1*b1cdbd2cSJim Jagielski /************************************************************** 2*b1cdbd2cSJim Jagielski * 3*b1cdbd2cSJim Jagielski * Licensed to the Apache Software Foundation (ASF) under one 4*b1cdbd2cSJim Jagielski * or more contributor license agreements. See the NOTICE file 5*b1cdbd2cSJim Jagielski * distributed with this work for additional information 6*b1cdbd2cSJim Jagielski * regarding copyright ownership. The ASF licenses this file 7*b1cdbd2cSJim Jagielski * to you under the Apache License, Version 2.0 (the 8*b1cdbd2cSJim Jagielski * "License"); you may not use this file except in compliance 9*b1cdbd2cSJim Jagielski * with the License. You may obtain a copy of the License at 10*b1cdbd2cSJim Jagielski * 11*b1cdbd2cSJim Jagielski * http://www.apache.org/licenses/LICENSE-2.0 12*b1cdbd2cSJim Jagielski * 13*b1cdbd2cSJim Jagielski * Unless required by applicable law or agreed to in writing, 14*b1cdbd2cSJim Jagielski * software distributed under the License is distributed on an 15*b1cdbd2cSJim Jagielski * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY 16*b1cdbd2cSJim Jagielski * KIND, either express or implied. See the License for the 17*b1cdbd2cSJim Jagielski * specific language governing permissions and limitations 18*b1cdbd2cSJim Jagielski * under the License. 19*b1cdbd2cSJim Jagielski * 20*b1cdbd2cSJim Jagielski *************************************************************/ 21*b1cdbd2cSJim Jagielski 22*b1cdbd2cSJim Jagielski package storagetesting; 23*b1cdbd2cSJim Jagielski 24*b1cdbd2cSJim Jagielski import com.sun.star.uno.XInterface; 25*b1cdbd2cSJim Jagielski import com.sun.star.lang.XMultiServiceFactory; 26*b1cdbd2cSJim Jagielski import com.sun.star.lang.XSingleServiceFactory; 27*b1cdbd2cSJim Jagielski 28*b1cdbd2cSJim Jagielski import com.sun.star.bridge.XUnoUrlResolver; 29*b1cdbd2cSJim Jagielski import com.sun.star.uno.UnoRuntime; 30*b1cdbd2cSJim Jagielski import com.sun.star.uno.XInterface; 31*b1cdbd2cSJim Jagielski 32*b1cdbd2cSJim Jagielski import com.sun.star.embed.*; 33*b1cdbd2cSJim Jagielski 34*b1cdbd2cSJim Jagielski import storagetesting.TestHelper; 35*b1cdbd2cSJim Jagielski import storagetesting.StorageTest; 36*b1cdbd2cSJim Jagielski 37*b1cdbd2cSJim Jagielski public class Test08 implements StorageTest { 38*b1cdbd2cSJim Jagielski 39*b1cdbd2cSJim Jagielski XMultiServiceFactory m_xMSF; 40*b1cdbd2cSJim Jagielski XSingleServiceFactory m_xStorageFactory; 41*b1cdbd2cSJim Jagielski TestHelper m_aTestHelper; 42*b1cdbd2cSJim Jagielski Test08( XMultiServiceFactory xMSF, XSingleServiceFactory xStorageFactory )43*b1cdbd2cSJim Jagielski public Test08( XMultiServiceFactory xMSF, XSingleServiceFactory xStorageFactory ) 44*b1cdbd2cSJim Jagielski { 45*b1cdbd2cSJim Jagielski m_xMSF = xMSF; 46*b1cdbd2cSJim Jagielski m_xStorageFactory = xStorageFactory; 47*b1cdbd2cSJim Jagielski m_aTestHelper = new TestHelper( "Test08: " ); 48*b1cdbd2cSJim Jagielski } 49*b1cdbd2cSJim Jagielski test()50*b1cdbd2cSJim Jagielski public boolean test() 51*b1cdbd2cSJim Jagielski { 52*b1cdbd2cSJim Jagielski try 53*b1cdbd2cSJim Jagielski { 54*b1cdbd2cSJim Jagielski 55*b1cdbd2cSJim Jagielski // create temporary storage based on arbitrary medium 56*b1cdbd2cSJim Jagielski // after such a storage is closed it is lost 57*b1cdbd2cSJim Jagielski Object oTempStorage = m_xStorageFactory.createInstance(); 58*b1cdbd2cSJim Jagielski XStorage xTempStorage = (XStorage) UnoRuntime.queryInterface( XStorage.class, oTempStorage ); 59*b1cdbd2cSJim Jagielski if ( xTempStorage == null ) 60*b1cdbd2cSJim Jagielski { 61*b1cdbd2cSJim Jagielski m_aTestHelper.Error( "Can't create temporary storage representation!" ); 62*b1cdbd2cSJim Jagielski return false; 63*b1cdbd2cSJim Jagielski } 64*b1cdbd2cSJim Jagielski 65*b1cdbd2cSJim Jagielski // set the global password for the root storage 66*b1cdbd2cSJim Jagielski XEncryptionProtectedSource xTempStorageEncryption = 67*b1cdbd2cSJim Jagielski (XEncryptionProtectedSource) UnoRuntime.queryInterface( XEncryptionProtectedSource.class, xTempStorage ); 68*b1cdbd2cSJim Jagielski 69*b1cdbd2cSJim Jagielski if ( xTempStorageEncryption == null ) 70*b1cdbd2cSJim Jagielski { 71*b1cdbd2cSJim Jagielski m_aTestHelper.Message( "Optional interface XEncryptionProtectedSource is not implemented, feature can not be tested!" ); 72*b1cdbd2cSJim Jagielski return true; 73*b1cdbd2cSJim Jagielski } 74*b1cdbd2cSJim Jagielski 75*b1cdbd2cSJim Jagielski byte pPass1[] = { 1, 2, 3 }; 76*b1cdbd2cSJim Jagielski byte pPass2[] = { 3, 2, 1 }; 77*b1cdbd2cSJim Jagielski 78*b1cdbd2cSJim Jagielski try { 79*b1cdbd2cSJim Jagielski xTempStorageEncryption.setEncryptionKey( pPass1 ); 80*b1cdbd2cSJim Jagielski } 81*b1cdbd2cSJim Jagielski catch( Exception e ) 82*b1cdbd2cSJim Jagielski { 83*b1cdbd2cSJim Jagielski m_aTestHelper.Error( "Can't set a common encryption key for the storage, exception:" + e ); 84*b1cdbd2cSJim Jagielski return false; 85*b1cdbd2cSJim Jagielski } 86*b1cdbd2cSJim Jagielski 87*b1cdbd2cSJim Jagielski // open a new substorage 88*b1cdbd2cSJim Jagielski XStorage xTempSubStorage = m_aTestHelper.openSubStorage( xTempStorage, 89*b1cdbd2cSJim Jagielski "SubStorage1", 90*b1cdbd2cSJim Jagielski ElementModes.ELEMENT_WRITE ); 91*b1cdbd2cSJim Jagielski if ( xTempSubStorage == null ) 92*b1cdbd2cSJim Jagielski { 93*b1cdbd2cSJim Jagielski m_aTestHelper.Error( "Can't create substorage!" ); 94*b1cdbd2cSJim Jagielski return false; 95*b1cdbd2cSJim Jagielski } 96*b1cdbd2cSJim Jagielski 97*b1cdbd2cSJim Jagielski // open a new substream, set "MediaType" and "Compressed" properties to it and write some bytes 98*b1cdbd2cSJim Jagielski // the stream will be encrypted with common password 99*b1cdbd2cSJim Jagielski byte pBytes1[] = { 1, 1, 1, 1, 1 }; 100*b1cdbd2cSJim Jagielski if ( !m_aTestHelper.WBToSubstrOfEncr( xTempSubStorage, "SubStream1", "MediaType1", true, pBytes1, true ) ) 101*b1cdbd2cSJim Jagielski return false; 102*b1cdbd2cSJim Jagielski 103*b1cdbd2cSJim Jagielski // open a new substream, set "MediaType" and "Compressed" properties to it and write some bytes 104*b1cdbd2cSJim Jagielski // the stream will not be encrypted 105*b1cdbd2cSJim Jagielski byte pBytes2[] = { 2, 2, 2, 2, 2 }; 106*b1cdbd2cSJim Jagielski if ( !m_aTestHelper.WBToSubstrOfEncr( xTempSubStorage, "SubStream2", "MediaType2", false, pBytes2, false ) ) 107*b1cdbd2cSJim Jagielski return false; 108*b1cdbd2cSJim Jagielski 109*b1cdbd2cSJim Jagielski // open a new substream, set "MediaType" and "Compressed" properties to it and write some bytes 110*b1cdbd2cSJim Jagielski // the stream will be compressed with own password 111*b1cdbd2cSJim Jagielski byte pBytes3[] = { 3, 3, 3, 3, 3 }; 112*b1cdbd2cSJim Jagielski 113*b1cdbd2cSJim Jagielski // open a new substream, set "MediaType" and "Compressed" properties to it and write some bytes 114*b1cdbd2cSJim Jagielski // the stream will not be encrypted 115*b1cdbd2cSJim Jagielski if ( !m_aTestHelper.WriteBytesToEncrSubstream( xTempSubStorage, "SubStream3", "MediaType3", false, pBytes3, pPass2 ) ) 116*b1cdbd2cSJim Jagielski