Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[docs-only] 1.1.0 release notes #1484

Merged
merged 34 commits into from
Jan 26, 2021
Merged
Show file tree
Hide file tree
Changes from 18 commits
Commits
Show all changes
34 commits
Select commit Hold shift + click to select a range
623f98d
add log rotation to deploy examples
wkloucek Jan 21, 2021
1418961
Merge branch 'master' into add_log_rotation_deploy_examples
wkloucek Jan 21, 2021
3786104
disable Traefik dasboard as default for deployment examples
wkloucek Jan 21, 2021
414add4
Merge branch 'master' into add_log_rotation_deploy_examples
wkloucek Jan 22, 2021
888bea5
switch to local log driver
wkloucek Jan 22, 2021
f2e0d8e
Merge branch 'master' into disable_traefik_dashboard_for_deployment_e…
wkloucek Jan 22, 2021
94c65c6
Merge branch 'master' into add_log_rotation_deploy_examples
wkloucek Jan 23, 2021
2575465
Merge branch 'master' into disable_traefik_dashboard_for_deployment_e…
wkloucek Jan 23, 2021
eb634d2
Merge pull request #1377 from owncloud/add_log_rotation_deploy_examples
wkloucek Jan 23, 2021
eac9e11
Merge branch 'master' into disable_traefik_dashboard_for_deployment_e…
wkloucek Jan 23, 2021
9e68275
Merge pull request #1380 from owncloud/disable_traefik_dashboard_for_…
wkloucek Jan 23, 2021
71dfb4e
Make cert handling in the docs more clear.
Jan 24, 2021
1c83fa0
Merge pull request #1398 from owncloud/docs_tls_go_default
phil-davis Jan 25, 2021
0ec1bd7
Pin behat/gherkin because of Gherkin issue 187
phil-davis Jan 25, 2021
b8ea851
Bump CORE_COMMITID to pin Behat/Gherkin v4.6.2
phil-davis Jan 25, 2021
b3636ee
Adjust expected-failures
phil-davis Jan 25, 2021
1404a8b
Merge pull request #1480 from owncloud/pin-behat-gherkin
phil-davis Jan 25, 2021
7598438
update reva to 0c10b333ee69
butonic Jan 25, 2021
e50ee6e
move refs/pman over to owncloud/ocis/ocis/pkg/runtime
refs Jan 25, 2021
1a38554
port README.md
refs Jan 25, 2021
49b1941
added changelog
refs Jan 25, 2021
70206b7
fix staticcheck
refs Jan 25, 2021
e7903f6
1.1.0 release notes
pmaier1 Jan 25, 2021
0d8e3ea
Update release_notes.md
pmaier1 Jan 25, 2021
4611cc2
Adjust expected-failures
phil-davis Jan 25, 2021
706a58c
Merge pull request #1482 from owncloud/update-reva-for-checksums
butonic Jan 25, 2021
65bc3f1
Automated changelog update [skip ci]
butonic Jan 25, 2021
bf3fff3
[Tests-Only] Adjust the links in the expected-failures file
haribhandari07 Jan 26, 2021
4877cb0
apply review comments
refs Jan 26, 2021
8fe2e72
Merge pull request #1485 from owncloud/fix-links
phil-davis Jan 26, 2021
0b14422
Merge branch 'master' into ocis-1485
refs Jan 26, 2021
6de9b60
Merge pull request #1483 from owncloud/ocis-1485
refs Jan 26, 2021
02693de
Automated changelog update [skip ci]
refs Jan 26, 2021
6f5b346
Merge branch 'master' into 1.1.0_release_notes
kulmann Jan 26, 2021
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .drone.env
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
# The test runner source for API tests
CORE_COMMITID=ec99c594e90b83c8a3778834e31a5714df630ffc
CORE_COMMITID=1628f6156c64717aa23b1e48dd8e51154f68cde8
CORE_BRANCH=master

# The test runner source for UI tests
Expand Down
2 changes: 2 additions & 0 deletions deployments/examples/cs3_users_ocis/.env
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,8 @@
INSECURE=true

