2014-04-30 14:49:16 +04:00
|
|
|
<?php
|
|
|
|
/**
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Björn Schießle <schiessle@owncloud.com>
|
|
|
|
* @author Joas Schilling <nickvergessen@owncloud.com>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
|
|
|
* @author Robin Appelman <icewind@owncloud.com>
|
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
|
|
|
* @author Vincent Petry <pvince81@owncloud.com>
|
2014-04-30 14:49:16 +04:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* @copyright Copyright (c) 2015, ownCloud, Inc.
|
|
|
|
* @license AGPL-3.0
|
2014-04-30 14:49:16 +04:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
2014-04-30 14:49:16 +04:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
2014-04-30 14:49:16 +04:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2015-03-26 13:44:34 +03:00
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
2014-04-30 14:49:16 +04:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2014-04-30 14:49:16 +04:00
|
|
|
*
|
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
2014-04-30 14:49:16 +04:00
|
|
|
use OCA\Files\Share;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Class Test_Files_Sharing_Api
|
|
|
|
*/
|
2014-10-30 19:20:40 +03:00
|
|
|
class Test_Files_Sharing_Storage extends OCA\Files_sharing\Tests\TestCase {
|
2014-04-30 14:49:16 +04:00
|
|
|
|
2014-11-11 00:28:12 +03:00
|
|
|
protected function setUp() {
|
2014-04-30 14:49:16 +04:00
|
|
|
parent::setUp();
|
2015-01-14 23:06:26 +03:00
|
|
|
\OCA\Files_Trashbin\Trashbin::registerHooks();
|
2014-04-30 14:49:16 +04:00
|
|
|
$this->folder = '/folder_share_storage_test';
|
|
|
|
|
|
|
|
$this->filename = '/share-api-storage.txt';
|
|
|
|
|
2014-05-26 14:37:43 +04:00
|
|
|
|
2014-04-30 14:49:16 +04:00
|
|
|
$this->view->mkdir($this->folder);
|
2014-05-26 14:37:43 +04:00
|
|
|
|
|
|
|
// save file with content
|
|
|
|
$this->view->file_put_contents($this->filename, "root file");
|
|
|
|
$this->view->file_put_contents($this->folder . $this->filename, "file in subfolder");
|
2014-04-30 14:49:16 +04:00
|
|
|
}
|
|
|
|
|
2014-11-11 00:28:12 +03:00
|
|
|
protected function tearDown() {
|
2014-05-26 14:37:43 +04:00
|
|
|
$this->view->unlink($this->folder);
|
|
|
|
$this->view->unlink($this->filename);
|
2014-04-30 14:49:16 +04:00
|
|
|
|
2015-01-23 17:22:06 +03:00
|
|
|
\OC\Files\Filesystem::getLoader()->removeStorageWrapper('oc_trashbin');
|
|
|
|
|
2014-04-30 14:49:16 +04:00
|
|
|
parent::tearDown();
|
|
|
|
}
|
|
|
|
|
2014-04-30 18:56:09 +04:00
|
|
|
/**
|
2014-08-14 19:21:52 +04:00
|
|
|
* if the parent of the mount point is gone then the mount point should move up
|
|
|
|
*
|
2014-04-30 18:56:09 +04:00
|
|
|
* @medium
|
|
|
|
*/
|
2014-08-14 19:21:52 +04:00
|
|
|
function testParentOfMountPointIsGone() {
|
2014-04-30 18:56:09 +04:00
|
|
|
|
|
|
|
// share to user
|
|
|
|
$fileinfo = $this->view->getFileInfo($this->folder);
|
|
|
|
$result = \OCP\Share::shareItem('folder', $fileinfo['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2, 31);
|
|
|
|
|
|
|
|
$this->assertTrue($result);
|
|
|
|
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
$user2View = new \OC\Files\View('/' . self::TEST_FILES_SHARING_API_USER2 . '/files');
|
|
|
|
$this->assertTrue($user2View->file_exists($this->folder));
|
|
|
|
|
|
|
|
// create a local folder
|
|
|
|
$result = $user2View->mkdir('localfolder');
|
|
|
|
$this->assertTrue($result);
|
|
|
|
|
|
|
|
// move mount point to local folder
|
|
|
|
$result = $user2View->rename($this->folder, '/localfolder/' . $this->folder);
|
|
|
|
$this->assertTrue($result);
