diff --git a/tests/acceptance/expected-failures-API-on-OCIS-storage.md b/tests/acceptance/expected-failures-API-on-OCIS-storage.md index f5b9e1d9c9f..43fcdc95749 100644 --- a/tests/acceptance/expected-failures-API-on-OCIS-storage.md +++ b/tests/acceptance/expected-failures-API-on-OCIS-storage.md @@ -220,7 +220,7 @@ cannot share a folder with create permission - [coreApiShareOperationsToShares1/gettingShares.feature:188](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares1/gettingShares.feature#L188) #### [Public link enforce permissions](https://github.com/owncloud/ocis/issues/1269) -- [coreApiSharePublicLink1/createPublicLinkShare.feature:352](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiSharePublicLink1/createPublicLinkShare.feature#L352) +- [coreApiSharePublicLink1/createPublicLinkShare.feature:355](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiSharePublicLink1/createPublicLinkShare.feature#L355) #### [download previews of other users file](https://github.com/owncloud/ocis/issues/2071) @@ -241,13 +241,13 @@ cannot share a folder with create permission #### [Upload-only shares must not overwrite but create a separate file](https://github.com/owncloud/ocis/issues/1267) -- [coreApiSharePublicLink3/uploadToPublicLinkShare.feature:10](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiSharePublicLink3/uploadToPublicLinkShare.feature#L10) -- [coreApiSharePublicLink3/uploadToPublicLinkShare.feature:111](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiSharePublicLink3/uploadToPublicLinkShare.feature#L111) +- [coreApiSharePublicLink3/uploadToPublicLinkShare.feature:13](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiSharePublicLink3/uploadToPublicLinkShare.feature#L13) +- [coreApiSharePublicLink3/uploadToPublicLinkShare.feature:114](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiSharePublicLink3/uploadToPublicLinkShare.feature#L114) #### [Set quota over settings](https://github.com/owncloud/ocis/issues/1290) -- [coreApiSharePublicLink3/uploadToPublicLinkShare.feature:84](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiSharePublicLink3/uploadToPublicLinkShare.feature#L84) -- [coreApiSharePublicLink3/uploadToPublicLinkShare.feature:93](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiSharePublicLink3/uploadToPublicLinkShare.feature#L93) +- [coreApiSharePublicLink3/uploadToPublicLinkShare.feature:87](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiSharePublicLink3/uploadToPublicLinkShare.feature#L87) +- [coreApiSharePublicLink3/uploadToPublicLinkShare.feature:96](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiSharePublicLink3/uploadToPublicLinkShare.feature#L96) #### [deleting a file inside a received shared folder is moved to the trash-bin of the sharer not the receiver](https://github.com/owncloud/ocis/issues/1124) @@ -293,13 +293,13 @@ cannot share a folder with create permission #### Expiration date of user shares -- [coreApiShareReshareToShares3/reShareWithExpiryDate.feature:33](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareReshareToShares3/reShareWithExpiryDate.feature#L33) -- [coreApiShareReshareToShares3/reShareWithExpiryDate.feature:34](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareReshareToShares3/reShareWithExpiryDate.feature#L34) +- [coreApiShareReshareToShares3/reShareWithExpiryDate.feature:36](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareReshareToShares3/reShareWithExpiryDate.feature#L36) +- [coreApiShareReshareToShares3/reShareWithExpiryDate.feature:37](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareReshareToShares3/reShareWithExpiryDate.feature#L37) #### Expiration date of group shares -- [coreApiShareReshareToShares3/reShareWithExpiryDate.feature:59](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareReshareToShares3/reShareWithExpiryDate.feature#L59) -- [coreApiShareReshareToShares3/reShareWithExpiryDate.feature:60](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareReshareToShares3/reShareWithExpiryDate.feature#L60) +- [coreApiShareReshareToShares3/reShareWithExpiryDate.feature:62](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareReshareToShares3/reShareWithExpiryDate.feature#L62) +- [coreApiShareReshareToShares3/reShareWithExpiryDate.feature:63](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareReshareToShares3/reShareWithExpiryDate.feature#L63) #### [Cannot move folder/file from one received share to another](https://github.com/owncloud/ocis/issues/2442) @@ -343,14 +343,14 @@ User and group management features _ocs: api compatibility, return correct status code_ -- [coreApiShareOperationsToShares2/shareAccessByID.feature:47](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L47) -- [coreApiShareOperationsToShares2/shareAccessByID.feature:48](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L48) -- [coreApiShareOperationsToShares2/shareAccessByID.feature:49](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L49) - [coreApiShareOperationsToShares2/shareAccessByID.feature:50](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L50) - [coreApiShareOperationsToShares2/shareAccessByID.feature:51](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L51) - [coreApiShareOperationsToShares2/shareAccessByID.feature:52](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L52) - [coreApiShareOperationsToShares2/shareAccessByID.feature:53](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L53) - [coreApiShareOperationsToShares2/shareAccessByID.feature:54](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L54) +- [coreApiShareOperationsToShares2/shareAccessByID.feature:55](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L55) +- [coreApiShareOperationsToShares2/shareAccessByID.feature:56](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L56) +- [coreApiShareOperationsToShares2/shareAccessByID.feature:57](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L57) ### Other @@ -358,67 +358,67 @@ API, search, favorites, config, capabilities, not existing endpoints, CORS and o #### [Ability to return error messages in Webdav response bodies](https://github.com/owncloud/ocis/issues/1293) -- [coreApiAuthOcs/ocsDELETEAuth.feature:8](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsDELETEAuth.feature#L8) -- [coreApiAuthOcs/ocsGETAuth.feature:8](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsGETAuth.feature#L8) -- [coreApiAuthOcs/ocsGETAuth.feature:42](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsGETAuth.feature#L42) -- [coreApiAuthOcs/ocsGETAuth.feature:73](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsGETAuth.feature#L73) -- [coreApiAuthOcs/ocsGETAuth.feature:104](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsGETAuth.feature#L104) -- [coreApiAuthOcs/ocsGETAuth.feature:121](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsGETAuth.feature#L121) -- [coreApiAuthOcs/ocsPOSTAuth.feature:8](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsPOSTAuth.feature#L8) -- [coreApiAuthOcs/ocsPUTAuth.feature:8](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsPUTAuth.feature#L8) -- [coreApiSharePublicLink1/createPublicLinkShare.feature:342](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiSharePublicLink1/createPublicLinkShare.feature#L342) +- [coreApiAuthOcs/ocsDELETEAuth.feature:11](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsDELETEAuth.feature#L11) +- [coreApiAuthOcs/ocsGETAuth.feature:11](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsGETAuth.feature#L11) +- [coreApiAuthOcs/ocsGETAuth.feature:45](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsGETAuth.feature#L45) +- [coreApiAuthOcs/ocsGETAuth.feature:76](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsGETAuth.feature#L76) +- [coreApiAuthOcs/ocsGETAuth.feature:107](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsGETAuth.feature#L107) +- [coreApiAuthOcs/ocsGETAuth.feature:124](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsGETAuth.feature#L124) +- [coreApiAuthOcs/ocsPOSTAuth.feature:11](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsPOSTAuth.feature#L11) +- [coreApiAuthOcs/ocsPUTAuth.feature:11](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsPUTAuth.feature#L11) +- [coreApiSharePublicLink1/createPublicLinkShare.feature:345](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiSharePublicLink1/createPublicLinkShare.feature#L345) #### [sending MKCOL requests to another user's webDav endpoints as normal user gives 404 instead of 403 ](https://github.com/owncloud/ocis/issues/3872) _ocdav: api compatibility, return correct status code_ -- [coreApiAuthWebDav/webDavMKCOLAuth.feature:52](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavMKCOLAuth.feature#L52) -- [coreApiAuthWebDav/webDavMKCOLAuth.feature:63](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavMKCOLAuth.feature#L63) +- [coreApiAuthWebDav/webDavMKCOLAuth.feature:55](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavMKCOLAuth.feature#L55) +- [coreApiAuthWebDav/webDavMKCOLAuth.feature:66](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavMKCOLAuth.feature#L66) #### [trying to lock file of another user gives http 200](https://github.com/owncloud/ocis/issues/2176) -- [coreApiAuthWebDav/webDavLOCKAuth.feature:56](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavLOCKAuth.feature#L56) -- [coreApiAuthWebDav/webDavLOCKAuth.feature:68](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavLOCKAuth.feature#L68) +- [coreApiAuthWebDav/webDavLOCKAuth.feature:59](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavLOCKAuth.feature#L59) +- [coreApiAuthWebDav/webDavLOCKAuth.feature:71](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavLOCKAuth.feature#L71) #### [send (MOVE,COPY) requests to another user's webDav endpoints as normal user gives 400 instead of 403](https://github.com/owncloud/ocis/issues/3882) _ocdav: api compatibility, return correct status code_ -- [coreApiAuthWebDav/webDavMOVEAuth.feature:55](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavMOVEAuth.feature#L55) -- [coreApiAuthWebDav/webDavMOVEAuth.feature:64](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavMOVEAuth.feature#L64) -- [coreApiAuthWebDav/webDavCOPYAuth.feature:59](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavCOPYAuth.feature#L59) -- [coreApiAuthWebDav/webDavCOPYAuth.feature:68](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavCOPYAuth.feature#L68) +- [coreApiAuthWebDav/webDavMOVEAuth.feature:58](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavMOVEAuth.feature#L58) +- [coreApiAuthWebDav/webDavMOVEAuth.feature:67](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavMOVEAuth.feature#L67) +- [coreApiAuthWebDav/webDavCOPYAuth.feature:58](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavCOPYAuth.feature#L58) +- [coreApiAuthWebDav/webDavCOPYAuth.feature:67](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavCOPYAuth.feature#L67) #### [send POST requests to another user's webDav endpoints as normal user](https://github.com/owncloud/ocis/issues/1287) _ocdav: api compatibility, return correct status code_ -- [coreApiAuthWebDav/webDavPOSTAuth.feature:56](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavPOSTAuth.feature#L56) -- [coreApiAuthWebDav/webDavPOSTAuth.feature:65](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavPOSTAuth.feature#L65) +- [coreApiAuthWebDav/webDavPOSTAuth.feature:59](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavPOSTAuth.feature#L59) +- [coreApiAuthWebDav/webDavPOSTAuth.feature:68](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavPOSTAuth.feature#L68) #### Another users space literally does not exist because it is not listed as a space for him, 404 seems correct, expects 403 -- [coreApiAuthWebDav/webDavPUTAuth.feature:56](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavPUTAuth.feature#L56) -- [coreApiAuthWebDav/webDavPUTAuth.feature:68](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavPUTAuth.feature#L68) +- [coreApiAuthWebDav/webDavPUTAuth.feature:59](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavPUTAuth.feature#L59) +- [coreApiAuthWebDav/webDavPUTAuth.feature:71](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavPUTAuth.feature#L71) #### [Using double slash in URL to access a folder gives 501 and other status codes](https://github.com/owncloud/ocis/issues/1667) -- [coreApiAuthWebDav/webDavSpecialURLs.feature:13](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L13) -- [coreApiAuthWebDav/webDavSpecialURLs.feature:24](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L24) -- [coreApiAuthWebDav/webDavSpecialURLs.feature:55](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L55) -- [coreApiAuthWebDav/webDavSpecialURLs.feature:66](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L66) -- [coreApiAuthWebDav/webDavSpecialURLs.feature:76](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L76) -- [coreApiAuthWebDav/webDavSpecialURLs.feature:88](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L88) -- [coreApiAuthWebDav/webDavSpecialURLs.feature:100](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L100) -- [coreApiAuthWebDav/webDavSpecialURLs.feature:111](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L111) -- [coreApiAuthWebDav/webDavSpecialURLs.feature:121](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L121) -- [coreApiAuthWebDav/webDavSpecialURLs.feature:132](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L132) -- [coreApiAuthWebDav/webDavSpecialURLs.feature:142](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L142) -- [coreApiAuthWebDav/webDavSpecialURLs.feature:153](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L153) -- [coreApiAuthWebDav/webDavSpecialURLs.feature:163](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L163) -- [coreApiAuthWebDav/webDavSpecialURLs.feature:174](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L174) -- [coreApiAuthWebDav/webDavSpecialURLs.feature:184](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L184) -- [coreApiAuthWebDav/webDavSpecialURLs.feature:195](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L195) +- [coreApiAuthWebDav/webDavSpecialURLs.feature:16](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L16) +- [coreApiAuthWebDav/webDavSpecialURLs.feature:27](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L27) +- [coreApiAuthWebDav/webDavSpecialURLs.feature:58](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L58) +- [coreApiAuthWebDav/webDavSpecialURLs.feature:69](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L69) +- [coreApiAuthWebDav/webDavSpecialURLs.feature:79](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L79) +- [coreApiAuthWebDav/webDavSpecialURLs.feature:91](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L91) +- [coreApiAuthWebDav/webDavSpecialURLs.feature:103](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L103) +- [coreApiAuthWebDav/webDavSpecialURLs.feature:114](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L114) +- [coreApiAuthWebDav/webDavSpecialURLs.feature:124](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L124) +- [coreApiAuthWebDav/webDavSpecialURLs.feature:135](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L135) +- [coreApiAuthWebDav/webDavSpecialURLs.feature:145](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L145) +- [coreApiAuthWebDav/webDavSpecialURLs.feature:156](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L156) +- [coreApiAuthWebDav/webDavSpecialURLs.feature:166](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L166) +- [coreApiAuthWebDav/webDavSpecialURLs.feature:177](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L177) +- [coreApiAuthWebDav/webDavSpecialURLs.feature:187](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L187) +- [coreApiAuthWebDav/webDavSpecialURLs.feature:198](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthWebDav/webDavSpecialURLs.feature#L198) #### [Difference in response content of status.php and default capabilities](https://github.com/owncloud/ocis/issues/1286) @@ -461,7 +461,7 @@ And other missing implementation of favorites #### [Request to edit non-existing user by authorized admin gets unauthorized in http response](https://github.com/owncloud/core/issues/38423) -- [coreApiAuthOcs/ocsPUTAuth.feature:24](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsPUTAuth.feature#L24) +- [coreApiAuthOcs/ocsPUTAuth.feature:27](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiAuthOcs/ocsPUTAuth.feature#L27) #### [Sharing a same file twice to the same group](https://github.com/owncloud/ocis/issues/1710) @@ -513,6 +513,17 @@ And other missing implementation of favorites - [coreApiWebdavUploadTUS/optionsRequest.feature:89](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiWebdavUploadTUS/optionsRequest.feature#L89) - [coreApiWebdavUploadTUS/optionsRequest.feature:104](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiWebdavUploadTUS/optionsRequest.feature#L104) +#### [Trying to accept a share with invalid ID gives incorrect OCS and HTTP status](https://github.com/owncloud/ocis/issues/2111) + +- [coreApiShareOperationsToShares2/shareAccessByID.feature:86](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L86) +- [coreApiShareOperationsToShares2/shareAccessByID.feature:87](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L87) +- [coreApiShareOperationsToShares2/shareAccessByID.feature:88](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L88) +- [coreApiShareOperationsToShares2/shareAccessByID.feature:89](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L89) +- [coreApiShareOperationsToShares2/shareAccessByID.feature:90](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L90) +- [coreApiShareOperationsToShares2/shareAccessByID.feature:91](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L91) +- [coreApiShareOperationsToShares2/shareAccessByID.feature:92](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L92) +- [coreApiShareOperationsToShares2/shareAccessByID.feature:93](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L93) + #### [Shares