-
Notifications
You must be signed in to change notification settings - Fork 184
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[full-ci] update reva to v2.6.1-... #4025
Conversation
Thanks for opening this pull request! The maintainers of this repository would appreciate it if you would create a changelog item based on your changes. |
3924bc8
to
72eeaa4
Compare
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
💥 Acceptance test Core-API-Tests-ocis-storage-1 failed. Further test are cancelled... |
I added |
@phil-davis thx, we have an unexpected pass ;-) |
https://drone.owncloud.com/owncloud/ocis/12787/38/6
It looks like those scenarios should now be edited to change the expectation of 404 to 403 |
Mkcol and put return 403 instead of 404 when targeting another users space |
hmmm ocis
seems to contradict reva
In both cases Brian is PUTing a file into the space of another user. In the first example a project space, in the second example a personal space. Taking a step back, we are trying to prevent leaking the existence of a space / file by returning 404 instead of 403. But to access a file you need to know the space id in advance ... hm, which for users is guessable because the userid is not secret and currently equals the personal space id. IMO we should always return 404 if the user has no access to a space, which would make the reva |
1c65a51
to
0322157
Compare
currently points to my branch, needs merge in reva |
|
0322157
to
c4e9b0f
Compare
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
|
Those scenarios were added with the same "403" expectation as for the The requirements need to be thought about and defined - probably a consistent 404 for all these combinations of trying to access something that may or may not "really" exist, but it does not exist from the point-of-view of the authenticated user. Then make the test scenarios expect the proper requirements. Then make both oC10 and oCIS meet the requirements. Part of the problem here is that we have oC10 core tests that demonstrate current oC10 behavior, but actually the current behavior is not correct/optimal. |
@phil-davis I agree. Regardless of the error, it you don't have read access to the storage all you get should be a 404. Currently, only some error paths of the ocdav service do a stat request to determine if a user can read file. This actually differs from oc10 where you get a 403. The initial spaces implementation required a space lookup, when you didn't have access you would always get a 404. For performance reasons we moved the space lookup from the storage registry to the storage provider. That ocdav does a stat after an error is technical debt. The storage providers would need to return 404 when the user has no access to the root. That could be done in the storage provider and is not necessary required to be done by the storage drivers. |
In any case this pr can now point to Reva edge, as both cis are green and the Reva pr has been merged. |
Agree - are you going to update this PR? And after you do, and CI goes green, IMO it can be merged. |
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
Kudos, SonarCloud Quality Gate passed! |
update reva to v2.6.1-...