|
|
|
|
|
|
|
|
// mount point in the root folder should no longer exist
|
|
|
|
$this->assertFalse($user2View->is_dir($this->folder));
|
|
|
|
|
|
|
|
// delete the local folder
|
2014-08-14 19:21:52 +04:00
|
|
|
$fullPath = \OC_Config::getValue('datadirectory') . '/' . self::TEST_FILES_SHARING_API_USER2 . '/files/localfolder';
|
|
|
|
rmdir($fullPath);
|
2014-04-30 18:56:09 +04:00
|
|
|
|
|
|
|
//enforce reload of the mount points
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
|
|
|
|
//mount point should be back at the root
|
|
|
|
$this->assertTrue($user2View->is_dir($this->folder));
|
|
|
|
|
|
|
|
//cleanup
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER1);
|
|
|
|
$this->view->unlink($this->folder);
|
|
|
|
}
|
|
|
|
|
2014-04-30 14:49:16 +04:00
|
|
|
/**
|
|
|
|
* @medium
|
|
|
|
*/
|
|
|
|
function testRenamePartFile() {
|
|
|
|
|
|
|
|
// share to user
|
|
|
|
$fileinfo = $this->view->getFileInfo($this->folder);
|
|
|
|
$result = \OCP\Share::shareItem('folder', $fileinfo['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2, 31);
|
|
|
|
|
|
|
|
$this->assertTrue($result);
|
|
|
|
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
$user2View = new \OC\Files\View('/' . self::TEST_FILES_SHARING_API_USER2 . '/files');
|
|
|
|
|
|
|
|
$this->assertTrue($user2View->file_exists($this->folder));
|
|
|
|
|
|
|
|
// create part file
|
|
|
|
$result = $user2View->file_put_contents($this->folder. '/foo.txt.part', 'some test data');
|
|
|
|
|
|
|
|
$this->assertTrue(is_int($result));
|
|
|
|
// rename part file to real file
|
|
|
|
$result = $user2View->rename($this->folder. '/foo.txt.part', $this->folder. '/foo.txt');
|
|
|
|
|
|
|
|
$this->assertTrue($result);
|
|
|
|
|
|
|
|
// check if the new file really exists
|
|
|
|
$this->assertTrue($user2View->file_exists( $this->folder. '/foo.txt'));
|
|
|
|
|
|
|
|
// check if the rename also affected the owner
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER1);
|
|
|
|
|
|
|
|
$this->assertTrue($this->view->file_exists( $this->folder. '/foo.txt'));
|
2014-04-30 18:56:09 +04:00
|
|
|
|
|
|
|
//cleanup
|
2014-05-26 14:37:43 +04:00
|
|
|
\OCP\Share::unshare('folder', $fileinfo['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testFilesize() {
|
|
|
|
|
|
|
|
$fileinfoFolder = $this->view->getFileInfo($this->folder);
|
|
|
|
$fileinfoFile = $this->view->getFileInfo($this->filename);
|
|
|
|
|
|
|
|
$folderSize = $this->view->filesize($this->folder);
|
|
|
|
$file1Size = $this->view->filesize($this->folder. $this->filename);
|
|
|
|
$file2Size = $this->view->filesize($this->filename);
|
|
|
|
|
|
|
|
$result = \OCP\Share::shareItem('folder', $fileinfoFolder['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2, 31);
|
|
|
|
$this->assertTrue($result);
|
|
|
|
|
|
|
|
$result = \OCP\Share::shareItem('file', $fileinfoFile['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2, 31);
|
|
|
|
$this->assertTrue($result);
|
|
|
|
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
|
|
|
|
// compare file size between user1 and user2, should always be the same
|
|
|
|
$this->assertSame($folderSize, \OC\Files\Filesystem::filesize($this->folder));
|
|
|
|
$this->assertSame($file1Size, \OC\Files\Filesystem::filesize($this->folder . $this->filename));
|
|
|
|
$this->assertSame($file2Size, \OC\Files\Filesystem::filesize($this->filename));
|
|
|
|
|
|
|
|
//cleanup
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER1);
|
|
|
|
$result = \OCP\Share::unshare('folder', $fileinfoFolder['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
