Merge pull request #22536 from owncloud/add-integration-tests-for-tags

Add integration tests for tags plus fix permissions
This commit is contained in:
Thomas Müller 2016-02-22 14:14:51 +01:00
commit f3b13c7656
7 changed files with 1140 additions and 7 deletions

View File

@ -93,7 +93,11 @@ class Server {
$this->server->addPlugin(new \OCA\DAV\CardDAV\Plugin());
// system tags plugins
$this->server->addPlugin(new \OCA\DAV\SystemTag\SystemTagPlugin(\OC::$server->getSystemTagManager()));
$this->server->addPlugin(new \OCA\DAV\SystemTag\SystemTagPlugin(
\OC::$server->getSystemTagManager(),
\OC::$server->getGroupManager(),
\OC::$server->getUserSession()
));
// comments plugin
$this->server->addPlugin(new \OCA\DAV\Comments\CommentsPlugin(

View File

@ -103,6 +103,7 @@ class SystemTagNode implements \Sabre\DAV\INode {
* @param bool $userVisible user visible
* @param bool $userAssignable user assignable
* @throws NotFound whenever the given tag id does not exist
* @throws Forbidden whenever there is no permission to update said tag
* @throws Conflict whenever a tag already exists with the given attributes
*/
public function update($name, $userVisible, $userAssignable) {

View File

@ -21,6 +21,8 @@
*/
namespace OCA\DAV\SystemTag;
use OCP\IGroupManager;
use OCP\IUserSession;
use Sabre\DAV\Exception\NotFound;
use Sabre\DAV\PropFind;
use Sabre\DAV\PropPatch;
@ -61,12 +63,26 @@ class SystemTagPlugin extends \Sabre\DAV\ServerPlugin {
protected $tagManager;
/**
* System tags plugin
*
* @param ISystemTagManager $tagManager tag manager
* @var IUserSession
*/
public function __construct(ISystemTagManager $tagManager) {
protected $userSession;
/**
* @var IGroupManager
*/
protected $groupManager;
/**
* @param ISystemTagManager $tagManager tag manager
* @param IGroupManager $groupManager
* @param IUserSession $userSession
*/
public function __construct(ISystemTagManager $tagManager,
IGroupManager $groupManager,
IUserSession $userSession) {
$this->tagManager = $tagManager;
$this->userSession = $userSession;
$this->groupManager = $groupManager;
}
/**
@ -163,6 +179,13 @@ class SystemTagPlugin extends \Sabre\DAV\ServerPlugin {
if (isset($data['userAssignable'])) {
$userAssignable = (bool)$data['userAssignable'];
}
if($userVisible === false || $userAssignable === false) {
if(!$this->userSession->isLoggedIn() || !$this->groupManager->isAdmin($this->userSession->getUser()->getUID())) {
throw new BadRequest('Not sufficient permissions');
}
}
try {
return $this->tagManager->createTag($tagName, $userVisible, $userAssignable);
} catch (TagAlreadyExistsException $e) {

