/* * SPDX-FileCopyrightText: 2019 Nextcloud GmbH and Nextcloud contributors * SPDX-FileCopyrightText: 2016 ownCloud GmbH * SPDX-License-Identifier: CC0-1.0 * * This software is in the public domain, furnished "as is", without technical * support, and with no warranty, express or implied, as to its usefulness for * any purpose. */ #include #include #include #include "QtTest/qtestcase.h" #include "common/utility.h" #include "folderman.h" #include "account.h" #include "accountstate.h" #include #include "configfile.h" #include "syncenginetestutils.h" #include "testhelper.h" using namespace Qt::StringLiterals; using namespace OCC; static QByteArray fake400Response = R"( {"ocs":{"meta":{"status":"failure","statuscode":400,"message":"Parameter is incorrect.\n"},"data":[]}} )"; bool itemDidCompleteSuccessfully(const ItemCompletedSpy &spy, const QString &path) { if (auto item = spy.findItem(path)) { return item->_status == SyncFileItem::Success; } return false; } class TestFolderMan: public QObject { Q_OBJECT std::unique_ptr _fm; signals: void incomingShareDeleted(); private slots: void initTestCase() { OCC::Logger::instance()->setLogFlush(true); OCC::Logger::instance()->setLogDebug(true); QStandardPaths::setTestModeEnabled(true); } void testDeleteEncryptedFiles() { _fm.reset({}); _fm.reset(new FolderMan{}); FakeFolder fakeFolder{FileInfo::A12_B12_C12_S12()}; QCOMPARE(fakeFolder.currentLocalState().children.count(), 4); ItemCompletedSpy completeSpy(fakeFolder); fakeFolder.localModifier().mkdir("encrypted"); fakeFolder.localModifier().setE2EE("encrypted", true); fakeFolder.remoteModifier().mkdir("encrypted"); fakeFolder.remoteModifier().setE2EE("encrypted", true); const auto fakeFileInfo = fakeFolder.remoteModifier().find("encrypted"); QVERIFY(fakeFileInfo); QVERIFY(fakeFileInfo->isEncrypted); QCOMPARE(fakeFolder.currentLocalState().children.count(), 5); const auto fakeFileId = fakeFileInfo->fileId; const auto fakeQnam = new FakeQNAM({}); // Let's avoid the null filename assert in the default FakeQNAM request creation const auto fakeQnamOverride = [this, fakeFileId](const QNetworkAccessManager::Operation op, const QNetworkRequest &req, QIODevice *device) { Q_UNUSED(device) QNetworkReply *reply = nullptr; const auto reqUrl = req.url(); const auto reqRawPath = reqUrl.path(); const auto reqPath = reqRawPath.startsWith("/owncloud/") ? reqRawPath.mid(10) : reqRawPath; if (reqPath.startsWith(QStringLiteral("ocs/v2.php/apps/end_to_end_encryption/api/v1/meta-data/"))) { const auto splitUrlPath = reqPath.split('/'); const auto fileId = splitUrlPath.last(); const QUrlQuery urlQuery(req.url()); const auto formatParam = urlQuery.queryItemValue(QStringLiteral("format")); if(fileId == fakeFileId && formatParam == QStringLiteral("json")) { reply = new FakePayloadReply(op, req, QJsonDocument().toJson(), this); } else { reply = new FakeErrorReply(op, req, this, 400, fake400Response); } } return reply; }; fakeFolder.setServerOverride(fakeQnamOverride); fakeQnam->setOverride(fakeQnamOverride); const auto account = Account::create(); const auto capabilities = QVariantMap { {QStringLiteral("end-to-end-encryption"), QVariantMap { {QStringLiteral("enabled"), true}, {QStringLiteral("api-version"), QString::number(2.0)}, }}, }; account->setCapabilities(capabilities); account->setCredentials(new FakeCredentials{fakeQnam}); account->setUrl(QUrl(("owncloud://somehost/owncloud"))); const auto accountState = new FakeAccountState(account); QVERIFY(accountState->isConnected()); QVERIFY(fakeFolder.syncOnce()); QCOMPARE(fakeFolder.currentLocalState(), fakeFolder.currentRemoteState()); auto folderDef = folderDefinition(fakeFolder.localPath()); folderDef.targetPath = ""; const auto folder = FolderMan::instance()->addFolder(accountState, folderDef); QVERIFY(folder); qRegisterMetaType("SyncResult"); QSignalSpy folderSyncDone(folder, &Folder::syncFinished); QDir dir(folder->path() + QStringLiteral("encrypted")); QVERIFY(dir.exists()); QVERIFY(fakeFolder.remoteModifier().find("encrypted")); QVERIFY(fakeFolder.currentLocalState().find("encrypted")); QCOMPARE(fakeFolder.currentLocalState().children.count(), 5); // Rather than go through the pain of trying to replicate the E2EE response from // the server, let's just manually set the encryption bool in the folder journal SyncJournalFileRecord rec; QVERIFY(folder->journalDb()->getFileRecord(QStringLiteral("encrypted"), &rec)); rec._modtime = QDateTime::currentSecsSinceEpoch(); rec._e2eEncryptionStatus = SyncJournalFileRecord::EncryptionStatus::EncryptedMigratedV2_0; rec._path = QStringLiteral("encrypted").toUtf8(); rec._type = CSyncEnums::ItemTypeDirectory; QVERIFY(folder->journalDb()->setFileRecord(rec)); SyncJournalFileRecord updatedRec; QVERIFY(folder->journalDb()->getFileRecord(QStringLiteral("encrypted"), &updatedRec)); QVERIFY(updatedRec.isE2eEncrypted()); QVERIFY(updatedRec.isDirectory()); FolderMan::instance()->removeE2eFiles(account); if (folderSyncDone.isEmpty()) { QVERIFY(folderSyncDone.wait()); } QVERIFY(fakeFolder.currentRemoteState().find("encrypted")); QVERIFY(!fakeFolder.currentLocalState().find("encrypted")); QCOMPARE(fakeFolder.currentLocalState().children.count(), 4); } void testLeaveShare() { _fm.reset({}); _fm.reset(new FolderMan{}); QTemporaryDir dir; ConfigFile::setConfDir(dir.path()); // we don't want to pollute the user's config file constexpr auto firstSharePath = "A/sharedwithme_A.txt"; constexpr auto secondSharePath = "A/B/sharedwithme_B.data"; QScopedPointer fakeQnam(new FakeQNAM({})); OCC::AccountPtr account = OCC::Account::create(); account->setCredentials(new FakeCredentials{fakeQnam.data()}); account->setUrl(QUrl(("http://example.de"))); OCC::AccountManager::instance()->addAccount(account); FakeFolder fakeFolder{FileInfo{}}; fakeFolder.remoteModifier().mkdir("A"); fakeFolder.remoteModifier().insert(firstSharePath, 100); const auto firstShare = fakeFolder.remoteModifier().find(firstSharePath); QVERIFY(firstShare); firstShare->permissions.setPermission(OCC::RemotePermissions::CanRead); firstShare->permissions.setPermission(OCC::RemotePermissions::IsShared); fakeFolder.remoteModifier().mkdir("A/B"); fakeFolder.remoteModifier().insert(secondSharePath, 100); const auto secondShare = fakeFolder.remoteModifier().find(secondSharePath); QVERIFY(secondShare); secondShare->permissions.setPermission(OCC::RemotePermissions::CanRead); secondShare->permissions.setPermission(OCC::RemotePermissions::IsShared); FolderMan *folderman = FolderMan::instance(); QCOMPARE(folderman, _fm.get()); OCC::AccountState *accountState = OCC::AccountManager::instance()->accounts().first().data(); const auto folder = folderman->addFolder(accountState, folderDefinition(fakeFolder.localPath())); QVERIFY(folder); auto realFolder = FolderMan::instance()->folderForPath(fakeFolder.localPath()); QVERIFY(realFolder); QVERIFY(fakeFolder.syncOnce()); QCOMPARE(fakeFolder.currentLocalState(), fakeFolder.currentRemoteState()); fakeQnam->setOverride([this, accountState, &fakeFolder](QNetworkAccessManager::Operation op, const QNetworkRequest &req, QIODevice *device) { Q_UNUSED(device); QNetworkReply *reply = nullptr; if (op != QNetworkAccessManager::DeleteOperation) { reply = new FakeErrorReply(op, req, this, 405); return reply; } if (req.url().path().isEmpty()) { reply = new FakeErrorReply(op, req, this, 404); return reply; } const auto filePathRelative = req.url().path().remove(accountState->account()->davPath()); const auto