$this->assertTrue($result);
|
|
|
|
$result = \OCP\Share::unshare('file', $fileinfoFile['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
$this->assertTrue($result);
|
2014-04-30 14:49:16 +04:00
|
|
|
}
|
2014-04-30 18:56:09 +04:00
|
|
|
|
2014-06-24 16:00:15 +04:00
|
|
|
function testGetPermissions() {
|
|
|
|
$fileinfoFolder = $this->view->getFileInfo($this->folder);
|
|
|
|
|
|
|
|
$result = \OCP\Share::shareItem('folder', $fileinfoFolder['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2, 1);
|
|
|
|
$this->assertTrue($result);
|
|
|
|
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
|
|
|
|
$this->assertTrue(\OC\Files\Filesystem::is_dir($this->folder));
|
|
|
|
|
|
|
|
// for the share root we expect:
|
|
|
|
// the shared permissions (1)
|
|
|
|
// the delete permission (8), to enable unshare
|
|
|
|
$rootInfo = \OC\Files\Filesystem::getFileInfo($this->folder);
|
2015-03-20 14:33:59 +03:00
|
|
|
$this->assertSame(9, $rootInfo->getPermissions());
|
2014-06-24 16:00:15 +04:00
|
|
|
|
|
|
|
// for the file within the shared folder we expect:
|
|
|
|
// the shared permissions (1)
|
|
|
|
$subfileInfo = \OC\Files\Filesystem::getFileInfo($this->folder . $this->filename);
|
|
|
|
$this->assertSame(1, $subfileInfo->getPermissions());
|
|
|
|
|
|
|
|
|
|
|
|
//cleanup
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER1);
|
|
|
|
$result = \OCP\Share::unshare('folder', $fileinfoFolder['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
$this->assertTrue($result);
|
|
|
|
}
|
|
|
|
|
2015-03-20 13:30:51 +03:00
|
|
|
public function testFopenWithReadOnlyPermission() {
|
2015-01-30 16:19:23 +03:00
|
|
|
$this->view->file_put_contents($this->folder . '/existing.txt', 'foo');
|
|
|
|
$fileinfoFolder = $this->view->getFileInfo($this->folder);
|
|
|
|
$result = \OCP\Share::shareItem('folder', $fileinfoFolder['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2, \OCP\Constants::PERMISSION_READ);
|
|
|
|
$this->assertTrue($result);
|
|
|
|
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
$user2View = new \OC\Files\View('/' . self::TEST_FILES_SHARING_API_USER2 . '/files');
|
|
|
|
|
|
|
|
// part file should be forbidden
|
|
|
|
$handle = $user2View->fopen($this->folder . '/test.txt.part', 'w');
|
|
|
|
$this->assertFalse($handle);
|
|
|
|
|
|
|
|
// regular file forbidden
|
|
|
|
$handle = $user2View->fopen($this->folder . '/test.txt', 'w');
|
|
|
|
$this->assertFalse($handle);
|
|
|
|
|
|
|
|
// rename forbidden
|
|
|
|
$this->assertFalse($user2View->rename($this->folder . '/existing.txt', $this->folder . '/existing2.txt'));
|
|
|
|
|
|
|
|
// delete forbidden
|
|
|
|
$this->assertFalse($user2View->unlink($this->folder . '/existing.txt'));
|
|
|
|
|
|
|
|
//cleanup
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER1);
|
|
|
|
$result = \OCP\Share::unshare('folder', $fileinfoFolder['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
$this->assertTrue($result);
|
|
|
|
}
|
|
|
|
|
2015-03-20 13:30:51 +03:00
|
|
|
public function testFopenWithCreateOnlyPermission() {
|
2015-01-30 16:19:23 +03:00
|
|
|
$this->view->file_put_contents($this->folder . '/existing.txt', 'foo');
|
|
|
|
$fileinfoFolder = $this->view->getFileInfo($this->folder);
|
|
|
|
$result = \OCP\Share::shareItem('folder', $fileinfoFolder['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2, \OCP\Constants::PERMISSION_READ | \OCP\Constants::PERMISSION_CREATE);
|
|
|
|
$this->assertTrue($result);
|
|
|
|
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
$user2View = new \OC\Files\View('/' . self::TEST_FILES_SHARING_API_USER2 . '/files');