View File

@ -22,6 +22,8 @@
namespace OCA\DAV\Tests\Unit\SystemTag;
use OC\SystemTag\SystemTag;
use OCP\IGroupManager;
use OCP\IUserSession;
use OCP\SystemTag\TagAlreadyExistsException;
class SystemTagPlugin extends \Test\TestCase {
@ -46,6 +48,16 @@ class SystemTagPlugin extends \Test\TestCase {
*/
private $tagManager;
/**
* @var IGroupManager
*/
private $groupManager;
/**
* @var IUserSession
*/
private $userSession;
/**
* @var \OCA\DAV\SystemTag\SystemTagPlugin
*/
@ -60,8 +72,14 @@ class SystemTagPlugin extends \Test\TestCase {
$this->server = new \Sabre\DAV\Server($this->tree);
$this->tagManager = $this->getMock('\OCP\SystemTag\ISystemTagManager');
$this->groupManager = $this->getMock('\OCP\IGroupManager');
$this->userSession = $this->getMock('\OCP\IUserSession');
$this->plugin = new \OCA\DAV\SystemTag\SystemTagPlugin($this->tagManager);
$this->plugin = new \OCA\DAV\SystemTag\SystemTagPlugin(
$this->tagManager,
$this->groupManager,
$this->userSession
);
$this->plugin->initialize($this->server);
}
@ -153,7 +171,204 @@ class SystemTagPlugin extends \Test\TestCase {
$this->assertEquals(200, $result[self::USERVISIBLE_PROPERTYNAME]);
}
/**
* @expectedException \Sabre\DAV\Exception\BadRequest
* @expectedExceptionMessage Not sufficient permissions
*/
public function testCreateNotAssignableTagAsRegularUser() {
$user = $this->getMock('\OCP\IUser');
$user->expects($this->once())
->method('getUID')
->willReturn('admin');
$this->userSession
->expects($this->once())
->method('isLoggedIn')
->willReturn(true);
$this->userSession
->expects($this->once())
->method('getUser')
->willReturn($user);
$this->groupManager
->expects($this->once())
->method('isAdmin')
->with('admin')
->willReturn(false);
$requestData = json_encode([
'name' => 'Test',
'userVisible' => true,
'userAssignable' => false,
]);
$node = $this->getMockBuilder('\OCA\DAV\SystemTag\SystemTagsByIdCollection')
->disableOriginalConstructor()
->getMock();
$this->tagManager->expects($this->never())
->method('createTag');
$this->tree->expects($this->any())
->method('getNodeForPath')
->with('/systemtags')
->will($this->returnValue($node));
$request = $this->getMockBuilder('Sabre\HTTP\RequestInterface')
->disableOriginalConstructor()
->getMock();
$response = $this->getMockBuilder('Sabre\HTTP\ResponseInterface')
->disableOriginalConstructor()
->getMock();
$request->expects($this->once())
->method('getPath')
->will($this->returnValue('/systemtags'));
$request->expects($this->once())
->method('getBodyAsString')
->will($this->returnValue($requestData));
$request->expects($this->once())
->method('getHeader')
->with('Content-Type')
->will($this->returnValue('application/json'));
$this->plugin->httpPost($request, $response);
}
/**
* @expectedException \Sabre\DAV\Exception\BadRequest
* @expectedExceptionMessage Not sufficient permissions
*/
public function testCreateInvisibleTagAsRegularUser() {
$user = $this->getMock('\OCP\IUser');
$user->expects($this->once())
->method('getUID')
->willReturn('admin');
$this->userSession
->expects($this->once())
->method('isLoggedIn')
->willReturn(true);
$this->userSession
->expects($this->once())
->method('getUser')
->willReturn($user);
$this->groupManager
->expects($this->once())
->method('isAdmin')
->with('admin')
->willReturn(false);
$requestData = json_encode([
'name' => 'Test',
'userVisible' => false,
'userAssignable' => true,
]);
$node = $this->getMockBuilder('\OCA\DAV\SystemTag\SystemTagsByIdCollection')
->disableOriginalConstructor()
->getMock();
$this->tagManager->expects($this->never())
->method('createTag');
$this->tree->expects($this->any())
->method('getNodeForPath')
->with('/systemtags')
->will($this->returnValue($node));
$request = $this->getMockBuilder('Sabre\HTTP\RequestInterface')