foundFileInRemoteFolder = fakeFolder.remoteModifier().find(filePathRelative); if (filePathRelative.isEmpty() || !foundFileInRemoteFolder) { reply = new FakeErrorReply(op, req, this, 404); return reply; } fakeFolder.remoteModifier().remove(filePathRelative); reply = new FakePayloadReply(op, req, {}, nullptr); emit incomingShareDeleted(); return reply; }); QSignalSpy incomingShareDeletedSignal(this, &TestFolderMan::incomingShareDeleted); // verify first share gets deleted folderman->leaveShare(fakeFolder.localPath() + firstSharePath); QCOMPARE(incomingShareDeletedSignal.count(), 1); QVERIFY(!fakeFolder.remoteModifier().find(firstSharePath)); QVERIFY(fakeFolder.syncOnce()); QCOMPARE(fakeFolder.currentLocalState(), fakeFolder.currentRemoteState()); // verify no share gets deleted folderman->leaveShare(fakeFolder.localPath() + "A/B/notsharedwithme_B.data"); QCOMPARE(incomingShareDeletedSignal.count(), 1); QVERIFY(fakeFolder.remoteModifier().find("A/B/sharedwithme_B.data")); QVERIFY(fakeFolder.syncOnce()); QCOMPARE(fakeFolder.currentLocalState(), fakeFolder.currentRemoteState()); // verify second share gets deleted folderman->leaveShare(fakeFolder.localPath() + secondSharePath); QCOMPARE(incomingShareDeletedSignal.count(), 2); QVERIFY(!fakeFolder.remoteModifier().find(secondSharePath)); QVERIFY(fakeFolder.syncOnce()); QCOMPARE(fakeFolder.currentLocalState(), fakeFolder.currentRemoteState()); OCC::AccountManager::instance()->deleteAccount(accountState); } void testCheckPathValidityForNewFolder() { _fm.reset({}); _fm.reset(new FolderMan{}); #ifdef Q_OS_WIN Utility::NtfsPermissionLookupRAII ntfs_perm; #endif QTemporaryDir dir; ConfigFile::setConfDir(dir.path()); // we don't want to pollute the user's config file QVERIFY(dir.isValid()); QDir dir2(dir.path()); QVERIFY(dir2.mkpath("sub/ownCloud1/folder/f")); QVERIFY(dir2.mkpath("ownCloud2")); QVERIFY(dir2.mkpath("sub/free")); QVERIFY(dir2.mkpath("free2/sub")); { QFile f(dir.path() + "/sub/file.txt"); f.open(QFile::WriteOnly); f.write("hello"); } QString dirPath = dir2.canonicalPath(); AccountPtr account = Account::create(); QUrl url("http://example.de"); auto *cred = new HttpCredentialsTest("testuser", "secret"); account->setCredentials(cred); account->setUrl( url ); AccountStatePtr newAccountState(new AccountState(account)); FolderMan *folderman = FolderMan::instance(); QCOMPARE(folderman, _fm.get()); QVERIFY(folderman->addFolder(newAccountState.data(), folderDefinition(dirPath + "/sub/ownCloud1"))); QVERIFY(folderman->addFolder(newAccountState.data(), folderDefinition(dirPath + "/ownCloud2"))); const auto folderList = folderman->map(); for (const auto &folder : folderList) { QVERIFY(!folder->isSyncRunning()); } // those should be allowed // QString FolderMan::checkPathValidityForNewFolder(const QString& path, const QUrl &serverUrl, bool forNewDirectory).second QCOMPARE(folderman->checkPathValidityForNewFolder(dirPath + "/sub/free").second, QString()); QCOMPARE(folderman->checkPathValidityForNewFolder(dirPath + "/free2/").second, QString()); // Not an existing directory -> Ok QCOMPARE(folderman->checkPathValidityForNewFolder(dirPath + "/sub/bliblablu").second, QString()); QCOMPARE(folderman->checkPathValidityForNewFolder(dirPath + "/sub/free/bliblablu").second, QString()); // QCOMPARE(folderman->checkPathValidityForNewFolder(dirPath + "/sub/bliblablu/some/more").second, QString()); // A file -> Error QVERIFY(!folderman->checkPathValidityForNewFolder(dirPath + "/sub/file.txt").second.isNull()); // There are folders configured in those folders, url needs to be taken into account: -> ERROR QUrl url2(url); const QString user = account->credentials()->user(); url2.setUserName(user); // The following both fail because they refer to the