aboutsummaryrefslogtreecommitdiffstats
path: root/OpenKeychain/src/androidTest/java
diff options
context:
space:
mode:
Diffstat (limited to 'OpenKeychain/src/androidTest/java')
-rw-r--r--OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/JacocoWorkaroundJUnitRunner.java29
-rw-r--r--OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/TestHelpers.java169
-rw-r--r--OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/actions/CustomActions.java82
-rw-r--r--OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/actions/OrientationChangeAction.java74
-rw-r--r--OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/matcher/BitmapMatcher.java63
-rw-r--r--OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/matcher/CustomMatchers.java160
-rw-r--r--OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/matcher/DrawableMatcher.java128
-rw-r--r--OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/matcher/EditTextMatchers.java2
-rw-r--r--OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/remote/OpenPgpServiceTest.java171
-rw-r--r--OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/AsymmetricFileOperationTests.java389
-rw-r--r--OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/AsymmetricTextOperationTests.java185
-rw-r--r--OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/CreateKeyActivityTest.java (renamed from OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/CreateKeyActivityTest.java)16
-rw-r--r--OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/EditKeyTest.java90
-rw-r--r--OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/MiscCryptOperationTests.java293
-rw-r--r--OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/SymmetricTextOperationTests.java188
-rw-r--r--OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/ViewKeyAdvShareTest.java124
-rw-r--r--OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/widget/EncryptKeyCompletionViewTest.java91
17 files changed, 2249 insertions, 5 deletions
diff --git a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/JacocoWorkaroundJUnitRunner.java b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/JacocoWorkaroundJUnitRunner.java
new file mode 100644
index 000000000..b310ed5b8
--- /dev/null
+++ b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/JacocoWorkaroundJUnitRunner.java
@@ -0,0 +1,29 @@
+package org.sufficientlysecure.keychain;
+
+
+import java.lang.reflect.Method;
+
+import android.os.Bundle;
+import android.support.test.runner.AndroidJUnitRunner;
+
+
+public class JacocoWorkaroundJUnitRunner extends AndroidJUnitRunner {
+ static {
+ System.setProperty("jacoco-agent.destfile", "/data/data/"
+ + BuildConfig.APPLICATION_ID + "/coverage.ec");
+ }
+
+ @Override
+ public void finish(int resultCode, Bundle results) {
+ try {
+ Class rt = Class.forName("org.jacoco.agent.rt.RT");
+ Method getAgent = rt.getMethod("getAgent");
+ Method dump = getAgent.getReturnType().getMethod("dump", boolean.class);
+ Object agent = getAgent.invoke(null);
+ dump.invoke(agent, false);
+ } catch (Exception e) {
+ e.printStackTrace();
+ }
+ super.finish(resultCode, results);
+ }
+} \ No newline at end of file
diff --git a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/TestHelpers.java b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/TestHelpers.java
new file mode 100644
index 000000000..c651d3a8c
--- /dev/null
+++ b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/TestHelpers.java
@@ -0,0 +1,169 @@
+/*
+ * Copyright (C) 2015 Vincent Breitmoser <look@my.amazin.horse>
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+package org.sufficientlysecure.keychain;
+
+
+import java.io.BufferedInputStream;
+import java.io.BufferedOutputStream;
+import java.io.File;
+import java.io.FileOutputStream;