return false; 117*b1cdbd2cSJim Jagielski 118*b1cdbd2cSJim Jagielski // set "MediaType" property for storages and check that "IsRoot" and "OpenMode" properties are set correctly 119*b1cdbd2cSJim Jagielski if ( !m_aTestHelper.setStorageTypeAndCheckProps( xTempStorage, 120*b1cdbd2cSJim Jagielski "MediaType4", 121*b1cdbd2cSJim Jagielski true, 122*b1cdbd2cSJim Jagielski ElementModes.ELEMENT_READWRITE ) ) 123*b1cdbd2cSJim Jagielski return false; 124*b1cdbd2cSJim Jagielski 125*b1cdbd2cSJim Jagielski // set "MediaType" property for storages and check that "IsRoot" and "OpenMode" properties are set correctly 126*b1cdbd2cSJim Jagielski if ( !m_aTestHelper.setStorageTypeAndCheckProps( xTempSubStorage, 127*b1cdbd2cSJim Jagielski "MediaType5", 128*b1cdbd2cSJim Jagielski false, 129*b1cdbd2cSJim Jagielski ElementModes.ELEMENT_WRITE ) ) 130*b1cdbd2cSJim Jagielski return false; 131*b1cdbd2cSJim Jagielski 132*b1cdbd2cSJim Jagielski // create temporary file 133*b1cdbd2cSJim Jagielski String sTempFileURL = m_aTestHelper.CreateTempFile( m_xMSF ); 134*b1cdbd2cSJim Jagielski if ( sTempFileURL == null || sTempFileURL == "" ) 135*b1cdbd2cSJim Jagielski { 136*b1cdbd2cSJim Jagielski m_aTestHelper.Error( "No valid temporary file was created!" ); 137*b1cdbd2cSJim Jagielski return false; 138*b1cdbd2cSJim Jagielski } 139*b1cdbd2cSJim Jagielski 140*b1cdbd2cSJim Jagielski // create temporary storage based on a previously created temporary file 141*b1cdbd2cSJim Jagielski Object pArgs[] = new Object[2]; 142*b1cdbd2cSJim Jagielski pArgs[0] = (Object) sTempFileURL; 143*b1cdbd2cSJim Jagielski pArgs[1] = new Integer( ElementModes.ELEMENT_WRITE ); 144*b1cdbd2cSJim Jagielski 145*b1cdbd2cSJim Jagielski Object oTempFileStorage = m_xStorageFactory.createInstanceWithArguments( pArgs ); 146*b1cdbd2cSJim Jagielski XStorage xTempFileStorage = (XStorage)UnoRuntime.queryInterface( XStorage.class, oTempFileStorage ); 147*b1cdbd2cSJim Jagielski if ( xTempFileStorage == null ) 148*b1cdbd2cSJim Jagielski { 149*b1cdbd2cSJim Jagielski m_aTestHelper.Error( "Can't create storage based on temporary file!" ); 150*b1cdbd2cSJim Jagielski return false; 151*b1cdbd2cSJim Jagielski } 152*b1cdbd2cSJim Jagielski 153*b1cdbd2cSJim Jagielski // copy xTempStorage to xTempFileStorage 154*b1cdbd2cSJim Jagielski // xTempFileStorage will be automatically commited 155*b1cdbd2cSJim Jagielski if ( !m_aTestHelper.copyStorage( xTempStorage, xTempFileStorage ) ) 156*b1cdbd2cSJim Jagielski return false; 157*b1cdbd2cSJim Jagielski 158*b1cdbd2cSJim Jagielski // dispose used storages to free resources 159*b1cdbd2cSJim Jagielski if ( !m_aTestHelper.disposeStorage( xTempStorage ) || !m_aTestHelper.disposeStorage( xTempFileStorage ) ) 160*b1cdbd2cSJim Jagielski return false; 161*b1cdbd2cSJim Jagielski 162*b1cdbd2cSJim Jagielski // ================================================ 163*b1cdbd2cSJim Jagielski // now check all the written and copied information 164*b1cdbd2cSJim Jagielski // ================================================ 165*b1cdbd2cSJim Jagielski 166*b1cdbd2cSJim Jagielski // the temporary file must not be locked any more after storage disposing 167*b1cdbd2cSJim Jagielski pArgs[1] = new Integer( ElementModes.ELEMENT_READ ); 168*b1cdbd2cSJim Jagielski Object oResultStorage = m_xStorageFactory.createInstanceWithArguments( pArgs ); 169*b1cdbd2cSJim Jagielski XStorage xResultStorage = (XStorage) UnoRuntime.queryInterface( XStorage.class, oResultStorage ); 170*b1cdbd2cSJim Jagielski if ( xResultStorage == null ) 