diff --git a/apps/files_sharing/tests/permissions.php b/apps/files_sharing/tests/permissions.php index bff7109518581fdd38969679a7b96e09af0ca507..2cbc412d261ef36e7030cc7d68d83865bf59095f 100644 --- a/apps/files_sharing/tests/permissions.php +++ b/apps/files_sharing/tests/permissions.php @@ -141,16 +141,14 @@ class Test_Files_Sharing_Permissions extends Test_Files_Sharing_Base { $this->assertEquals('subdir', $contents[0]['name']); $this->assertEquals(31, $contents[0]['permissions']); $this->assertEquals('textfile.txt', $contents[1]['name']); - $this->assertEquals(31, $contents[1]['permissions']); + // 27 is correct because create is reserved to folders only - requires more unit tests overall to ensure this + $this->assertEquals(27, $contents[1]['permissions']); $contents = $this->secondView->getDirectoryContent('files/shareddirrestricted'); $this->assertEquals('subdir', $contents[0]['name']); - $this->assertEquals(7, $contents[0]['permissions']); + $this->assertEquals(7 | \OCP\PERMISSION_DELETE, $contents[0]['permissions']); $this->assertEquals('textfile1.txt', $contents[1]['name']); - $this->assertEquals(7, $contents[1]['permissions']); - - // the share mount point should always have delete permissions to allow the user - // to unmount it - $restrictedShare = $this->secondView->getFileInfo('files/shareddirrestricted'); - $this->assertEquals(7 | \OCP\PERMISSION_DELETE, $restrictedShare['permissions']); + // 3 is correct because create is reserved to folders only + // delete permissions are added since mount points can always be deleted + $this->assertEquals(3 | \OCP\PERMISSION_DELETE, $contents[1]['permissions']); } }