+import java.io.IOException;
+import java.io.InputStream;
+import java.io.OutputStream;
+import java.util.Random;
+
+import android.content.Context;
+import android.support.annotation.StringRes;
+import android.support.test.espresso.UiController;
+import android.support.test.espresso.ViewAction;
+import android.support.test.espresso.base.DefaultFailureHandler;
+import android.support.test.espresso.matcher.ViewMatchers;
+import android.view.View;
+
+import com.nispok.snackbar.Snackbar;
+import com.tokenautocomplete.TokenCompleteTextView;
+import org.hamcrest.CoreMatchers;
+import org.hamcrest.Matcher;
+import org.sufficientlysecure.keychain.pgp.UncachedKeyRing;
+import org.sufficientlysecure.keychain.pgp.UncachedKeyRing.IteratorWithIOThrow;
+import org.sufficientlysecure.keychain.provider.KeychainDatabase;
+import org.sufficientlysecure.keychain.provider.ProviderHelper;
+import org.sufficientlysecure.keychain.service.PassphraseCacheService;
+import org.sufficientlysecure.keychain.ui.util.Notify.Style;
+import org.sufficientlysecure.keychain.util.ProgressScaler;
+
+import static android.support.test.InstrumentationRegistry.getInstrumentation;
+import static android.support.test.espresso.Espresso.onView;
+import static android.support.test.espresso.assertion.ViewAssertions.matches;
+import static android.support.test.espresso.matcher.ViewMatchers.hasDescendant;
+import static android.support.test.espresso.matcher.ViewMatchers.withClassName;
+import static android.support.test.espresso.matcher.ViewMatchers.withText;
+import static org.hamcrest.CoreMatchers.endsWith;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withSnackbarLineColor;
+
+
+public class TestHelpers {
+
+ public static void dismissSnackbar() {
+ onView(withClassName(endsWith("Snackbar")))
+ .perform(new ViewAction() {
+ @Override
+ public Matcher<View> getConstraints() {
+ return ViewMatchers.isAssignableFrom(Snackbar.class);
+ }
+
+ @Override
+ public String getDescription() {
+ return "dismiss snackbar";
+ }
+
+ @Override
+ public void perform(UiController uiController, View view) {
+ ((Snackbar) view).dismiss();
+ }
+ });
+ }
+
+ public static void checkSnackbar(Style style, @StringRes Integer text) {
+
+ onView(withClassName(endsWith("Snackbar")))
+ .check(matches(withSnackbarLineColor(style.mLineColor)));
+
+ if (text != null) {
+ onView(withClassName(endsWith("Snackbar")))
+ .check(matches(hasDescendant(withText(text))));
+ }
+
+ }
+
+ public static void checkAndDismissSnackbar(Style style, @StringRes Integer text) {
+ checkSnackbar(style, text);
+ dismissSnackbar();
+ }
+
+ public static void importKeysFromResource(Context context, String name) throws Exception {
+ IteratorWithIOThrow<UncachedKeyRing> stream = UncachedKeyRing.fromStream(
+ getInstrumentation().getContext().getAssets().open(name));
+
+ ProviderHelper helper = new ProviderHelper(context);
+ while(stream.hasNext()) {
+ UncachedKeyRing ring = stream.next();
+ if (ring.isSecret()) {
+ helper.saveSecretKeyRing(ring, new ProgressScaler());
+ } else {
+ helper.savePublicKeyRing(ring, new ProgressScaler());
+ }
+ }
+
+ }
+
+ public static void copyFiles() throws IOException {
+ File cacheDir = getInstrumentation().getTargetContext().getFilesDir();
+ byte[] buf = new byte[256];
+ for (String filename : FILES) {
+ File outFile = new File(cacheDir, filename);
+ if (outFile.exists()) {
+ continue;
+ }
+ InputStream in = new BufferedInputStream(getInstrumentation().getContext().getAssets().open(filename));
+ OutputStream out = new BufferedOutputStream(new FileOutputStream(outFile));
+ int len;
+ while( (len = in.read(buf)) > 0) {
+ out.write(buf, 0, len);
+ }
+ }
+ }
+
+ public static final String[] FILES = new String[] { "pa.png", "re.png", "ci.png" };