->disableOriginalConstructor()
->getMock();
$response = $this->getMockBuilder('Sabre\HTTP\ResponseInterface')
->disableOriginalConstructor()
->getMock();
$request->expects($this->once())
->method('getPath')
->will($this->returnValue('/systemtags'));
$request->expects($this->once())
->method('getBodyAsString')
->will($this->returnValue($requestData));
$request->expects($this->once())
->method('getHeader')
->with('Content-Type')
->will($this->returnValue('application/json'));
$this->plugin->httpPost($request, $response);
}
public function testCreateTagInByIdCollectionAsRegularUser() {
$systemTag = new SystemTag(1, 'Test', true, false);
$requestData = json_encode([
'name' => 'Test',
'userVisible' => true,
'userAssignable' => true,
]);
$node = $this->getMockBuilder('\OCA\DAV\SystemTag\SystemTagsByIdCollection')
->disableOriginalConstructor()
->getMock();
$this->tagManager->expects($this->once())
->method('createTag')
->with('Test', true, true)
->will($this->returnValue($systemTag));
$this->tree->expects($this->any())
->method('getNodeForPath')
->with('/systemtags')
->will($this->returnValue($node));
$request = $this->getMockBuilder('Sabre\HTTP\RequestInterface')
->disableOriginalConstructor()
->getMock();
$response = $this->getMockBuilder('Sabre\HTTP\ResponseInterface')
->disableOriginalConstructor()
->getMock();
$request->expects($this->once())
->method('getPath')
->will($this->returnValue('/systemtags'));
$request->expects($this->once())
->method('getBodyAsString')
->will($this->returnValue($requestData));
$request->expects($this->once())
->method('getHeader')
->with('Content-Type')
->will($this->returnValue('application/json'));
$request->expects($this->once())
->method('getUrl')
->will($this->returnValue('http://example.com/dav/systemtags'));
$response->expects($this->once())
->method('setHeader')
->with('Content-Location', 'http://example.com/dav/systemtags/1');
$this->plugin->httpPost($request, $response);
}
public function testCreateTagInByIdCollection() {
$user = $this->getMock('\OCP\IUser');
$user->expects($this->once())
->method('getUID')
->willReturn('admin');
$this->userSession
->expects($this->once())
->method('isLoggedIn')
->willReturn(true);
$this->userSession
->expects($this->once())
->method('getUser')
->willReturn($user);
$this->groupManager
->expects($this->once())
->method('isAdmin')
->with('admin')
->willReturn(true);
$systemTag = new SystemTag(1, 'Test', true, false);
$requestData = json_encode([
@ -214,6 +429,24 @@ class SystemTagPlugin extends \Test\TestCase {
}
public function testCreateTagInMappingCollection() {
$user = $this->getMock('\OCP\IUser');
$user->expects($this->once())
->method('getUID')
->willReturn('admin');
$this->userSession
->expects($this->once())
->method('isLoggedIn')
->willReturn(true);
$this->userSession
->expects($this->once())
->method('getUser')
->willReturn($user);
$this->groupManager
->expects($this->once())
->method('isAdmin')
->with('admin')
->willReturn(true);
$systemTag = new SystemTag(1, 'Test', true, false);
$requestData = json_encode([
@ -307,9 +540,27 @@ class SystemTagPlugin extends \Test\TestCase {
/**
* @dataProvider nodeClassProvider
* @expectedException Sabre\DAV\Exception\Conflict
* @expectedException \Sabre\DAV\Exception\Conflict
*/
public function testCreateTagConflict($nodeClass) {
$user = $this->getMock('\OCP\IUser');
$user->expects($this->once())
->method('getUID')
->willReturn('admin');
$this->userSession
->expects($this->once())
->method('isLoggedIn')
->willReturn(true);
$this->userSession
->expects($this->once())
->method('getUser')
->willReturn($user);
$this->groupManager
->expects($this->once())
->method('isAdmin')
->with('admin')
->willReturn(true);
$requestData = json_encode([
'name' => 'Test',
'userVisible' => true,