### Traefik settings ###
# Serve Treafik dashboard. Defaults to "false".
TRAEFIK_DASHBOARD=
# Domain of Traefik, where you can find the dashboard. Defaults to "traefik.owncloud.test"
TRAEFIK_DOMAIN=
# Basic authentication for the dashboard. Defaults to user "admin" and password "admin"
Expand Down
10 changes: 9 additions & 1 deletion deployments/examples/cs3_users_ocis/docker-compose.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ services:
- "/var/run/docker.sock:/var/run/docker.sock:ro"
- "certs:/certs"
labels:
- "traefik.enable=true"
- "traefik.enable=${TRAEFIK_DASHBOARD:-false}"
- "traefik.http.routers.traefik.entrypoints=http"
- "traefik.http.routers.traefik.rule=Host(`${TRAEFIK_DOMAIN:-traefik.owncloud.test}`)"
- "traefik.http.middlewares.traefik-auth.basicauth.users=${TRAEFIK_BASIC_AUTH_USERS:-admin:$apr1$4vqie50r$YQAmQdtmz5n9rEALhxJ4l.}" # defaults to admin:admin
Expand All @@ -38,6 +38,8 @@ services:
- "traefik.http.routers.traefik-secure.tls=true"
- "traefik.http.routers.traefik-secure.tls.certresolver=http"
- "traefik.http.routers.traefik-secure.service=api@internal"
logging:
driver: "local"
restart: always

ocis:
Expand Down Expand Up @@ -86,6 +88,8 @@ services:
- "traefik.http.routers.ocis-secure.service=ocis"
- "traefik.http.services.ocis.loadbalancer.server.port=9200"
- "traefik.http.services.ocis.loadbalancer.server.scheme=https"
logging:
driver: "local"
restart: always

ldap-server:
Expand All @@ -103,6 +107,8 @@ services:
- "127.0.0.1:636:636"
volumes:
- ./config/ldap/ldif:/container/service/slapd/assets/config/bootstrap/ldif/custom
logging:
driver: "local"
restart: always

ldap-manager:
Expand All @@ -122,6 +128,8 @@ services:
- "traefik.http.routers.ldap-manager-secure.tls.certresolver=http"
- "traefik.http.routers.ldap-manager-secure.service=ldap-manager"
- "traefik.http.services.ldap-manager.loadbalancer.server.port=80"
logging:
driver: "local"
restart: always

volumes:
Expand Down
2 changes: 2 additions & 0 deletions deployments/examples/ocis_keycloak/.env
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,8 @@
INSECURE=true

### Traefik settings ###
# Serve Treafik dashboard. Defaults to "false".
TRAEFIK_DASHBOARD=
# Domain of Traefik, where you can find the dashboard. Defaults to "traefik.owncloud.test"
TRAEFIK_DOMAIN=
# Basic authentication for the dashboard. Defaults to user "admin" and password "admin"
Expand Down
10 changes: 9 additions & 1 deletion deployments/examples/ocis_keycloak/docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ services:
- "/var/run/docker.sock:/var/run/docker.sock:ro"
- "certs:/certs"
labels:
- "traefik.enable=true"
- "traefik.enable=${TRAEFIK_DASHBOARD:-false}"
- "traefik.http.routers.traefik.entrypoints=http"
- "traefik.http.routers.traefik.rule=Host(`${TRAEFIK_DOMAIN:-traefik.owncloud.test}`)"
- "traefik.http.middlewares.traefik-auth.basicauth.users=${TRAEFIK_BASIC_AUTH_USERS:-admin:$apr1$4vqie50r$YQAmQdtmz5n9rEALhxJ4l.}" # defaults to admin:admin
Expand All @@ -39,6 +39,8 @@ services:
- "traefik.http.routers.traefik-secure.tls=true"
- "traefik.http.routers.traefik-secure.tls.certresolver=http"
- "traefik.http.routers.traefik-secure.service=api@internal"
logging:
driver: "local"
restart: always