|
|
|
|
|
|
|
|
// create part file allowed
|
|
|
|
$handle = $user2View->fopen($this->folder . '/test.txt.part', 'w');
|
|
|
|
$this->assertNotFalse($handle);
|
|
|
|
fclose($handle);
|
|
|
|
|
|
|
|
// create regular file allowed
|
|
|
|
$handle = $user2View->fopen($this->folder . '/test-create.txt', 'w');
|
|
|
|
$this->assertNotFalse($handle);
|
|
|
|
fclose($handle);
|
|
|
|
|
2015-03-20 13:30:51 +03:00
|
|
|
// rename file never allowed
|
|
|
|
$this->assertFalse($user2View->rename($this->folder . '/test-create.txt', $this->folder . '/newtarget.txt'));
|
|
|
|
$this->assertFalse($user2View->file_exists($this->folder . '/newtarget.txt'));
|
2015-01-30 16:19:23 +03:00
|
|
|
|
|
|
|
// rename file not allowed if target exists
|
|
|
|
$this->assertFalse($user2View->rename($this->folder . '/newtarget.txt', $this->folder . '/existing.txt'));
|
|
|
|
|
|
|
|
// overwriting file not allowed
|
|
|
|
$handle = $user2View->fopen($this->folder . '/existing.txt', 'w');
|
|
|
|
$this->assertFalse($handle);
|
|
|
|
|
|
|
|
// overwrite forbidden (no update permission)
|
|
|
|
$this->assertFalse($user2View->rename($this->folder . '/test.txt.part', $this->folder . '/existing.txt'));
|
|
|
|
|
|
|
|
// delete forbidden
|
|
|
|
$this->assertFalse($user2View->unlink($this->folder . '/existing.txt'));
|
|
|
|
|
|
|
|
//cleanup
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER1);
|
|
|
|
$result = \OCP\Share::unshare('folder', $fileinfoFolder['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
$this->assertTrue($result);
|
|
|
|
}
|
|
|
|
|
2015-03-20 13:30:51 +03:00
|
|
|
public function testFopenWithUpdateOnlyPermission() {
|
2015-01-30 16:19:23 +03:00
|
|
|
$this->view->file_put_contents($this->folder . '/existing.txt', 'foo');
|
|
|
|
$fileinfoFolder = $this->view->getFileInfo($this->folder);
|
|
|
|
|
|
|
|
$result = \OCP\Share::shareItem('folder', $fileinfoFolder['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2, \OCP\Constants::PERMISSION_READ | \OCP\Constants::PERMISSION_UPDATE);
|
|
|
|
$this->assertTrue($result);
|
|
|
|
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
$user2View = new \OC\Files\View('/' . self::TEST_FILES_SHARING_API_USER2 . '/files');
|
|
|
|
|
|
|
|
// create part file allowed
|
|
|
|
$handle = $user2View->fopen($this->folder . '/test.txt.part', 'w');
|
|
|
|
$this->assertNotFalse($handle);
|
|
|
|
fclose($handle);
|
|
|
|
|
|
|
|
// create regular file not allowed
|
|
|
|
$handle = $user2View->fopen($this->folder . '/test-create.txt', 'w');
|
|
|
|
$this->assertFalse($handle);
|
|
|
|
|
|
|
|
// rename part file not allowed to non-existing file
|
|
|
|
$this->assertFalse($user2View->rename($this->folder . '/test.txt.part', $this->folder . '/nonexist.txt'));
|
|
|
|
|
|
|
|
// rename part file allowed to target existing file
|
|
|
|
$this->assertTrue($user2View->rename($this->folder . '/test.txt.part', $this->folder . '/existing.txt'));
|
|
|
|
$this->assertTrue($user2View->file_exists($this->folder . '/existing.txt'));
|
|
|
|
|
2015-03-20 13:30:51 +03:00
|
|
|
// rename regular file allowed
|
|
|
|
$this->assertTrue($user2View->rename($this->folder . '/existing.txt', $this->folder . '/existing-renamed.txt'));
|
|
|
|
$this->assertTrue($user2View->file_exists($this->folder . '/existing-renamed.txt'));
|
|
|
|
|
2015-01-30 16:19:23 +03:00
|
|
|
// overwriting file directly is allowed
|
2015-03-20 13:30:51 +03:00
|
|
|
$handle = $user2View->fopen($this->folder . '/existing-renamed.txt', 'w');
|
2015-01-30 16:19:23 +03:00
|
|
|
$this->assertNotFalse($handle);
|
|
|
|
