From 57c78b0a19b4fa82e10218e3177e59620085c6bd Mon Sep 17 00:00:00 2001 From: Saw-jan Date: Mon, 31 Jul 2023 12:47:07 +0545 Subject: [PATCH] skip new behavior tests for reva-master --- .../acceptance/features/apiSpaces/resharing.feature | 6 +++--- .../features/apiSpacesShares/shareSpaces.feature | 4 ++-- .../apiSpacesShares/shareSpacesViaLink.feature | 2 +- .../apiSpacesShares/shareSubItemOfSpace.feature | 2 +- .../shareSubItemOfSpaceViaPublicLink.feature | 2 +- .../reShareAsPublicLinkToSharesNewDav.feature | 12 ++++++------ .../updatePublicLinkShare.feature | 4 ++-- .../coreApiShareReshareToShares1/reShare.feature | 10 +++++----- .../reShareSubfolder.feature | 4 ++-- .../reShareUpdate.feature | 2 +- 10 files changed, 24 insertions(+), 24 deletions(-) diff --git a/tests/acceptance/features/apiSpaces/resharing.feature b/tests/acceptance/features/apiSpaces/resharing.feature index c17d53750..879960b99 100644 --- a/tests/acceptance/features/apiSpaces/resharing.feature +++ b/tests/acceptance/features/apiSpaces/resharing.feature @@ -54,7 +54,7 @@ Feature: Resharing And user "Carol" should be included in the response And user "Damian" should be included in the response - + @skipOnRevaMaster Scenario: user can't share with more permissions than they have When user "Damian" shares folder "Shares/folder" with user "Ember" with permissions "31" using the sharing API Then the OCS status code should be "403" @@ -88,7 +88,7 @@ Feature: Resharing | Brian | 998 | should exist | | Carol | 100 | should not exist | - + @skipOnRevaMaster Scenario Outline: resharing folder with different permissions When user "" shares folder "Shares/folder" with user "Ember" with permissions "" using the sharing API Then the OCS status code should be "" @@ -100,7 +100,7 @@ Feature: Resharing | Damian | 27 | 403 | | Damian | 31 | 403 | - + @skipOnRevaMaster Scenario Outline: Resharing files with different permissions Given user "Alice" has uploaded file with content "Random data" to "/file.txt" And user "Alice" has shared file "/file.txt" with user "Brian" with permissions "" diff --git a/tests/acceptance/features/apiSpacesShares/shareSpaces.feature b/tests/acceptance/features/apiSpacesShares/shareSpaces.feature index 84a0f6a01..5db7e9ce2 100644 --- a/tests/acceptance/features/apiSpacesShares/shareSpaces.feature +++ b/tests/acceptance/features/apiSpacesShares/shareSpaces.feature @@ -131,7 +131,7 @@ Feature: Share spaces | editor | | viewer | - + @skipOnRevaMaster Scenario Outline: user with editor or viewer role cannot share a space to another user Given user "Alice" has shared a space "share space" with settings: | shareWith | Brian | @@ -172,7 +172,7 @@ Feature: Share spaces | manager | editor | | manager | viewer | - + @skipOnRevaMaster Scenario Outline: user without manager role cannot change the role of space members Given user "Alice" has shared a space "share space" with settings: | shareWith | Brian | diff --git a/tests/acceptance/features/apiSpacesShares/shareSpacesViaLink.feature b/tests/acceptance/features/apiSpacesShares/shareSpacesViaLink.feature index ebc4cafb5..42605ac17 100644 --- a/tests/acceptance/features/apiSpacesShares/shareSpacesViaLink.feature +++ b/tests/acceptance/features/apiSpacesShares/shareSpacesViaLink.feature @@ -70,7 +70,7 @@ Feature: Share spaces via link And for user "Alice" the space "share space" should contain these entries: | lorem.txt | - + @skipOnRevaMaster Scenario Outline: user without manager role cannot share a space to public via link Given user "Alice" has shared a space "share space" with settings: | shareWith | Brian | diff --git a/tests/acceptance/features/apiSpacesShares/shareSubItemOfSpace.feature b/tests/acceptance/features/apiSpacesShares/shareSubItemOfSpace.feature index 4d78fd802..5c697e13a 100644 --- a/tests/acceptance/features/apiSpacesShares/shareSubItemOfSpace.feature +++ b/tests/acceptance/features/apiSpacesShares/shareSubItemOfSpace.feature @@ -65,7 +65,7 @@ Feature: Share a file or folder that is inside a space | file.txt | file | viewer | 2042-03-25T23:59:59+0100 | 2042-03-25 | | file.txt | file | editor | | | - + @skipOnRevaMaster Scenario Outline: user participant of the project space without space manager role cannot share an entity to another user Given user "Alice" has shared a space "share sub-item" with settings: | shareWith | Brian | diff --git a/tests/acceptance/features/apiSpacesShares/shareSubItemOfSpaceViaPublicLink.feature b/tests/acceptance/features/apiSpacesShares/shareSubItemOfSpaceViaPublicLink.feature index 70ed2a0a6..eed669352 100644 --- a/tests/acceptance/features/apiSpacesShares/shareSubItemOfSpaceViaPublicLink.feature +++ b/tests/acceptance/features/apiSpacesShares/shareSubItemOfSpaceViaPublicLink.feature @@ -96,7 +96,7 @@ Feature: Share a file or folder that is inside a space via public link | folder | /folder | folder | httpd/unix-directory | | folder/file.txt | /file.txt | file | text/plain | - + @skipOnRevaMaster Scenario Outline: user participant of the project space without space manager role cannot share an entity inside project space via public link Given user "Alice" has shared a space "share sub-item" with settings: | shareWith | Brian | diff --git a/tests/acceptance/features/coreApiSharePublicLink2/reShareAsPublicLinkToSharesNewDav.feature b/tests/acceptance/features/coreApiSharePublicLink2/reShareAsPublicLinkToSharesNewDav.feature index 184231645..e1eac3261 100644 --- a/tests/acceptance/features/coreApiSharePublicLink2/reShareAsPublicLinkToSharesNewDav.feature +++ b/tests/acceptance/features/coreApiSharePublicLink2/reShareAsPublicLinkToSharesNewDav.feature @@ -10,7 +10,7 @@ Feature: reshare as public link | Alice | | Brian | - + @skipOnRevaMaster Scenario Outline: creating a public link from a share with read permission only is not allowed Given using OCS API version "" And user "Alice" has created folder "/test" @@ -46,7 +46,7 @@ Feature: reshare as public link | 1 | 100 | | 2 | 200 | - + @skipOnRevaMaster Scenario Outline: creating an upload public link from a share with share+read only permissions is not allowed Given using OCS API version "" And user "Alice" has created folder "/test" @@ -63,7 +63,7 @@ Feature: reshare as public link | 1 | 200 | | 2 | 403 | - + @skipOnRevaMaster Scenario Outline: creating a public link from a share with read+write permissions only is not allowed Given using OCS API version "" And user "Alice" has created folder "/test" @@ -120,7 +120,7 @@ Feature: reshare as public link | 1 | 100 | | 2 | 200 | - + @skipOnRevaMaster Scenario Outline: creating an upload public link from a sub-folder of a share with share+read only permissions is not allowed Given using OCS API version "" And user "Alice" has created folder "/test" @@ -138,7 +138,7 @@ Feature: reshare as public link | 1 | 200 | | 2 | 403 | - + @skipOnRevaMaster Scenario Outline: increasing permissions of a public link of a share with share+read only permissions is not allowed Given using OCS API version "" And user "Alice" has created folder "/test" @@ -159,7 +159,7 @@ Feature: reshare as public link | 1 | 200 | | 2 | 403 | - + @skipOnRevaMaster Scenario Outline: increasing permissions of a public link from a sub-folder of a share with share+read only permissions is not allowed Given using OCS API version "" And user "Alice" has created folder "/test" diff --git a/tests/acceptance/features/coreApiSharePublicLink3/updatePublicLinkShare.feature b/tests/acceptance/features/coreApiSharePublicLink3/updatePublicLinkShare.feature index caeae169f..961d3faeb 100644 --- a/tests/acceptance/features/coreApiSharePublicLink3/updatePublicLinkShare.feature +++ b/tests/acceptance/features/coreApiSharePublicLink3/updatePublicLinkShare.feature @@ -246,7 +246,7 @@ Feature: update a public link share | 1 | 100 | | 2 | 200 | - + @skipOnRevaMaster Scenario Outline: adding public upload to a read only shared folder