+ public static File[] getImageNames() {
+ File cacheDir = getInstrumentation().getTargetContext().getFilesDir();
+ File[] ret = new File[FILES.length];
+ for (int i = 0; i < ret.length; i++) {
+ ret[i] = new File(cacheDir, FILES[i]);
+ }
+ return ret;
+ }
+
+ public static <T> T pickRandom(T[] haystack) {
+ return haystack[new Random().nextInt(haystack.length)];
+ }
+
+ public static String randomString(int min, int max) {
+ String chars = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ123456789!@#$%^&*()-_=";
+ Random r = new Random();
+ StringBuilder passbuilder = new StringBuilder();
+ // 5% chance for an empty string
+ for(int i = 0, j = r.nextInt(max)+min; i < j; i++) {
+ passbuilder.append(chars.charAt(r.nextInt(chars.length())));
+ }
+ return passbuilder.toString();
+ }
+
+ public static void cleanupForTests(Context context) throws Exception {
+
+ new KeychainDatabase(context).clearDatabase();
+
+ // import these two, make sure they're there
+ importKeysFromResource(context, "x.sec.asc");
+
+ // make sure no passphrases are cached
+ PassphraseCacheService.clearCachedPassphrases(context);
+
+ }
+
+}
diff --git a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/actions/CustomActions.java b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/actions/CustomActions.java
new file mode 100644
index 000000000..75197ac9e
--- /dev/null
+++ b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/actions/CustomActions.java
@@ -0,0 +1,82 @@
+/*
+ * Copyright (C) 2015 Vincent Breitmoser <look@my.amazin.horse>
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ *
+ */
+
+package org.sufficientlysecure.keychain.actions;
+
+
+import android.support.test.espresso.UiController;
+import android.support.test.espresso.ViewAction;
+import android.support.test.espresso.matcher.ViewMatchers;
+import android.support.v4.view.GravityCompat;
+import android.support.v4.widget.DrawerLayout;
+import android.view.View;
+
+import com.tokenautocomplete.TokenCompleteTextView;
+import org.hamcrest.Matcher;
+import org.sufficientlysecure.keychain.pgp.CanonicalizedPublicKeyRing;
+import org.sufficientlysecure.keychain.provider.ProviderHelper;
+import org.sufficientlysecure.keychain.ui.adapter.KeyAdapter;
+
+import static android.support.test.InstrumentationRegistry.getTargetContext;
+
+
+public abstract class CustomActions {
+
+ public static ViewAction tokenEncryptViewAddToken(long keyId) throws Exception {
+ CanonicalizedPublicKeyRing ring =
+ new ProviderHelper(getTargetContext()).getCanonicalizedPublicKeyRing(keyId);
+ final Object item = new KeyAdapter.KeyItem(ring);
+
+ return new ViewAction() {
+ @Override
+ public Matcher<View> getConstraints() {
+ return ViewMatchers.isAssignableFrom(TokenCompleteTextView.class);
+ }
+
+ @Override
+ public String getDescription() {
+ return "add completion token";
+ }
+
+ @Override
+ public void perform(UiController uiController, View view) {
+ ((TokenCompleteTextView) view).addObject(item);
+ }
+ };
+ }
+
+ public static ViewAction tokenViewAddToken(final Object item) {
+ return new ViewAction() {
+ @Override
+ public Matcher<View> getConstraints() {
+ return ViewMatchers.isAssignableFrom(TokenCompleteTextView.class);
+ }
+
+ @Override
+ public String getDescription() {
+ return "add completion token";
+ }
+
+ @Override
+ public void perform(UiController uiController, View view) {
+ ((TokenCompleteTextView) view).addObject(item);
+ }
+ };
+ }
+
+} \ No newline at end of file
diff --git a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/actions/OrientationChangeAction.java b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/actions/OrientationChangeAction.java
new file mode 100644
index 000000000..cdded7d7f
--- /dev/null
+++ b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/actions/OrientationChangeAction.java