View File

@ -14,6 +14,8 @@ default:
regular_user_password: 123456
- CommentsContext:
baseUrl: http://localhost:8080
- TagsContext:
baseUrl: http://localhost:8080
federation:
paths:
- %paths.base%/../federation_features

View File

@ -0,0 +1,482 @@
<?php
/**
* @author Lukas Reschke <lukas@owncloud.com>
*
* @copyright Copyright (c) 2016, ownCloud, Inc.
* @license AGPL-3.0
*
* This code is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License, version 3,
* as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License, version 3,
* along with this program. If not, see <http://www.gnu.org/licenses/>
*
*/
require __DIR__ . '/../../vendor/autoload.php';
use Behat\Gherkin\Node\TableNode;
use GuzzleHttp\Client;
use GuzzleHttp\Message\ResponseInterface;
class TagsContext implements \Behat\Behat\Context\Context {
/** @var string */
private $baseUrl;
/** @var Client */
private $client;
/** @var ResponseInterface */
private $response;
/**
* @param string $baseUrl
*/
public function __construct($baseUrl) {
$this->baseUrl = $baseUrl;
// in case of ci deployment we take the server url from the environment
$testServerUrl = getenv('TEST_SERVER_URL');
if ($testServerUrl !== false) {
$this->baseUrl = substr($testServerUrl, 0, -5);
}
}
/** @BeforeScenario */
public function tearUpScenario() {
$this->client = new Client();
}
/** @AfterScenario */
public function tearDownScenario() {
$user = 'admin';
$tags = $this->requestTagsForUser($user);
foreach($tags as $tagId => $tag) {
$this->response = $this->client->delete(
$this->baseUrl . '/remote.php/dav/systemtags/'.$tagId,
[
'auth' => [
$user,
$this->getPasswordForUser($user),
],
'headers' => [
'Content-Type' => 'application/json',
],
]
);
}
try {
$this->client->delete(
$this->baseUrl . '/remote.php/webdav/myFileToTag.txt',
[
'auth' => [
'user0',
'123456',
],
'headers' => [
'Content-Type' => 'application/json',
],
]
);
} catch (\GuzzleHttp\Exception\ClientException $e) {}
}
/**
* @param string $userName
* @return string
*/
private function getPasswordForUser($userName) {
if($userName === 'admin') {
return 'admin';
}
return '123456';
}
/**
* @When :user creates a :type tag with name :name
*/
public function createsATagWithName($user, $type, $name) {
$userVisible = 'true';
$userAssignable = 'true';
switch ($type) {
case 'normal':
break;
case 'not user-assignable':
$userAssignable = 'false';
break;
case 'not user-visible':
$userVisible = 'false';
break;
default:
throw new \Exception('Unsupported type');
}
try {
$this->response = $this->client->post(
$this->baseUrl . '/remote.php/dav/systemtags/',
[
'auth' => [
$user,
$this->getPasswordForUser($user),
],
'headers' => [
'Content-Type' => 'application/json',
],
'body' => '{"name":"'.$name.'","userVisible":'.$userVisible.',"userAssignable":'.$userAssignable.'}',
]
);
} catch (\GuzzleHttp\Exception\ClientException $e){
$this->response = $e->getResponse();
}
}
/**
* @Then The response should have a status code :statusCode
*/
public function theResponseShouldHaveAStatusCode($statusCode) {
if((int)$statusCode !== $this->response->getStatusCode()) {
throw new \Exception("Expected $statusCode, got ".$this->response->getStatusCode());
}
}
/**
* Returns all tags for a given user
*
* @param string $user
* @return array
*/
private function requestTagsForUser($user) {
try {
$request = $this->client->createRequest(
'PROPFIND',
$this->baseUrl . '/remote.php/dav/systemtags/',
[
'body' => '<?xml version="1.0"?>
<d:propfind xmlns:d="DAV:" xmlns:oc="http://owncloud.org/ns">
<d:prop>
<oc:id />
<oc:display-name />
<oc:user-visible />
<oc:user-assignable />
</d:prop>
</d:propfind>',
'auth' => [
$user,
$this->getPasswordForUser($user),
],
'headers' => [
'Content-Type' => 'application/json',
],
]
);
$this->response = $this->client->send($request);
} catch (\GuzzleHttp\Exception\ClientException $e) {
$this->response = $e->getResponse();
}
$tags = [];
$service = new Sabre\Xml\Service();
$parsed = $service->parse($this->response->getBody()->getContents());
foreach($parsed as $entry) {
$singleEntry = $entry['value'][1]['value'][0]['value'];
if(empty($singleEntry[0]['value'])) {
continue;
}
$tags[$singleEntry[0]['value']] = [
'display-name' => $singleEntry[1]['value'],
'user-visible' => $singleEntry[2]['value'],
'user-assignable' => $singleEntry[3]['value'],
];
}
return $tags;
}
/**
* @Then The following tags should exist for :user
*/
public function theFollowingTagsShouldExistFor($user, TableNode $table) {
$tags = $this->requestTagsForUser($user);
if(count($table->getRows()) !== count($tags)) {
throw new \Exception(
sprintf(
"Expected %s tags, got %s.",
count($table->getRows()),
count($tags)
)
);
}
foreach($table->getRowsHash() as $rowDisplayName => $row) {
foreach($tags as $key => $tag) {
if(
$tag['display-name'] === $rowDisplayName &&
$tag['user-visible'] === $row[0] &&
$tag['user-assignable'] === $row[1]
) {
unset($tags[$key]);
}
}
}
if(count($tags) !== 0) {
throw new \Exception('Not expected response');
}
}
/**
* @Then :count tags should exist for :user
*/
public function tagsShouldExistFor($count, $user) {
if((int)$count !== count($this->requestTagsForUser($user))) {
throw new \Exception("Expected $count tags, got ".count($this->requestTagsForUser($user)));
}
}
/**
* @param string $name
* @return int
*/
private function findTagIdByName($name) {
$tags = $this->requestTagsForUser('admin');
$tagId = 0;
foreach($tags as $id => $tag) {
if($tag['display-name'] === $name) {
$tagId = $id;
break;
}
}
return (int)$tagId;
}
/**
* @When :user edits the tag with name :oldNmae and sets its name to :newName
*/
