Fix resharing of federated shares that were created out of links
| * Adjust integration tests to new permissionsJulius Härtl2020-04-231-3/+3
| | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | Revert "Update guzzlehttp/guzzle requirement from 6.5.2 to 6.5.3 in ↵Roeland Jago Douma2020-04-221-1/+1
|/ | | | /build/integration"
* Update guzzlehttp/guzzle requirement in /build/integrationdependabot-preview[bot]2020-04-191-1/+1
| | | | | | | | Updates the requirements on [guzzlehttp/guzzle](https://github.com/guzzle/guzzle) to permit the latest version. - [Release notes](https://github.com/guzzle/guzzle/releases) - [Changelog](https://github.com/guzzle/guzzle/blob/6.5.3/CHANGELOG.md) - [Commits](https://github.com/guzzle/guzzle/compare/6.5.2...6.5.3) Signed-off-by: dependabot-preview[bot] <support@dependabot.com>
* Merge pull request #20037 from ↵blizzz2020-04-151-0/+22
|\ | | | | | | | | nextcloud/fix/19127/deprecated-ldap_control_paged_result_1 do not use deprecated API for LDAP paged results
| * use serverControls directly with LDAP calls, fixes 19127Arthur Schiwon2020-04-141-0/+22
| | | | | | | | | | | | | | | | - adapters for PHP API version to Support PHP < 7.3 - switch to pass only one base per search - cookie logic is moved from Access to API adapters Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* | Allow local remotes in integration testsJoas Schilling2020-04-151-0/+2
|/ | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* Fix app not listed in provisioning integration testDaniel Calviño Sánchez2020-04-131-0/+1
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Format control structures, classes, methods and functionChristoph Wurst2020-04-1015-122/+90
| | | | | | | | | | | | | | | To continue this formatting madness, here's a tiny patch that adds unified formatting for control structures like if and loops as well as classes, their methods and anonymous functions. This basically forces the constructs to start on the same line. This is not exactly what PSR2 wants, but I think we can have a few exceptions with "our" style. The starting of braces on the same line is pracrically standard for our code. This also removes and empty lines from method/function bodies at the beginning and end. Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Use elseif instead of else ifChristoph Wurst2020-04-104-5/+5
| | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Make sure every file ends with an empty newlineChristoph Wurst2020-04-092-2/+0
| | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Remove trailing and in between spacesChristoph Wurst2020-04-091-2/+2
| | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Unify function spacing to PSR2 recommendationChristoph Wurst2020-04-099-29/+29
| | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Update the license headers for Nextcloud 19Christoph Wurst2020-03-315-2/+4
| | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Merge pull request #20170 from nextcloud/techdebt/remove-unused-importsChristoph Wurst2020-03-276-13/+0
|\ | | | | Remove unused imports
| * Remove unused importsChristoph Wurst2020-03-256-13/+0
| | | | | | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* | Use the short array syntax, everywhereChristoph Wurst2020-03-263-9/+9
| | | | | | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* | Use lowercase true, false and null constantsChristoph Wurst2020-03-251-12/+12
|/ | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* Force compatible EventDispatcher version in integration testsDaniel Calviño Sánchez2020-03-121-1/+2
| | | | | | | | | | | Nextcloud requires EventDispatcher from Symfony 4.4. Behat required Symfony 4.x until Behat 3.5, but since Behat 3.6 it supports Symfony 5.x too. However, as the EventDispatcher version was not restricted in the "composer.json" file Composer installed the latest compatible version with all the dependencies, which happened to be Symfony 5.x. To prevent that now the EventDispatcher is explicitly limited to Symfony 4.4 only. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Update behat/behat requirement in /build/integrationdependabot-preview[bot]2020-02-121-1/+1
