From 57c78b0a19b4fa82e10218e3177e59620085c6bd Mon Sep 17 00:00:00 2001 From: Saw-jan Date: Mon, 31 Jul 2023 12:47:07 +0545 Subject: [PATCH] skip new behavior tests for reva-master --- .../acceptance/features/apiSpaces/resharing.feature | 6 +++--- .../features/apiSpacesShares/shareSpaces.feature | 4 ++-- .../apiSpacesShares/shareSpacesViaLink.feature | 2 +- .../apiSpacesShares/shareSubItemOfSpace.feature | 2 +- .../shareSubItemOfSpaceViaPublicLink.feature | 2 +- .../reShareAsPublicLinkToSharesNewDav.feature | 12 ++++++------ .../updatePublicLinkShare.feature | 4 ++-- .../coreApiShareReshareToShares1/reShare.feature | 10 +++++----- .../reShareSubfolder.feature | 4 ++-- .../reShareUpdate.feature | 2 +- 10 files changed, 24 insertions(+), 24 deletions(-) diff --git a/tests/acceptance/features/apiSpaces/resharing.feature b/tests/acceptance/features/apiSpaces/resharing.feature index c17d537502..879960b993 100644 --- a/tests/acceptance/features/apiSpaces/resharing.feature +++ b/tests/acceptance/features/apiSpaces/resharing.feature @@ -54,7 +54,7 @@ Feature: Resharing And user "Carol" should be included in the response And user "Damian" should be included in the response - + @skipOnRevaMaster Scenario: user can't share with more permissions than they have When user "Damian" shares folder "Shares/folder" with user "Ember" with permissions "31" using the sharing API Then the OCS status code should be "403" @@ -88,7 +88,7 @@ Feature: Resharing | Brian | 998 | should exist | | Carol | 100 | should not exist | - + @skipOnRevaMaster Scenario Outline: resharing folder with different permissions When user "" shares folder "Shares/folder" with user "Ember" with permissions "" using the sharing API Then the OCS status code should be "" @@ -100,7 +100,7 @@ Feature: Resharing | Damian | 27 | 403 | | Damian | 31 | 403 | - + @skipOnRevaMaster Scenario Outline: Resharing files with different permissions Given user "Alice" has uploaded file with content "Random data" to "/file.txt" And user "Alice" has shared file "/file.txt" with user "Brian" with permissions "" diff --git a/tests/acceptance/features/apiSpacesShares/shareSpaces.feature b/tests/acceptance/features/apiSpacesShares/shareSpaces.feature index 84a0f6a013..5db7e9ce27 100644 --- a/tests/acceptance/features/apiSpacesShares/shareSpaces.feature +++ b/tests/acceptance/features/apiSpacesShares/shareSpaces.feature @@ -131,7 +131,7 @@ Feature: Share spaces | editor | | viewer | - + @skipOnRevaMaster Scenario Outline: user with editor or viewer role cannot share a space to another user Given user "Alice" has shared a space "share space" with settings: | shareWith | Brian | @@ -172,7 +172,7 @@ Feature: Share spaces | manager | editor | | manager | viewer | - + @skipOnRevaMaster Scenario Outline: user without manager role cannot change the role of space members Given user "Alice" has shared a space "share space" with settings: | shareWith | Brian | diff --git a/tests/acceptance/features/apiSpacesShares/shareSpacesViaLink.feature b/tests/acceptance/features/apiSpacesShares/shareSpacesViaLink.feature index ebc4cafb54..42605ac171 100644 --- a/tests/acceptance/features/apiSpacesShares/shareSpacesViaLink.feature +++ b/tests/acceptance/features/apiSpacesShares/shareSpacesViaLink.feature @@ -70,7 +70,7 @@ Feature: Share spaces via link And for user "Alice" the space "share space" should contain these entries: | lorem.txt | - + @skipOnRevaMaster Scenario Outline: user without manager role cannot share a space to public via link Given user "Alice" has shared a space "share space" with settings: | shareWith | Brian | diff --git a/tests/acceptance/features/apiSpacesShares/shareSubItemOfSpace.feature b/tests/acceptance/features/apiSpacesShares/shareSubItemOfSpace.feature index 4d78fd8023..5c697e13a9 100644 --- a/tests/acceptance/features/apiSpacesShares/shareSubItemOfSpace.feature +++ b/tests/acceptance/features/apiSpacesShares/shareSubItemOfSpace.feature @@ -65,7 +65,7 @@ Feature: Share a file or folder that is inside a space | file.txt | file | viewer | 2042-03-25T23:59:59+0100 | 2042-03-25 | | file.txt | file | editor | | | - + @skipOnRevaMaster Scenario Outline: user participant of the project space without space manager role cannot share an entity to another user Given user "Alice" has shared a space "share sub-item" with settings: | shareWith | Brian | diff --git a/tests/acceptance/features/apiSpacesShares/shareSubItemOfSpaceViaPublicLink.feature b/tests/acceptance/features/apiSpacesShares/shareSubItemOfSpaceViaPublicLink.feature index 70ed2a0a64..eed669352b 100644 --- a/tests/acceptance/features/apiSpacesShares/shareSubItemOfSpaceViaPublicLink.feature +++ b/tests/acceptance/features/apiSpacesShares/shareSubItemOfSpaceViaPublicLink.feature @@ -96,7 +96,7 @@ Feature: Share a file or folder that is inside a space via public link | folder | /folder | folder | httpd/unix-directory | | folder/file.txt | /file.txt | file | text/plain | - + @skipOnRevaMaster Scenario Outline: user participant of the project space without space manager role cannot share an entity inside project space via public link Given user "Alice" has shared a space "share sub-item" with settings: | shareWith | Brian | diff --git a/tests/acceptance/features/coreApiSharePublicLink2/reShareAsPublicLinkToSharesNewDav.feature b/tests/acceptance/features/coreApiSharePublicLink2/reShareAsPublicLinkToSharesNewDav.feature index 184231645e..e1eac3261c 100644 --- a/tests/acceptance/features/coreApiSharePublicLink2/reShareAsPublicLinkToSharesNewDav.feature +++ b/tests/acceptance/features/coreApiSharePublicLink2/reShareAsPublicLinkToSharesNewDav.feature @@ -10,7 +10,7 @@ Feature: reshare as public link | Alice | | Brian | - + @skipOnRevaMaster Scenario Outline: creating a public link from a share with read permission only is not allowed Given using OCS API version "" And user "Alice" has created folder "/test" @@ -46,7 +46,7 @@ Feature: reshare as public link | 1 | 100 | | 2 | 200 | - + @skipOnRevaMaster Scenario Outline: creating an upload public link from a share with share+read only permissions is not allowed Given using OCS API version "" And user "Alice" has created folder "/test" @@ -63,7 +63,7 @@ Feature: reshare as public link | 1 | 200 | | 2 | 403 | - + @skipOnRevaMaster Scenario Outline: creating a public link from a share with read+write permissions only is not allowed Given using OCS API version "" And user "Alice" has created folder "/test" @@ -120,7 +120,7 @@ Feature: reshare as public link | 1 | 100 | | 2 | 200 | - + @skipOnRevaMaster Scenario Outline: creating an upload public link from a sub-folder of a share with share+read only permissions is not allowed Given using OCS API version "" And user "Alice" has created folder "/test" @@ -138,7 +138,7 @@ Feature: reshare as public link | 1 | 200 | | 2 | 403 | - + @skipOnRevaMaster Scenario Outline: increasing permissions of a public link of a share with share+read only permissions is not allowed Given using OCS API version "" And user "Alice" has created folder "/test" @@ -159,7 +159,7 @@ Feature: reshare as public link | 1 | 200 | | 2 | 403 | - + @skipOnRevaMaster Scenario Outline: increasing permissions of a public link from a sub-folder of a share with share+read only permissions is not allowed Given using OCS API version "" And user "Alice" has created folder "/test" diff --git a/tests/acceptance/features/coreApiSharePublicLink3/updatePublicLinkShare.feature b/tests/acceptance/features/coreApiSharePublicLink3/updatePublicLinkShare.feature index caeae169f9..961d3faeb9 100644 --- a/tests/acceptance/features/coreApiSharePublicLink3/updatePublicLinkShare.feature +++ b/tests/acceptance/features/coreApiSharePublicLink3/updatePublicLinkShare.feature @@ -246,7 +246,7 @@ Feature: update a public link share | 1 | 100 | | 2 | 200 | - + @skipOnRevaMaster Scenario Outline: adding public upload to a read only shared folder