public function editsTheTagWithNameAndSetsItsNameTo($user, $oldName, $newName) {
$tagId = $this->findTagIdByName($oldName);
if($tagId === 0) {
throw new \Exception('Could not find tag to rename');
}
try {
$request = $this->client->createRequest(
'PROPPATCH',
$this->baseUrl . '/remote.php/dav/systemtags/' . $tagId,
[
'body' => '<?xml version="1.0"?>
<d:propertyupdate xmlns:d="DAV:" xmlns:oc="http://owncloud.org/ns">
<d:set>
<d:prop>
<oc:display-name>' . $newName . '</oc:display-name>
</d:prop>
</d:set>
</d:propertyupdate>',
'auth' => [
$user,
$this->getPasswordForUser($user),
],
]
);
$this->response = $this->client->send($request);
} catch (\GuzzleHttp\Exception\ClientException $e) {
$this->response = $e->getResponse();
}
}
/**
* @When :user deletes the tag with name :name
*/
public function deletesTheTagWithName($user, $name) {
$tagId = $this->findTagIdByName($name);
try {
$this->response = $this->client->delete(
$this->baseUrl . '/remote.php/dav/systemtags/' . $tagId,
[
'auth' => [
$user,
$this->getPasswordForUser($user),
],
'headers' => [
'Content-Type' => 'application/json',
],
]
);
} catch (\GuzzleHttp\Exception\ClientException $e) {
$this->response = $e->getResponse();
}
}
/**
* @param string $path
* @param string $user
* @return int
*/
private function getFileIdForPath($path, $user) {
$url = $this->baseUrl.'/remote.php/webdav/'.$path;
$credentials = base64_encode($user .':'.$this->getPasswordForUser($user));
$context = stream_context_create(array(
'http' => array(
'method' => 'PROPFIND',
'header' => "Authorization: Basic $credentials\r\nContent-Type: application/x-www-form-urlencoded",
'content' => '<?xml version="1.0"?>
<d:propfind xmlns:d="DAV:" xmlns:oc="http://owncloud.org/ns">
<d:prop>
<oc:fileid />
</d:prop>
</d:propfind>'
)
));
$response = file_get_contents($url, false, $context);
preg_match_all('/\<oc:fileid\>(.*)\<\/oc:fileid\>/', $response, $matches);
return (int)$matches[1][0];
}
/**
* @When :taggingUser adds the tag :tagName to :fileName shared by :sharingUser
*/
public function addsTheTagToSharedBy($taggingUser, $tagName, $fileName, $sharingUser) {
$fileId = $this->getFileIdForPath($fileName, $sharingUser);
$tagId = $this->findTagIdByName($tagName);
try {
$this->response = $this->client->put(
$this->baseUrl.'/remote.php/dav/systemtags-relations/files/'.$fileId.'/'.$tagId,
[
'auth' => [
$taggingUser,
$this->getPasswordForUser($taggingUser),
]
]
);
} catch (\GuzzleHttp\Exception\ClientException $e) {
$this->response = $e->getResponse();
}
}
/**
* @Then :fileName shared by :sharingUser has the following tags
*/
public function sharedByHasTheFollowingTags($fileName, $sharingUser, TableNode $table) {
$loadedExpectedTags = $table->getTable();
$expectedTags = [];
foreach($loadedExpectedTags as $expected) {
$expectedTags[] = $expected[0];
}
// Get the real tags
$request = $this->client->createRequest(
'PROPFIND',
$this->baseUrl.'/remote.php/dav/systemtags-relations/files/'.$this->getFileIdForPath($fileName, $sharingUser),
[
'auth' => [
$sharingUser,
$this->getPasswordForUser($sharingUser),
],
'body' => '<?xml version="1.0"?>
<d:propfind xmlns:d="DAV:" xmlns:oc="http://owncloud.org/ns">
<d:prop>
<oc:id />
<oc:display-name />
<oc:user-visible />
<oc:user-assignable />
</d:prop>
</d:propfind>',
]
);
$response = $this->client->send($request)->getBody()->getContents();
preg_match_all('/\<oc:display-name\>(.*)\<\/oc:display-name\>/', $response, $realTags);
foreach($expectedTags as $key => $row) {
foreach($realTags as $tag) {
if($tag[0] === $row) {
unset($expectedTags[$key]);
}
}
}
if(count($expectedTags) !== 0) {
throw new \Exception('Not all tags found.');
}
}
/**
* @Then :fileName shared by :sharingUser has the following tags for :user
*/
public function sharedByHasTheFollowingTagsFor($fileName, $sharingUser, $user, TableNode $table) {
$loadedExpectedTags = $table->getTable();
$expectedTags = [];
foreach($loadedExpectedTags as $expected) {
$expectedTags[] = $expected[0];
}
// Get the real tags
try {
$request = $this->client->createRequest(
'PROPFIND',
$this->baseUrl . '/remote.php/dav/systemtags-relations/files/' . $this->getFileIdForPath($fileName, $sharingUser),
[
'auth' => [
$user,
$this->getPasswordForUser($user),
],
'body' => '<?xml version="1.0"?>
<d:propfind xmlns:d="DAV:" xmlns:oc="http://owncloud.org/ns">
<d:prop>
<oc:id />
<oc:display-name />
<oc:user-visible />
<oc:user-assignable />
</d:prop>
</d:propfind>',
]
);
$this->response = $this->client->send($request)->getBody()->getContents();
} catch (\GuzzleHttp\Exception\ClientException $e) {
$this->response = $e->getResponse();
}
preg_match_all('/\<oc:display-name\>(.*)\<\/oc:display-name\>/', $this->response, $realTags);
$realTags = array_filter($realTags);
$expectedTags = array_filter($expectedTags);
foreach($expectedTags as $key => $row) {
foreach($realTags as $tag) {
foreach($tag as $index => $foo) {
if($tag[$index] === $row) {
unset($expectedTags[$key]);
}
}
}
}
if(count($expectedTags) !== 0) {
throw new \Exception('Not all tags found.');
}
}
/**
* @When :user removes the tag :tagName from :fileName shared by :shareUser
*/
public function removesTheTagFromSharedBy($user, $tagName, $fileName, $shareUser) {
$tagId = $this->findTagIdByName($tagName);
$fileId = $this->getFileIdForPath($fileName, $shareUser);
try {
$this->response = $this->client->delete(
$this->baseUrl.'/remote.php/dav/systemtags-relations/files/'.$fileId.'/'.$tagId,
[
'auth' => [
$user,
$this->getPasswordForUser($user),
],
]
);
} catch (\GuzzleHttp\Exception\ClientException $e) {
$this->response = $e->getResponse();
}
}
}