as recipient is not allowed using the public API Given using OCS API version "" And user "Brian" has been created with default attributes and without skeleton files @@ -288,7 +288,7 @@ Feature: update a public link share | 1 | 100 | | 2 | 200 | - + @skipOnRevaMaster Scenario Outline: adding public link with all permissions to a read only shared folder as recipient is not allowed using the public API Given using OCS API version "" And user "Brian" has been created with default attributes and without skeleton files diff --git a/tests/acceptance/features/coreApiShareReshareToShares1/reShare.feature b/tests/acceptance/features/coreApiShareReshareToShares1/reShare.feature index 926f7da7f..c84136819 100644 --- a/tests/acceptance/features/coreApiShareReshareToShares1/reShare.feature +++ b/tests/acceptance/features/coreApiShareReshareToShares1/reShare.feature @@ -11,7 +11,7 @@ Feature: sharing | Brian | | Carol | - @smokeTest + @smokeTest @skipOnRevaMaster Scenario Outline: user is not allowed to reshare file when reshare permission is not given Given using OCS API version "" And user "Alice" has uploaded file "filesForUpload/textfile.txt" to "/textfile0.txt" @@ -28,7 +28,7 @@ Feature: sharing | 1 | 200 | | 2 | 403 | - + @skipOnRevaMaster Scenario Outline: user is not allowed to reshare folder when reshare permission is not given Given using OCS API version "" And user "Alice" has created folder "/FOLDER" @@ -109,7 +109,7 @@ Feature: sharing | 1 | 100 | | 2 | 200 | - + @skipOnRevaMaster Scenario Outline: user is not allowed to reshare file and set more permissions bits Given using OCS API version "" And user "Alice" has uploaded file "filesForUpload/textfile.txt" to "/textfile0.txt" @@ -179,7 +179,7 @@ Feature: sharing | 1 | 100 | 17 | 9 | 1 | | 2 | 200 | 17 | 9 | 1 | - + @skipOnRevaMaster Scenario Outline: user is not allowed to reshare folder and set more permissions bits Given using OCS API version "" And user "Alice" has created folder "/PARENT" @@ -220,7 +220,7 @@ Feature: sharing | 1 | 200 | 19 | 15 | | 2 | 403 | 19 | 15 | - + @skipOnRevaMaster Scenario Outline: user is not allowed to reshare folder and add delete permission bit (8) Given using OCS API version "" And user "Alice" has created folder "/PARENT" diff --git a/tests/acceptance/features/coreApiShareReshareToShares2/reShareSubfolder.feature b/tests/acceptance/features/coreApiShareReshareToShares2/reShareSubfolder.feature index d70a66e1a..b2ee4c9a6 100644 --- a/tests/acceptance/features/coreApiShareReshareToShares2/reShareSubfolder.feature +++ b/tests/acceptance/features/coreApiShareReshareToShares2/reShareSubfolder.feature @@ -29,7 +29,7 @@ Feature: a subfolder of a received share can be reshared | 1 | 100 | | 2 | 200 | - + @skipOnRevaMaster Scenario Outline: user is not allowed to reshare a sub-folder with more permissions Given using OCS API version "" And user "Alice" has shared folder "/TMP" with user "Brian" with permissions @@ -123,7 +123,7 @@ Feature: a subfolder of a received share can be reshared | 1 | 100 | | 2 | 200 | - @issue-2214 + @issue-2214 @skipOnRevaMaster Scenario Outline: user is not allowed to update reshare of a sub-folder with more permissions Given using OCS API version "" And user "Alice" has shared folder "/TMP" with user "Brian" with permissions "share,read" diff --git a/tests/acceptance/features/coreApiShareReshareToShares3/reShareUpdate.feature b/tests/acceptance/features/coreApiShareReshareToShares3/reShareUpdate.feature index 9be59069b..867d12cba 100644 --- a/tests/acceptance/features/coreApiShareReshareToShares3/reShareUpdate.feature +++ b/tests/acceptance/features/coreApiShareReshareToShares3/reShareUpdate.feature @@ -46,7 +46,7 @@ Feature: sharing | 1 | 100 | | 2 | 200 | - + @skipOnRevaMaster Scenario Outline: do not allow update of reshare to exceed permissions Given using OCS API version "" And user "Alice" has shared folder "/TMP" with user "Brian" with permissions "share,read"