to deleted group listed in the response](https://github.com/owncloud/ocis/issues/2441) - [coreApiShareManagementBasicToShares/createShareToSharesFolder.feature:528](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareManagementBasicToShares/createShareToSharesFolder.feature#L528) @@ -570,8 +581,8 @@ Not everything needs to be implemented for ocis. While the oc10 testsuite covers - [coreApiShareManagementToShares/acceptShares.feature:226](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareManagementToShares/acceptShares.feature#L226) - [coreApiShareManagementToShares/acceptShares.feature:260](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareManagementToShares/acceptShares.feature#L260) - [coreApiShareManagementToShares/acceptShares.feature:480](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareManagementToShares/acceptShares.feature#L480) -- [coreApiShareOperationsToShares2/shareAccessByID.feature:120](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L120) -- [coreApiShareOperationsToShares2/shareAccessByID.feature:121](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L121) +- [coreApiShareOperationsToShares2/shareAccessByID.feature:111](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L111) +- [coreApiShareOperationsToShares2/shareAccessByID.feature:112](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature#L112) - [coreApiShareManagementBasicToShares/deleteShareFromShares.feature:176](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareManagementBasicToShares/deleteShareFromShares.feature#L176) - [coreApiShareManagementBasicToShares/deleteShareFromShares.feature:177](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareManagementBasicToShares/deleteShareFromShares.feature#L177) - [coreApiShareManagementBasicToShares/deleteShareFromShares.feature:178](https://github.com/owncloud/ocis/blob/master/tests/acceptance/features/coreApiShareManagementBasicToShares/deleteShareFromShares.feature#L178) diff --git a/tests/acceptance/features/coreApiShareManagementToShares/acceptSharesToSharesFolder.feature b/tests/acceptance/features/coreApiShareManagementToShares/acceptSharesToSharesFolder.feature index e5aa3db77d9..5d32efb16ec 100644 --- a/tests/acceptance/features/coreApiShareManagementToShares/acceptSharesToSharesFolder.feature +++ b/tests/acceptance/features/coreApiShareManagementToShares/acceptSharesToSharesFolder.feature @@ -13,7 +13,7 @@ Feature: accept/decline shares coming from internal users to the Shares folder | Brian | - Scenario: When accepting a share of a file, the received file is accessible + Scenario: when accepting a share of a file, the received file is accessible Given user "Alice" has uploaded file with content "ownCloud test text file 0" to "textfile0.txt" And user "Alice" has shared file "/textfile0.txt" with user "Brian" When user "Brian" accepts share "/textfile0.txt" offered by user "Alice" using the sharing API @@ -22,7 +22,7 @@ Feature: accept/decline shares coming from internal users to the Shares folder And the content of file "/Shares/textfile0.txt" for user "Brian" should be "ownCloud test text file 0" - Scenario: When accepting a share of a folder, the received folder is accessible + Scenario: when accepting a share of a folder, the received folder is accessible Given user "Alice" has created folder "/PARENT" And user "Alice" has uploaded file with content "ownCloud test text file parent" to "PARENT/parent.txt" And user "Alice" has shared file "/PARENT" with user "Brian" @@ -30,7 +30,7 @@ Feature: accept/decline shares coming from internal users to the Shares folder Then the content of file "/Shares/PARENT/parent.txt" for user "Brian" should be "ownCloud test text file parent" - Scenario: When accepting a share of a file, the response is valid + Scenario: when accepting a share of a file, the response is valid Given user "Alice" has uploaded file with content "ownCloud test text file 0" to "textfile0.txt" And user "Alice" has shared file "/textfile0.txt" with user "Brian" When user "Brian" accepts share "/textfile0.txt" offered by user "Alice" using the sharing API @@ -51,7 +51,7 @@ Feature: accept/decline shares coming from internal users to the Shares folder And the content of file "/Shares/textfile0.txt" for user "Brian" should be "ownCloud test text file 0" - Scenario: When accepting a share of a folder, the response is valid + Scenario: when accepting a share of a folder, the response is valid Given user "Alice" has created folder "/PARENT" And user "Alice" has uploaded file with content "ownCloud test text file parent" to "PARENT/parent.txt" And user "Alice" has shared file "/PARENT" with user "Brian" diff --git a/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature b/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature index d20358269a2..fcc251537be 100644 --- a/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature +++ b/tests/acceptance/features/coreApiShareOperationsToShares2/shareAccessByID.feature @@ -1,5 +1,8 @@ @api @files_sharing-app-required Feature: share access by ID + As a user + I want to get share with share ID + So that I can access resources with valid share ID Background: Given auto-accept shares has been disabled @@ -9,7 +12,7 @@ Feature: share access by ID | Brian | - Scenario Outline: Get a share with a valid share ID + Scenario Outline: get a share with a valid share ID Given using OCS API version "" And user "Alice" has uploaded file with content "ownCloud test text file 0" to "/textfile0.txt" When