View File

@ -0,0 +1,370 @@
Feature: tags
Scenario: Creating a normal tag as regular user should work
Given user "user0" exists
When "user0" creates a "normal" tag with name "MySuperAwesomeTagName"
Then The response should have a status code "201"
And The following tags should exist for "admin"
|MySuperAwesomeTagName|true|true|
And The following tags should exist for "user0"
|MySuperAwesomeTagName|true|true|
Scenario: Creating a not user-assignable tag as regular user should fail
Given user "user0" exists
When "user0" creates a "not user-assignable" tag with name "MySuperAwesomeTagName"
Then The response should have a status code "400"
And "0" tags should exist for "admin"
Scenario: Creating a not user-visible tag as regular user should fail
Given user "user0" exists
When "user0" creates a "not user-visible" tag with name "MySuperAwesomeTagName"
Then The response should have a status code "400"
And "0" tags should exist for "admin"
Scenario: Renaming a normal tag as regular user should work
Given user "user0" exists
Given "admin" creates a "normal" tag with name "MySuperAwesomeTagName"
When "user0" edits the tag with name "MySuperAwesomeTagName" and sets its name to "AnotherTagName"
Then The response should have a status code "207"
And The following tags should exist for "admin"
|AnotherTagName|true|true|
Scenario: Renaming a not user-assignable tag as regular user should fail
Given user "user0" exists
Given "admin" creates a "not user-assignable" tag with name "MySuperAwesomeTagName"
When "user0" edits the tag with name "MySuperAwesomeTagName" and sets its name to "AnotherTagName"
Then The response should have a status code "403"
And The following tags should exist for "admin"
|MySuperAwesomeTagName|true|false|
Scenario: Renaming a not user-visible tag as regular user should fail
Given user "user0" exists
Given "admin" creates a "not user-visible" tag with name "MySuperAwesomeTagName"
When "user0" edits the tag with name "MySuperAwesomeTagName" and sets its name to "AnotherTagName"
Then The response should have a status code "404"
And The following tags should exist for "admin"
|MySuperAwesomeTagName|false|true|
Scenario: Deleting a normal tag as regular user should work
Given user "user0" exists
Given "admin" creates a "normal" tag with name "MySuperAwesomeTagName"
When "user0" deletes the tag with name "MySuperAwesomeTagName"
Then The response should have a status code "204"
And "0" tags should exist for "admin"
Scenario: Deleting a not user-assignable tag as regular user should fail
Given user "user0" exists
Given "admin" creates a "not user-assignable" tag with name "MySuperAwesomeTagName"
When "user0" deletes the tag with name "MySuperAwesomeTagName"
Then The response should have a status code "403"
And The following tags should exist for "admin"
|MySuperAwesomeTagName|true|false|
Scenario: Deleting a not user-visible tag as regular user should fail
Given user "user0" exists
Given "admin" creates a "not user-visible" tag with name "MySuperAwesomeTagName"
When "user0" deletes the tag with name "MySuperAwesomeTagName"
Then The response should have a status code "404"
And The following tags should exist for "admin"
|MySuperAwesomeTagName|false|true|
Scenario: Deleting a not user-assignable tag as admin should work
Given "admin" creates a "not user-assignable" tag with name "MySuperAwesomeTagName"
When "admin" deletes the tag with name "MySuperAwesomeTagName"
Then The response should have a status code "204"
And "0" tags should exist for "admin"
Scenario: Deleting a not user-visible tag as admin should work
Given "admin" creates a "not user-visible" tag with name "MySuperAwesomeTagName"
When "admin" deletes the tag with name "MySuperAwesomeTagName"
Then The response should have a status code "204"
And "0" tags should exist for "admin"
Scenario: Assigning a normal tag to a file shared by someone else as regular user should work
Given user "user0" exists
Given user "user1" exists
Given "admin" creates a "normal" tag with name "MySuperAwesomeTagName"
Given user "user0" uploads file "data/textfile.txt" to "/myFileToTag.txt"
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | user1 |
| shareType | 0 |
When "user1" adds the tag "MySuperAwesomeTagName" to "/myFileToTag.txt" shared by "user0"
Then The response should have a status code "201"
And "/myFileToTag.txt" shared by "user0" has the following tags
|MySuperAwesomeTagName|
Scenario: Assigning a normal tag to a file belonging to someone else as regular user should fail
Given user "user0" exists
Given user "user1" exists
Given "admin" creates a "normal" tag with name "MyFirstTag"
Given "admin" creates a "normal" tag with name "MySecondTag"
Given user "user0" uploads file "data/textfile.txt" to "/myFileToTag.txt"
When "user0" adds the tag "MyFirstTag" to "/myFileToTag.txt" shared by "user0"
When "user1" adds the tag "MySecondTag" to "/myFileToTag.txt" shared by "user0"
Then The response should have a status code "404"
And "/myFileToTag.txt" shared by "user0" has the following tags
|MyFirstTag|
Scenario: Assigning a not user-assignable tag to a file shared by someone else as regular user should fail
Given user "user0" exists
Given user "user1" exists
Given "admin" creates a "normal" tag with name "MyFirstTag"
Given "admin" creates a "not user-assignable" tag with name "MySecondTag"
Given user "user0" uploads file "data/textfile.txt" to "/myFileToTag.txt"
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | user1 |
| shareType | 0 |
When "user0" adds the tag "MyFirstTag" to "/myFileToTag.txt" shared by "user0"
When "user1" adds the tag "MySecondTag" to "/myFileToTag.txt" shared by "user0"