as recipient is not allowed using the public API Given using OCS API version "" And user "Brian" has been created with default attributes and without skeleton files @@ -288,7 +288,7 @@ Feature: update a public link share | 1 | 100 | | 2 | 200 | - + @skipOnRevaMaster Scenario Outline: adding public link with all permissions to a read only shared folder as recipient is not allowed using the public API Given using OCS API version "" And user "Brian" has been created with default attributes and without skeleton files diff --git a/tests/acceptance/features/coreApiShareReshareToShares1/reShare.feature b/tests/acceptance/features/coreApiShareReshareToShares1/reShare.feature index 926f7da7f2..c84136819f 100644 --- a/tests/acceptance/features/coreApiShareReshareToShares1/reShare.feature +++ b/tests/acceptance/features/coreApiShareReshareToShares1/reShare.feature @@ -11,7 +11,7 @@ Feature: sharing | Brian | | Carol | - @smokeTest + @smokeTest @skipOnRevaMaster Scenario Outline: user is not allowed to reshare file when reshare permission is not given Given using OCS API version "" And user "Alice" has uploaded file "filesForUpload/textfile.txt" to "/textfile0.txt" @@ -28,7 +28,7 @@ Feature: sharing | 1 | 200 | | 2 | 403 | - + @skipOnRevaMaster Scenario Outline: user is not allowed to reshare folder when reshare permission is not given Given using OCS API version "" And user "Alice" has created folder "/FOLDER" @@ -109,7 +109,7 @@ Feature: sharing | 1 | 100 | | 2 | 200 | - + @skipOnRevaMaster Scenario Outline: user is not allowed to reshare file and set more permissions bits Given using OCS API version "" And user "Alice" has uploaded file "filesForUpload/textfile.txt" to "/textfile0.txt" @@ -179,7 +179,7 @@ Feature: sharing | 1 | 100 | 17 | 9 | 1 | | 2 | 200 | 17 | 9 | 1 | - + @skipOnRevaMaster Scenario Outline: user is not allowed to reshare folder and set more permissions bits Given using OCS API version "" And user "Alice" has created folder "/PARENT" @@ -220,7 +220,7 @@ Feature: sharing | 1 | 200 | 19 | 15 | | 2 | 403 | 19 | 15 | - + @skipOnRevaMaster Scenario Outline: user is not allowed to reshare folder and add delete permission bit (8) Given using OCS API version "" And user "Alice" has created folder "/PARENT" diff --git a/tests/acceptance/features/coreApiShareReshareToShares2/reShareSubfolder.feature b/tests/acceptance/features/coreApiShareReshareToShares2/reShareSubfolder.feature index d70a66e1a8..b2ee4c9a64 100644 --- a/tests/acceptance/features/coreApiShareReshareToShares2/reShareSubfolder.feature +++ b/tests/acceptance/features/coreApiShareReshareToShares2/reShareSubfolder.feature @@ -29,7 +29,7 @@ Feature: a subfolder of a received share can be reshared | 1 | 100 | | 2 | 200 | - + @skipOnRevaMaster Scenario Outline: user is not allowed to reshare a sub-folder with more permissions Given using OCS API version "" And user "Alice" has shared folder "/TMP" with user "Brian" with permissions @@ -123,7 +123,7 @@ Feature: a subfolder of a received share can be reshared | 1 | 100 | | 2 | 200 | - @issue-2214 + @issue-2214 @skipOnRevaMaster Scenario Outline: user is not allowed to update reshare of a sub-folder with more permissions Given using OCS API version "" And user "Alice" has shared folder "/TMP" with user "Brian" with permissions "share,read" diff --git a/tests/acceptance/features/coreApiShareReshareToShares3/reShareUpdate.feature b/tests/acceptance/features/coreApiShareReshareToShares3/reShareUpdate.feature index 9be59069b7..867d12cba7 100644 --- a/tests/acceptance/features/coreApiShareReshareToShares3/reShareUpdate.feature +++ b/tests/acceptance/features/coreApiShareReshareToShares3/reShareUpdate.feature @@ -46,7 +46,7 @@ Feature: sharing | 1 | 100 | | 2 | 200 | - + @skipOnRevaMaster Scenario Outline: do not allow update of reshare to exceed permissions Given using OCS API version "" And user "Alice" has shared folder "/TMP" with user "Brian" with permissions "share,read"