mirror of
https://github.com/opencloud-eu/opencloud.git
synced 2026-05-02 08:49:29 -05:00
Merge pull request #10348 from owncloud/run-roles-with-wrapper
[tests-only][full-ci] running secure viewer role with ocis wrapper instead of running ocis with GRAPH_AVAILABLE_ROLES
This commit is contained in:
@@ -84,9 +84,10 @@ Feature: REPORT request to Shares space
|
||||
| old |
|
||||
| new |
|
||||
|
||||
@issue-9607 @issue-10329
|
||||
@issue-9607 @issue-10329 @env-config
|
||||
Scenario Outline: check the REPORT response of a folder shared with secure viewer role
|
||||
Given using <dav-path-version> DAV path
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And user "Alice" has created folder "/secureFolder"
|
||||
And user "Alice" has uploaded file with content "secure content" to "/secureFolder/secure.txt"
|
||||
And user "Alice" has sent the following resource share invitation:
|
||||
@@ -94,7 +95,7 @@ Feature: REPORT request to Shares space
|
||||
| space | Personal |
|
||||
| sharee | Brian |
|
||||
| shareType | user |
|
||||
| permissionsRole | Secure viewer |
|
||||
| permissionsRole | Secure Viewer |
|
||||
And user "Brian" has a share "secureFolder" synced
|
||||
When user "Brian" searches for "secureFolder" using the WebDAV API
|
||||
Then the HTTP status code should be "207"
|
||||
@@ -125,16 +126,17 @@ Feature: REPORT request to Shares space
|
||||
| new |
|
||||
| spaces |
|
||||
|
||||
@issue-9607 @issue-10329
|
||||
@issue-9607 @issue-10329 @env-config
|
||||
Scenario Outline: check the REPORT response of a file shared with secure viewer role
|
||||
Given using <dav-path-version> DAV path
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And user "Alice" has uploaded file with content "secure content" to "/secure.txt"
|
||||
And user "Alice" has sent the following resource share invitation:
|
||||
| resource | secure.txt |
|
||||
| space | Personal |
|
||||
| sharee | Brian |
|
||||
| shareType | user |
|
||||
| permissionsRole | Secure viewer |
|
||||
| permissionsRole | Secure Viewer |
|
||||
And user "Brian" has a share "secure.txt" synced
|
||||
When user "Brian" searches for "secure.txt" using the WebDAV API
|
||||
Then the HTTP status code should be "207"
|
||||
|
||||
@@ -14,8 +14,8 @@ Feature: permissions role definitions
|
||||
"""
|
||||
{
|
||||
"type": "array",
|
||||
"maxItems": 8,
|
||||
"minItems": 8,
|
||||
"maxItems": 7,
|
||||
"minItems": 7,
|
||||
"uniqueItems": true,
|
||||
"items": {
|
||||
"oneOf": [
|
||||
@@ -541,78 +541,6 @@ Feature: permissions role definitions
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"type": "object",
|
||||
"required": [
|
||||
"@libre.graph.weight",
|
||||
"description",
|
||||
"displayName",
|
||||
"id",
|
||||
"rolePermissions"
|
||||
],
|
||||
"properties": {
|
||||
"@libre.graph.weight": {
|
||||
"const": 0
|
||||
},
|
||||
"description": {
|
||||
"const": "View only documents, images and PDFs. Watermarks will be applied."
|
||||
},
|
||||
"displayName": {
|
||||
"const": "Can view (secure)"
|
||||
},
|
||||
"id": {
|
||||
"const": "aa97fe03-7980-45ac-9e50-b325749fd7e6"
|
||||
},
|
||||
"rolePermissions": {
|
||||
"type": "array",
|
||||
"maxItems": 2,
|
||||
"minItems": 2,
|
||||
"uniqueItems": true,
|
||||
"items": {
|
||||
"oneOf": [
|
||||
{
|
||||
"type": "object",
|
||||
"required": [
|
||||
"allowedResourceActions",
|
||||
"condition"
|
||||
],
|
||||
"properties": {
|
||||
"allowedResourceActions": {
|
||||
"const": [
|
||||
"libre.graph/driveItem/path/read",
|
||||
"libre.graph/driveItem/children/read",
|
||||
"libre.graph/driveItem/basic/read"
|
||||
]
|
||||
},
|
||||
"condition": {
|
||||
"const": "exists @Resource.File"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"type": "object",
|
||||
"required": [
|
||||
"allowedResourceActions",
|
||||
"condition"
|
||||
],
|
||||
"properties": {
|
||||
"allowedResourceActions": {
|
||||
"const": [
|
||||
"libre.graph/driveItem/path/read",
|
||||
"libre.graph/driveItem/children/read",
|
||||
"libre.graph/driveItem/basic/read"
|
||||
]
|
||||
},
|
||||
"condition": {
|
||||
"const": "exists @Resource.Folder"
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
@@ -748,3 +676,84 @@ Feature: permissions role definitions
|
||||
}
|
||||
}
|
||||
"""
|
||||
|
||||
@env-config
|
||||
Scenario: get details of a secure viewer role definition
|
||||
Given the administrator has enabled the permissions role "Secure Viewer"
|
||||
When user "Alice" gets the "Secure Viewer" role definition using the Graph API
|
||||
Then the HTTP status code should be "200"
|
||||
And the JSON data of the response should match
|
||||
"""
|
||||
{
|
||||
"type": "object",
|
||||
"required": [
|
||||
"@libre.graph.weight",
|
||||
"description",
|
||||
"displayName",
|
||||
"id",
|
||||
"rolePermissions"
|
||||
],
|
||||
"properties": {
|
||||
"@libre.graph.weight": {
|
||||
"const": 0
|
||||
},
|
||||
"description": {
|
||||
"const": "View only documents, images and PDFs. Watermarks will be applied."