Then The response should have a status code "403"
And "/myFileToTag.txt" shared by "user0" has the following tags
|MyFirstTag|
Scenario: Assigning a not user-visible tag to a file shared by someone else as regular user should fail
Given user "user0" exists
Given user "user1" exists
Given "admin" creates a "normal" tag with name "MyFirstTag"
Given "admin" creates a "not user-visible" tag with name "MySecondTag"
Given user "user0" uploads file "data/textfile.txt" to "/myFileToTag.txt"
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | user1 |
| shareType | 0 |
When "user0" adds the tag "MyFirstTag" to "/myFileToTag.txt" shared by "user0"
When "user1" adds the tag "MySecondTag" to "/myFileToTag.txt" shared by "user0"
Then The response should have a status code "412"
And "/myFileToTag.txt" shared by "user0" has the following tags
|MyFirstTag|
Scenario: Assigning a not user-visible tag to a file shared by someone else as admin user should work
Given user "user0" exists
Given "admin" creates a "normal" tag with name "MyFirstTag"
Given "admin" creates a "not user-visible" tag with name "MySecondTag"
Given user "user0" uploads file "data/textfile.txt" to "/myFileToTag.txt"
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | admin |
| shareType | 0 |
When "user0" adds the tag "MyFirstTag" to "/myFileToTag.txt" shared by "user0"
When "admin" adds the tag "MySecondTag" to "/myFileToTag.txt" shared by "user0"
Then The response should have a status code "201"
And "/myFileToTag.txt" shared by "user0" has the following tags for "admin"
|MyFirstTag|
|MySecondTag|
And "/myFileToTag.txt" shared by "user0" has the following tags for "user0"
|MyFirstTag|
Scenario: Assigning a not user-assignable tag to a file shared by someone else as admin user should worj
Given user "user0" exists
Given "admin" creates a "normal" tag with name "MyFirstTag"
Given "admin" creates a "not user-assignable" tag with name "MySecondTag"
Given user "user0" uploads file "data/textfile.txt" to "/myFileToTag.txt"
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | admin |
| shareType | 0 |
When "user0" adds the tag "MyFirstTag" to "/myFileToTag.txt" shared by "user0"
When "admin" adds the tag "MySecondTag" to "/myFileToTag.txt" shared by "user0"
Then The response should have a status code "201"
And "/myFileToTag.txt" shared by "user0" has the following tags for "admin"
|MyFirstTag|
|MySecondTag|
And "/myFileToTag.txt" shared by "user0" has the following tags for "user0"
|MyFirstTag|
|MySecondTag|
Scenario: Unassigning a normal tag from a file shared by someone else as regular user should work
Given user "user0" exists
Given user "user1" exists
Given "admin" creates a "normal" tag with name "MyFirstTag"
Given "admin" creates a "normal" tag with name "MySecondTag"
Given user "user0" uploads file "data/textfile.txt" to "/myFileToTag.txt"
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | user1 |
| shareType | 0 |
Given "user0" adds the tag "MyFirstTag" to "/myFileToTag.txt" shared by "user0"
Given "user0" adds the tag "MySecondTag" to "/myFileToTag.txt" shared by "user0"
When "user1" removes the tag "MyFirstTag" from "/myFileToTag.txt" shared by "user0"
Then The response should have a status code "204"
And "/myFileToTag.txt" shared by "user0" has the following tags for "user0"
|MySecondTag|
Scenario: Unassigning a normal tag from a file unshared by someone else as regular user should fail
Given user "user0" exists
Given user "user1" exists
Given "admin" creates a "normal" tag with name "MyFirstTag"
Given "admin" creates a "normal" tag with name "MySecondTag"
Given user "user0" uploads file "data/textfile.txt" to "/myFileToTag.txt"
Given "user0" adds the tag "MyFirstTag" to "/myFileToTag.txt" shared by "user0"
Given "user0" adds the tag "MySecondTag" to "/myFileToTag.txt" shared by "user0"
When "user1" removes the tag "MyFirstTag" from "/myFileToTag.txt" shared by "user0"
Then The response should have a status code "404"
And "/myFileToTag.txt" shared by "user0" has the following tags for "user0"
|MyFirstTag|
|MySecondTag|
Scenario: Unassigning a not user-visible tag from a file shared by someone else as regular user should fail
Given user "user0" exists
Given user "user1" exists
Given "admin" creates a "not user-visible" tag with name "MyFirstTag"
Given "admin" creates a "normal" tag with name "MySecondTag"
Given user "user0" uploads file "data/textfile.txt" to "/myFileToTag.txt"
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | user1 |
| shareType | 0 |
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | admin |
| shareType | 0 |
Given "admin" adds the tag "MyFirstTag" to "/myFileToTag.txt" shared by "user0"
Given "user0" adds the tag "MySecondTag" to "/myFileToTag.txt" shared by "user0"
When "user1" removes the tag "MyFirstTag" from "/myFileToTag.txt" shared by "user0"
Then The response should have a status code "404"
And "/myFileToTag.txt" shared by "user0" has the following tags for "user0"
|MySecondTag|
And "/myFileToTag.txt" shared by "user0" has the following tags for "admin"
|MyFirstTag|
|MySecondTag|
Scenario: Unassigning a not user-visible tag from a file shared by someone else as admin should work
Given user "user0" exists
Given user "user1" exists
Given "admin" creates a "not user-visible" tag with name "MyFirstTag"
Given "admin" creates a "normal" tag with name "MySecondTag"
Given user "user0" uploads file "data/textfile.txt" to "/myFileToTag.txt"
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | user1 |
| shareType | 0 |
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | admin |
| shareType | 0 |
