Skip to content

Commit

Permalink
Removed closed issues from features
Browse files Browse the repository at this point in the history
  • Loading branch information
kiranparajuli589 committed Jul 9, 2021
1 parent 45ab630 commit f27d144
Show file tree
Hide file tree
Showing 11 changed files with 41 additions and 44 deletions.
27 changes: 12 additions & 15 deletions tests/acceptance/expected-failures-with-ocis-server-ocis-storage.md
Original file line number Diff line number Diff line change
Expand Up @@ -241,7 +241,6 @@ Other free text and markdown formatting can be used elsewhere in the document if
### [Accepting different shares with same filename from different users overwrites one file](https://github.com/owncloud/ocis/issues/713)
- [webUISharingAcceptShares/acceptShares.feature:218](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingAcceptShares/acceptShares.feature#L218)

### [Enable re-sharing is not possible](https://github.com/owncloud/ocis/issues/1743)
### [Share Permissions](https://github.com/owncloud/ocis/issues/1277)
- [webUISharingFilePermissionsGroups/sharePermissionsGroup.feature:61](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFilePermissionsGroups/sharePermissionsGroup.feature#L61)
- [webUISharingFilePermissionsGroups/sharePermissionsGroup.feature:62](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFilePermissionsGroups/sharePermissionsGroup.feature#L62)
Expand All @@ -254,20 +253,6 @@ Other free text and markdown formatting can be used elsewhere in the document if
- [webUISharingFolderPermissionsGroups/sharePermissionsGroup.feature:65](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderPermissionsGroups/sharePermissionsGroup.feature#L65)
- [webUISharingInternalGroups/shareWithGroups.feature:74](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingInternalGroups/shareWithGroups.feature#L74)

### [Enable re-sharing is not possible](https://github.com/owncloud/ocis/issues/1743)
- [webUISharingFilePermissionsGroups/sharePermissionsGroup.feature:64](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFilePermissionsGroups/sharePermissionsGroup.feature#L64)
- [webUISharingFilePermissionsGroups/sharePermissionsGroup.feature:65](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFilePermissionsGroups/sharePermissionsGroup.feature#L65)
- [webUISharingFolderPermissionsGroups/sharePermissionsGroup.feature:64](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderPermissionsGroups/sharePermissionsGroup.feature#L64)
- [webUISharingFolderPermissionsGroups/sharePermissionsGroup.feature:66](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderPermissionsGroups/sharePermissionsGroup.feature#L66)
- [webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature:64](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature#L64)
- [webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature:65](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature#L65)
- [webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature:66](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature#L66)
- [webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature:70](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature#L70)
- [webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature:71](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature#L71)
- [webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature:72](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature#L72)
- [webUISharingInternalGroups/shareWithGroups.feature:72](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingInternalGroups/shareWithGroups.feature#L72)
- [webUISharingInternalGroups/shareWithGroups.feature:73](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingInternalGroups/shareWithGroups.feature#L73)

### [Different share permissions provides varying roles in oc10 and ocis](https://github.com/owncloud/ocis/issues/1277)
- [webUISharingInternalGroups/shareWithGroups.feature:166](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingInternalGroups/shareWithGroups.feature#L166)
- [webUISharingInternalGroups/shareWithGroups.feature:180](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingInternalGroups/shareWithGroups.feature#L180)
Expand Down Expand Up @@ -333,6 +318,18 @@ Other free text and markdown formatting can be used elsewhere in the document if
- [webUIMoveFilesFolders/moveFiles.feature:139](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUIMoveFilesFolders/moveFiles.feature#L139)

