From 24e9aacfdfbac2a82b5792ab0ed5ddad09ddf4ea Mon Sep 17 00:00:00 2001 From: prashant-gurung899 Date: Mon, 17 Mar 2025 12:07:34 +0545 Subject: [PATCH] run more local api tests in CI Signed-off-by: prashant-gurung899 --- .woodpecker.star | 14 ++++++------- ...failures-localAPI-on-decomposed-storage.md | 9 +++++++++ .../enforcePasswordPublicLink.feature | 16 +++++++-------- .../createLinkShare.feature | 20 +++++++++---------- .../updateLinkShare.feature | 4 ++-- .../createLinkShare.feature | 12 +++++------ 6 files changed, 42 insertions(+), 33 deletions(-) diff --git a/.woodpecker.star b/.woodpecker.star index 697d75b613..b8d757d419 100644 --- a/.woodpecker.star +++ b/.woodpecker.star @@ -105,7 +105,7 @@ config = { "suites": [ "apiSettings", ], - "skip": True, + "skip": False, "withRemotePhp": [True], "emailNeeded": True, "extraEnvironment": { @@ -113,7 +113,7 @@ config = { "EMAIL_PORT": "9000", }, "extraServerEnvironment": { - "OCIS_ADD_RUN_SERVICES": "notifications", + "OC_ADD_RUN_SERVICES": "notifications", "NOTIFICATIONS_SMTP_HOST": "email", "NOTIFICATIONS_SMTP_PORT": "2500", "NOTIFICATIONS_SMTP_INSECURE": True, @@ -126,14 +126,14 @@ config = { "apiGraph", "apiServiceAvailability", ], - "skip": True, + "skip": False, "withRemotePhp": [True], }, "graphUserGroup": { "suites": [ "apiGraphUserGroup", ], - "skip": True, + "skip": False, "withRemotePhp": [True], }, "spaces": { @@ -185,7 +185,7 @@ config = { "apiSharingNgLinkSharePermission", "apiSharingNgLinkShareRoot", ], - "skip": True, + "skip": False, }, "accountsHashDifficulty": { "skip": False, @@ -198,7 +198,7 @@ config = { "suites": [ "apiNotification", ], - "skip": True, + "skip": False, "withRemotePhp": [True], "emailNeeded": True, "extraEnvironment": { @@ -206,7 +206,7 @@ config = { "EMAIL_PORT": "9000", }, "extraServerEnvironment": { - "OCIS_ADD_RUN_SERVICES": "notifications", + "OC_ADD_RUN_SERVICES": "notifications", "NOTIFICATIONS_SMTP_HOST": "email", "NOTIFICATIONS_SMTP_PORT": "2500", "NOTIFICATIONS_SMTP_INSECURE": True, diff --git a/tests/acceptance/expected-failures-localAPI-on-decomposed-storage.md b/tests/acceptance/expected-failures-localAPI-on-decomposed-storage.md index 6a1e3fecbe..557b55098b 100644 --- a/tests/acceptance/expected-failures-localAPI-on-decomposed-storage.md +++ b/tests/acceptance/expected-failures-localAPI-on-decomposed-storage.md @@ -199,10 +199,19 @@ - [apiAntivirus/antivirus.feature:312](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiAntivirus/antivirus.feature#L312) - [apiAntivirus/antivirus.feature:313](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiAntivirus/antivirus.feature#L313) - [apiAntivirus/antivirus.feature:314](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiAntivirus/antivirus.feature#L314) +- [apiNotification/deprovisioningNotification.feature:126](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiNotification/deprovisioningNotification.feature#L126) - [apiNotification/deprovisioningNotification.feature:127](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiNotification/deprovisioningNotification.feature#L127) +- [apiNotification/notification.feature:282](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiNotification/notification.feature#L282) +- [apiNotification/notification.feature:283](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiNotification/notification.feature#L283) - [apiNotification/notification.feature:284](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiNotification/notification.feature#L284) - [apiNotification/notification.feature:285](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiNotification/notification.feature#L285) +- [apiNotification/notification.feature:288](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiNotification/notification.feature#L288) +- [apiNotification/spaceNotification.feature:434](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiNotification/spaceNotification.feature#L434) - [apiNotification/spaceNotification.feature:435](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiNotification/spaceNotification.feature#L435) +- [apiNotification/emailNotification.feature:84](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiNotification/emailNotification.feature#L84) +- [apiNotification/emailNotification.feature:117](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiNotification/emailNotification.feature#L117) +- [apiNotification/emailNotification.feature:150](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiNotification/emailNotification.feature#L150) +- [apiNotification/emailNotification.feature:205](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiNotification/emailNotification.feature#L205) - [apiActivities/activities.feature:2598](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiActivities/activities.feature#L2598) diff --git a/tests/acceptance/features/apiGraph/enforcePasswordPublicLink.feature b/tests/acceptance/features/apiGraph/enforcePasswordPublicLink.feature index f96c929ac8..078523f134 100644 --- a/tests/acceptance/features/apiGraph/enforcePasswordPublicLink.feature +++ b/tests/acceptance/features/apiGraph/enforcePasswordPublicLink.feature @@ -256,7 +256,7 @@ Feature: enforce password on public link Scenario Outline: update a public link with a password that is listed in the Banned-Password-List - Given the config "OC_PASSWORD_POLICY_BANNED_PASSWORDS_LIST" has been set to path "config/drone/banned-password-list.txt" + Given the config "OC_PASSWORD_POLICY_BANNED_PASSWORDS_LIST" has been set to path "config/woodpecker/banned-password-list.txt" And using OCS API version "2" And user "Alice" has been created with default attributes And user "Alice" has uploaded file with content "test file" to "/testfile.txt" @@ -272,14 +272,14 @@ Feature: enforce password on public link And the OCS status code should be "" And the OCS status message should be "" Examples: - | password | http-status-code | ocs-status-code | message | - | 123 | 400 | 400 | Unfortunately, your password is commonly used. please pick a harder-to-guess password for your safety | - | password | 400 | 400 | Unfortunately, your password is commonly used. please pick a harder-to-guess password for your safety | + | password | http-status-code | ocs-status-code | message | + | 123 | 400 | 400 | Unfortunately, your password is commonly used. please pick a harder-to-guess password for your safety | + | password | 400 | 400 | Unfortunately, your password is commonly used. please pick a harder-to-guess password for your safety | | OpenCloud | 400 | 400 | Unfortunately, your password is commonly used. please pick a harder-to-guess password for your safety | Scenario Outline: create a public link with a password that is listed in the Banned-Password-List - Given the config "OC_PASSWORD_POLICY_BANNED_PASSWORDS_LIST" has been set to path "config/drone/banned-password-list.txt" + Given the config "OC_PASSWORD_POLICY_BANNED_PASSWORDS_LIST" has been set to path "config/woodpecker/banned-password-list.txt" And using OCS API version "2" And user "Alice" has been created with default attributes And user "Alice" has uploaded file with content "test file" to "/testfile.txt" @@ -291,7 +291,7 @@ Feature: enforce password on public link And the OCS status code should be "" And the OCS status message should be "" Examples: - | password | http-status-code | ocs-status-code | message | - | 123 | 400 | 400 | Unfortunately, your password is commonly used. please pick a harder-to-guess password for your safety | - | password | 400 | 400 | Unfortunately, your password is commonly used. please pick a harder-to-guess password for your safety | + | password | http-status-code | ocs-status-code | message | + | 123 | 400 | 400 | Unfortunately, your password is commonly used. please pick a harder-to-guess password for your safety | + | password | 400 | 400 | Unfortunately, your password is commonly used. please pick a harder-to-guess password for your safety | | OpenCloud | 400 | 400 | Unfortunately, your password is commonly used. please pick a harder-to-guess password for your safety | diff --git a/tests/acceptance/features/apiSharingNgLinkSharePermission/createLinkShare.feature b/tests/acceptance/features/apiSharingNgLinkSharePermission/createLinkShare.feature index 6471344498..662dbff45d 100644 --- a/tests/acceptance/features/apiSharingNgLinkSharePermission/createLinkShare.feature +++ b/tests/acceptance/features/apiSharingNgLinkSharePermission/createLinkShare.feature @@ -502,7 +502,7 @@ Feature: Create a link share for a resource Scenario Outline: create a file's link share with a password that is listed in the Banned-Password-List using permissions endpoint - Given the config "OC_PASSWORD_POLICY_BANNED_PASSWORDS_LIST" has been set to path "config/drone/banned-password-list.txt" + Given the config "OC_PASSWORD_POLICY_BANNED_PASSWORDS_LIST" has been set to path "config/woodpecker/banned-password-list.txt" And user "Alice" has uploaded file with content "other data" to "text.txt" When user "Alice" creates the following resource link share using the Graph API: | resource | text.txt | @@ -757,7 +757,7 @@ Feature: Create a link share for a resource Scenario Outline: create a link share of a folder inside project-space with a password that is listed in the Banned-Password-List using permissions endpoint - Given the config "OC_PASSWORD_POLICY_BANNED_PASSWORDS_LIST" has been set to path "config/drone/banned-password-list.txt" + Given the config "OC_PASSWORD_POLICY_BANNED_PASSWORDS_LIST" has been set to path "config/woodpecker/banned-password-list.txt" And using spaces DAV path And the administrator has assigned the role "Space Admin" to user "Alice" using the Graph API And user "Alice" has created a space "projectSpace" with the default quota using the Graph API @@ -799,16 +799,16 @@ Feature: Create a link share for a resource | banned-password | permissions-role | | 123 | view | | password | view | - | OpenCloud | view | + | OpenCloud | view | | 123 | edit | | password | edit | - | OpenCloud | edit | + | OpenCloud | edit | | 123 | upload | | password | upload | - | OpenCloud | upload | + | OpenCloud | upload | | 123 | createOnly | | password | createOnly | - | OpenCloud | createOnly | + | OpenCloud | createOnly | @env-config @issue-7879 Scenario Outline: create a link share of a file inside project-space without password using permissions endpoint @@ -1157,7 +1157,7 @@ Feature: Create a link share for a resource Scenario Outline: create a link share of a file inside project-space with a password that is listed in the Banned-Password-List using permissions endpoint - Given the config "OC_PASSWORD_POLICY_BANNED_PASSWORDS_LIST" has been set to path "config/drone/banned-password-list.txt" + Given the config "OC_PASSWORD_POLICY_BANNED_PASSWORDS_LIST" has been set to path "config/woodpecker/banned-password-list.txt" And using spaces DAV path And the administrator has assigned the role "Space Admin" to user "Alice" using the Graph API And user "Alice" has created a space "projectSpace" with the default quota using the Graph API @@ -1199,10 +1199,10 @@ Feature: Create a link share for a resource | banned-password | permissions-role | | 123 | view | | password | view | - | OpenCloud | view | + | OpenCloud | view | | 123 | edit | | password | edit | - | OpenCloud | edit | + | OpenCloud | edit | @env-config @issue-9724 @issue-10331 Scenario: set password on a existing link share of a file inside project-space using permissions endpoint @@ -1612,7 +1612,7 @@ Feature: Create a link share for a resource Scenario Outline: try to create a link share of a project-space with a password that is listed in the Banned-Password-List using permissions endpoint - Given the config "OC_PASSWORD_POLICY_BANNED_PASSWORDS_LIST" has been set to path "config/drone/banned-password-list.txt" + Given the config "OC_PASSWORD_POLICY_BANNED_PASSWORDS_LIST" has been set to path "config/woodpecker/banned-password-list.txt" And using spaces DAV path And the administrator has assigned the role "Space Admin" to user "Alice" using the Graph API And user "Alice" has created a space "projectSpace" with the default quota using the Graph API diff --git a/tests/acceptance/features/apiSharingNgLinkSharePermission/updateLinkShare.feature b/tests/acceptance/features/apiSharingNgLinkSharePermission/updateLinkShare.feature index 032a4b6041..649a79cccc 100644 --- a/tests/acceptance/features/apiSharingNgLinkSharePermission/updateLinkShare.feature +++ b/tests/acceptance/features/apiSharingNgLinkSharePermission/updateLinkShare.feature @@ -232,7 +232,7 @@ Feature: Update a link share for a resource Scenario Outline: update a file's link share with a password that is listed in the Banned-Password-List using permissions endpoint - Given the config "OC_PASSWORD_POLICY_BANNED_PASSWORDS_LIST" has been set to path "config/drone/banned-password-list.txt" + Given the config "OC_PASSWORD_POLICY_BANNED_PASSWORDS_LIST" has been set to path "config/woodpecker/banned-password-list.txt" And user "Alice" has uploaded file with content "other data" to "text.txt" And user "Alice" has created the following resource link share: | resource | text.txt | @@ -276,7 +276,7 @@ Feature: Update a link share for a resource | banned-password | | 123 | | password | - | OpenCloud | + | OpenCloud | @env-config @issue-9724 @issue-10331 Scenario: set password on a existing link share of a folder inside project-space using permissions endpoint diff --git a/tests/acceptance/features/apiSharingNgLinkShareRoot/createLinkShare.feature b/tests/acceptance/features/apiSharingNgLinkShareRoot/createLinkShare.feature index 256833857f..97d255ff98 100644 --- a/tests/acceptance/features/apiSharingNgLinkShareRoot/createLinkShare.feature +++ b/tests/acceptance/features/apiSharingNgLinkShareRoot/createLinkShare.feature @@ -349,7 +349,7 @@ Feature: Create a link share for a resource @issue-7879 @skip-local-run Scenario Outline: try to create a link share of a project-space drive with a password that is listed in the Banned-Password-List using root endpoint - Given the config "OC_PASSWORD_POLICY_BANNED_PASSWORDS_LIST" has been set to path "config/drone/banned-password-list.txt" + Given the config "OC_PASSWORD_POLICY_BANNED_PASSWORDS_LIST" has been set to path "config/woodpecker/banned-password-list.txt" And using spaces DAV path And the administrator has assigned the role "Space Admin" to user "Alice" using the Graph API And user "Alice" has created a space "projectSpace" with the default quota using the Graph API @@ -389,21 +389,21 @@ Feature: Create a link share for a resource | banned-password | permissions-role | | 123 | view | | password | view | - | OpenCloud | view | + | OpenCloud | view | | 123 | edit | | password | edit | - | OpenCloud | edit | + | OpenCloud | edit | | 123 | upload | | password | upload | - | OpenCloud | upload | + | OpenCloud | upload | | 123 | createOnly | | password | createOnly | - | OpenCloud | createOnly | + | OpenCloud | createOnly | @env-config @issue-7879 Scenario Outline: create a link share of a project-space drive without password using root endpoint Given the following configs have been set: - | config | value | + | config | value | | OC_SHARING_PUBLIC_SHARE_MUST_HAVE_PASSWORD | false | And using spaces DAV path And the administrator has assigned the role "Space Admin" to user "Alice" using the Graph API