Given "admin" adds the tag "MyFirstTag" to "/myFileToTag.txt" shared by "user0"
Given "user0" adds the tag "MySecondTag" to "/myFileToTag.txt" shared by "user0"
When "admin" removes the tag "MyFirstTag" from "/myFileToTag.txt" shared by "user0"
Then The response should have a status code "204"
And "/myFileToTag.txt" shared by "user0" has the following tags for "user0"
|MySecondTag|
And "/myFileToTag.txt" shared by "user0" has the following tags for "admin"
|MySecondTag|
Scenario: Unassigning a not user-visible tag from a file unshared by someone else should fail
Given user "user0" exists
Given user "user1" exists
Given "admin" creates a "not user-visible" tag with name "MyFirstTag"
Given "admin" creates a "normal" tag with name "MySecondTag"
Given user "user0" uploads file "data/textfile.txt" to "/myFileToTag.txt"
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | user1 |
| shareType | 0 |
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | admin |
| shareType | 0 |
Given "admin" adds the tag "MyFirstTag" to "/myFileToTag.txt" shared by "user0"
Given "user0" adds the tag "MySecondTag" to "/myFileToTag.txt" shared by "user0"
Given As "user0" remove all shares from the file named "/myFileToTag.txt"
When "admin" removes the tag "MyFirstTag" from "/myFileToTag.txt" shared by "user0"
Then The response should have a status code "404"
Scenario: Unassigning a not user-assignable tag from a file shared by someone else as regular user should fail
Given user "user0" exists
Given user "user1" exists
Given "admin" creates a "not user-assignable" tag with name "MyFirstTag"
Given "admin" creates a "normal" tag with name "MySecondTag"
Given user "user0" uploads file "data/textfile.txt" to "/myFileToTag.txt"
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | user1 |
| shareType | 0 |
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | admin |
| shareType | 0 |
Given "admin" adds the tag "MyFirstTag" to "/myFileToTag.txt" shared by "user0"
Given "user0" adds the tag "MySecondTag" to "/myFileToTag.txt" shared by "user0"
When "user1" removes the tag "MyFirstTag" from "/myFileToTag.txt" shared by "user0"
Then The response should have a status code "403"
And "/myFileToTag.txt" shared by "user0" has the following tags for "user0"
|MyFirstTag|
|MySecondTag|
And "/myFileToTag.txt" shared by "user0" has the following tags for "admin"
|MyFirstTag|
|MySecondTag|
Scenario: Unassigning a not user-assignable tag from a file shared by someone else as admin should work
Given user "user0" exists
Given user "user1" exists
Given "admin" creates a "not user-assignable" tag with name "MyFirstTag"
Given "admin" creates a "normal" tag with name "MySecondTag"
Given user "user0" uploads file "data/textfile.txt" to "/myFileToTag.txt"
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | user1 |
| shareType | 0 |
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | admin |
| shareType | 0 |
Given "admin" adds the tag "MyFirstTag" to "/myFileToTag.txt" shared by "user0"
Given "user0" adds the tag "MySecondTag" to "/myFileToTag.txt" shared by "user0"
When "admin" removes the tag "MyFirstTag" from "/myFileToTag.txt" shared by "user0"
Then The response should have a status code "204"
And "/myFileToTag.txt" shared by "user0" has the following tags for "user0"
|MySecondTag|
And "/myFileToTag.txt" shared by "user0" has the following tags for "admin"
|MySecondTag|
Scenario: Unassigning a not user-assignable tag from a file unshared by someone else should fail
Given user "user0" exists
Given user "user1" exists
Given "admin" creates a "not user-assignable" tag with name "MyFirstTag"
Given "admin" creates a "normal" tag with name "MySecondTag"
Given user "user0" uploads file "data/textfile.txt" to "/myFileToTag.txt"
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | user1 |
| shareType | 0 |
Given As "user0" sending "POST" to "/apps/files_sharing/api/v1/shares" with
| path | myFileToTag.txt |
| shareWith | admin |
| shareType | 0 |
Given "admin" adds the tag "MyFirstTag" to "/myFileToTag.txt" shared by "user0"
Given "user0" adds the tag "MySecondTag" to "/myFileToTag.txt" shared by "user0"
Given As "user0" remove all shares from the file named "/myFileToTag.txt"
When "admin" removes the tag "MyFirstTag" from "/myFileToTag.txt" shared by "user0"
Then The response should have a status code "404"
Scenario: Overwriting existing normal tags should fail
Given user "user0" exists
Given "user0" creates a "normal" tag with name "MyFirstTag"
When "user0" creates a "normal" tag with name "MyFirstTag"
Then The response should have a status code "409"
Scenario: Overwriting existing not user-assignable tags should fail
Given "admin" creates a "not user-assignable" tag with name "MyFirstTag"
When "admin" creates a "not user-assignable" tag with name "MyFirstTag"
Then The response should have a status code "409"
Scenario: Overwriting existing not user-visible tags should fail
Given "admin" creates a "not user-visible" tag with name "MyFirstTag"
When "admin" creates a "not user-visible" tag with name "MyFirstTag"
Then The response should have a status code "409"
Scenario: Getting tags only works with access to the file
Given user "user0" exists
Given user "user1" exists
Given "admin" creates a "normal" tag with name "MyFirstTag"
Given user "user0" uploads file "data/textfile.txt" to "/myFileToTag.txt"
When "user0" adds the tag "MyFirstTag" to "/myFileToTag.txt" shared by "user0"
And "/myFileToTag.txt" shared by "user0" has the following tags for "user0"
|MyFirstTag|
And "/myFileToTag.txt" shared by "user0" has the following tags for "user1"
||
And The response should have a status code "404"