### [enable re-sharing is not possible](https://github.com/owncloud/ocis/issues/1743)
- [webUISharingFilePermissionsGroups/sharePermissionsGroup.feature:64](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFilePermissionsGroups/sharePermissionsGroup.feature#L64)
- [webUISharingFilePermissionsGroups/sharePermissionsGroup.feature:65](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFilePermissionsGroups/sharePermissionsGroup.feature#L65)
- [webUISharingFolderPermissionsGroups/sharePermissionsGroup.feature:64](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderPermissionsGroups/sharePermissionsGroup.feature#L64)
- [webUISharingFolderPermissionsGroups/sharePermissionsGroup.feature:66](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderPermissionsGroups/sharePermissionsGroup.feature#L66)
- [webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature:64](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature#L64)
- [webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature:65](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature#L65)
- [webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature:66](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature#L66)
- [webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature:70](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature#L70)
- [webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature:71](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature#L71)
- [webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature:72](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderAdvancedPermissionsGroups/shareAdvancePermissionsGroup.feature#L72)
- [webUISharingInternalGroups/shareWithGroups.feature:72](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingInternalGroups/shareWithGroups.feature#L72)
- [webUISharingInternalGroups/shareWithGroups.feature:73](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingInternalGroups/shareWithGroups.feature#L73)
- [webUISharingFolderAdvancedPermissionMultipleUsers/sharedFolderWithMultipleUsersAdvancedPermissions.feature:71](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderAdvancedPermissionMultipleUsers/sharedFolderWithMultipleUsersAdvancedPermissions.feature#L71)
- [webUISharingFolderAdvancedPermissionMultipleUsers/sharedFolderWithMultipleUsersAdvancedPermissions.feature:70](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderAdvancedPermissionMultipleUsers/sharedFolderWithMultipleUsersAdvancedPermissions.feature#L70)
- [webUISharingFolderAdvancedPermissionMultipleUsers/sharedFolderWithMultipleUsersAdvancedPermissions.feature:69](https://github.com/owncloud/web/blob/master/tests/acceptance/features/webUISharingFolderAdvancedPermissionMultipleUsers/sharedFolderWithMultipleUsersAdvancedPermissions.feature#L69)
Expand Down
2 changes: 1 addition & 1 deletion tests/acceptance/features/webUIFilesCopy/copy.feature
Original file line number Diff line number Diff line change
Expand Up @@ -83,7 +83,7 @@ Feature: copy files and folders
And as "Alice" file "simple-folder/simple-empty-folder/data.zip" should exist
And as "Alice" file "simple-folder/data.zip" should exist

@issue-ocis-reva-243

Scenario: copy a file into another folder with no change permission
Given user "Alice" has created file "lorem.txt"
And user "Alice" has created folder "simple-folder"
Expand Down
12 changes: 6 additions & 6 deletions tests/acceptance/features/webUIResharing1/reshareUsers.feature
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ Feature: Resharing shared files with different permissions
| Carol |
And user "Brian" has created folder "simple-folder"

@issue-4193
@issue-ocis-2260
Scenario: share a folder with another user with share permissions and reshare without share permissions to different user, and check if user is displayed for original sharer
Given user "Brian" has shared folder "simple-folder" with user "Alice" with "read, share" permissions
And user "Alice" has accepted the share "simple-folder" offered by user "Brian"
Expand Down Expand Up @@ -70,7 +70,7 @@ Feature: Resharing shared files with different permissions
| item_type | folder |
| permissions | read |

@issue-4193
@issue-2260
Scenario: share a folder with another user with share permissions and reshare without share permissions to different user, and check if user is displayed for the receiver
Given user "Brian" has shared folder "simple-folder" with user "Alice" with "read, share" permissions
And user "Alice" has accepted the share "simple-folder" offered by user "Brian"
Expand Down Expand Up @@ -110,7 +110,7 @@ Feature: Resharing shared files with different permissions
When user "Alice" logs in using the webUI
And the user opens folder "Shares" using the webUI
Then the user should not be able to share resource "simple-folder" using the webUI