|
||||
},
|
||||
"displayName": {
|
||||
"const": "Can view (secure)"
|
||||
},
|
||||
"id": {
|
||||
"const": "aa97fe03-7980-45ac-9e50-b325749fd7e6"
|
||||
},
|
||||
"rolePermissions": {
|
||||
"type": "array",
|
||||
"maxItems": 2,
|
||||
"minItems": 2,
|
||||
"uniqueItems": true,
|
||||
"items": {
|
||||
"oneOf": [
|
||||
{
|
||||
"type": "object",
|
||||
"required": [
|
||||
"allowedResourceActions",
|
||||
"condition"
|
||||
],
|
||||
"properties": {
|
||||
"allowedResourceActions": {
|
||||
"const": [
|
||||
"libre.graph/driveItem/path/read",
|
||||
"libre.graph/driveItem/children/read",
|
||||
"libre.graph/driveItem/basic/read"
|
||||
]
|
||||
},
|
||||
"condition": {
|
||||
"const": "exists @Resource.File"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"type": "object",
|
||||
"required": [
|
||||
"allowedResourceActions",
|
||||
"condition"
|
||||
],
|
||||
"properties": {
|
||||
"allowedResourceActions": {
|
||||
"const": [
|
||||
"libre.graph/driveItem/path/read",
|
||||
"libre.graph/driveItem/children/read",
|
||||
"libre.graph/driveItem/basic/read"
|
||||
]
|
||||
},
|
||||
"condition": {
|
||||
"const": "exists @Resource.Folder"
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
"""
|
||||
@@ -209,9 +209,10 @@ Feature: lock files
|
||||
| d:lockdiscovery/d:activelock/d:lockscope/d:exclusive | |
|
||||
| d:lockdiscovery/d:activelock/oc:ownername | Brian Murphy |
|
||||
|
||||
|
||||
@env-config
|
||||
Scenario Outline: viewer cannot lock a file in the shares using file-id
|
||||
Given using spaces DAV path
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And user "Alice" has uploaded a file inside space "Alice Hansen" with content "some content" to "textfile.txt"
|
||||
And we save it into "FILEID"
|
||||
And user "Alice" has sent the following resource share invitation:
|
||||
@@ -227,7 +228,7 @@ Feature: lock files
|
||||
Examples:
|
||||
| permissions-role |
|
||||
| Viewer |
|
||||
| Secure viewer |
|
||||
| Secure Viewer |
|
||||
|
||||
|
||||
Scenario: sharee cannot lock a resource exclusively locked by a sharer
|
||||
|
||||
@@ -48,8 +48,8 @@ Feature: List a sharing permissions
|
||||
},
|
||||
"@libre.graph.permissions.roles.allowedValues": {
|
||||
"type": "array",
|
||||
"minItems": 4,
|
||||
"maxItems": 4,
|
||||
"minItems": 3,
|
||||
"maxItems": 3,
|
||||
"uniqueItems": true,
|
||||
"items": {
|
||||
"oneOf": [
|
||||
@@ -68,41 +68,6 @@ Feature: List a sharing permissions
|
||||
1
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"type": "string",
|
||||
"enum": [
|
||||
"View only documents, images and PDFs. Watermarks will be applied."
