From 5bdea318c2ce4f1bcb27460940f7cfcb2bfcc8c5 Mon Sep 17 00:00:00 2001 From: Viktor Scharf Date: Tue, 4 Feb 2025 15:58:28 +0100 Subject: [PATCH] delete issue link from feature files --- .../opencloud_full/{debug-ocis.yml => debug-opencloud.yml} | 0 tests/acceptance/expected-failures-without-remotephp.md | 4 ++-- .../features/apiAccountsHashDifficulty/addUser.feature | 3 --- .../createShareToSharesFolder.feature | 3 --- .../features/apiAccountsHashDifficulty/uploadFile.feature | 3 --- .../apiAccountsHashDifficulty/webDavPUTAuthInvalid.feature | 3 --- .../features/apiContract/spacesSharesReport.feature | 3 --- tests/acceptance/features/apiDownloads/download.feature | 3 --- .../acceptance/features/apiGraphUserGroup/createUser.feature | 3 --- .../acceptance/features/apiGraphUserGroup/deleteUser.feature | 3 --- tests/acceptance/features/apiGraphUserGroup/editUser.feature | 3 --- 11 files changed, 2 insertions(+), 29 deletions(-) rename deployments/examples/opencloud_full/{debug-ocis.yml => debug-opencloud.yml} (100%) diff --git a/deployments/examples/opencloud_full/debug-ocis.yml b/deployments/examples/opencloud_full/debug-opencloud.yml similarity index 100% rename from deployments/examples/opencloud_full/debug-ocis.yml rename to deployments/examples/opencloud_full/debug-opencloud.yml diff --git a/tests/acceptance/expected-failures-without-remotephp.md b/tests/acceptance/expected-failures-without-remotephp.md index 18266cbc12..4403c39912 100644 --- a/tests/acceptance/expected-failures-without-remotephp.md +++ b/tests/acceptance/expected-failures-without-remotephp.md @@ -10,8 +10,8 @@ - [apiContract/spacesReport.feature:34](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiContract/spacesReport.feature#L34) - [apiContract/spacesReport.feature:53](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiContract/spacesReport.feature#L53) - [apiContract/spacesReport.feature:71](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiContract/spacesReport.feature#L71) -- [apiContract/spacesSharesReport.feature:48](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiContract/spacesSharesReport.feature#L48) -- [apiContract/spacesSharesReport.feature:78](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiContract/spacesSharesReport.feature#L78) +- [apiContract/spacesSharesReport.feature:45](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiContract/spacesSharesReport.feature#L45) +- [apiContract/spacesSharesReport.feature:75](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiContract/spacesSharesReport.feature#L75) - [apiSearch1/dateSearch.feature:19](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiSearch1/dateSearch.feature#L19) - [apiSearch1/dateSearch.feature:39](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiSearch1/dateSearch.feature#L39) - [apiSearch1/dateSearch.feature:40](https://github.com/opencloud-eu/opencloud/blob/main/tests/acceptance/features/apiSearch1/dateSearch.feature#L40) diff --git a/tests/acceptance/features/apiAccountsHashDifficulty/addUser.feature b/tests/acceptance/features/apiAccountsHashDifficulty/addUser.feature index b534a8fad5..ca9218fe81 100644 --- a/tests/acceptance/features/apiAccountsHashDifficulty/addUser.feature +++ b/tests/acceptance/features/apiAccountsHashDifficulty/addUser.feature @@ -4,9 +4,6 @@ Feature: add user I want to be able to add users and store their password with the full hash difficulty So that I can give people controlled individual access to resources on the OpenCloud server - Note - this feature is run in CI with ACCOUNTS_HASH_DIFFICULTY set to the default for production - See https://github.com/owncloud/ocis/issues/1542 and https://github.com/owncloud/ocis/pull/839 - Scenario: admin creates a user When the user "Admin" creates a new user with the following attributes using the Graph API: diff --git a/tests/acceptance/features/apiAccountsHashDifficulty/createShareToSharesFolder.feature b/tests/acceptance/features/apiAccountsHashDifficulty/createShareToSharesFolder.feature index ceccc53b6a..d774757b51 100644 --- a/tests/acceptance/features/apiAccountsHashDifficulty/createShareToSharesFolder.feature +++ b/tests/acceptance/features/apiAccountsHashDifficulty/createShareToSharesFolder.feature @@ -4,9 +4,6 @@ Feature: sharing I want to be able to share files when passwords are stored with the full hash difficulty So that I can give people secure controlled access to my data - Note - this feature is run in CI with ACCOUNTS_HASH_DIFFICULTY set to the default for production - See https://github.com/owncloud/ocis/issues/1542 and https://github.com/owncloud/ocis/pull/839 - Scenario Outline: creating a share of a file with a user Given using OCS API version "" diff --git a/tests/acceptance/features/apiAccountsHashDifficulty/uploadFile.feature b/tests/acceptance/features/apiAccountsHashDifficulty/uploadFile.feature index 04dae9232f..b043ded69e 100644 --- a/tests/acceptance/features/apiAccountsHashDifficulty/uploadFile.feature +++ b/tests/acceptance/features/apiAccountsHashDifficulty/uploadFile.feature @@ -4,9 +4,6 @@ Feature: upload file I want to be able to upload files when passwords are stored with the full hash difficulty So that I can store and share files securely between multiple client systems - Note - this feature is run in CI with ACCOUNTS_HASH_DIFFICULTY set to the default for production - See https://github.com/owncloud/ocis/issues/1542 and https://github.com/owncloud/ocis/pull/839 - Scenario Outline: upload a file and check download content Given using OCS API version "" diff --git a/tests/acceptance/features/apiAccountsHashDifficulty/webDavPUTAuthInvalid.feature b/tests/acceptance/features/apiAccountsHashDifficulty/webDavPUTAuthInvalid.feature index 0f80c98cca..7d7ca85f69 100644 --- a/tests/acceptance/features/apiAccountsHashDifficulty/webDavPUTAuthInvalid.feature +++ b/tests/acceptance/features/apiAccountsHashDifficulty/webDavPUTAuthInvalid.feature @@ -4,9 +4,6 @@ Feature: attempt to PUT files with invalid password I want the system to be secure when passwords are stored with the full hash difficulty So that unauthorised users do not have access to data - Note - this feature is run in CI with ACCOUNTS_HASH_DIFFICULTY set to the default for production - See https://github.com/owncloud/ocis/issues/1542 and https://github.com/owncloud/ocis/pull/839 - Background: Given user "Alice" has been created with default attributes And user "Alice" has created folder "/PARENT" diff --git a/tests/acceptance/features/apiContract/spacesSharesReport.feature b/tests/acceptance/features/apiContract/spacesSharesReport.feature index fda7859314..f9569be4be 100644 --- a/tests/acceptance/features/apiContract/spacesSharesReport.feature +++ b/tests/acceptance/features/apiContract/spacesSharesReport.feature @@ -3,9 +3,6 @@ Feature: Report test I want to check the share REPORT response So that I can make sure that the response contains all the relevant details for shares - Note - this feature is run in CI with ACCOUNTS_HASH_DIFFICULTY set to the default for production - See https://github.com/owncloud/ocis/issues/1542 and https://github.com/owncloud/ocis/pull/839 - Background: Given these users have been created with default attributes: | username | diff --git a/tests/acceptance/features/apiDownloads/download.feature b/tests/acceptance/features/apiDownloads/download.feature index 85e097d4ab..4f1a0f04fa 100644 --- a/tests/acceptance/features/apiDownloads/download.feature +++ b/tests/acceptance/features/apiDownloads/download.feature @@ -3,9 +3,6 @@ Feature: Download file in project space I want to be able to download files So that I can have it in my local storage - Note - this feature is run in CI with ACCOUNTS_HASH_DIFFICULTY set to the default for production - See https://github.com/owncloud/ocis/issues/1542 and https://github.com/owncloud/ocis/pull/839 - Background: Given these users have been created with default attributes: | username | diff --git a/tests/acceptance/features/apiGraphUserGroup/createUser.feature b/tests/acceptance/features/apiGraphUserGroup/createUser.feature index ec43b22b91..d6b42ceba1 100644 --- a/tests/acceptance/features/apiGraphUserGroup/createUser.feature +++ b/tests/acceptance/features/apiGraphUserGroup/createUser.feature @@ -3,9 +3,6 @@ Feature: create user I want to create a user So that the user can use the application - Note - this feature is run in CI with ACCOUNTS_HASH_DIFFICULTY set to the default for production - See https://github.com/owncloud/ocis/issues/1542 and https://github.com/owncloud/ocis/pull/839 - Background: Given user "Alice" has been created with default attributes diff --git a/tests/acceptance/features/apiGraphUserGroup/deleteUser.feature b/tests/acceptance/features/apiGraphUserGroup/deleteUser.feature index bb234040b1..8cd8016e13 100644 --- a/tests/acceptance/features/apiGraphUserGroup/deleteUser.feature +++ b/tests/acceptance/features/apiGraphUserGroup/deleteUser.feature @@ -3,9 +3,6 @@ Feature: delete user I want to be able to delete users So that I can remove unnecessary users - Note - this feature is run in CI with ACCOUNTS_HASH_DIFFICULTY set to the default for production - See https://github.com/owncloud/ocis/issues/1542 and https://github.com/owncloud/ocis/pull/839 - Background: Given user "Alice" has been created with default attributes diff --git a/tests/acceptance/features/apiGraphUserGroup/editUser.feature b/tests/acceptance/features/apiGraphUserGroup/editUser.feature index 84b1c030c6..94829fba6c 100644 --- a/tests/acceptance/features/apiGraphUserGroup/editUser.feature +++ b/tests/acceptance/features/apiGraphUserGroup/editUser.feature @@ -3,9 +3,6 @@ Feature: edit user I want to be able to edit user information So that I can manage users - Note - this feature is run in CI with ACCOUNTS_HASH_DIFFICULTY set to the default for production - See https://github.com/owncloud/ocis/issues/1542 and https://github.com/owncloud/ocis/pull/839 - Background: Given user "Alice" has been created with default attributes And the administrator has assigned the role "Admin" to user "Alice" using the Graph API