ocis:
Expand Down Expand Up @@ -73,6 +75,8 @@ services:
- "traefik.http.routers.ocis-secure.service=ocis"
- "traefik.http.services.ocis.loadbalancer.server.port=9200"
- "traefik.http.services.ocis.loadbalancer.server.scheme=https"
logging:
driver: "local"
restart: always

postgres:
Expand All @@ -83,6 +87,8 @@ services:
POSTGRES_DB: keycloak
POSTGRES_USER: keycloak
POSTGRES_PASSWORD: keycloak
logging:
driver: "local"
restart: always

keycloak:
Expand Down Expand Up @@ -112,6 +118,8 @@ services:
- "traefik.http.services.keycloak.loadbalancer.server.scheme=http"
depends_on:
- postgres
logging:
driver: "local"
restart: always

volumes:
Expand Down
2 changes: 2 additions & 0 deletions deployments/examples/ocis_traefik/.env
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,8 @@
INSECURE=true

### Traefik settings ###
# Serve Treafik dashboard. Defaults to "false".
TRAEFIK_DASHBOARD=
# Domain of Traefik, where you can find the dashboard. Defaults to "traefik.owncloud.test"
TRAEFIK_DOMAIN=
# Basic authentication for the dashboard. Defaults to user "admin" and password "admin"
Expand Down
6 changes: 5 additions & 1 deletion deployments/examples/ocis_traefik/docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ services:
- "/var/run/docker.sock:/var/run/docker.sock:ro"
- "certs:/certs"
labels:
- "traefik.enable=true"
- "traefik.enable=${TRAEFIK_DASHBOARD:-false}"
- "traefik.http.routers.traefik.entrypoints=http"
- "traefik.http.routers.traefik.rule=Host(`${TRAEFIK_DOMAIN:-traefik.owncloud.test}`)"
- "traefik.http.middlewares.traefik-auth.basicauth.users=${TRAEFIK_BASIC_AUTH_USERS:-admin:$apr1$4vqie50r$YQAmQdtmz5n9rEALhxJ4l.}" # defaults to admin:admin
Expand All @@ -38,6 +38,8 @@ services:
- "traefik.http.routers.traefik-secure.tls=true"
- "traefik.http.routers.traefik-secure.tls.certresolver=http"
- "traefik.http.routers.traefik-secure.service=api@internal"
logging:
driver: "local"
restart: always

ocis:
Expand All @@ -63,6 +65,8 @@ services:
- "traefik.http.routers.ocis-secure.service=ocis"
- "traefik.http.services.ocis.loadbalancer.server.port=9200"
- "traefik.http.services.ocis.loadbalancer.server.scheme=https"
logging:
driver: "local"
restart: always

volumes:
Expand Down
2 changes: 2 additions & 0 deletions deployments/examples/owncloud10_with_oc_web/.env
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,8 @@
INSECURE=true

### Traefik settings ###
# Serve Treafik dashboard. Defaults to "false".
TRAEFIK_DASHBOARD=
# Domain of Traefik, where you can find the dashboard. Defaults to "traefik.owncloud.test"
TRAEFIK_DOMAIN=
# Basic authentication for the dashboard. Defaults to user "admin" and password "admin"
Expand Down
12 changes: 11 additions & 1 deletion deployments/examples/owncloud10_with_oc_web/docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ services:
- "/var/run/docker.sock:/var/run/docker.sock:ro"
- "certs:/certs"
labels:
- "traefik.enable=true"
- "traefik.enable=${TRAEFIK_DASHBOARD:-false}"
- "traefik.http.routers.traefik.entrypoints=http"
- "traefik.http.routers.traefik.rule=Host(`${TRAEFIK_DOMAIN:-traefik.owncloud.test}`)"
- "traefik.http.middlewares.traefik-auth.basicauth.users=${TRAEFIK_BASIC_AUTH_USERS:-admin:$apr1$4vqie50r$YQAmQdtmz5n9rEALhxJ4l.}" # defaults to admin:admin
Expand All @@ -38,6 +38,8 @@ services:
- "traefik.http.routers.traefik-secure.tls=true"
- "traefik.http.routers.traefik-secure.tls.certresolver=http"
- "traefik.http.routers.traefik-secure.service=api@internal"
logging:
driver: "local"
restart: always