|
||||
]
|
||||
},
|
||||
"displayName": {
|
||||
"type": "string",
|
||||
"enum": [
|
||||
"Can view (secure)"
|
||||
]
|
||||
},
|
||||
"id": {
|
||||
"type": "string",
|
||||
"enum": [
|
||||
"aa97fe03-7980-45ac-9e50-b325749fd7e6"
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"type": "object",
|
||||
"required": [
|
||||
"@libre.graph.weight",
|
||||
"description",
|
||||
"displayName",
|
||||
"id"
|
||||
],
|
||||
"properties": {
|
||||
"@libre.graph.weight": {
|
||||
"type": "integer",
|
||||
"enum": [
|
||||
2
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"type": "string",
|
||||
"enum": [
|
||||
@@ -135,7 +100,7 @@ Feature: List a sharing permissions
|
||||
"@libre.graph.weight": {
|
||||
"type": "integer",
|
||||
"enum": [
|
||||
3
|
||||
2
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
@@ -170,7 +135,7 @@ Feature: List a sharing permissions
|
||||
"@libre.graph.weight": {
|
||||
"type": "integer",
|
||||
"enum": [
|
||||
4
|
||||
3
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
@@ -642,8 +607,8 @@ Feature: List a sharing permissions
|
||||
},
|
||||
"@libre.graph.permissions.roles.allowedValues": {
|
||||
"type": "array",
|
||||
"minItems": 3,
|
||||
"maxItems": 3,
|
||||
"minItems": 2,
|
||||
"maxItems": 2,
|
||||
"uniqueItems": true,
|
||||
"items": {
|
||||
"oneOf":[
|
||||
@@ -659,29 +624,6 @@ Feature: List a sharing permissions
|
||||
"@libre.graph.weight": {
|
||||
"const": 1
|
||||
},
|
||||
"description": {
|
||||
"const": "View only documents, images and PDFs. Watermarks will be applied."
|
||||
},
|
||||
"displayName": {
|
||||
"const": "Can view (secure)"
|
||||
},
|
||||
"id": {
|
||||
"const": "aa97fe03-7980-45ac-9e50-b325749fd7e6"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"type": "object",
|
||||
"required": [
|
||||
"@libre.graph.weight",
|
||||
"description",
|
||||
"displayName",
|
||||
"id"
|
||||
],
|
||||
"properties": {
|
||||
"@libre.graph.weight": {
|
||||
"const": 2
|
||||
},
|
||||
"description": {
|
||||
"const": "View and download."
|
||||
},
|
||||
@@ -703,7 +645,7 @@ Feature: List a sharing permissions
|
||||
],
|
||||
"properties": {
|
||||
"@libre.graph.weight": {
|
||||
"const": 3
|
||||
"const": 2
|
||||
},
|
||||
"description": {
|
||||
"const": "View, download and edit."
|
||||
@@ -768,34 +710,11 @@ Feature: List a sharing permissions
|
||||
},
|
||||
"@libre.graph.permissions.roles.allowedValues": {
|
||||
"type": "array",
|
||||
"minItems": 4,
|
||||
"maxItems": 4,
|
||||
"minItems": 3,
|
||||
"maxItems": 3,
|
||||
"uniqueItems": true,
|
||||
"items": {
|
||||
"oneOf":[
|
||||
{
|
||||
"type": "object",
|
||||
"required": [
|
||||
"@libre.graph.weight",
|
||||
"description",
|
||||
"displayName",
|
||||
"id"
|
||||
],
|
||||
"properties": {
|
||||
"@libre.graph.weight": {
|
||||
"const": 1
|
||||
},
|
||||
"description": {
|
||||
"const": "View only documents, images and PDFs. Watermarks will be applied."
|
||||
},
|
||||
"displayName": {
|
||||
"const": "Can view (secure)"
|
||||
},
|
||||
"id": {
|
||||
"const": "aa97fe03-7980-45ac-9e50-b325749fd7e6"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"type": "object",
|
||||
"required": [
|
||||
@@ -806,7 +725,7 @@ Feature: List a sharing permissions
|
||||
],
|
||||
"properties": {
|
||||
"@libre.graph.weight": {
|
||||
"const": 2
|
||||
"const": 1
|
||||
},
|
||||
"description": {
|
||||
"const": "View and download."
|
||||
@@ -829,7 +748,7 @@ Feature: List a sharing permissions
|
||||
],
|
||||
"properties": {
|
||||
"@libre.graph.weight": {
|
||||
"const": 3
|
||||
"const": 2
|
||||
},
|
||||
"description": {
|
||||
"const": "View, download and upload."
|
||||
@@ -852,7 +771,7 @@ Feature: List a sharing permissions
|
||||
],
|
||||
"properties": {
|
||||
"@libre.graph.weight": {
|
||||
"const": 4
|
||||
"const": 3
|
||||
},
|
||||
"description": {
|
||||
"const": "View, download, upload, edit, add and delete."
|
||||
@@ -917,8 +836,8 @@ Feature: List a sharing permissions
|
||||
},
|
||||
"@libre.graph.permissions.roles.allowedValues": {
|
||||
"type": "array",
|
||||
"minItems": 3,
|
||||
"maxItems": 3,
|
||||
"minItems": 2,
|
||||
"maxItems": 2,
|
||||
"uniqueItems": true,
|
||||
"items": {
|
||||
"oneOf":[
|
||||
@@ -934,29 +853,6 @@ Feature: List a sharing permissions
|
||||
"@libre.graph.weight": {
|
||||
"const": 1
|
||||
},
|
||||
"description": {
|
||||
"const": "View only documents, images and PDFs. Watermarks will be applied."