171*b1cdbd2cSJim Jagielski { 172*b1cdbd2cSJim Jagielski m_aTestHelper.Error( "Can't reopen storage based on temporary file!" ); 173*b1cdbd2cSJim Jagielski return false; 174*b1cdbd2cSJim Jagielski } 175*b1cdbd2cSJim Jagielski 176*b1cdbd2cSJim Jagielski if ( !m_aTestHelper.checkStorageProperties( xResultStorage, "MediaType4", true, ElementModes.ELEMENT_READ ) ) 177*b1cdbd2cSJim Jagielski return false; 178*b1cdbd2cSJim Jagielski 179*b1cdbd2cSJim Jagielski // open existing substorage 180*b1cdbd2cSJim Jagielski XStorage xResultSubStorage = m_aTestHelper.openSubStorage( xResultStorage, 181*b1cdbd2cSJim Jagielski "SubStorage1", 182*b1cdbd2cSJim Jagielski ElementModes.ELEMENT_READ ); 183*b1cdbd2cSJim Jagielski if ( xResultSubStorage == null ) 184*b1cdbd2cSJim Jagielski { 185*b1cdbd2cSJim Jagielski m_aTestHelper.Error( "Can't open existing substorage!" ); 186*b1cdbd2cSJim Jagielski return false; 187*b1cdbd2cSJim Jagielski } 188*b1cdbd2cSJim Jagielski 189*b1cdbd2cSJim Jagielski if ( !m_aTestHelper.checkStorageProperties( xResultSubStorage, "MediaType5", false, ElementModes.ELEMENT_READ ) ) 190*b1cdbd2cSJim Jagielski return false; 191*b1cdbd2cSJim Jagielski 192*b1cdbd2cSJim Jagielski // set the global password for the root storage 193*b1cdbd2cSJim Jagielski XEncryptionProtectedSource xResultStorageEncryption = 194*b1cdbd2cSJim Jagielski (XEncryptionProtectedSource) UnoRuntime.queryInterface( XEncryptionProtectedSource.class, xResultStorage ); 195*b1cdbd2cSJim Jagielski 196*b1cdbd2cSJim Jagielski if ( xResultStorageEncryption == null ) 197*b1cdbd2cSJim Jagielski { 198*b1cdbd2cSJim Jagielski m_aTestHelper.Error( "XEncryptionProtectedSource was successfully used already, so it must be supported!" ); 199*b1cdbd2cSJim Jagielski return false; 200*b1cdbd2cSJim Jagielski } 201*b1cdbd2cSJim Jagielski 202*b1cdbd2cSJim Jagielski try { 203*b1cdbd2cSJim Jagielski xResultStorageEncryption.setEncryptionKey( pPass2 ); 204*b1cdbd2cSJim Jagielski } 205*b1cdbd2cSJim Jagielski catch( Exception e ) 206*b1cdbd2cSJim Jagielski { 207*b1cdbd2cSJim Jagielski m_aTestHelper.Error( "Can't set a common encryption key for the storage, exception:" + e ); 208*b1cdbd2cSJim Jagielski return false; 209*b1cdbd2cSJim Jagielski } 210*b1cdbd2cSJim Jagielski 211*b1cdbd2cSJim Jagielski if ( !m_aTestHelper.checkEncrStream( xResultSubStorage, "SubStream1", "MediaType1", pBytes1, pPass1 ) ) 212*b1cdbd2cSJim Jagielski return false; 213*b1cdbd2cSJim Jagielski 214*b1cdbd2cSJim Jagielski if ( !m_aTestHelper.checkStream( xResultSubStorage, "SubStream2", "MediaType2", pBytes2 ) ) 215*b1cdbd2cSJim Jagielski return false; 216*b1cdbd2cSJim Jagielski 217*b1cdbd2cSJim Jagielski // the common root storage password should allow to open this stream 218*b1cdbd2cSJim Jagielski if ( !m_aTestHelper.checkStream( xResultSubStorage, "SubStream3", "MediaType3", pBytes3 ) ) 219*b1cdbd2cSJim Jagielski return false; 220*b1cdbd2cSJim Jagielski 221*b1cdbd2cSJim Jagielski // dispose used storages to free resources 222*b1cdbd2cSJim Jagielski if ( !m_aTestHelper.disposeStorage( xResultStorage ) ) 223*b1cdbd2cSJim Jagielski return false; 224*b1cdbd2cSJim Jagielski 225*b1cdbd2cSJim Jagielski return true; 226*b1cdbd2cSJim Jagielski } 227*b1cdbd2cSJim Jagielski catch( Exception e ) 228*b1cdbd2cSJim Jagielski { 229*b1cdbd2cSJim Jagielski m_aTestHelper.Error( "Exception: " + e ); 230*b1cdbd2cSJim Jagielski return false; 231*b1cdbd2cSJim Jagielski } 232*b1cdbd2cSJim Jagielski } 233*b1cdbd2cSJim Jagielski } 234*b1cdbd2cSJim Jagielski 235