diff --git a/tests/acceptance/features/apiGraph/addUserToGroup.feature b/tests/acceptance/features/apiGraph/addUserToGroup.feature index e36599618e..ea77a1df12 100644 --- a/tests/acceptance/features/apiGraph/addUserToGroup.feature +++ b/tests/acceptance/features/apiGraph/addUserToGroup.feature @@ -1,4 +1,4 @@ -@api +@api Feature: add users to group As a admin I want to be able to add users to a group @@ -150,7 +150,7 @@ Feature: add users to group | role | | Space Admin | | User | - | Guest | + | User Light | @issue-5938 Scenario Outline: user other than the admin tries to add other user to a group @@ -184,7 +184,7 @@ Feature: add users to group | role | | Space Admin | | User | - | Guest | + | User Light | Scenario: admin tries to add user to a nonexistent group @@ -201,7 +201,7 @@ Feature: add users to group | role | | Space Admin | | User | - | Guest | + | User Light | Scenario: admin tries to add a nonexistent user to a group diff --git a/tests/acceptance/features/apiGraph/assignRole.feature b/tests/acceptance/features/apiGraph/assignRole.feature index 1cfdcac996..b14533c93f 100644 --- a/tests/acceptance/features/apiGraph/assignRole.feature +++ b/tests/acceptance/features/apiGraph/assignRole.feature @@ -16,7 +16,7 @@ Feature: assign role | Admin | | Space Admin | | User | - | Guest | + | User Light | @issue-5032 Scenario Outline: assign role to the user with graph api and list role with setting api @@ -30,7 +30,7 @@ Feature: assign role | Admin | 201 | | Space Admin | 401 | | User | 401 | - | Guest | 401 | + | User Light | 401 | Scenario Outline: assign role to the user with setting api and list role with graph api @@ -44,4 +44,4 @@ Feature: assign role | Admin | | Space Admin | | User | - | Guest | + | User Light | diff --git a/tests/acceptance/features/apiGraph/changeRole.feature b/tests/acceptance/features/apiGraph/changeRole.feature index bdc03d4ad5..a5572054db 100644 --- a/tests/acceptance/features/apiGraph/changeRole.feature +++ b/tests/acceptance/features/apiGraph/changeRole.feature @@ -20,19 +20,19 @@ Feature: change role | Admin | Admin | | Admin | Space Admin | | Admin | User | - | Admin | Guest | + | Admin | User Light | | Space Admin | Admin | | Space Admin | Space Admin | | Space Admin | User | - | Space Admin | Guest | + | Space Admin | User Light | | User | Admin | | User | Space Admin | | User | User | - | User | Guest | - | Guest | Admin | - | Guest | Space Admin | - | Guest | User | - | Guest | Guest | + | User | User Light | + | User Light | Admin | + | User Light | Space Admin | + | User Light | User | + | User Light | User Light | Scenario Outline: admin user tries to change his/her own role @@ -44,5 +44,5 @@ Feature: change role | newRole | | Space Admin | | User | - | Guest | + | User Light | | Admin | diff --git a/tests/acceptance/features/apiGraph/createGroup.feature b/tests/acceptance/features/apiGraph/createGroup.feature index b8263a1002..22402513f7 100644 --- a/tests/acceptance/features/apiGraph/createGroup.feature +++ b/tests/acceptance/features/apiGraph/createGroup.feature @@ -1,4 +1,4 @@ -@api +@api Feature: create group As an admin I want to create a group @@ -42,7 +42,7 @@ Feature: create group | userRole | | Space Admin | | User | - | Guest | + | User Light | @issue-5050 Scenario: admin user tries to create a group that is the empty string diff --git a/tests/acceptance/features/apiGraph/createUser.feature b/tests/acceptance/features/apiGraph/createUser.feature index 6b718059bb..a141c63897 100644 --- a/tests/acceptance/features/apiGraph/createUser.feature +++ b/tests/acceptance/features/apiGraph/createUser.feature @@ -66,7 +66,7 @@ Feature: create user | role | | Space Admin | | User | - | Guest | + | User Light | @issue-3516 @skipOnStable2.0 Scenario: user cannot be created with the name of the disabled user diff --git a/tests/acceptance/features/apiGraph/deleteGroup.feature b/tests/acceptance/features/apiGraph/deleteGroup.feature index 48ca52ccf0..aa2787e6e1 100644 --- a/tests/acceptance/features/apiGraph/deleteGroup.feature +++ b/tests/acceptance/features/apiGraph/deleteGroup.feature @@ -62,7 +62,7 @@ Feature: delete groups | role | | Space Admin | | User | - | Guest | + | User Light | @issue-903 Scenario: deleted group should not be listed in the sharees list diff --git a/tests/acceptance/features/apiGraph/deleteUser.feature b/tests/acceptance/features/apiGraph/deleteUser.feature index def4fd50fb..f8a5df028d 100644 --- a/tests/acceptance/features/apiGraph/deleteUser.feature +++ b/tests/acceptance/features/apiGraph/deleteUser.feature @@ -1,4 +1,4 @@ -@api +@api Feature: delete user As an admin I want to be able to delete users @@ -48,7 +48,7 @@ Feature: delete user | Admin | | Space Admin | | User | - | Guest | + | User Light | Scenario: admin user tries to delete his/her own account @@ -67,7 +67,7 @@ Feature: delete user | role | | Space Admin | | User | - | Guest | + | User Light | Scenario: admin user tries to delete a nonexistent user @@ -75,7 +75,7 @@ Feature: delete user When the user "Alice" tries to delete a nonexistent user using the Graph API Then the HTTP status code should be "404" - + Scenario Outline: non-admin user tries to delete a nonexistent user Given the administrator has given "Alice" the role "" using the settings api When the user "Alice" tries to delete a nonexistent user using the Graph API @@ -84,7 +84,7 @@ Feature: delete user | role | | Space Admin | | User | - | Guest | + | User Light | Scenario Outline: non-admin user tries to delete another user with different role @@ -98,16 +98,16 @@ Feature: delete user | userRole | role | | Space Admin | Space Admin | | Space Admin | User | - | Space Admin | Guest | + | Space Admin | User Light | | Space Admin | Admin | | User | Space Admin | | User | User | - | User | Guest | + | User | User Light | | User | Admin | - | Guest | Space Admin | - | Guest | User | - | Guest | Guest | - | Guest | Admin | + | User Light | Space Admin | + | User Light | User | + | User Light | User Light | + | User Light | Admin | Scenario: admin user deletes a disabled user @@ -133,13 +133,13 @@ Feature: delete user | userRole | role | | Space Admin | Space Admin | | Space Admin | User | - | Space Admin | Guest | + | Space Admin | User Light | | Space Admin | Admin | | User | Space Admin | | User | User | - | User | Guest | + | User | User Light | | User | Admin | - | Guest | Space Admin | - | Guest | User | - | Guest | Guest | - | Guest | Admin | + | User Light | Space Admin | + | User Light | User | + | User Light | User Light | + | User Light | Admin | diff --git a/tests/acceptance/features/apiGraph/editGroup.feature b/tests/acceptance/features/apiGraph/editGroup.feature index 39e7294169..4335c9c347 100644 --- a/tests/acceptance/features/apiGraph/editGroup.feature +++ b/tests/acceptance/features/apiGraph/editGroup.feature @@ -1,4 +1,4 @@ -@api +@api Feature: edit group name As an admin I want to be able to edit group name @@ -34,7 +34,7 @@ Feature: edit group name | role | | Space Admin | | User | - | Guest | + | User Light | Scenario: admin user tries to rename nonexistent group diff --git a/tests/acceptance/features/apiGraph/editUser.feature b/tests/acceptance/features/apiGraph/editUser.feature index e8803ecd46..d286cf939f 100644 --- a/tests/acceptance/features/apiGraph/editUser.feature +++ b/tests/acceptance/features/apiGraph/editUser.feature @@ -1,4 +1,4 @@ -@api +@api Feature: edit user As an admin I want to be able to edit user information @@ -146,7 +146,7 @@ Feature: edit user | role | | Space Admin | | User | - | Guest | + | User Light | Scenario Outline: normal user should not be able to edit another user's email @@ -178,16 +178,16 @@ Feature: edit user | userRole | role | | Space Admin | Space Admin | | Space Admin | User | - | Space Admin | Guest | + | Space Admin | User Light | | Space Admin | Admin | | User | Space Admin | | User | User | - | User | Guest | + | User | User Light | | User | Admin | - | Guest | Space Admin | - | Guest | User | - | Guest | Guest | - | Guest | Admin | + | User Light | Space Admin | + | User Light | User | + | User Light | User Light | + | User Light | Admin | Scenario Outline: admin user can edit another user display name @@ -239,7 +239,7 @@ Feature: edit user | role | | Space Admin | | User | - | Guest | + | User Light | Scenario Outline: normal user should not be able to edit another user's display name @@ -271,16 +271,16 @@ Feature: edit user | userRole | role | | Space Admin | Space Admin | | Space Admin | User | - | Space Admin | Guest | + | Space Admin | User Light | | Space Admin | Admin | | User | Space Admin | | User | User | - | User | Guest | + | User | User Light | | User | Admin | - | Guest | Space Admin | - | Guest | User | - | Guest | Guest | - | Guest | Admin | + | User Light | Space Admin | + | User Light | User | + | User Light | User Light | + | User Light | Admin | Scenario: admin user resets password of another user @@ -307,16 +307,16 @@ Feature: edit user | userRole | role | | Space Admin | Space Admin | | Space Admin | User | - | Space Admin | Guest | + | Space Admin | User Light | | Space Admin | Admin | | User | Space Admin | | User | User | - | User | Guest | + | User | User Light | | User | Admin | - | Guest | Space Admin | - | Guest | User | - | Guest | Guest | - | Guest | Admin | + | User Light | Space Admin | + | User Light | User | + | User Light | User Light | + | User Light | Admin | @skipOnStable2.0 Scenario: admin user disables another user @@ -407,7 +407,7 @@ Feature: edit user | role | | Space Admin | | User | - | Guest | + | User Light | @skipOnStable2.0 Scenario: admin user enables disabled user @@ -500,4 +500,4 @@ Feature: edit user | role | | Space Admin | | User | - | Guest | + | User Light | diff --git a/tests/acceptance/features/apiGraph/getApplications.feature b/tests/acceptance/features/apiGraph/getApplications.feature index 01f6beee26..0e943ae822 100644 --- a/tests/acceptance/features/apiGraph/getApplications.feature +++ b/tests/acceptance/features/apiGraph/getApplications.feature @@ -20,10 +20,10 @@ Feature: get applications | Admin | | Space Admin | | User | - | Guest | + | User Light | Examples: | role | | Admin | | Space Admin | | User | - | Guest | + | User Light | diff --git a/tests/acceptance/features/apiGraph/getGroup.feature b/tests/acceptance/features/apiGraph/getGroup.feature index bc0ea867e2..d56715545d 100644 --- a/tests/acceptance/features/apiGraph/getGroup.feature +++ b/tests/acceptance/features/apiGraph/getGroup.feature @@ -1,4 +1,4 @@ -@api +@api Feature: get groups and their members As an admin I want to be able to get groups @@ -54,7 +54,7 @@ Feature: get groups and their members | role | | Space Admin | | User | - | Guest | + | User Light | Scenario: admin user gets users of a group @@ -103,7 +103,7 @@ Feature: get groups and their members | role | | Space Admin | | User | - | Guest | + | User Light | Scenario: admin user gets all groups along with its member's information @@ -267,7 +267,7 @@ Feature: get groups and their members | role | | Space Admin | | User | - | Guest | + | User Light | Scenario: admin user gets a group along with its member's information @@ -381,7 +381,7 @@ Feature: get groups and their members | role | | Space Admin | | User | - | Guest | + | User Light | Scenario: get details of a group diff --git a/tests/acceptance/features/apiGraph/getUser.feature b/tests/acceptance/features/apiGraph/getUser.feature index fb6031bebd..b85380c7fb 100644 --- a/tests/acceptance/features/apiGraph/getUser.feature +++ b/tests/acceptance/features/apiGraph/getUser.feature @@ -1,4 +1,4 @@ -@api +@api Feature: get users As an admin I want to be able to retrieve user information @@ -82,16 +82,16 @@ Feature: get users | userRole | role | | Space Admin | Space Admin | | Space Admin | User | - | Space Admin | Guest | + | Space Admin | User Light | | Space Admin | Admin | | User | Space Admin | | User | User | - | User | Guest | + | User | User Light | | User | Admin | - | Guest | Space Admin | - | Guest | User | - | Guest | Guest | - | Guest | Admin | + | User Light | Space Admin | + | User Light | User | + | User Light | User Light | + | User Light | Admin | @skipOnStable2.0 Scenario: admin user gets all users @@ -256,7 +256,7 @@ Feature: get users | userRole | | Space Admin | | User | - | Guest | + | User Light | @skipOnStable2.0 Scenario: admin user gets the drive information of a user @@ -507,7 +507,7 @@ Feature: get users | userRole | | Space Admin | | User | - | Guest | + | User Light | @skipOnStable2.0 Scenario: admin user gets the group information of a user @@ -606,16 +606,16 @@ Feature: get users | userRole | role | | Space Admin | Space Admin | | Space Admin | User | - | Space Admin | Guest | + | Space Admin | User Light | | Space Admin | Admin | | User | Space Admin | | User | User | - | User | Guest | + | User | User Light | | User | Admin | - | Guest | Space Admin | - | Guest | User | - | Guest | Guest | - | Guest | Admin | + | User Light | Space Admin | + | User Light | User | + | User Light | User Light | + | User Light | Admin | @skipOnStable2.0 Scenario: admin user gets all users of certain groups @@ -858,7 +858,7 @@ Feature: get users | role | | Space Admin | | User | - | Guest | + | User Light | @skipOnStable2.0 Scenario: admin user gets all users with certain roles and members of a certain group @@ -995,16 +995,16 @@ Feature: get users | userRole | role | | Space Admin | Space Admin | | Space Admin | User | - | Space Admin | Guest | + | Space Admin | User Light | | Space Admin | Admin | | User | Space Admin | | User | User | - | User | Guest | + | User | User Light | | User | Admin | - | Guest | Space Admin | - | Guest | User | - | Guest | Guest | - | Guest | Admin | + | User Light | Space Admin | + | User Light | User | + | User Light | User Light | + | User Light | Admin | @issue-6017 Scenario Outline: admin user gets the drive information of a user with different user role @@ -1105,11 +1105,11 @@ Feature: get users | Admin | Admin | | Admin | Space Admin | | Admin | User | - | Admin | Guest | + | Admin | User Light | | Space Admin | Admin | | Space Admin | Space Admin | | Space Admin | User | - | Space Admin | Guest | + | Space Admin | User Light | Scenario Outline: non-admin user tries to get drive information of other user with different user role @@ -1150,11 +1150,11 @@ Feature: get users | User | Admin | | User | Space Admin | | User | User | - | User | Guest | - | Guest | Admin | - | Guest | Space Admin | - | Guest | User | - | Guest | Guest | + | User | User Light | + | User Light | Admin | + | User Light | Space Admin | + | User Light | User | + | User Light | User Light | Scenario Outline: user with different user role gets his/her own drive information @@ -1253,4 +1253,4 @@ Feature: get users | Admin | | Space Admin | | User | - | Guest | + | User Light | diff --git a/tests/acceptance/features/apiGraph/removeUserFromGroup.feature b/tests/acceptance/features/apiGraph/removeUserFromGroup.feature index 45d51bac5a..21cdc3b6cd 100644 --- a/tests/acceptance/features/apiGraph/removeUserFromGroup.feature +++ b/tests/acceptance/features/apiGraph/removeUserFromGroup.feature @@ -1,4 +1,4 @@ -@api +@api Feature: remove a user from a group As an admin I want to be able to remove a user from a group @@ -191,7 +191,7 @@ Feature: remove a user from a group | role | | Space Admin | | User | - | Guest | + | User Light | Scenario: admin removes a disabled user from a group diff --git a/tests/acceptance/features/apiGraph/unassignRole.feature b/tests/acceptance/features/apiGraph/unassignRole.feature index efe4fa2cd7..43088e793c 100644 --- a/tests/acceptance/features/apiGraph/unassignRole.feature +++ b/tests/acceptance/features/apiGraph/unassignRole.feature @@ -22,7 +22,7 @@ Feature: unassign user role | Admin | | Space Admin | | User | - | Guest | + | User Light | @issue-6035 Scenario: admin user tries to unassign his/her own role diff --git a/tests/acceptance/features/apiGraph/userGDPRExport.feature b/tests/acceptance/features/apiGraph/userGDPRExport.feature index cd9bcbabbb..e0bc8efb75 100644 --- a/tests/acceptance/features/apiGraph/userGDPRExport.feature +++ b/tests/acceptance/features/apiGraph/userGDPRExport.feature @@ -504,19 +504,19 @@ Feature: user GDPR (General Data Protection Regulation) report | userRole | role | | Space Admin | Space Admin | | Space Admin | User | - | Space Admin | Guest | + | Space Admin | User Light | | Space Admin | Admin | | User | Space Admin | | User | User | - | User | Guest | + | User | User Light | | User | Admin | - | Guest | Space Admin | - | Guest | User | - | Guest | Guest | - | Guest | Admin | + | User Light | Space Admin | + | User Light | User | + | User Light | User Light | + | User Light | Admin | | Admin | Space Admin | | Admin | User | - | Admin | Guest | + | Admin | User Light | | Admin | Admin | diff --git a/tests/acceptance/features/apiSpaces/changeSpaces.feature b/tests/acceptance/features/apiSpaces/changeSpaces.feature index 4ad095a0af..9cff5889e5 100644 --- a/tests/acceptance/features/apiSpaces/changeSpaces.feature +++ b/tests/acceptance/features/apiSpaces/changeSpaces.feature @@ -520,7 +520,7 @@ Feature: Change data of space | Admin | | Space Admin | | User | - | Guest | + | User Light | Scenario Outline: admin user set own quota of a personal space via the Graph API and upload resource diff --git a/tests/acceptance/features/apiSpaces/createSpace.feature b/tests/acceptance/features/apiSpaces/createSpace.feature index 2500e7c513..fb7484e3d1 100644 --- a/tests/acceptance/features/apiSpaces/createSpace.feature +++ b/tests/acceptance/features/apiSpaces/createSpace.feature @@ -8,15 +8,15 @@ Feature: create space Given user "Alice" has been created with default attributes and without skeleton files @issue-5938 - Scenario Outline: user with role user and guest can't create space via Graph API + Scenario Outline: user with role user and user light can't create space via Graph API Given the administrator has given "Alice" the role "" using the settings api When user "Alice" tries to create a space "Project Mars" of type "project" with the default quota using the Graph API Then the HTTP status code should be "403" And the user "Alice" should not have a space called "share space" Examples: - | role | - | User | - | Guest | + | role | + | User | + | User Light | Scenario Outline: admin or space admin user can create a space via the Graph API with a default quota diff --git a/tests/acceptance/features/apiSpaces/disableAndDeleteSpaces.feature b/tests/acceptance/features/apiSpaces/disableAndDeleteSpaces.feature index d6fa1c900c..844a940ecc 100644 --- a/tests/acceptance/features/apiSpaces/disableAndDeleteSpaces.feature +++ b/tests/acceptance/features/apiSpaces/disableAndDeleteSpaces.feature @@ -35,19 +35,19 @@ Feature: Disabling and deleting space | Admin | | Space Admin | | User | - | Guest | + | User Light | - Scenario Outline: user with role user and guest cannot disable other space via the Graph API + Scenario Outline: user with role user and user light cannot disable other space via the Graph API Given the administrator has given "Carol" the role "" using the settings api When user "Carol" tries to disable a space "Project Moon" owned by user "Alice" Then the HTTP status code should be "404" And the user "Brian" should have a space called "Project Moon" And the user "Bob" should have a space called "Project Moon" Examples: - | role | - | User | - | Guest | + | role | + | User | + | User Light | Scenario: a space manager can disable and delete space in which files and folders exist via the webDav API @@ -70,7 +70,7 @@ Feature: Disabling and deleting space | Admin | | Space Admin | | User | - | Guest | + | User Light | Scenario Outline: user can delete their own disabled space via the Graph API @@ -84,7 +84,7 @@ Feature: Disabling and deleting space | Admin | | Space Admin | | User | - | Guest | + | User Light | Scenario Outline: an admin and space manager can disable other space via the Graph API @@ -111,12 +111,12 @@ Feature: Disabling and deleting space | Space Admin | - Scenario Outline: user with role user and guest cannot delete others disabled space via the Graph API + Scenario Outline: user with role user and user light