|
||||
},
|
||||
"displayName": {
|
||||
"const": "Can view (secure)"
|
||||
},
|
||||
"id": {
|
||||
"const": "aa97fe03-7980-45ac-9e50-b325749fd7e6"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"type": "object",
|
||||
"required": [
|
||||
"@libre.graph.weight",
|
||||
"description",
|
||||
"displayName",
|
||||
"id"
|
||||
],
|
||||
"properties": {
|
||||
"@libre.graph.weight": {
|
||||
"const": 2
|
||||
},
|
||||
"description": {
|
||||
"const": "View and download."
|
||||
},
|
||||
@@ -978,7 +874,7 @@ Feature: List a sharing permissions
|
||||
],
|
||||
"properties": {
|
||||
"@libre.graph.weight": {
|
||||
"const": 3
|
||||
"const": 2
|
||||
},
|
||||
"description": {
|
||||
"const": "View, download and edit."
|
||||
@@ -2307,3 +2203,97 @@ Feature: List a sharing permissions
|
||||
}
|
||||
}
|
||||
"""
|
||||
|
||||
@env-config
|
||||
Scenario: user lists permissions of a folder in personal space after enabling secure viewer role
|
||||
Given user "Alice" has created folder "folder"
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
When user "Alice" gets permissions list for folder "folder" of the space "Personal" using the Graph API
|
||||
Then the HTTP status code should be "200"
|
||||
And the JSON data of the response should match
|
||||
"""
|
||||
{
|
||||
"type": "object",
|
||||
"required": [
|
||||
"@libre.graph.permissions.actions.allowedValues",
|
||||
"@libre.graph.permissions.roles.allowedValues"
|
||||
],
|
||||
"properties": {
|
||||
"@libre.graph.permissions.roles.allowedValues": {
|
||||
"type": "array",
|
||||
"minItems": 4,
|
||||
"maxItems": 4,
|
||||
"uniqueItems": true,
|
||||
"items": {
|
||||
"oneOf": [
|
||||
{
|
||||
"type": "object",
|
||||
"required": [
|
||||
"@libre.graph.weight",
|
||||
"description",
|
||||
"displayName",
|
||||
"id"
|
||||
],
|
||||
"properties": {
|
||||
"@libre.graph.weight": {
|
||||
"const": 1
|
||||
},
|
||||
"description": {
|
||||
"const": "View only documents, images and PDFs. Watermarks will be applied."
|
||||
},
|
||||
"displayName": {
|
||||
"const": "Can view (secure)"
|
||||
},
|
||||
"id": {
|
||||
"const": "aa97fe03-7980-45ac-9e50-b325749fd7e6"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"type": "object",
|
||||
"required": [
|
||||
"@libre.graph.weight",
|
||||
"description",
|
||||
"displayName",
|
||||
"id"
|
||||
],
|
||||
"properties": {
|
||||
"displayName": {
|
||||
"const": "Can view"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"type": "object",
|
||||
"required": [
|
||||
"@libre.graph.weight",
|
||||
"description",
|
||||
"displayName",
|
||||
"id"
|
||||
],
|
||||
"properties": {
|
||||
"displayName": {
|
||||
"const": "Can upload"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"type": "object",
|
||||
"required": [
|
||||
"@libre.graph.weight",
|
||||
"description",
|
||||
"displayName",
|
||||
"id"
|
||||
],
|
||||
"properties": {
|
||||
"displayName": {
|
||||
"const": "Can edit"
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
"""
|
||||
@@ -137,7 +137,6 @@ Feature: resources shared by user
|
||||
| permissions-role |
|
||||
| File Editor |
|
||||
| Viewer |
|
||||
| Secure viewer |
|
||||
|
||||
|
||||
Scenario: sharer lists the file share shared from inside a folder (Personal space)
|
||||
@@ -382,7 +381,6 @@ Feature: resources shared by user
|
||||
| permissions-role |
|
||||
| Editor |
|
||||
| Viewer |
|
||||
| Secure viewer |
|
||||
|
||||
|
||||
Scenario: sharer lists the file and folder shares (Personal space)
|
||||
@@ -958,7 +956,6 @@ Feature: resources shared by user
|
||||
| permissions-role |
|
||||
| File Editor |
|
||||
| Viewer |
|
||||
| Secure viewer |
|
||||
|
||||
|
||||
Scenario: sharer lists the file share shared from inside a folder (Project space)
|
||||
@@ -1209,7 +1206,6 @@ Feature: resources shared by user
|
||||
| permissions-role |
|
||||
| Editor |
|
||||
| Viewer |
|
||||
| Secure viewer |
|
||||
|
||||
|
||||
Scenario: sharer lists the file and folder shares (Project space)
|
||||
|
||||
@@ -313,7 +313,6 @@ Feature: an user gets the resources shared to them
|
||||
| permissions-role |
|
||||
| File Editor |
|
||||
| Viewer |
|
||||
| Secure viewer |
|
||||
|
||||
|
||||
Scenario Outline: sharee lists the folder share (Personal space)
|
||||
@@ -606,7 +605,6 @@ Feature: an user gets the resources shared to them
|
||||
| permissions-role |
|
||||
| Editor |
|
||||
| Viewer |
|
||||
| Secure viewer |
|
||||
|
||||
|
||||
Scenario: sharee lists the file share received via group invitation (Personal space)