| | | | | | | | Updates the requirements on [behat/behat](https://github.com/Behat/Behat) to permit the latest version. - [Release notes](https://github.com/Behat/Behat/releases) - [Changelog](https://github.com/Behat/Behat/blob/master/CHANGELOG.md) - [Commits](https://github.com/Behat/Behat/compare/v3.5.0...v3.6.1) Signed-off-by: dependabot-preview[bot] <support@dependabot.com>
* Update guzzlehttp/guzzle requirement in /build/integrationdependabot-preview[bot]2020-02-091-1/+1
| | | | | | | | Updates the requirements on [guzzlehttp/guzzle](https://github.com/guzzle/guzzle) to permit the latest version. - [Release notes](https://github.com/guzzle/guzzle/releases) - [Changelog](https://github.com/guzzle/guzzle/blob/master/CHANGELOG.md) - [Commits](https://github.com/guzzle/guzzle/compare/6.3.3...6.5.2) Signed-off-by: dependabot-preview[bot] <support@dependabot.com>
* Don't show link shares hash in inherited share listRoeland Jago Douma2020-01-151-22/+4
| | | | | | This adds no value at all. Just showing the text "(Shared link)" now. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Fix testsJohn Molakvoæ (skjnldsv)2019-12-101-0/+1
| | | | Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Update license headersChristoph Wurst2019-12-0525-33/+75
| | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
* integration testsMaxence Lange2019-12-031-0/+80
| | | | | | | | | | | | | | | Signed-off-by: Maxence Lange <maxence@artificial-owl.com> add tests on non-owner pov Signed-off-by: Maxence Lange <maxence@artificial-owl.com> duplicate Signed-off-by: Maxence Lange <maxence@artificial-owl.com> small fixes Signed-off-by: Maxence Lange <maxence@artificial-owl.com> removed tags Signed-off-by: Maxence Lange <maxence@artificial-owl.com>
* Merge pull request #18159 from nextcloud/tests/comments-integrationRoeland Jago Douma2019-12-021-2/+6
|\ | | | | Do not call count on null
| * Do not call count on nullJulius Härtl2019-11-291-2/+6
| | | | | | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* | Fix integrationRoeland Jago Douma2019-11-281-1/+1
|/ | | | Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
* Accept incoming shares in integration testsDaniel Calviño Sánchez2019-11-2012-0/+167
| | | | | | | | | Now all incoming shares need to be explicitly accepted before being able to use the shared file or get information about a reshare (although getting the information of the incoming share is possible before accepting it). Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Replace direct calls to share API with specific share stepsDaniel Calviño Sánchez2019-11-205-35/+35
| | | | | | | This makes possible to use steps that reference the last share, which will be needed to accept pending shares. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Remove extra spaces at the end of linesDaniel Calviño Sánchez2019-11-202-7/+7
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Extend data returned when searching remote sharesJohn Molakvoæ (skjnldsv)2019-10-292-2/+2
| | | | Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Add more integration tests for getting sharesDaniel Calviño Sánchez2019-10-262-2/+126
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Add integration tests for getting shares including subfilesDaniel Calviño Sánchez2019-10-252-0/+294
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Replace fully qualified name with aliasDaniel Calviño Sánchez2019-10-251-10/+11
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Fix shares read permissionsJohn Molakvoæ (skjnldsv)2019-10-042-4/+34
| | | | | | | A user with reshare permissions on a file is now able to get any share of that file (just like the owner). Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Add assorted integration tests for sharesDaniel Calviño Sánchez2019-10-043-0/+100
| | | | Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Do not expect a 200 HTTP status code when updating a shareDaniel Calviño Sánchez2019-10-043-2/+8