user "Alice" shares file "textfile0.txt" with user "Brian" using the sharing API @@ -36,7 +39,7 @@ Feature: share access by ID | 2 | 200 | - Scenario Outline: Get a share with an invalid share id + Scenario Outline: get a share with an invalid share id Given using OCS API version "" When user "Alice" gets share with id "" using the sharing API Then the OCS status code should be "404" diff --git a/tests/acceptance/features/coreApiSharePublicLink1/createPublicLinkShare.feature b/tests/acceptance/features/coreApiSharePublicLink1/createPublicLinkShare.feature index a55f048b46c..5e00beb6ff7 100644 --- a/tests/acceptance/features/coreApiSharePublicLink1/createPublicLinkShare.feature +++ b/tests/acceptance/features/coreApiSharePublicLink1/createPublicLinkShare.feature @@ -1,12 +1,15 @@ @api @files_sharing-app-required @public_link_share-feature-required @issue-1276 @issue-1277 Feature: create a public link share + As a user + I want to create a publik link share + So that I can share resources with different access permissions Background: Given user "Alice" has been created with default attributes and without skeleton files @smokeTest - Scenario Outline: A new public link share of a file using the default permissions only grants read access using the public WebDAV API + Scenario Outline: a new public link share of a file using the default permissions only grants read access using the public WebDAV API Given using OCS API version "" And user "Alice" has uploaded file with content "Random data" to "/randomfile.txt" When user "Alice" creates a public link share using the sharing API with settings @@ -37,7 +40,7 @@ Feature: create a public link share | 2 | 200 | @smokeTest @issue-1293 - Scenario Outline: Creating a new public link share of a file with password using the new public WebDAV API + Scenario Outline: creating a new public link share of a file with password using the new public WebDAV API Given using OCS API version "" And user "Alice" has uploaded file with content "Random data" to "/randomfile.txt" When user "Alice" creates a public link share using the sharing API with settings @@ -69,7 +72,7 @@ Feature: create a public link share | 2 | 200 | - Scenario Outline: Create a new public link share of a file with edit permissions + Scenario Outline: create a new public link share of a file with edit permissions Given using OCS API version "" And user "Alice" has uploaded file with content "Random data" to "/randomfile.txt" When user "Alice" creates a public link share using the sharing API with settings @@ -101,7 +104,7 @@ Feature: create a public link share | 2 | 200 | - Scenario Outline: Creating a new public link share of a folder using the default permissions only grants read access and can be accessed with no password or any password using the public WebDAV API + Scenario Outline: creating a new public link share of a folder using the default permissions only grants read access and can be accessed with no password or any password using the public WebDAV API Given using OCS API version "" And user "Alice" has created folder "/PARENT" And user "Alice" has uploaded file with content "Random data" to "/PARENT/randomfile.txt" @@ -133,7 +136,7 @@ Feature: create a public link share | 2 | 200 | - Scenario Outline: Creating a new public link share of a folder, with a password and accessing using the public WebDAV API + Scenario Outline: creating a new public link share of a folder, with a password and accessing using the public WebDAV API Given using OCS API version "" And user "Alice" has created folder "/PARENT" And user "Alice" has uploaded file with content "Random data" to "/PARENT/randomfile.txt" @@ -168,7 +171,7 @@ Feature: create a public link share | 2 | 200 | @smokeTest - Scenario Outline: Getting the share information of public link share from the OCS API does not expose sensitive information + Scenario Outline: getting the share information of public link share from the OCS API does not expose sensitive information Given using OCS API version "" And user "Alice" has uploaded file with content "Random data" to "/randomfile.txt" When user "Alice" creates a public link share using the sharing API with settings @@ -191,7 +194,7 @@ Feature: create a public link share | 2 | 200 | - Scenario Outline: Getting the share information of passwordless public-links hides credential placeholders + Scenario Outline: getting the share information of passwordless public-links hides credential placeholders Given using OCS API version "" And user "Alice" has uploaded file with content "Random data" to "/randomfile.txt" When user "Alice" creates a public link share using the sharing API with settings @@ -214,7 +217,7 @@ Feature: create a public link share | 2 | 200 | - Scenario Outline: Creating a link share with no specified permissions defaults to read permissions when public upload is disabled globally and accessing using the public WebDAV API + Scenario Outline: creating a link share with no specified permissions defaults to read permissions when public upload is disabled globally and accessing using the public WebDAV API Given using OCS API version "" And user "Alice" has created folder "/afolder" When user "Alice" creates a public link share using the sharing API with settings @@ -235,7 +238,7 @@ Feature: create a public link share | 2 | 200 | - Scenario Outline: Creating a link share with edit permissions keeps it using the public WebDAV API + Scenario Outline: creating a link share with edit permissions keeps it using the public WebDAV API Given using OCS API version "" And user "Alice" has created folder "/afolder" When user "Alice" creates a public link share using the sharing API with settings @@ -257,7 +260,7 @@ Feature: create a public link share | 2 | 200 | - Scenario Outline: Creating a link share with upload permissions keeps it using the public WebDAV API + Scenario Outline: creating a link share