|
||||
@@ -2739,7 +2737,6 @@ Feature: an user gets the resources shared to them
|
||||
| permissions-role |
|
||||
| File Editor |
|
||||
| Viewer |
|
||||
| Secure viewer |
|
||||
|
||||
@issue-8027 @issue-8314
|
||||
Scenario Outline: sharee lists the folder share (Project space)
|
||||
@@ -2953,7 +2950,6 @@ Feature: an user gets the resources shared to them
|
||||
| permissions-role |
|
||||
| Editor |
|
||||
| Viewer |
|
||||
| Secure viewer |
|
||||
|
||||
|
||||
Scenario: sharee lists the file share received via group invitation (Project space)
|
||||
|
||||
@@ -61,16 +61,17 @@ Feature: Preview file in project space
|
||||
| filesForUpload/testavatar.png | testavatar.png |
|
||||
| filesForUpload/lorem.txt | lorem.txt |
|
||||
|
||||
|
||||
@env-config
|
||||
Scenario Outline: download preview of shared file shared via Secure viewer permission role
|
||||
Given user "Brian" has been created with default attributes and without skeleton files
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And user "Alice" has uploaded a file from "<source>" to "<destination>" via TUS inside of the space "Alice Hansen" using the WebDAV API
|
||||
And user "Alice" has sent the following resource share invitation:
|
||||
| resource | <destination> |
|
||||
| space | Personal |
|
||||
| sharee | Brian |
|
||||
| shareType | user |
|
||||
| permissionsRole | Secure viewer |
|
||||
| permissionsRole | Secure Viewer |
|
||||
And user "Brian" has a share "<destination>" synced
|
||||
When user "Brian" downloads the preview of shared resource "/Shares/<destination>" with width "32" and height "32" using the WebDAV API
|
||||
Then the HTTP status code should be "403"
|
||||
|
||||
@@ -204,6 +204,7 @@ Feature: copying file using file id
|
||||
|
||||
Scenario: sharee tries to copy a file from shares space with secure viewer to personal space
|
||||
Given user "Brian" has been created with default attributes and without skeleton files
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And user "Alice" has created folder "/folder"
|
||||
And user "Alice" has uploaded file with content "some data" to "/folder/test.txt"
|
||||
And we save it into "FILEID"
|
||||
@@ -212,7 +213,7 @@ Feature: copying file using file id
|
||||
| space | Personal |
|
||||
| sharee | Brian |
|
||||
| shareType | user |
|
||||
| permissionsRole | Secure viewer |
|
||||
| permissionsRole | Secure Viewer |
|
||||
And user "Brian" has a share "folder" synced
|
||||
When user "Brian" copies a file "/test.txt" into "/" inside space "Personal" using file-id "<<FILEID>>"
|
||||
Then the HTTP status code should be "403"
|
||||
@@ -258,9 +259,10 @@ Feature: copying file using file id
|
||||
| Uploader | Manager |
|
||||
| Uploader | Space Editor |
|
||||
|
||||
|
||||
@env-config
|
||||
Scenario Outline: sharee tries to copy a file from shares to project space
|
||||
Given user "Brian" has been created with default attributes and without skeleton files
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And the administrator has assigned the role "Space Admin" to user "Alice" using the Graph API
|
||||
And user "Alice" has created folder "/folder"
|
||||
And user "Alice" has uploaded file with content "some data" to "/folder/test.txt"
|
||||
@@ -288,9 +290,9 @@ Feature: copying file using file id
|
||||
| test.txt |
|
||||
Examples:
|
||||
| permission-role | space-role |
|
||||
| Secure viewer | Manager |
|
||||
| Secure viewer | Space Viewer |
|
||||
| Secure viewer | Space Editor |
|
||||
| Secure Viewer | Manager |
|
||||
| Secure Viewer | Space Viewer |
|
||||
| Secure Viewer | Space Editor |
|
||||
| Editor | Space Viewer |
|
||||
| Viewer | Space Viewer |
|
||||
| Uploader | Space Viewer |
|
||||
@@ -335,9 +337,10 @@ Feature: copying file using file id
|
||||
| Uploader | Editor |
|
||||
| Uploader | Uploader |
|
||||
|
||||
|
||||
@env-config
|
||||
Scenario Outline: sharee tries to copy a file between shares space
|
||||
Given user "Brian" has been created with default attributes and without skeleton files
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And user "Alice" has created folder "/share1"
|
||||
And user "Alice" has created folder "/share2"
|
||||
And user "Alice" has uploaded file with content "some data" to "/share1/test.txt"
|
||||
@@ -368,16 +371,16 @@ Feature: copying file using file id
|
||||
| test.txt |
|
||||
Examples:
|
||||
| from-share-role | to-share-role |
|
||||
| Secure viewer | Viewer |