ocis:
Expand Down Expand Up @@ -114,6 +116,8 @@ services:
- "traefik.http.routers.ocis-secure.tls.certresolver=http"
- "traefik.http.routers.ocis-secure.service=ocis"
- "traefik.http.services.ocis.loadbalancer.server.port=9200"
logging:
driver: "local"
restart: always

oc10:
Expand Down Expand Up @@ -156,6 +160,8 @@ services:
- "traefik.http.routers.oc10-secure.tls.certresolver=http"
- "traefik.http.routers.oc10-secure.service=oc10"
- "traefik.http.services.oc10.loadbalancer.server.port=8080"
logging:
driver: "local"
restart: always

db:
Expand All @@ -175,6 +181,8 @@ services:
volumes:
- mysql:/var/lib/mysql
- backup:/var/lib/backup
logging:
driver: "local"
restart: always

redis:
Expand All @@ -183,6 +191,8 @@ services:
- REDIS_DATABASES=1
volumes:
- redis:/var/lib/redis
logging:
driver: "local"
restart: always


Expand Down
10 changes: 7 additions & 3 deletions docs/ocis/deployment/basic-remote-setup.md
Original file line number Diff line number Diff line change
Expand Up @@ -56,11 +56,11 @@ In this example we do not change the default port (`9200`). But this could be ch

You need to configure `your-host` in some services to provide the needed public resources.

This snippet will start the ocis server with auto generated self signed certificates:

```bash
PROXY_HTTP_ADDR=0.0.0.0:9200 \
OCIS_URL=https://your-server:9200 \
PROXY_TRANSPORT_TLS_KEY=./certs/your-host.key \
PROXY_TRANSPORT_TLS_CERT=./certs/your-host.crt \
KONNECTD_TLS=0 \
./bin/ocis server
```
Expand All @@ -69,7 +69,11 @@ For more configuration options check the configuration section in [ocis](https:/

{{< hint info >}}
**TLS Certificate**\
In this example, we are replacing the default self-signed cert with a CA signed one to avoid the certificate warning when accessing the login page.
If you have a CA signed certificate for your domain, add the following configurations:
```
PROXY_TRANSPORT_TLS_KEY=./certs/your-host.key \
PROXY_TRANSPORT_TLS_CERT=./certs/your-host.crt \
```
{{< /hint >}}

## Use Docker Compose
Expand Down
4 changes: 3 additions & 1 deletion docs/ocis/deployment/ocis_keycloak.md
Original file line number Diff line number Diff line change
Expand Up @@ -54,6 +54,8 @@ See also [example server setup]({{< ref "preparing_server.md" >}})
INSECURE=true

### Traefik settings ###
# Serve Treafik dashboard. Defaults to "false".
TRAEFIK_DASHBOARD=
# Domain of Traefik, where you can find the dashboard. Defaults to "traefik.owncloud.test"
TRAEFIK_DOMAIN=
# Basic authentication for the dashboard. Defaults to user "admin" and password "admin"
Expand Down Expand Up @@ -83,7 +85,7 @@ See also [example server setup]({{< ref "preparing_server.md" >}})

You are installing oCIS on a server and Traefik will obtain valid certificates for you so please remove `INSECURE=true` or set it to `false`.

Set your domain for the Traefik dashboard in `TRAEFIK_DOMAIN=` eg. `TRAEFIK_DOMAIN=traefik.owncloud.test`.
If you want to use the Traefik dashboard, set TRAEFIK_DASHBOARD to `true` (default is `false` and therefore not active). If you activate it, you must set a domain for the Traefik dashboard in `TRAEFIK_DOMAIN=` eg. `TRAEFIK_DOMAIN=traefik.owncloud.test`.

The Traefik dashboard is secured by basic auth. Default credentials are the user `admin` with the password `admin`. To set your own credentials, generate a htpasswd (eg. by using [an online tool](https://htpasswdgenerator.de/) or a cli tool).