@issue-product-270
Scenario: share a file without share permissions and check if another user can reshare
Given user "Brian" has created file "lorem.txt"
Expand Down Expand Up @@ -162,7 +162,7 @@ Feature: Resharing shared files with different permissions
| item_type | folder |
| permissions | share, delete, read |

@issue-product-270 @issue-4193
@issue-product-270
Scenario: User is allowed to reshare a file/folder with the lesser permissions, and check if it is listed for original owner
Given user "Brian" has shared folder "simple-folder" with user "Alice" with "read, share, delete" permissions
And user "Alice" has accepted the share "simple-folder" offered by user "Brian"
Expand Down Expand Up @@ -256,7 +256,7 @@ Feature: Resharing shared files with different permissions
Then user "Alice Hansen" should be listed as "Editor" in the collaborators list on the webUI
And user "Carol King" should be listed as "Editor" reshared through "Alice Hansen" in the collaborators list on the webUI

@ocis-reva-issue-34
@kiran-create-reshare-issue-not-complete-colab-list
Scenario: Share recipient sees resharer in collaborators list
Given user "David" has been created with default attributes and without skeleton files
And group "Davidgrp" has been created
Expand All @@ -271,4 +271,4 @@ Feature: Resharing shared files with different permissions
When user "David" has logged in using the webUI
And the user opens folder "Shares" using the webUI
And the user opens the share dialog for folder "simple-folder" using the webUI
Then user "Brian Murphy" should be listed as "Owner" reshared through "Alice Hansen, Carol King" in the collaborators list on the webUI
Then user "Brian Murphy" should be listed as "Owner" reshared through "Alice Hansen, Carol King" in the collaborators list on the webUI
Original file line number Diff line number Diff line change
Expand Up @@ -98,7 +98,7 @@ Feature: Resharing shared files with different permissions
| Advanced permissions | Advanced permissions | update | update | read, update |
| Advanced permissions | Editor | delete, create, update | | read, delete, update, create |

@issue-4193 @issue-ocis-1743
@issue-ocis-1743
Scenario Outline: share a received folder with another user with same permissions(including share permissions) and check if the user is displayed in collaborators list for original owner
Given user "Brian" has shared folder "simple-folder" with user "Alice" with "<permissions>" permissions
And user "Alice" has accepted the share "simple-folder" offered by user "Brian"
Expand Down Expand Up @@ -131,4 +131,4 @@ Feature: Resharing shared files with different permissions
| Editor | Editor | , | , | all |
| Advanced permissions | Advanced permissions | share, create | share, create | read, share, create |
| Advanced permissions | Advanced permissions | update, share | share, update | read, update, share |
| Advanced permissions | Editor | delete, share, create, update | , | read, share, delete, update, create |
| Advanced permissions | Editor | delete, share, create, update | , | read, share, delete, update, create |
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Feature: Sharing files and folders with internal users
| Brian |
And user "Alice" has created folder "simple-folder"

@issue-4193 @issue-4310
@issue-4310
Scenario: sharing indicator for user shares stays up to date
Given user "Carol" has been created with default attributes and without skeleton files
And user "David" has been created with default attributes and without skeleton files
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -168,7 +168,7 @@ Feature: Create public link shares
| folder | simple-folder |
| file | lorem.txt |

@issue-ocis-reva-243

Scenario: User can create a public link via quick action
Given user "Alice" has created folder "simple-folder"
And user "Alice" has logged in using the webUI
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ Feature: Edit public link shares
Background:
Given user "Alice" has been created with default attributes and without skeleton files

@issue-ocis-reva-41
@issue-ocis-1328
Scenario Outline: user tries to change the role of an existing public link role without entering share password while enforce password for that role is enforced
Given the setting "<setting-name>" of app "core" has been set to "yes"
And user "Alice" has created folder "simple-folder"
Expand All @@ -32,7 +32,7 @@ Feature: Edit public link shares
| read | Editor | shareapi_enforce_links_password_read_write_delete |
| read, create | Uploader | shareapi_enforce_links_password_write_only |