|
||||
| Secure viewer | Editor |
|
||||
| Secure viewer | Uploader |
|
||||
| Secure viewer | Secure viewer |
|
||||
| Secure Viewer | Viewer |
|
||||
| Secure Viewer | Editor |
|
||||
| Secure Viewer | Uploader |
|
||||
| Secure Viewer | Secure Viewer |
|
||||
| Viewer | Viewer |
|
||||
| Editor | Viewer |
|
||||
| Uploader | Viewer |
|
||||
| Viewer | Secure viewer |
|
||||
| Editor | Secure viewer |
|
||||
| Uploader | Secure viewer |
|
||||
| Viewer | Secure Viewer |
|
||||
| Editor | Secure Viewer |
|
||||
| Uploader | Secure Viewer |
|
||||
|
||||
|
||||
Scenario Outline: copy a file from project to personal space
|
||||
@@ -507,9 +510,10 @@ Feature: copying file using file id
|
||||
| Space Viewer | Editor |
|
||||
| Space Viewer | Uploader |
|
||||
|
||||
|
||||
@env-config
|
||||
Scenario Outline: try to copy a file from project to shares space with read permission
|
||||
Given user "Brian" has been created with default attributes and without skeleton files
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And the administrator has assigned the role "Space Admin" to user "Alice" using the Graph API
|
||||
And user "Alice" has created a space "project-space" with the default quota using the Graph API
|
||||
And user "Alice" has uploaded a file inside space "project-space" with content "some data" to "textfile.txt"
|
||||
@@ -538,8 +542,8 @@ Feature: copying file using file id
|
||||
Examples:
|
||||
| space-role | permissions |
|
||||
| Manager | Viewer |
|
||||
| Manager | Secure viewer |
|
||||
| Manager | Secure Viewer |
|
||||
| Space Editor | Viewer |
|
||||
| Space Editor | Secure viewer |
|
||||
| Space Editor | Secure Viewer |
|
||||
| Space Viewer | Viewer |
|
||||
| Space Viewer | Secure viewer |
|
||||
| Space Viewer | Secure Viewer |
|
||||
|
||||
@@ -268,9 +268,10 @@ Feature: copy file
|
||||
| Editor |
|
||||
| Viewer |
|
||||
|
||||
@issue-9482
|
||||
@issue-9482 @env-config
|
||||
Scenario: user copies a file from share space with secure viewer role to personal space
|
||||
Given the administrator has assigned the role "Space Admin" to user "Brian" using the Graph API
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And user "Brian" has created folder "/testshare"
|
||||
And user "Brian" has uploaded file with content "testshare content" to "/testshare/testshare.txt"
|
||||
And user "Brian" has sent the following resource share invitation:
|
||||
@@ -278,7 +279,7 @@ Feature: copy file
|
||||
| space | Personal |
|
||||
| sharee | Alice |
|
||||
| shareType | user |
|
||||
| permissionsRole | Secure viewer |
|
||||
| permissionsRole | Secure Viewer |
|
||||
When user "Alice" copies file "/testshare/testshare.txt" from space "Shares" to "/testshare.txt" inside space "Personal" using the WebDAV API
|
||||
Then the HTTP status code should be "403"
|
||||
And for user "Alice" the space "Personal" should not contain these entries:
|
||||
@@ -314,9 +315,10 @@ Feature: copy file
|
||||
| Space Editor | Editor |
|
||||
| Space Editor | Viewer |
|
||||
|
||||
@issue-9482
|
||||
@issue-9482 @env-config
|
||||
Scenario Outline: user copies a file from share space with secure viewer role to project space with different role
|
||||
Given the administrator has assigned the role "Space Admin" to user "Brian" using the Graph API
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And user "Brian" has created a space "Project" with the default quota using the Graph API
|
||||
And user "Brian" has sent the following space share invitation:
|
||||
| space | Project |
|
||||
@@ -330,7 +332,7 @@ Feature: copy file
|
||||
| space | Personal |
|
||||
| sharee | Alice |
|
||||
| shareType | user |
|
||||
| permissionsRole | Secure viewer |
|
||||
| permissionsRole | Secure Viewer |
|
||||
When user "Alice" copies file "/testshare/testshare.txt" from space "Shares" to "/testshare.txt" inside space "Project" using the WebDAV API
|
||||
Then the HTTP status code should be "403"
|
||||
And for user "Alice" the space "Project" should not contain these entries:
|
||||
@@ -399,10 +401,11 @@ Feature: copy file
|
||||
| Editor |
|
||||
| Viewer |
|
||||
|
||||
@issue-9482
|
||||
Scenario Outline: user copies a file from share space with different role to share space with role viewer or Secure viewer
|
||||
@issue-9482 @env-config
|
||||
Scenario Outline: user copies a file from share space with different role to share space with role viewer or Secure Viewer
|
||||
Given user "Brian" has created folder "/testshare1"