same account (user and url) QVERIFY(!folderman->checkPathValidityForNewFolder(dirPath + "/sub/ownCloud1", url2).second.isNull()); QVERIFY(!folderman->checkPathValidityForNewFolder(dirPath + "/ownCloud2/", url2).second.isNull()); // The following both fail because they are already sync folders even if for another account QUrl url3("http://anotherexample.org"); url3.setUserName("dummy"); QCOMPARE(folderman->checkPathValidityForNewFolder(dirPath + "/sub/ownCloud1", url3).second, QString("Please choose a different location. %1 is already being used as a sync folder.").arg(QDir::toNativeSeparators(dirPath + "/sub/ownCloud1"))); QCOMPARE(folderman->checkPathValidityForNewFolder(dirPath + "/ownCloud2", url3).second, QString("Please choose a different location. %1 is already being used as a sync folder.").arg(QDir::toNativeSeparators(dirPath + "/ownCloud2"))); QVERIFY(!folderman->checkPathValidityForNewFolder(dirPath).second.isNull()); QVERIFY(!folderman->checkPathValidityForNewFolder(dirPath + "/sub/ownCloud1/folder").second.isNull()); QVERIFY(!folderman->checkPathValidityForNewFolder(dirPath + "/sub/ownCloud1/f").second.isNull()); #ifndef Q_OS_WIN // no links on windows, no permissions // make a bunch of links QVERIFY(QFile::link(dirPath + "/sub/free", dirPath + "/link1")); QVERIFY(QFile::link(dirPath + "/sub", dirPath + "/link2")); QVERIFY(QFile::link(dirPath + "/sub/ownCloud1", dirPath + "/link3")); QVERIFY(QFile::link(dirPath + "/sub/ownCloud1/folder", dirPath + "/link4")); // Ok QVERIFY(folderman->checkPathValidityForNewFolder(dirPath + "/link1").second.isNull()); QVERIFY(folderman->checkPathValidityForNewFolder(dirPath + "/link2/free").second.isNull()); // Not Ok QVERIFY(!folderman->checkPathValidityForNewFolder(dirPath + "/link2").second.isNull()); // link 3 points to an existing sync folder. To make it fail, the account must be the same QVERIFY(!folderman->checkPathValidityForNewFolder(dirPath + "/link3", url2).second.isNull()); // while with a different account, this is fine QCOMPARE(folderman->checkPathValidityForNewFolder(dirPath + "/link3", url3).second, QString("Please choose a different location. %1 is already being used as a sync folder.").arg(dirPath + "/link3")); QVERIFY(!folderman->checkPathValidityForNewFolder(dirPath + "/link4").second.isNull()); QVERIFY(!folderman->checkPathValidityForNewFolder(dirPath + "/link3/folder").second.isNull()); // test some non existing sub path (error) QVERIFY(!folderman->checkPathValidityForNewFolder(dirPath + "/sub/ownCloud1/some/sub/path").second.isNull()); QVERIFY(!folderman->checkPathValidityForNewFolder(dirPath + "/ownCloud2/blublu").second.isNull()); QVERIFY(!folderman->checkPathValidityForNewFolder(dirPath + "/sub/ownCloud1/folder/g/h").second.isNull()); QVERIFY(!folderman->checkPathValidityForNewFolder(dirPath + "/link3/folder/neu_folder").second.isNull()); // Subfolder of links QVERIFY(folderman->checkPathValidityForNewFolder(dirPath + "/link1/subfolder").second.isNull()); QVERIFY(folderman->checkPathValidityForNewFolder(dirPath + "/link2/free/subfolder").second.isNull()); // Should not have the rights QVERIFY(!folderman->checkPathValidityForNewFolder("/").second.isNull()); QVERIFY(!folderman->checkPathValidityForNewFolder("/usr/bin/somefolder").second.isNull()); #endif #ifdef Q_OS_WIN // drive-letter tests if (!QFileInfo("v:/").exists()) { QVERIFY(!folderman->checkPathValidityForNewFolder("v:").second.isNull()); QVERIFY(!folderman->checkPathValidityForNewFolder("v:/").second.isNull()); QVERIFY(!folderman->checkPathValidityForNewFolder("v:/foo").second.isNull()); } if (QFileInfo("c:/").isWritable()) { QVERIFY(folderman->checkPathValidityForNewFolder("c:").second.isNull()); QVERIFY(folderman->checkPathValidityForNewFolder("c:/").second.isNull()); QVERIFY(folderman->checkPathValidityForNewFolder("c:/foo").second.isNull()); } #endif // Invalid paths QVERIFY(!folderman->checkPathValidityForNewFolder("").second.isNull()); // REMOVE ownCloud2 from the filesystem, but keep a folder sync'ed to it. QDir(dirPath + "/ownCloud2/").removeRecursively(); QVERIFY(!folderman->checkPathValidityForNewFolder(dirPath + "/ownCloud2/blublu").second.isNull()); QVERIFY(!folderman->checkPathValidityForNewFolder(dirPath + "/ownCloud2/sub/subsub/sub").second.isNull()); } void testFindGoodPathForNewSyncFolder() { _fm.reset({}); _fm.reset(new FolderMan{}); // SETUP QTemporaryDir dir; ConfigFile::setConfDir(dir.path()); // we don't want to pollute the user's config file QVERIFY(dir.isValid()); QDir dir2(dir.path()); QVERIFY(dir2.mkpath("sub/ownCloud1/folder/f")); QVERIFY(dir2.mkpath("ownCloud")); QVERIFY(dir2.mkpath("ownCloud2")); QVERIFY(dir2.mkpath("ownCloud2/foo")); QVERIFY(dir2.mkpath("sub/free")); QVERIFY(dir2.mkpath("free2/sub")); QString dirPath = dir2.canonicalPath(); AccountPtr account = Account::create(); QUrl url("http://example.de"); auto *cred = new HttpCredentialsTest("testuser", "secret"); account->setCredentials(cred); account->setUrl( url ); url.setUserName(cred->user()); AccountStatePtr newAccountState(new AccountState(account)); FolderMan *folderman = FolderMan::instance(); QCOMPARE(folderman, _fm.get()); QVERIFY(folderman->addFolder(newAccountState.data(), folderDefinition(dirPath + "/sub/ownCloud/"))); QVERIFY(folderman->addFolder(newAccountState.data(), folderDefinition(dirPath + "/ownCloud2/"))); // TEST QCOMPARE(folderman->findGoodPathForNewSyncFolder(dirPath + "/oc", url, FolderMan::GoodPathStrategy::AllowOnlyNewPath), QString(dirPath + "/oc")); QCOMPARE(folderman->findGoodPathForNewSyncFolder(dirPath + "/ownCloud", url, FolderMan::GoodPathStrategy::AllowOnlyNewPath), QString(dirPath + "/ownCloud3")); QCOMPARE(folderman->findGoodPathForNewSyncFolder(dirPath + "/ownCloud2", url, FolderMan::GoodPathStrategy::AllowOnlyNewPath), QString(dirPath + "/ownCloud22")); QCOMPARE(folderman->findGoodPathForNewSyncFolder(dirPath + "/ownCloud2/foo", url, FolderMan::GoodPathStrategy::AllowOnlyNewPath), QString(dirPath + "/ownCloud2/foo")); QCOMPARE(folderman->findGoodPathForNewSyncFolder(dirPath + "/ownCloud2/bar", url, FolderMan::GoodPathStrategy::AllowOnlyNewPath), QString(dirPath + "/ownCloud2/bar")); QCOMPARE(folderman->findGoodPathForNewSyncFolder(dirPath + "/sub", url, FolderMan::GoodPathStrategy::AllowOnlyNewPath), QString(dirPath + "/sub2")); // REMOVE ownCloud2 from the filesystem, but keep a folder sync'ed to it. // We should still not suggest this folder as a new folder. QDir(dirPath + "/ownCloud2/").removeRecursively(); QCOMPARE(folderman->findGoodPathForNewSyncFolder(dirPath + "/ownCloud", url, FolderMan::GoodPathStrategy::AllowOnlyNewPath), QString(dirPath + "/ownCloud3")); QCOMPARE(folderman->findGoodPathForNewSyncFolder(dirPath + "/ownCloud2", url, FolderMan::GoodPathStrategy::AllowOnlyNewPath), QString(dirPath + "/ownCloud22")); } void testProcessingFileIdsPushNotification() { _fm.reset({}); _fm.reset(new FolderMan{}); QTemporaryDir tempDir; ConfigFile::setConfDir(tempDir.path()); // we don't want to pollute the user's config file QVERIFY(tempDir.isValid()); QDir dir(tempDir.path()); QVERIFY(dir.mkpath("user1_root")); QVERIFY(dir.mkpath("user1_subfolder")); QVERIFY(dir.mkpath("user2_root")); const auto dirPath = dir.canonicalPath(); const auto createAccount = [](const QString &userName) -> AccountState * { auto account = Account::create(); auto credentials = new FakeCredentials{new FakeQNAM({})}; credentials->setUserName(userName); account->setCredentials(credentials); account->setUrl(QUrl{"http://nextcloud.test"}); return