Expand Down
4 changes: 3 additions & 1 deletion docs/ocis/deployment/ocis_traefik.md
Original file line number Diff line number Diff line change
Expand Up @@ -50,6 +50,8 @@ See also [example server setup]({{< ref "preparing_server.md" >}})
INSECURE=true

### Traefik settings ###
# Serve Treafik dashboard. Defaults to "false".
TRAEFIK_DASHBOARD=
# Domain of Traefik, where you can find the dashboard. Defaults to "traefik.owncloud.test"
TRAEFIK_DOMAIN=
# Basic authentication for the dashboard. Defaults to user "admin" and password "admin"
Expand All @@ -66,7 +68,7 @@ See also [example server setup]({{< ref "preparing_server.md" >}})

You are installing oCIS on a server and Traefik will obtain valid certificates for you so please remove `INSECURE=true` or set it to `false`.

Set your domain for the Traefik dashboard in `TRAEFIK_DOMAIN=` eg. `TRAEFIK_DOMAIN=traefik.owncloud.test`.
If you want to use the Traefik dashboard, set TRAEFIK_DASHBOARD to `true` (default is `false` and therefore not active). If you activate it, you must set a domain for the Traefik dashboard in `TRAEFIK_DOMAIN=` eg. `TRAEFIK_DOMAIN=traefik.owncloud.test`.

The Traefik dashboard is secured by basic auth. Default credentials are the user `admin` with the password `admin`. To set your own credentials, generate a htpasswd (eg. by using [an online tool](https://htpasswdgenerator.de/) or a cli tool).

Expand Down
4 changes: 3 additions & 1 deletion docs/ocis/deployment/owncloud10_with_oc_web.md
Original file line number Diff line number Diff line change
Expand Up @@ -59,6 +59,8 @@ See also [example server setup]({{< ref "preparing_server.md" >}})
INSECURE=true

### Traefik settings ###
# Serve Treafik dashboard. Defaults to "false".
TRAEFIK_DASHBOARD=
# Domain of Traefik, where you can find the dashboard. Defaults to "traefik.owncloud.test"
TRAEFIK_DOMAIN=
# Basic authentication for the dashboard. Defaults to user "admin" and password "admin"
Expand All @@ -79,7 +81,7 @@ See also [example server setup]({{< ref "preparing_server.md" >}})

You are installing oCIS on a server and Traefik will obtain valid certificates for you so please remove `INSECURE=true` or set it to `false`.

Set your domain for the Traefik dashboard in `TRAEFIK_DOMAIN=` eg. `TRAEFIK_DOMAIN=traefik.owncloud.test`.
If you want to use the Traefik dashboard, set TRAEFIK_DASHBOARD to `true` (default is `false` and therefore not active). If you activate it, you must set a domain for the Traefik dashboard in `TRAEFIK_DOMAIN=` eg. `TRAEFIK_DOMAIN=traefik.owncloud.test`.

The Traefik dashboard is secured by basic auth. Default credentials are the user `admin` with the password `admin`. To set your own credentials, generate a htpasswd (eg. by using [an online tool](https://htpasswdgenerator.de/) or a cli tool).

Expand Down
6 changes: 6 additions & 0 deletions docs/ocis/release_notes.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,12 @@ geekdocEditPath: edit/master/docs/ocis
geekdocFilePath: release_notes.md
---

## ownCloud Infinite Scale 1.1.0 Technology Preview

Version 1.1.0 is a hardening and patch release. It ships with version 1.0.2 of ownCloud Web and brings a couple of dependency updates and minor improvements. The minor version increase is needed due to changes in configuration. The documentation has been updated to reflect the changes. Deployments with version 1.0.0 will not break, but the 1.1.0 deployment best practises are not backwards compatible.
kulmann marked this conversation as resolved.
Show resolved Hide resolved

You can also read the full [ownCloud Infinite Scale changelog](https://github.com/owncloud/ocis/blob/master/CHANGELOG.md) for further details on what has changed.