with upload permissions keeps it using the public WebDAV API Given using OCS API version "" And user "Alice" has created folder "/afolder" When user "Alice" creates a public link share using the sharing API with settings @@ -279,7 +282,7 @@ Feature: create a public link share | 2 | 200 | @issue-1265 @issue-2079 - Scenario Outline: Allow public sharing of the root on OCIS when the default permission is read and access using the public WebDAV API + Scenario Outline: allow public sharing of the root on OCIS when the default permission is read and access using the public WebDAV API Given using OCS API version "" And user "Alice" has uploaded file with content "Random data" to "/randomfile.txt" When user "Alice" creates a public link share using the sharing API with settings @@ -339,7 +342,7 @@ Feature: create a public link share | 2 | 200 | @issue-1293 - Scenario: Delete a folder that has been publicly shared and try to access using the public WebDAV API + Scenario: delete a folder that has been publicly shared and try to access using the public WebDAV API Given user "Alice" has created folder "PARENT" And user "Alice" has uploaded file with content "Random data" to "/PARENT/parent.txt" And user "Alice" has created a public link share with settings @@ -360,7 +363,7 @@ Feature: create a public link share And the HTTP status code should be "404" - Scenario: Get the size of a file shared by public link + Scenario: get the size of a file shared by public link Given user "Alice" has uploaded file with content "This is a test file" to "test-file.txt" And user "Alice" has created a public link share with settings | path | test-file.txt | @@ -370,7 +373,7 @@ Feature: create a public link share And the size of the file should be "19" - Scenario Outline: Get the mtime of a file shared by public link + Scenario Outline: get the mtime of a file shared by public link Given using DAV path And user "Alice" has uploaded file "filesForUpload/textfile.txt" to "file.txt" with mtime "Thu, 08 Aug 2019 04:18:13 GMT" using the WebDAV API When user "Alice" creates a public link share using the sharing API with settings @@ -384,7 +387,7 @@ Feature: create a public link share | new | - Scenario Outline: Get the mtime of a file inside a folder shared by public link + Scenario Outline: get the mtime of a file inside a folder shared by public link Given using DAV path And user "Alice" has created folder "testFolder" And user "Alice" has uploaded file "filesForUpload/textfile.txt" to "testFolder/file.txt" with mtime "Thu, 08 Aug 2019 04:18:13 GMT" using the WebDAV API @@ -399,7 +402,7 @@ Feature: create a public link share | new | - Scenario: Get the mtime of a file inside a folder shared by public link using new webDAV version + Scenario: get the mtime of a file inside a folder shared by public link using new webDAV version Given user "Alice" has created folder "testFolder" And user "Alice" has created a public link share with settings | path | /testFolder | diff --git a/tests/acceptance/features/coreApiSharePublicLink3/uploadToPublicLinkShare.feature b/tests/acceptance/features/coreApiSharePublicLink3/uploadToPublicLinkShare.feature index d73630e2f28..f6aea0936b3 100644 --- a/tests/acceptance/features/coreApiSharePublicLink3/uploadToPublicLinkShare.feature +++ b/tests/acceptance/features/coreApiSharePublicLink3/uploadToPublicLinkShare.feature @@ -1,13 +1,16 @@ @api @files_sharing-app-required @public_link_share-feature-required @issue-1276 @issue-1277 @issue-2079 Feature: upload to a public link share + As a user + I want to create a public link share with different file permission + So that I can manage different file permissions on shared resource Background: Given user "Alice" has been created with default attributes and without skeleton files And user "Alice" has created folder "FOLDER" @smokeTest @issue-1267 - Scenario: Uploading same file to a public upload-only share multiple times via new API + Scenario: uploading same file to a public upload-only share multiple times via new API # The new API does the autorename automatically in upload-only folders Given user "Alice" has created a public link share with settings | path | FOLDER | @@ -21,7 +24,7 @@ Feature: upload to a public link share And the content of file "/FOLDER/test (2).txt" for user "Alice" should be "test2" - Scenario Outline: Uploading file to a public upload-only share using public API that was deleted does not work + Scenario Outline: uploading file to a public upload-only share using public API that was deleted does not work Given using DAV path And user "Alice" has created a public link share with settings | path | FOLDER | @@ -42,7 +45,7 @@ Feature: upload to a public link share | spaces | @issue-1269 - Scenario: Uploading file to a public read-only share folder with public API does not work + Scenario: uploading file to a public read-only share folder with public API does not work Given user "Alice" has created a public link share with settings | path | FOLDER | | permissions | read | @@ -50,7 +53,7 @@ Feature: upload to a public link share And the HTTP status code should be "403" - Scenario: Uploading to a public upload-only share with public API + Scenario: uploading to a public upload-only share with public API Given user "Alice" has created a public link share with settings | path | FOLDER | | permissions | create | @@ -61,7 +64,7 @@ Feature: upload to a public link share | ETag | /^"[a-f0-9:\.]