@@ -0,0 +1,74 @@
+package org.sufficientlysecure.keychain.actions;
+
+
+import java.util.Collection;
+
+import android.app.Activity;
+import android.content.Context;
+import android.content.ContextWrapper;
+import android.content.pm.ActivityInfo;
+import android.support.test.espresso.UiController;
+import android.support.test.espresso.ViewAction;
+import android.support.test.runner.lifecycle.ActivityLifecycleMonitorRegistry;
+import android.support.test.runner.lifecycle.Stage;
+import android.view.View;
+
+import org.hamcrest.Matcher;
+
+import static android.support.test.espresso.matcher.ViewMatchers.isRoot;
+
+public class OrientationChangeAction implements ViewAction {
+ private final int orientation;
+
+ private OrientationChangeAction(int orientation) {
+ this.orientation = orientation;
+ }
+
+ @Override
+ public Matcher<View> getConstraints() {
+ return isRoot();
+ }
+
+ @Override
+ public String getDescription() {
+ return "change orientation to " + orientation;
+ }
+
+ @Override
+ public void perform(UiController uiController, View view) {
+ uiController.loopMainThreadUntilIdle();
+
+ final Activity activity = findActivity(view.getContext());
+ if (activity == null){
+ throw new IllegalStateException("Could not find the current activity");
+ }
+
+ activity.setRequestedOrientation(orientation);
+
+ Collection<Activity> resumedActivities = ActivityLifecycleMonitorRegistry
+ .getInstance().getActivitiesInStage(Stage.RESUMED);
+
+ if (resumedActivities.isEmpty()) {
+ throw new RuntimeException("Could not change orientation");
+ }
+ }
+
+ private static Activity findActivity(Context context) {
+ if (context == null)
+ return null;
+ else if (context instanceof Activity)
+ return (Activity) context;
+ else if (context instanceof ContextWrapper)
+ return findActivity(((ContextWrapper) context).getBaseContext());
+
+ return null;
+ }
+
+ public static ViewAction orientationLandscape() {
+ return new OrientationChangeAction(ActivityInfo.SCREEN_ORIENTATION_LANDSCAPE);
+ }
+
+ public static ViewAction orientationPortrait() {
+ return new OrientationChangeAction(ActivityInfo.SCREEN_ORIENTATION_PORTRAIT);
+ }
+} \ No newline at end of file
diff --git a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/matcher/BitmapMatcher.java b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/matcher/BitmapMatcher.java
new file mode 100644
index 000000000..c08847065
--- /dev/null
+++ b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/matcher/BitmapMatcher.java
@@ -0,0 +1,63 @@
+/*
+ * Copyright (C) 2015 Vincent Breitmoser <look@my.amazin.horse>
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ *
+ * From the droidcon anroid espresso repository.
+ * https://github.com/xrigau/droidcon-android-espresso/
+ *
+ */
+
+package org.sufficientlysecure.keychain.matcher;
+
+
+import android.graphics.Bitmap;
+import android.graphics.drawable.BitmapDrawable;
+import android.graphics.drawable.Drawable;
+import android.view.View;
+import android.widget.ImageView;
+
+import org.hamcrest.Description;
+import org.hamcrest.TypeSafeMatcher;
+
+
+public class BitmapMatcher extends TypeSafeMatcher<View> {
+
+ private final Bitmap mBitmap;
+
+ public BitmapMatcher(Bitmap bitmap) {
+ super(View.class);
+ mBitmap = bitmap;
+ }
+
+ @Override
+ public boolean matchesSafely(View view) {
+ if ( !(view instanceof ImageView) ) {
+ return false;
+ }
+ Drawable drawable = ((ImageView) view).getDrawable();
+ return drawable != null && (drawable instanceof BitmapDrawable)
+ && ((BitmapDrawable) drawable).getBitmap().sameAs(mBitmap);
+ }
+
+ @Override
+ public void describeTo(Description description) {
+ description.appendText("with equivalent specified bitmap");
+ }
+