new FakeAccountState(account); }; auto user1 = createAccount("user1"); auto user2 = createAccount("user2"); const auto addFolderForTesting = [this, &dirPath](AccountState * const account, const QString &alias, const QString &localPath, const QString &targetPath, const int rootFileId, const QList &fileIds) -> void { FolderDefinition definition; definition.alias = alias; definition.localPath = dirPath + localPath; definition.targetPath = targetPath; auto folder = _fm->addFolder(account, definition); QVERIFY(folder); Q_EMIT folder->syncEngine().rootFileIdReceived(rootFileId); auto journal = folder->journalDb(); for (const auto &fileId : fileIds) { SyncJournalFileRecord record; record._fileId = u"%1oc123xyz987e"_s.arg(fileId, 8, 10, '0'_L1).toLocal8Bit(); record._modtime = QDateTime::currentSecsSinceEpoch(); record._path = u"item%1"_s.arg(fileId).toLocal8Bit(); record._type = ItemTypeFile; record._etag = "etag"_ba; QVERIFY(journal->setFileRecord(record)); } }; const auto verifyFolderSyncChangesOnReceivedFileIdNotification = [this](AccountState * const user, const QList &fileIds, const QStringList &expectedFolderAliasesToSync) -> void { QStringList folderAliasesToBeSynced = {}; _fm->_scheduledFolders.clear(); QSignalSpy spy(_fm.get(), &FolderMan::folderSyncStateChange); // the account received a push notification about for specific file ids _fm->slotProcessFileIdsPushNotification(user->account().get(), fileIds); // expect the sync state for all folders of that account containing this file id to change QCOMPARE(spy.size(), expectedFolderAliasesToSync.size()); for (const auto &signalParameters : std::as_const(spy)) { QVERIFY(signalParameters.size() == 1); const auto folderAlias = signalParameters.front().value()->alias(); QVERIFY2( expectedFolderAliasesToSync.contains(folderAlias), qPrintable("Unexpected folder alias '%1'; expected were [%2]"_L1.arg(folderAlias, expectedFolderAliasesToSync.join(", "))) ); folderAliasesToBeSynced.append(folderAlias); } // all expected folders received a sync request! folderAliasesToBeSynced.sort(); QCOMPARE(folderAliasesToBeSynced, expectedFolderAliasesToSync); }; addFolderForTesting(user1, "0", "/user1_root", "/", 10, {11, 12, 13, 50}); addFolderForTesting(user1, "1", "/user1_subfolder", "/subfolder", 15, {16, 17, 18, 50}); addFolderForTesting(user2, "2", "/user2_root", "/", 20, {21, 22, 23, 50}); verifyFolderSyncChangesOnReceivedFileIdNotification(user1, {10}, {"0"}); verifyFolderSyncChangesOnReceivedFileIdNotification(user1, {11}, {"0"}); verifyFolderSyncChangesOnReceivedFileIdNotification(user1, {13, 11}, {"0"}); verifyFolderSyncChangesOnReceivedFileIdNotification(user1, {15}, {"1"}); verifyFolderSyncChangesOnReceivedFileIdNotification(user1, {16}, {"1"}); verifyFolderSyncChangesOnReceivedFileIdNotification(user1, {18, 16}, {"1"}); verifyFolderSyncChangesOnReceivedFileIdNotification(user1, {15, 11}, {"0", "1"}); verifyFolderSyncChangesOnReceivedFileIdNotification(user1, {11, 16, 21}, {"0", "1"}); verifyFolderSyncChangesOnReceivedFileIdNotification(user1, {50}, {"0", "1"}); verifyFolderSyncChangesOnReceivedFileIdNotification(user1, {20, 21, 22, 23, 404}, {}); verifyFolderSyncChangesOnReceivedFileIdNotification(user2, {20}, {"2"}); verifyFolderSyncChangesOnReceivedFileIdNotification(user2, {21}, {"2"}); verifyFolderSyncChangesOnReceivedFileIdNotification(user2, {23, 21}, {"2"}); verifyFolderSyncChangesOnReceivedFileIdNotification(user2, {11, 16, 21}, {"2"}); verifyFolderSyncChangesOnReceivedFileIdNotification(user2, {50}, {"2"}); verifyFolderSyncChangesOnReceivedFileIdNotification(user2, {10, 11, 17, 18, 404}, {}); } }; QTEST_GUILESS_MAIN(TestFolderMan) #include "testfolderman.moc"