{1,32}"$/ | - Scenario: Uploading to a public upload-only share with password with public API + Scenario: uploading to a public upload-only share with password with public API Given user "Alice" has created a public link share with settings | path | FOLDER | | password | %public% | @@ -71,7 +74,7 @@ Feature: upload to a public link share And the content of file "/FOLDER/test.txt" for user "Alice" should be "test-file" - Scenario: Uploading to a public read/write share with password with public API + Scenario: uploading to a public read/write share with password with public API Given user "Alice" has created a public link share with settings | path | FOLDER | | password | %public% | @@ -81,7 +84,7 @@ Feature: upload to a public link share And the content of file "/FOLDER/test.txt" for user "Alice" should be "test-file" - Scenario: Uploading file to a public shared folder with read/write permission when the sharer has insufficient quota does not work with public API + Scenario: uploading file to a public shared folder with read/write permission when the sharer has insufficient quota does not work with public API When user "Alice" creates a public link share using the sharing API with settings | path | FOLDER | | permissions | change | @@ -90,7 +93,7 @@ Feature: upload to a public link share Then the HTTP status code should be "507" @issue-1290 - Scenario: Uploading file to a public shared folder with upload-only permission when the sharer has insufficient quota does not work with public API + Scenario: uploading file to a public shared folder with upload-only permission when the sharer has insufficient quota does not work with public API When user "Alice" creates a public link share using the sharing API with settings | path | FOLDER | | permissions | create | @@ -99,7 +102,7 @@ Feature: upload to a public link share Then the HTTP status code should be "507" @smokeTest - Scenario: Uploading to a public upload-write and no edit and no overwrite share with public API + Scenario: uploading to a public upload-write and no edit and no overwrite share with public API Given user "Alice" has created a public link share with settings | path | FOLDER | | permissions | uploadwriteonly | @@ -108,7 +111,7 @@ Feature: upload to a public link share And the content of file "/FOLDER/test.txt" for user "Alice" should be "test-file" @smokeTest @issue-1267 - Scenario: Uploading same file to a public upload-write and no edit and no overwrite share multiple times with new public API + Scenario: uploading same file to a public upload-write and no edit and no overwrite share multiple times with new public API Given user "Alice" has created a public link share with settings | path | FOLDER | | permissions | uploadwriteonly | diff --git a/tests/acceptance/features/coreApiShareReshareToShares2/reShareDisabled.feature b/tests/acceptance/features/coreApiShareReshareToShares2/reShareDisabled.feature index 9dd7f653b00..06d74ea47f0 100644 --- a/tests/acceptance/features/coreApiShareReshareToShares2/reShareDisabled.feature +++ b/tests/acceptance/features/coreApiShareReshareToShares2/reShareDisabled.feature @@ -1,5 +1,8 @@ @api @files_sharing-app-required @issue-1328 Feature: resharing can be disabled + As a user + I want to disable resharing resources + So that I can manage the resharing of resources Background: Given auto-accept shares has been disabled diff --git a/tests/acceptance/features/coreApiShareReshareToShares3/reShareWithExpiryDate.feature b/tests/acceptance/features/coreApiShareReshareToShares3/reShareWithExpiryDate.feature index 102a387c789..702a2591880 100644 --- a/tests/acceptance/features/coreApiShareReshareToShares3/reShareWithExpiryDate.feature +++ b/tests/acceptance/features/coreApiShareReshareToShares3/reShareWithExpiryDate.feature @@ -1,5 +1,8 @@ @api @files_sharing-app-required @issue-1328 Feature: resharing a resource with an expiration date + As a user + I want to share resource with an expiration date + So that I can share resource for limited time period Background: Given auto-accept shares has been disabled @@ -10,7 +13,7 @@ Feature: resharing a resource with an expiration date And user "Alice" has uploaded file "filesForUpload/textfile.txt" to "/textfile0.txt" - Scenario Outline: User should be able to set expiration while resharing a file with user + Scenario Outline: user should be able to set expiration while resharing a file with user Given using OCS API version "" And user "Carol" has been created with default attributes and without skeleton files And user "Alice" has shared file "/textfile0.txt" with user "Brian" with permissions "read,update,share" @@ -34,7 +37,7 @@ Feature: resharing a resource with an expiration date | 2 | 200 | @issue-1289 - Scenario Outline: User should be able to set expiration while resharing a file with group + Scenario Outline: user should be able to set expiration while resharing a file with group Given using OCS API version "" And user "Carol" has been created with default attributes and without skeleton files And group "grp1" has been created diff --git a/tests/acceptance/features/coreApiSharees/sharees.feature b/tests/acceptance/features/coreApiSharees/sharees.feature index 943c360d77a..ff0688edf3f 100644 --- a/tests/acceptance/features/coreApiSharees/sharees.feature +++ b/tests/acceptance/features/coreApiSharees/sharees.feature @@ -11,7 +11,7 @@ Feature: sharees And user "Alice" has been added to group "ShareeGroup2" @smokeTest - Scenario Outline: Search without exact match + Scenario Outline: search without exact match Given using OCS API version "" When user "Alice" gets the sharees using the sharing API with parameters | search | sharee | @@ -33,7 +33,7 @@ Feature: sharees | 2 | 200 | 200 | - Scenario Outline: Search without exact match not-exact casing + Scenario Outline: search without exact match not-exact casing Given using OCS API version "" When user "Alice" gets the sharees using the sharing API with parameters | search | sHaRee | @@ -55,7 +55,7 @@ Feature: sharees | 2 | 200 | 200 | @skipOnLDAP - Scenario Outline: Search only with group members - allowed + Scenario Outline: search only with group members - allowed Given using OCS API version "" And user "Sharee1" has been added to group "ShareeGroup2" When user "Alice" gets the sharees using the sharing API with parameters @@ -78,7 +78,7 @@ Feature: sharees | 2 | 200 | 200 | - Scenario Outline: Search with exact match + Scenario Outline: search with exact match Given using OCS API version "" When user "Alice" gets the sharees using the sharing API with parameters | search | Sharee1 | @@ -98,7 +98,7 @@ Feature: sharees | 2 | 200 | 200 | - Scenario Outline: Search with exact match not-exact casing + Scenario Outline: search with exact match not-exact casing Given using OCS API version "" When user "Alice" gets the sharees using the sharing API with parameters | search | sharee1 | @@ -118,7 +118,7 @@ Feature: sharees | 2 | 200 | 200 | - Scenario Outline: Search with exact match not-exact casing group + Scenario Outline: search with exact match not-exact casing group Given using OCS API version "" When user "Alice" gets the sharees using the sharing API with parameters | search | shareegroup2 | @@ -138,7 +138,7 @@ Feature: sharees | 2 | 200 | 200 | - Scenario Outline: Search with "self" + Scenario Outline: search with "self" Given using OCS API version "" When user "Sharee1" gets the sharees using the sharing API with parameters | search | Sharee1 | @@ -158,7 +158,7 @@ Feature: sharees | 2 | 200 | 200 | - Scenario Outline: Federated sharee for files + Scenario Outline: federated sharee for files Given using OCS API version "" When user "Alice" gets the sharees using the sharing API with parameters | search | test@localhost | @@ -178,7 +178,7 @@ Feature: sharees | 2 | 200 | 200 | - Scenario Outline: Federated sharee for calendars not allowed + Scenario Outline: federated sharee for calendars not allowed Given using OCS API version "" When user "Alice" gets the sharees using the sharing API with parameters | search | test@localhost | @@ -197,7 +197,7 @@ Feature: sharees | 2 | 200 | 200 | @skipOnLDAP - Scenario Outline: Enumerate only group members - only show partial results from member of groups + Scenario Outline: enumerate only group members - only show partial results from member of groups Given using OCS API version "" And these users have been created with default attributes and without skeleton files: | username | displayname | @@ -221,7 +221,7 @@ Feature: sharees | 2 | 200 | 200 | - Scenario Outline: Search without exact match such that the search string matches the user getting the sharees + Scenario Outline: search without exact match such that the search string matches the user getting the sharees Given user "sharee2" has been created with default attributes and without skeleton files And using OCS API version "" When user "sharee1" gets the sharees using the sharing API with parameters diff --git a/tests/acceptance/features/coreApiWebdavEtagPropagation1/deleteFileFolder.feature b/tests/acceptance/features/coreApiWebdavEtagPropagation1/deleteFileFolder.feature index f5a6bcb5e32..02c02d42e22 100644 --- a/tests/acceptance/features/coreApiWebdavEtagPropagation1/deleteFileFolder.feature +++ b/tests/acceptance/features/coreApiWebdavEtagPropagation1/deleteFileFolder.feature @@ -1,5 +1,8 @@ @api Feature: propagation of etags when deleting a file or folder + As a user + I want to store etags when deleting files or folders + So that I can manage etags of deleted files or folders Background: Given user "Alice" has been created with default attributes and without skeleton files diff --git a/tests/acceptance/features/coreApiWebdavEtagPropagation1/moveFileFolder.feature b/tests/acceptance/features/coreApiWebdavEtagPropagation1/moveFileFolder.feature index 80393c97f0f..3e1bca2da3f 100644 --- a/tests/acceptance/features/coreApiWebdavEtagPropagation1/moveFileFolder.feature +++ b/tests/acceptance/features/coreApiWebdavEtagPropagation1/moveFileFolder.feature @@ -1,5 +1,8 @@ @api Feature: propagation of etags when moving files or folders + As a user + I want to store etags when moving files or folders + So that I can manage etags of moved files or folders Background: Given user "Alice" has been created with default attributes and without skeleton files diff --git a/tests/acceptance/features/coreApiWebdavEtagPropagation2/copyFileFolder.feature b/tests/acceptance/features/coreApiWebdavEtagPropagation2/copyFileFolder.feature index 3117b0cbab7..bfb244fbb47 100644 --- a/tests/acceptance/features/coreApiWebdavEtagPropagation2/copyFileFolder.feature +++ b/tests/acceptance/features/coreApiWebdavEtagPropagation2/copyFileFolder.feature @@ -1,5 +1,8 @@ @api Feature: propagation of etags when copying files or folders + As a user + I want to store etags when copying files or folders + So that I can manage etags of copied files or folders Background: Given user "Alice" has been created with default attributes and without skeleton files diff --git a/tests/acceptance/features/coreApiWebdavEtagPropagation2/createFolder.feature b/tests/acceptance/features/coreApiWebdavEtagPropagation2/createFolder.feature index 3d8cfe28496..9dc68cc1e06 100644 --- a/tests/acceptance/features/coreApiWebdavEtagPropagation2/createFolder.feature +++ b/tests/acceptance/features/coreApiWebdavEtagPropagation2/createFolder.feature @@ -1,5 +1,8 @@ @api Feature: propagation of etags when creating folders + As a user + I want to store etags when creating folders + So that I can manage etags of created folders Background: Given user "Alice" has been created with default attributes and without skeleton files diff --git a/tests/acceptance/features/coreApiWebdavEtagPropagation2/upload.feature b/tests/acceptance/features/coreApiWebdavEtagPropagation2/upload.feature index 2f32e746627..9899c9f7602 100644 --- a/tests/acceptance/features/coreApiWebdavEtagPropagation2/upload.feature +++ b/tests/acceptance/features/coreApiWebdavEtagPropagation2/upload.feature @@ -1,5 +1,8 @@ @api Feature: propagation of etags when uploading data + As a user + I want to store etags when uploading data + So that I can manage etags of uploaded data Background: Given user "Alice" has been created with default attributes and without skeleton files