+ public static BitmapMatcher withBitmap(Bitmap bitmap) {
+ return new BitmapMatcher(bitmap);
+ }
+
+}
diff --git a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/matcher/CustomMatchers.java b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/matcher/CustomMatchers.java
new file mode 100644
index 000000000..6713cd237
--- /dev/null
+++ b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/matcher/CustomMatchers.java
@@ -0,0 +1,160 @@
+/*
+ * Copyright (C) 2015 Vincent Breitmoser <look@my.amazin.horse>
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ *
+ */
+
+package org.sufficientlysecure.keychain.matcher;
+
+
+import android.support.annotation.ColorRes;
+import android.support.annotation.IdRes;
+import android.support.test.espresso.matcher.BoundedMatcher;
+import android.support.v7.widget.RecyclerView;
+import android.view.View;
+import android.widget.ViewAnimator;
+
+import com.nispok.snackbar.Snackbar;
+import org.hamcrest.Description;
+import org.hamcrest.Matcher;
+import org.sufficientlysecure.keychain.R;
+import org.sufficientlysecure.keychain.ui.adapter.KeyAdapter.KeyItem;
+import org.sufficientlysecure.keychain.ui.widget.EncryptKeyCompletionView;
+
+import static android.support.test.espresso.matcher.ViewMatchers.hasDescendant;
+import static android.support.test.espresso.matcher.ViewMatchers.isAssignableFrom;
+import static android.support.test.espresso.matcher.ViewMatchers.isDisplayed;
+import static android.support.test.espresso.matcher.ViewMatchers.withId;
+import static android.support.test.espresso.matcher.ViewMatchers.withParent;
+import static android.support.test.espresso.matcher.ViewMatchers.withText;
+import static org.hamcrest.CoreMatchers.allOf;
+import static org.hamcrest.CoreMatchers.not;
+import static org.sufficientlysecure.keychain.matcher.DrawableMatcher.withDrawable;
+
+
+public abstract class CustomMatchers {
+
+ public static Matcher<View> withDisplayedChild(final int child) {
+ return new BoundedMatcher<View, ViewAnimator>(ViewAnimator.class) {
+ public void describeTo(Description description) {
+ description.appendText("with displayed child: " + child);
+ }
+
+ @Override
+ public boolean matchesSafely(ViewAnimator viewAnimator) {
+ return viewAnimator.getDisplayedChild() == child;
+ }
+ };
+ }
+
+ public static Matcher<View> withSnackbarLineColor(@ColorRes final int colorRes) {
+ return new BoundedMatcher<View, Snackbar>(Snackbar.class) {
+ public void describeTo(Description description) {
+ description.appendText("with color resource id: " + colorRes);
+ }
+
+ @Override
+ public boolean matchesSafely(Snackbar snackbar) {
+ return snackbar.getResources().getColor(colorRes) == snackbar.getLineColor();
+ }
+ };
+ }
+
+ public static Matcher<Object> withKeyItemId(final long keyId) {
+ return new BoundedMatcher<Object, KeyItem>(KeyItem.class) {
+ @Override
+ public boolean matchesSafely(KeyItem item) {
+ return item.mKeyId == keyId;
+ }
+
+ @Override
+ public void describeTo(Description description) {
+ description.appendText("with key id: " + keyId);
+ }
+ };
+ }
+
+ public static Matcher<View> withKeyToken(@ColorRes final long keyId) {
+ return new BoundedMatcher<View, EncryptKeyCompletionView>(EncryptKeyCompletionView.class) {
+ public void describeTo(Description description) {
+ description.appendText("with key id token: " + keyId);
+ }
+
+ @Override
+ public boolean matchesSafely(EncryptKeyCompletionView tokenView) {
+ for (Object object : tokenView.getObjects()) {
+ if (object instanceof KeyItem && ((KeyItem) object).mKeyId == keyId) {
+ return true;
+ }
+ }
+ return false;
+ }
+ };
+ }
+
+ public static Matcher<View> withRecyclerView(@IdRes int viewId) {
+ return allOf(isAssignableFrom(RecyclerView.class), withId(viewId));
+ }
+