| | | | | | | | | | | | | This will be needed to test scenarios in which updating a share return a different HTTP status code, like 401. The assertion for the 200 HTTP status code was added in those scenarios that tested updating a share (that is, those that were also checking the OCS status code), but not in those in which updating a share was just a preparatory step for the actual test (in the same way that the HTTP status code is not checked in those tests when creating a share). Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Move sharing integration tests to their own directoryJohn Molakvoæ (skjnldsv)2019-10-045-0/+50
| | | | Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Add helper script to run integration tests on a Docker containerJohn Molakvoæ (skjnldsv)2019-10-041-0/+261
| | | | | | | Copied and adjusted from "tests/integration/run-docker.sh" in Talk; see its commit history for further reference. Signed-off-by: John Molakvoæ (skjnldsv) <skjnldsv@protonmail.com>
* Move settings to an appChristoph Wurst2019-09-281-0/+1
| | | | | Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at> Signed-off-by: npmbuildbot[bot] <npmbuildbot[bot]@users.noreply.github.com>
* Better check reshare permissions when creating a shareJoas Schilling2019-07-031-0/+60
| | | | Signed-off-by: Joas Schilling <coding@schilljs.com>
* Add integration test for increasing sub reshare permissionsDaniel Calviño Sánchez2019-06-272-0/+43
| | | | | | | | The tests check an user share and a link share; there is a slight difference in style between them as each one is based on the test above it, which tests increasing reshare permissions. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* Do not create folders with admin userDaniel Calviño Sánchez2019-06-271-3/+5
| | | | | | | | | | The admin user is not deleted after each integration test is run, so folders created by the admin user in one test are still there when the next tests run; tests should be independent one from each other, so a regular user that is created and deleted for each test should be used instead. Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
* add LDAP integr. test for receiving share candidates with group limitationArthur Schiwon2019-06-149-102/+106
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* set the ldapGroupMemberAssocAttr for group testsArthur Schiwon2019-05-222-6/+10
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* Add integration tests for updating folder sharesJulius Härtl2019-04-162-0/+49
| | | | Signed-off-by: Julius Härtl <jus@bitgrid.net>
* add an integration test that ensures deletion of LDAP usersArthur Schiwon2019-03-141-0/+10
| | | | Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
* Disable failing federated sharing testsMorris Jobke2019-03-131-31/+31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fails with: * build/integration/federation_features/federated.feature:183 * build/integration/federation_features/federated.feature:232 * build/integration/federation_features/federated.feature:247 * build/integration/federation_features/federated.feature:263 <details><summary>Show full log</summary> ``` Scenario: Reshare a federated shared file # /drone/src/github.com/nextcloud/server/build/integration/federation_features/federated.feature:183 Given Using server "REMOTE" # FederationContext::usingServer() And user "user1" exists # FederationContext::assureUserExists() And user "user2" exists # FederationContext::assureUserExists() And Using server "LOCAL" # FederationContext::usingServer() And user "user0" exists # FederationContext::assureUserExists() And User "user0" from server "LOCAL" shares "/textfile0.txt" with user "user1" from server "REMOTE" # FederationContext::federateSharing() And User "user1" from server "REMOTE" accepts last pending share # FederationContext::acceptLastPendingShare() And Using server "REMOTE" # FederationContext::usingServer() And As an "user1" # FederationContext::asAn() When creating a share with # FederationContext::creatingShare() | path | /textfile0 (2).txt | | shareType | 0 | | shareWith | user2 | | permissions | 19 | Then the OCS status code should be "100" # FederationContext::theOCSStatusCodeShouldBe() Failed asserting that SimpleXMLElement Object &000000007d8e0d3c00000000403fd08a ( 0 => '404' ) matches expected '100'. ... {"message":"Can not find share with ID: 8"} Scenario: Overwrite a federated