@issue-ocis-reva-41
@issue-ocis-1328
Scenario Outline: user tries to delete the password of an existing public link role while enforce password for that role is enforced
Given the setting "<setting-name>" of app "core" has been set to "yes"
And user "Alice" has created folder "simple-folder"
Expand All @@ -58,7 +58,7 @@ Feature: Edit public link shares
| read, update, create, delete | shareapi_enforce_links_password_read_write_delete |
| create | shareapi_enforce_links_password_write_only |

@issue-ocis-reva-41
@issue-ocis-1328
Scenario Outline: user changes the role of an existing public link role without entering share password while enforce password for the original role is enforced
Given the setting "<setting-name>" of app "core" has been set to "yes"
And user "Alice" has created folder "simple-folder"
Expand All @@ -84,7 +84,7 @@ Feature: Edit public link shares
| read, update, create, delete | Uploader | shareapi_enforce_links_password_read_write_delete | create |
| create | Editor | shareapi_enforce_links_password_write_only | read, update, create, delete |

@issue-ocis-reva-41
@issue-ocis-1328
Scenario: user edits a public link and does not save the changes
Given the setting "shareapi_allow_public_notification" of app "core" has been set to "yes"
And user "Alice" has created folder "simple-folder"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -274,15 +274,15 @@ Feature: Share by public link with different roles
And as "Alice" the content of "simple-folder/'single'quotes.txt" should be the same as the content of local file "'single'quotes.txt"
And as "Alice" the content of "simple-folder/new-lorem.txt" should be the same as the content of local file "new-lorem.txt"

@issue-ocis-reva-41
@issue-ocis-1328
Scenario: user tries to create a public link with Viewer role without entering share password while enforce password on read only public share is enforced
Given the setting "shareapi_enforce_links_password_read_only" of app "core" has been set to "yes"
And user "Alice" has logged in using the webUI
When the user creates a new public link for folder "simple-folder" using the webUI
Then the user should see an error message on the public link share dialog saying "Passwords are enforced for link shares"
And user "Alice" should not have created any shares

@issue-ocis-reva-41
@issue-ocis-1328
Scenario: user tries to create a public link with Contributor role without entering share password while enforce password on read-write public share is enforced
Given the setting "shareapi_enforce_links_password_read_write" of app "core" has been set to "yes"
And user "Alice" has logged in using the webUI
Expand All @@ -291,7 +291,7 @@ Feature: Share by public link with different roles
Then the user should see an error message on the public link share dialog saying "Passwords are enforced for link shares"
And user "Alice" should not have created any shares

@issue-ocis-reva-41
@issue-ocis-1328
Scenario: user tries to create a public link with Editor Role without entering share password while enforce password on read-write public share is enforced
Given the setting "shareapi_enforce_links_password_read_write_delete" of app "core" has been set to "yes"
And user "Alice" has logged in using the webUI
Expand All @@ -300,7 +300,7 @@ Feature: Share by public link with different roles
Then the user should see an error message on the public link share dialog saying "Passwords are enforced for link shares"
And user "Alice" should not have created any shares

@issue-ocis-reva-41
@issue-ocis-1328
Scenario: user tries to create a public link with Uploader role without entering share password while enforce password on write only public share is enforced
Given the setting "shareapi_enforce_links_password_write_only" of app "core" has been set to "yes"
And user "Alice" has logged in using the webUI
Expand All @@ -309,7 +309,7 @@ Feature: Share by public link with different roles
Then the user should see an error message on the public link share dialog saying "Passwords are enforced for link shares"
And user "Alice" should not have created any shares

@issue-ocis-reva-41
@issue-ocis-1328
Scenario: user creates a public link with Contributor Role without entering share password while enforce password on read only public share is enforced
Given the setting "shareapi_enforce_links_password_read_only" of app "core" has been set to "yes"
And user "Alice" has logged in using the webUI
Expand Down
Loading

0 comments on commit f27d144

Please sign in to comment.