cannot delete others disabled space via the Graph API Given the administrator has given "Carol" the role "" using the settings api And user "Alice" has disabled a space "Project Moon" When user "Carol" tries to delete a space "Project Moon" owned by user "Alice" Then the HTTP status code should be "404" Examples: - | role | - | User | - | Guest | + | role | + | User | + | User Light | diff --git a/tests/acceptance/features/apiSpaces/listSpaces.feature b/tests/acceptance/features/apiSpaces/listSpaces.feature index 06d525df6b..2d47d56b7a 100644 --- a/tests/acceptance/features/apiSpaces/listSpaces.feature +++ b/tests/acceptance/features/apiSpaces/listSpaces.feature @@ -1,4 +1,4 @@ -@api +@api Feature: List and create spaces As a user I want to be able to list project spaces @@ -429,4 +429,4 @@ Feature: List and create spaces | Admin | | Space Admin | | User | - | Guest | + | User Light | diff --git a/tests/acceptance/features/apiSpaces/restoreSpaces.feature b/tests/acceptance/features/apiSpaces/restoreSpaces.feature index 58dbe75927..c035944c06 100644 --- a/tests/acceptance/features/apiSpaces/restoreSpaces.feature +++ b/tests/acceptance/features/apiSpaces/restoreSpaces.feature @@ -1,4 +1,4 @@ -@api +@api Feature: Restoring space As a manager of space I want to be able to restore a disabled space @@ -72,15 +72,15 @@ Feature: Restoring space | editor | - Scenario Outline: user with role user and guest cannot restore space + Scenario Outline: user with role user and user light cannot restore space Given the administrator has given "Brian" the role "" using the settings api And user "Alice" has disabled a space "restore a space" When user "Brian" tries to restore a disabled space "restore a space" owned by user "Alice" Then the HTTP status code should be "404" Examples: - | role | - | User | - | Guest | + | role | + | User | + | User Light | @issue-5872 Scenario Outline: admin and space admin can restore other space diff --git a/tests/acceptance/features/apiSpaces/setQuota.feature b/tests/acceptance/features/apiSpaces/setQuota.feature index feff65c690..9d7c309db5 100644 --- a/tests/acceptance/features/apiSpaces/setQuota.feature +++ b/tests/acceptance/features/apiSpaces/setQuota.feature @@ -44,7 +44,7 @@ Feature: Set quota | Admin | | Space Admin | | User | - | Guest | + | User Light | Scenario Outline: non-admin user tries to set the personal space quota of other users @@ -57,15 +57,15 @@ Feature: Set quota | Space Admin | Admin | | Space Admin | Space Admin | | Space Admin | User | - | Space Admin | Guest | + | Space Admin | User Light | | User | Admin | | User | Space Admin | | User | User | - | User | Guest | - | Guest | Admin | - | Guest | Space Admin | - | Guest | User | - | Guest | Guest | + | User | User Light | + | User Light | Admin | + | User Light | Space Admin | + | User Light | User | + | User Light | User Light | Scenario Outline: admin or space admin user sets a quota of a project space @@ -108,7 +108,7 @@ Feature: Set quota | Space Admin | - Scenario Outline: normal or guest user tries to set quota of a space + Scenario Outline: normal or user light user tries to set quota of a space Given the administrator has given "Alice" the role "Space Admin" using the settings api And the administrator has given "Brian" the role "" using the settings api And user "Alice" has created a space "Project Jupiter" of type "project" with quota "20" @@ -118,13 +118,13 @@ Feature: Set quota When user "Brian" changes the quota of the "Project Jupiter" space to "100" Then the HTTP status code should be "403" Examples: - | userRole | spaceRole | - | User | viewer | - | User | editor | - | User | manager | - | Guest | viewer | - | Guest | editor | - | Guest | manager | + | userRole | spaceRole | + | User | viewer | + | User | editor | + | User | manager | + | User Light | viewer | + | User Light | editor | + | User Light | manager | Scenario: admin user can set their own personal space quota @@ -164,4 +164,4 @@ Feature: Set quota | userRole | | Space Admin | | User | - | Guest | + | User Light |