-
Notifications
You must be signed in to change notification settings - Fork 195
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[tests-only][full-ci] added test to enable disable Secure Viewer permissions role for federated shares #10823
Merged
Merged
Changes from all commits
Commits
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
99 changes: 99 additions & 0 deletions
99
tests/acceptance/features/apiOcm/enableDisablePermissionsRole.feature
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,99 @@ | ||
@ocm @env-config @issue-10824 | ||
Feature: enable/disable permissions role | ||
As a user | ||
I want to enable/disable permissions role on shared resources | ||
So that I can control the accessibility of shared resources to sharee | ||
|
||
Background: | ||
Given using spaces DAV path | ||
And user "Alice" has been created with default attributes | ||
And "Alice" has created the federation share invitation | ||
And using server "REMOTE" | ||
And user "Brian" has been created with default attributes | ||
And "Brian" has accepted invitation | ||
And using server "LOCAL" | ||
And the administrator has enabled the permissions role "Secure Viewer" | ||
|
||
@issue-10822 | ||
Scenario: user accesses federated shared file shared with permissions role Secure Viewer after the role is disabled (Personal Space) | ||
Given user "Alice" has uploaded file with content "some content" to "textfile.txt" | ||
And user "Alice" has sent the following resource share invitation to federated user: | ||
PrajwolAmatya marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| resource | textfile.txt | | ||
| space | Personal | | ||
| sharee | Brian | | ||
| shareType | user | | ||
| permissionsRole | Secure Viewer | | ||
And the administrator has disabled the permissions role "Secure Viewer" | ||
And using server "REMOTE" | ||
When user "Brian" sends PROPFIND request to federated share "textfile.txt" with depth "0" using the WebDAV API | ||
Then the HTTP status code should be "207" | ||
And as user "Brian" the PROPFIND response should contain a resource "textfile.txt" with these key and value pairs: | ||
| key | value | | ||
| oc:name | textfile.txt | | ||
| oc:permissions | | | ||
And user "Brian" should have a federated share "textfile.txt" shared by user "Alice" from space "Personal" | ||
And user "Brian" should be able to download federated shared file "textfile.txt" | ||
|
||
|
||
Scenario: user accesses federated shared folder shared with permissions role Secure Viewer after the role is disabled (Personal Space) | ||
Given user "Alice" has created folder "folderToShare" | ||
And user "Alice" has sent the following resource share invitation to federated user: | ||
| resource | folderToShare | | ||
| space | Personal | | ||
| sharee | Brian | | ||
| shareType | user | | ||
| permissionsRole | Secure Viewer | | ||
And the administrator has disabled the permissions role "Secure Viewer" | ||
And using server "REMOTE" | ||
When user "Brian" sends PROPFIND request to federated share "folderToShare" with depth "0" using the WebDAV API | ||
Then the HTTP status code should be "207" | ||
And as user "Brian" the PROPFIND response should contain a resource "folderToShare" with these key and value pairs: | ||
| key | value | | ||
| oc:name | folderToShare | | ||
| oc:permissions | | | ||
And user "Brian" should have a federated share "folderToShare" shared by user "Alice" from space "Personal" | ||
And user "Brian" should be able to download archive of federated shared folder "folderToShare" | ||
|
||
@issue-10822 | ||
Scenario: user accesses federated shared file shared with permissions role Secure Viewer after the role is disabled (Project Space) | ||
Given the administrator has assigned the role "Space Admin" to user "Alice" using the Graph API | ||
And user "Alice" has created a space "new-space" with the default quota using the Graph API | ||
And user "Alice" has uploaded a file inside space "new-space" with content "some content" to "textfile.txt" | ||
And user "Alice" has sent the following resource share invitation to federated user: | ||
| resource | textfile.txt | | ||
| space | new-space | | ||
| sharee | Brian | | ||
| shareType | user | | ||
| permissionsRole | Secure Viewer | | ||
And the administrator has disabled the permissions role "Secure Viewer" | ||
And using server "REMOTE" | ||
When user "Brian" sends PROPFIND request to federated share "textfile.txt" with depth "0" using the WebDAV API | ||
Then the HTTP status code should be "207" | ||
And as user "Brian" the PROPFIND response should contain a resource "textfile.txt" with these key and value pairs: | ||
| key | value | | ||
| oc:name | textfile.txt | | ||
| oc:permissions | | | ||
And user "Brian" should have a federated share "textfile.txt" shared by user "Alice" from space "new-space" | ||
And user "Brian" should be able to download federated shared file "textfile.txt" | ||
|
||
|
||
Scenario: user accesses federated shared folder shared with permissions role Secure Viewer after the role is disabled (Project Space) | ||
Given the administrator has assigned the role "Space Admin" to user "Alice" using the Graph API | ||
And user "Alice" has created a space "new-space" with the default quota using the Graph API | ||
And user "Alice" has created a folder "folderToShare" in space "new-space" | ||
And user "Alice" has sent the following resource share invitation to federated user: | ||
| resource | folderToShare | | ||
| space | new-space | | ||
| sharee | Brian | | ||
| shareType | user | | ||
| permissionsRole | Secure Viewer | | ||
And the administrator has disabled the permissions role "Secure Viewer" | ||
And using server "REMOTE" | ||
When user "Brian" sends PROPFIND request to federated share "folderToShare" with depth "0" using the WebDAV API | ||
Then the HTTP status code should be "207" | ||
And as user "Brian" the PROPFIND response should contain a resource "folderToShare" with these key and value pairs: | ||
| key | value | | ||
| oc:name | folderToShare | | ||
| oc:permissions | | | ||
And user "Brian" should have a federated share "folderToShare" shared by user "Alice" from space "new-space" | ||
And user "Brian" should be able to download archive of federated shared folder "folderToShare" |
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍🏼