1. 30 Mar, 2017 2 commits
  2. 29 Mar, 2017 4 commits
  3. 03 Mar, 2017 1 commit
  4. 21 Feb, 2017 2 commits
  5. 02 Feb, 2017 1 commit
    • Vincent Petry's avatar
      Add integration test for trashbin · 383aa124
      Vincent Petry authored
      Add test for basic deletion.
      Add test when deleting from shared folder as recipient.
      Add test to check that metadata stays when moving out of shared folder
      as recipient.
  6. 18 Jan, 2017 3 commits
  7. 23 Nov, 2016 1 commit
    • Vincent Petry's avatar
      Properly convert OCS params + more tests (#26691) · 687c0592
      Vincent Petry authored
      * Correctly convert OCS permissions params
      * Added tests about permissions and public upload
      Added read and share permissions instead of all (default ones)
      Added positive case
      Check also permissions update
      Added tests for resharing with public links when the user doesn't have enough permisssions
  8. 14 Nov, 2016 1 commit
  9. 14 Oct, 2016 1 commit
  10. 28 Sep, 2016 1 commit
  11. 27 Sep, 2016 1 commit
  12. 16 Sep, 2016 1 commit
  13. 26 Jul, 2016 1 commit
    • Vincent Petry's avatar
      Creating second share to user who renamed received folder creates a second entry (#25568) · c7b97382
      Vincent Petry authored
      * Add integration tests for double shares with rename in between
      * Make share target consistent when grouping group share with user share
      In some situations, a group share is created before a user share, and
      the recipient renamed the received share before the latter is created.
      In this situation, the "file_target" was already modified and the second
      created share must align to the already renamed share.
      To achieve this, the MountProvider now groups only by "item_source"
      value and sorts by share time. This makes it so that the least recent
      share is selected as super-share and its "file_target" value is then
      adjusted in all grouped shares.
      This fixes the issue where this situation would have different
      "file_target" values resulting in two shared folders appearing instead
      of one.
  14. 19 Jul, 2016 1 commit
  15. 05 Jul, 2016 1 commit
  16. 24 Jun, 2016 1 commit
    • Vincent Petry's avatar
      Add explicit delete permission to link shares · 2ca13014
      Vincent Petry authored
      Link shares always allowed deletion, however internally the permissions
      were stored as 7 which lacked delete permissions. This created an
      inconsistency in the Webdav permissions.
      This fix makes sure we include delete permissions in the share
      permissions, which now become 15.
      In case a client is still passing 7 for legacy reasons, it gets
      converted automatically to 15.
  17. 13 Jun, 2016 1 commit
  18. 02 May, 2016 2 commits
  19. 30 Apr, 2016 1 commit
  20. 15 Apr, 2016 2 commits
  21. 14 Apr, 2016 1 commit
  22. 12 Apr, 2016 1 commit
  23. 31 Mar, 2016 1 commit
    • Roeland Jago Douma's avatar
      Add sharePermissions webdav property · 8c0ef4c4
      Roeland Jago Douma authored
      This property can be queries by the clients so they know the max
      permissions they can use to share a file with. This will improve the UX.
      The oc:permissions proptery is not enough since mountpoints have
      different permissions (delete + move by default).
      By making it a new property the clients can just request it. On older
      servers it will just return a 404 for that property (and thus they know
      they have to fall back to their hacky work arounds). But if the property
      is returned the client can show proper info.
      * unit tests
      * intergration test
  24. 10 Mar, 2016 1 commit
  25. 01 Mar, 2016 1 commit
  26. 29 Feb, 2016 1 commit
    • Roeland Jago Douma's avatar
      Check correct permissions when resharing · 8924b0a0
      Roeland Jago Douma authored
      Fixes #22675
      Since we only get a share id we do not know the path for the sharer.
      Now if we edit a share we start searching for shares for that user of
      that node. And deduce the permissions that way.
      * Intergration test added
      * Fix unit tests
  27. 26 Feb, 2016 1 commit
  28. 25 Feb, 2016 1 commit
    • Roeland Jago Douma's avatar
      Do not allow sharing of the root folder · 8213d5df
      Roeland Jago Douma authored
      Sharing of the users root folder should not be allowed as it is very
      weird UX. Also many of our clients have no proper way of displaying
      Added unit test
      Also added intergration tests to make sure we won't allow it in the
  29. 23 Feb, 2016 1 commit
    • Morris Jobke's avatar
      Add a test that reproduces #20686 · 45e24759
      Morris Jobke authored
      * user with a quota of 0 gets a file shared and can't update this file
        because the wrong quota is used to verify if the update is allowed
  30. 05 Feb, 2016 1 commit
  31. 29 Jan, 2016 1 commit