+ public static Matcher<View> isRecyclerItemView(@IdRes int recyclerId, Matcher<View> specificChildMatcher) {
+ return allOf(withParent(withRecyclerView(recyclerId)), specificChildMatcher);
+ }
+
+ public static Matcher<View> withEncryptionStatus(boolean encrypted) {
+
+ if (encrypted) {
+ return allOf(
+ hasDescendant(allOf(
+ withId(R.id.result_encryption_text), withText(R.string.decrypt_result_encrypted))),
+ hasDescendant(allOf(
+ withId(R.id.result_encryption_icon), withDrawable(R.drawable.status_lock_closed_24dp, true)))
+ );
+ } else {
+ return allOf(
+ hasDescendant(allOf(
+ withId(R.id.result_encryption_text), withText(R.string.decrypt_result_not_encrypted))),
+ hasDescendant(allOf(
+ withId(R.id.result_encryption_icon), withDrawable(R.drawable.status_lock_open_24dp, true)))
+ );
+ }
+ }
+
+ public static Matcher<View> withSignatureNone() {
+
+ return allOf(
+ hasDescendant(allOf(
+ withId(R.id.result_signature_text), withText(R.string.decrypt_result_no_signature))),
+ hasDescendant(allOf(
+ withId(R.id.result_signature_icon), withDrawable(R.drawable.status_signature_invalid_cutout_24dp, true))),
+ hasDescendant(allOf(
+ withId(R.id.result_signature_layout), not(isDisplayed())))
+ );
+
+ }
+
+ public static Matcher<View> withSignatureMyKey() {
+
+ return allOf(
+ hasDescendant(allOf(
+ withId(R.id.result_signature_text), withText(R.string.decrypt_result_signature_certified))),
+ hasDescendant(allOf(
+ withId(R.id.result_signature_icon), withDrawable(R.drawable.status_signature_verified_cutout_24dp, true))),
+ hasDescendant(allOf(
+ withId(R.id.result_signature_layout), isDisplayed()))
+ );
+
+ }
+
+}
diff --git a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/matcher/DrawableMatcher.java b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/matcher/DrawableMatcher.java
new file mode 100644
index 000000000..da2ff87d9
--- /dev/null
+++ b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/matcher/DrawableMatcher.java
@@ -0,0 +1,128 @@
+/*
+ * Copyright (C) 2015 Xavi Rigau <xrigau@gmail.com>
+ * Copyright (C) 2015 Vincent Breitmoser <look@my.amazin.horse>
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ *
+ * From the droidcon anroid espresso repository.
+ * https://github.com/xrigau/droidcon-android-espresso/
+ *
+ */
+
+package org.sufficientlysecure.keychain.matcher;
+
+
+import android.content.res.Resources;
+import android.graphics.drawable.BitmapDrawable;
+import android.graphics.drawable.Drawable;
+import android.view.View;
+import android.widget.ImageView;
+import android.widget.TextView;
+
+import org.hamcrest.Description;
+import org.hamcrest.TypeSafeMatcher;
+
+
+public class DrawableMatcher extends TypeSafeMatcher<View> {
+
+ private final int mResourceId;
+ private final boolean mIgnoreFilters;
+
+ public DrawableMatcher(int resourceId, boolean ignoreFilters) {
+ super(View.class);
+ mResourceId = resourceId;
+ mIgnoreFilters = ignoreFilters;
+ }
+
+ private String resourceName = null;
+ private Drawable expectedDrawable = null;
+
+ @Override
+ public boolean matchesSafely(View target) {
+ if (expectedDrawable == null) {
+ loadDrawableFromResources(target.getResources());
+ }
+ if (invalidExpectedDrawable()) {
+ return false;
+ }
+
+ if (target instanceof ImageView) {
+ return hasImage((ImageView) target) || hasBackground(target);
+ }
+ if (target instanceof TextView) {
+ return hasCompoundDrawable((TextView) target) || hasBackground(target);
+ }
+ return hasBackground(target);
+ }
+
+ private void loadDrawableFromResources(Resources resources) {
+ try {
+ expectedDrawable = resources.getDrawable(mResourceId);
+ resourceName = resources.getResourceEntryName(mResourceId);
+ } catch (Resources.NotFoundException ignored) {
+ // view could be from a context unaware of the resource id.