|
||||
And user "Brian" has created folder "/testshare2"
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And user "Brian" has uploaded file with content "testshare1 content" to "/testshare1/testshare1.txt"
|
||||
And user "Brian" has sent the following resource share invitation:
|
||||
| resource | testshare1 |
|
||||
@@ -425,11 +428,11 @@ Feature: copy file
|
||||
Examples:
|
||||
| permissions-role-1 | permissions-role-2 |
|
||||
| Editor | Viewer |
|
||||
| Editor | Secure viewer |
|
||||
| Editor | Secure Viewer |
|
||||
| Viewer | Viewer |
|
||||
| Viewer | Secure viewer |
|
||||
| Secure viewer | Viewer |
|
||||
| Secure viewer | Secure viewer |
|
||||
| Viewer | Secure Viewer |
|
||||
| Secure Viewer | Viewer |
|
||||
| Secure Viewer | Secure Viewer |
|
||||
|
||||
|
||||
Scenario Outline: copying a folder within the same project space with different role
|
||||
|
||||
@@ -404,23 +404,25 @@ Feature: sharing
|
||||
| Editor |
|
||||
| Uploader |
|
||||
|
||||
|
||||
@env-config
|
||||
Scenario: sharee cannot download file shared with Secure viewer permission by sharee
|
||||
Given using old DAV path
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And user "Alice" has uploaded file with content "hello world" to "textfile.txt"
|
||||
And user "Alice" has sent the following resource share invitation:
|
||||
| resource | textfile.txt |
|
||||
| space | Personal |
|
||||
| sharee | Brian |
|
||||
| shareType | user |
|
||||
| permissionsRole | Secure viewer |
|
||||
| permissionsRole | Secure Viewer |
|
||||
And user "Brian" has a share "textfile.txt" synced
|
||||
And user "Brian" downloads file "/Shares/textfile.txt" using the WebDAV API
|
||||
Then the HTTP status code should be "403"
|
||||
|
||||
|
||||
@env-config
|
||||
Scenario: sharee cannot download file inside folder shared with Secure viewer permission by sharee
|
||||
Given using old DAV path
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And user "Alice" has created folder "FolderToShare"
|
||||
And user "Alice" has uploaded file with content "hello world" to "FolderToShare/textfile.txt"
|
||||
And user "Alice" has sent the following resource share invitation:
|
||||
@@ -428,7 +430,7 @@ Feature: sharing
|
||||
| space | Personal |
|
||||
| sharee | Brian |
|
||||
| shareType | user |
|
||||
| permissionsRole | Secure viewer |
|
||||
| permissionsRole | Secure Viewer |
|
||||
And user "Brian" has a share "FolderToShare" synced
|
||||
And user "Brian" downloads file "/Shares/FolderToShare/textfile.txt" using the WebDAV API
|
||||
Then the HTTP status code should be "403"
|
||||
|
||||
@@ -88,9 +88,10 @@ Feature: sharing
|
||||
| dav-path | dav-path-personal |
|
||||
| /dav/spaces/%shares_drive_id% | /dav/spaces/%spaceid% |
|
||||
|
||||
@issue-8242 @issue-10334
|
||||
@issue-8242 @issue-10334 @env-config
|
||||
Scenario Outline: share receiver renames the shared item (old/new webdav)
|
||||
Given user "Alice" has uploaded file with content "foo" to "/sharefile.txt"
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And using <dav-path-version> DAV path
|
||||
And user "Alice" has sent the following resource share invitation:
|
||||
| resource | sharefile.txt |
|
||||
@@ -126,13 +127,14 @@ Feature: sharing
|
||||
Examples:
|
||||
| dav-path-version | dav-path | permissions-role |
|
||||
| old | /webdav | Viewer |
|
||||
| old | /webdav | Secure viewer |
|
||||
| old | /webdav | Secure Viewer |
|
||||
| new | /dav/files/%username% | Viewer |
|
||||
| new | /dav/files/%username% | Secure viewer |
|
||||
| new | /dav/files/%username% | Secure Viewer |
|
||||
|
||||
@issue-8242
|
||||
@issue-8242 @env-config
|
||||
Scenario Outline: share receiver renames the shared item (spaces webdav)
|
||||
Given user "Alice" has uploaded file with content "foo" to "/sharefile.txt"
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And user "Alice" has sent the following resource share invitation:
|
||||
| resource | sharefile.txt |
|
||||
| space | Personal |
|
||||
@@ -168,7 +170,7 @@ Feature: sharing
|
||||
Examples:
|
||||
| dav-path | dav-path-personal | permissions-role |
|
||||
| /dav/spaces/%shares_drive_id% | /dav/spaces/%spaceid% | Viewer |
|
||||
| /dav/spaces/%shares_drive_id% | /dav/spaces/%spaceid% | Secure viewer |
|
||||
| /dav/spaces/%shares_drive_id% | /dav/spaces/%spaceid% | Secure Viewer |
|
||||
|
||||
|
||||
Scenario: keep group share when the one user renames the share and the user is deleted
|
||||
@@ -209,9 +211,10 @@ Feature: sharing