fclose($handle);
|
|
|
|
|
|
|
|
// delete forbidden
|
2015-03-20 13:30:51 +03:00
|
|
|
$this->assertFalse($user2View->unlink($this->folder . '/existing-renamed.txt'));
|
2015-01-30 16:19:23 +03:00
|
|
|
|
|
|
|
//cleanup
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER1);
|
|
|
|
$result = \OCP\Share::unshare('folder', $fileinfoFolder['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
$this->assertTrue($result);
|
|
|
|
}
|
|
|
|
|
2015-03-20 13:30:51 +03:00
|
|
|
public function testFopenWithDeleteOnlyPermission() {
|
2015-01-30 16:19:23 +03:00
|
|
|
$this->view->file_put_contents($this->folder . '/existing.txt', 'foo');
|
|
|
|
$fileinfoFolder = $this->view->getFileInfo($this->folder);
|
|
|
|
$result = \OCP\Share::shareItem('folder', $fileinfoFolder['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2, \OCP\Constants::PERMISSION_READ | \OCP\Constants::PERMISSION_DELETE);
|
|
|
|
$this->assertTrue($result);
|
|
|
|
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
$user2View = new \OC\Files\View('/' . self::TEST_FILES_SHARING_API_USER2 . '/files');
|
|
|
|
|
|
|
|
// part file should be forbidden
|
|
|
|
$handle = $user2View->fopen($this->folder . '/test.txt.part', 'w');
|
|
|
|
$this->assertFalse($handle);
|
|
|
|
|
|
|
|
// regular file forbidden
|
|
|
|
$handle = $user2View->fopen($this->folder . '/test.txt', 'w');
|
|
|
|
$this->assertFalse($handle);
|
|
|
|
|
|
|
|
// rename forbidden
|
|
|
|
$this->assertFalse($user2View->rename($this->folder . '/existing.txt', $this->folder . '/existing2.txt'));
|
|
|
|
|
|
|
|
// delete allowed
|
|
|
|
$this->assertTrue($user2View->unlink($this->folder . '/existing.txt'));
|
|
|
|
|
|
|
|
//cleanup
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER1);
|
|
|
|
$result = \OCP\Share::unshare('folder', $fileinfoFolder['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
$this->assertTrue($result);
|
|
|
|
}
|
|
|
|
|
2014-11-04 17:16:58 +03:00
|
|
|
function testMountSharesOtherUser() {
|
|
|
|
$folderInfo = $this->view->getFileInfo($this->folder);
|
|
|
|
$fileInfo = $this->view->getFileInfo($this->filename);
|
|
|
|
$rootView = new \OC\Files\View('');
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER1);
|
|
|
|
|
|
|
|
// share 2 different files with 2 different users
|
|
|
|
\OCP\Share::shareItem('folder', $folderInfo['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER2, 31);
|
|
|
|
\OCP\Share::shareItem('file', $fileInfo['fileid'], \OCP\Share::SHARE_TYPE_USER,
|
|
|
|
self::TEST_FILES_SHARING_API_USER3, 31);
|
|
|
|
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER2);
|
|
|
|
$this->assertTrue($rootView->file_exists('/' . self::TEST_FILES_SHARING_API_USER2 . '/files/' . $this->folder));
|
|
|
|
OC_Hook::emit('OC_Filesystem', 'setup', array('user' => self::TEST_FILES_SHARING_API_USER3, 'user_dir' => \OC_User::getHome(self::TEST_FILES_SHARING_API_USER3)));
|
|
|
|
|
|
|
|
$this->assertTrue($rootView->file_exists('/' . self::TEST_FILES_SHARING_API_USER3 . '/files/' . $this->filename));
|
|
|
|
|
|
|
|
// make sure we didn't double setup shares for user 2 or mounted the shares for user 3 in user's 2 home
|
|
|
|
$this->assertFalse($rootView->file_exists('/' . self::TEST_FILES_SHARING_API_USER2 . '/files/' . $this->folder .' (2)'));
|
|
|
|
$this->assertFalse($rootView->file_exists('/' . self::TEST_FILES_SHARING_API_USER2 . '/files/' . $this->filename));
|
|
|
|
|
|
|
|
//cleanup
|
|
|
|
self::loginHelper(self::TEST_FILES_SHARING_API_USER1);
|
|
|
|
$this->view->unlink($this->folder);
|
|
|
|
}
|
2014-04-30 14:49:16 +04:00
|
|
|
}
|