## ownCloud Infinite Scale 1.0.0 Technology Preview

We are pleased to announce the availability of ownCloud Infinite Scale 1.0.0 Technology Preview which is released as the first public version of the new Infinite Scale platform.
Expand Down
20 changes: 8 additions & 12 deletions tests/acceptance/expected-failures-API-on-OCIS-storage.md
Original file line number Diff line number Diff line change
Expand Up @@ -2103,18 +2103,6 @@
- [apiWebdavLocks3/independentLocks.feature:88](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocks.feature#L88)
- [apiWebdavLocks3/independentLocks.feature:89](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocks.feature#L89)
- [apiWebdavLocks3/independentLocks.feature:90](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocks.feature#L90)
- [apiWebdavLocks3/independentLocks.feature:109](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocks.feature#L109)
- [apiWebdavLocks3/independentLocks.feature:110](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocks.feature#L110)
- [apiWebdavLocks3/independentLocks.feature:111](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocks.feature#L111)
- [apiWebdavLocks3/independentLocks.feature:112](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocks.feature#L112)
- [apiWebdavLocks3/independentLocks.feature:134](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocks.feature#L134)
- [apiWebdavLocks3/independentLocks.feature:135](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocks.feature#L135)
- [apiWebdavLocks3/independentLocks.feature:136](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocks.feature#L136)
- [apiWebdavLocks3/independentLocks.feature:137](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocks.feature#L137)
- [apiWebdavLocks3/independentLocks.feature:157](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocks.feature#L157)
- [apiWebdavLocks3/independentLocks.feature:158](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocks.feature#L158)
- [apiWebdavLocks3/independentLocks.feature:159](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocks.feature#L159)
- [apiWebdavLocks3/independentLocks.feature:160](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocks.feature#L160)
- [apiWebdavLocks3/independentLocksShareToShares.feature:27](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocksShareToShares.feature#L27)
- [apiWebdavLocks3/independentLocksShareToShares.feature:28](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocksShareToShares.feature#L28)
- [apiWebdavLocks3/independentLocksShareToShares.feature:29](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocks3/independentLocksShareToShares.feature#L29)
Expand All @@ -2139,6 +2127,14 @@
- [apiWebdavLocksUnlock/unlock.feature:48](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocksUnlock/unlock.feature#L48)
- [apiWebdavLocksUnlock/unlock.feature:60](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocksUnlock/unlock.feature#L60)
- [apiWebdavLocksUnlock/unlock.feature:61](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocksUnlock/unlock.feature#L61)
- [apiWebdavLocksUnlock/unlock.feature:85](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocksUnlock/unlock.feature#L85)
- [apiWebdavLocksUnlock/unlock.feature:86](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocksUnlock/unlock.feature#L86)
- [apiWebdavLocksUnlock/unlock.feature:87](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocksUnlock/unlock.feature#L87)
- [apiWebdavLocksUnlock/unlock.feature:88](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocksUnlock/unlock.feature#L88)
- [apiWebdavLocksUnlock/unlock.feature:110](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocksUnlock/unlock.feature#L110)
- [apiWebdavLocksUnlock/unlock.feature:111](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocksUnlock/unlock.feature#L111)
- [apiWebdavLocksUnlock/unlock.feature:112](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocksUnlock/unlock.feature#L112)
- [apiWebdavLocksUnlock/unlock.feature:113](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocksUnlock/unlock.feature#L113)
- [apiWebdavLocksUnlock/unlockSharingToRoot.feature:20](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocksUnlock/unlockSharingToRoot.feature#L20)
- [apiWebdavLocksUnlock/unlockSharingToRoot.feature:21](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocksUnlock/unlockSharingToRoot.feature#L21)
- [apiWebdavLocksUnlock/unlockSharingToRoot.feature:22](https://github.com/owncloud/core/blob/master/tests/acceptance/features/apiWebdavLocksUnlock/unlockSharingToRoot.feature#L22)
Expand Down
Loading