|
||||
And as "Alice" file "/folderToShare/renamedFile" should exist
|
||||
But as "Alice" file "/folderToShare/fileInside" should not exist
|
||||
|
||||
|
||||
@env-config
|
||||
Scenario Outline: receiver tries to rename a received share with read permissions inside the Shares folder
|
||||
Given user "Alice" has created folder "folderToShare"
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And user "Alice" has created folder "folderToShare/folderInside"
|
||||
And user "Alice" has uploaded file with content "thisIsAFileInsideTheSharedFolder" to "/folderToShare/fileInside"
|
||||
And user "Alice" has sent the following resource share invitation:
|
||||
@@ -236,7 +239,7 @@ Feature: sharing
|
||||
Examples:
|
||||
| permissions-role |
|
||||
| Viewer |
|
||||
| Secure viewer |
|
||||
| Secure Viewer |
|
||||
|
||||
|
||||
Scenario: receiver renames a received folder share to a different name on the same folder
|
||||
|
||||
@@ -48,9 +48,10 @@ Feature: copy file
|
||||
| new |
|
||||
| spaces |
|
||||
|
||||
@skipOnReva
|
||||
@skipOnReva @env-config
|
||||
Scenario Outline: copying a file to a folder with no permissions
|
||||
Given using <dav-path-version> DAV path
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And user "Brian" has been created with default attributes and without skeleton files
|
||||
And user "Brian" has created folder "/testshare"
|
||||
And user "Brian" has sent the following resource share invitation:
|
||||
@@ -67,8 +68,8 @@ Feature: copy file
|
||||
| dav-path-version | permissions-role |
|
||||
| old | Viewer |
|
||||
| new | Viewer |
|
||||
| old | Secure viewer |
|
||||
| new | Secure viewer |
|
||||
| old | Secure Viewer |
|
||||
| new | Secure Viewer |
|
||||
|
||||
@skipOnReva
|
||||
Scenario Outline: copying a file to overwrite a file into a folder with no permissions
|
||||
@@ -761,9 +762,10 @@ Feature: copy file
|
||||
| old |
|
||||
| new |
|
||||
|
||||
@skipOnReva
|
||||
@skipOnReva @env-config
|
||||
Scenario Outline: sharee copies a file from a shared folder, shared with secure viewer permission
|
||||
Given using <dav-path-version> DAV path
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And user "Brian" has been created with default attributes and without skeleton files
|
||||
And user "Brian" has created folder "/testshare"
|
||||
And user "Brian" has uploaded file with content "hello world" to "testshare/fileInsideShare.txt"
|
||||
@@ -772,7 +774,7 @@ Feature: copy file
|
||||
| space | Personal |
|
||||
| sharee | Alice |
|
||||
| shareType | user |
|
||||
| permissionsRole | Secure viewer |
|
||||
| permissionsRole | Secure Viewer |
|
||||
And user "Alice" has a share "testshare" synced
|
||||
When user "Alice" copies file "/Shares/testshare/fileInsideShare.txt" to "/fileInsideShare.txt" using the WebDAV API
|
||||
Then the HTTP status code should be "403"
|
||||
@@ -861,9 +863,10 @@ Feature: copy file
|
||||
| old |
|
||||
| new |
|
||||
|
||||
@skipOnReva
|
||||
@skipOnReva @env-config
|
||||
Scenario Outline: copying a file between shares received from different users when one share is shared via Viewer and Secure viewer permission
|
||||
Given using <dav-path-version> DAV path
|
||||
And the administrator has enabled the permissions role "Secure Viewer"
|
||||
And user "Brian" has been created with default attributes and without skeleton files
|
||||
And user "Carol" has been created with default attributes and without skeleton files
|
||||
And user "Brian" has created folder "/testshare0"
|
||||
@@ -893,14 +896,14 @@ Feature: copy file
|
||||
|
||||
Examples:
|
||||
| dav-path-version | permissions-role-1 | permissions-role-2 |
|
||||
| old | Secure viewer | Secure viewer |
|
||||
| new | Secure viewer | Secure viewer |
|
||||
| old | Secure viewer | Viewer |
|
||||
| new | Secure viewer | Viewer |
|
||||
| old | Editor | Secure viewer |
|
||||
| new | Editor | Secure viewer |
|
||||
| old | Viewer | Secure viewer |
|
||||
| new | Viewer | Secure viewer |
|
||||
| old | Secure Viewer | Secure Viewer |
|
||||
| new | Secure Viewer | Secure Viewer |
|
||||
| old | Secure Viewer | Viewer |
|
||||
| new | Secure Viewer | Viewer |
|
||||
| old | Editor | Secure Viewer |
|
||||
| new | Editor | Secure Viewer |
|
||||
| old | Viewer | Secure Viewer |
|
||||
| new | Viewer | Secure Viewer |
|
||||
|
||||
@skipOnReva
|
||||
Scenario Outline: copying a folder between shares received from different users
|
||||
|
||||
Reference in New Issue
Block a user