shared folder as recipient # /drone/src/github.com/nextcloud/server/build/integration/federation_features/federated.feature:232 Given Using server "REMOTE" # FederationContext::usingServer() And user "user1" exists # FederationContext::assureUserExists() And user "user2" exists # FederationContext::assureUserExists() And Using server "LOCAL" # FederationContext::usingServer() And user "user0" exists # FederationContext::assureUserExists() And User "user0" from server "LOCAL" shares "/PARENT" with user "user1" from server "REMOTE" # FederationContext::federateSharing() And User "user1" from server "REMOTE" accepts last pending share # FederationContext::acceptLastPendingShare() And Using server "REMOTE" # FederationContext::usingServer() And As an "user1" # FederationContext::asAn() And User "user1" modifies text of "/textfile0.txt" with text "BLABLABLA" # FederationContext::modifyTextOfFile() When User "user1" uploads file "../../data/user1/files/textfile0.txt" to "/PARENT (2)/textfile0.txt" # FederationContext::userUploadsAFileTo() Client error: `PUT http://localhost:8180/remote.php/webdav/PARENT%20(2)/textfile0.txt` resulted in a `404 Not Found` response: <?xml version="1.0" encoding="utf-8"?> <d:error xmlns:d="DAV:" xmlns:s="http://sabredav.org/ns"> <s:exception>Sabre\DA (truncated...) (GuzzleHttp\Exception\ClientException) ... {"message":"Can not find share with ID: 10"} Scenario: Overwrite a federated shared file as recipient using old chunking # /drone/src/github.com/nextcloud/server/build/integration/federation_features/federated.feature:247 Given Using server "REMOTE" # FederationContext::usingServer() And user "user1" exists # FederationContext::assureUserExists() And user "user2" exists # FederationContext::assureUserExists() And Using server "LOCAL" # FederationContext::usingServer() And user "user0" exists # FederationContext::assureUserExists() And User "user0" from server "LOCAL" shares "/textfile0.txt" with user "user1" from server "REMOTE" # FederationContext::federateSharing() And User "user1" from server "REMOTE" accepts last pending share # FederationContext::acceptLastPendingShare() And Using server "REMOTE" # FederationContext::usingServer() And As an "user1" # FederationContext::asAn() And user "user1" uploads chunk file "1" of "3" with "AAAAA" to "/textfile0 (2).txt" # FederationContext::userUploadsChunkFileOfWithToWithChecksum() Client error: `PUT http://localhost:8180/remote.php/webdav/textfile0%20(2).txt-chunking-42-3-0` resulted in a `404 Not Found` response: <?xml version="1.0" encoding="utf-8"?> <d:error xmlns:d="DAV:" xmlns:s="http://sabredav.org/ns"> <s:exception>Sabre\DA (truncated...) (GuzzleHttp\Exception\ClientException) ... {"message":"Can not find share with ID: 11"} Scenario: Overwrite a federated shared folder as recipient using old chunking # /drone/src/github.com/nextcloud/server/build/integration/federation_features/federated.feature:263 Given Using server "REMOTE" # FederationContext::usingServer() And user "user1" exists # FederationContext::assureUserExists() And user "user2" exists # FederationContext::assureUserExists() And Using server "LOCAL" # FederationContext::usingServer() And user "user0" exists # FederationContext::assureUserExists() And User "user0" from server "LOCAL" shares "/PARENT" with user "user1" from server "REMOTE" # FederationContext::federateSharing() And User "user1" from server "REMOTE" accepts last pending share # FederationContext::acceptLastPendingShare() And Using server "REMOTE" # FederationContext::usingServer() And As an "user1" # FederationContext::asAn() And user "user1" uploads chunk file "1" of "3" with "AAAAA" to "/PARENT (2)/textfile0.txt" # FederationContext::userUploadsChunkFileOfWithToWithChecksum() Client error: `PUT http://localhost:8180/remote.php/webdav/PARENT%20(2)/textfile0.txt-chunking-42-3-0` resulted in a `404 Not Found` response: <?xml version="1.0" encoding="utf-8"?> <d:error xmlns:d="DAV:" xmlns:s="http://sabredav.org/ns"> <s:exception>Sabre\DA (truncated...) (GuzzleHttp\Exception\ClientException) ... {"message":"Can not find share with ID: 12"} ``` </details> Signed-off-by: Morris Jobke <hey@morrisjobke.de>