+ }
+ }
+
+ private boolean invalidExpectedDrawable() {
+ return expectedDrawable == null;
+ }
+
+ private boolean hasImage(ImageView target) {
+ return isSameDrawable(target.getDrawable());
+ }
+
+ private boolean hasCompoundDrawable(TextView target) {
+ for (Drawable drawable : target.getCompoundDrawables()) {
+ if (isSameDrawable(drawable)) {
+ return true;
+ }
+ }
+ return false;
+ }
+
+ private boolean hasBackground(View target) {
+ return isSameDrawable(target.getBackground());
+ }
+
+ private boolean isSameDrawable(Drawable drawable) {
+ if (drawable == null) {
+ return false;
+ }
+ // if those are both bitmap drawables, compare their bitmaps (ignores color filters, which is what we want!)
+ if (mIgnoreFilters && drawable instanceof BitmapDrawable && expectedDrawable instanceof BitmapDrawable) {
+ return ((BitmapDrawable) drawable).getBitmap().sameAs((((BitmapDrawable) expectedDrawable).getBitmap()));
+ }
+ return expectedDrawable.getConstantState().equals(drawable.getConstantState());
+ }
+
+ @Override
+ public void describeTo(Description description) {
+ description.appendText("with drawable from resource id: ");
+ description.appendValue(mResourceId);
+ if (resourceName != null) {
+ description.appendText("[");
+ description.appendText(resourceName);
+ description.appendText("]");
+ }
+ }
+
+ public static DrawableMatcher withDrawable(int resourceId, boolean ignoreFilters) {
+ return new DrawableMatcher(resourceId, ignoreFilters);
+ }
+ public static DrawableMatcher withDrawable(int resourceId) {
+ return new DrawableMatcher(resourceId, true);
+ }
+
+}
diff --git a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/matcher/EditTextMatchers.java b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/matcher/EditTextMatchers.java
index 7f2a7953b..a1df7912f 100644
--- a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/matcher/EditTextMatchers.java
+++ b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/matcher/EditTextMatchers.java
@@ -1,5 +1,5 @@
/*
- * Copyright (C) 2015 Dominik Schürmann <dominik@dominikschuermann.de>
+ * Copyright (C) 2015 Vincent Breitmoser <look@my.amazin.horse>
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
diff --git a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/remote/OpenPgpServiceTest.java b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/remote/OpenPgpServiceTest.java
new file mode 100644
index 000000000..aaf7499b7
--- /dev/null
+++ b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/remote/OpenPgpServiceTest.java
@@ -0,0 +1,171 @@
+package org.sufficientlysecure.keychain.remote;
+
+
+import java.io.ByteArrayInputStream;
+import java.io.ByteArrayOutputStream;
+
+import android.app.PendingIntent;
+import android.content.Intent;
+import android.os.IBinder;
+import android.support.test.InstrumentationRegistry;
+import android.support.test.rule.ServiceTestRule;
+import android.support.test.runner.AndroidJUnit4;
+import android.test.suitebuilder.annotation.LargeTest;
+import android.widget.AdapterView;
+
+import org.junit.Before;
+import org.junit.Rule;
+import org.junit.Test;
+import org.junit.runner.RunWith;
+import org.openintents.openpgp.IOpenPgpService;
+import org.openintents.openpgp.util.OpenPgpApi;
+import org.sufficientlysecure.keychain.R;
+
+import static android.support.test.espresso.Espresso.onData;
+import static android.support.test.espresso.Espresso.onView;
+import static android.support.test.espresso.action.ViewActions.click;
+import static android.support.test.espresso.action.ViewActions.typeText;
+import static android.support.test.espresso.matcher.ViewMatchers.isAssignableFrom;
+import static android.support.test.espresso.matcher.ViewMatchers.withId;
+import static android.support.test.espresso.matcher.ViewMatchers.withText;
+import static org.hamcrest.core.Is.is;
+import static org.junit.Assert.assertThat;
+import static org.sufficientlysecure.keychain.TestHelpers.cleanupForTests;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withKeyItemId;
+
+
+@RunWith(AndroidJUnit4.class)
+@LargeTest
+public class OpenPgpServiceTest {
+
+ @Rule
+ public final ServiceTestRule mServiceRule = new ServiceTestRule();
+
+ OpenPgpApi mApi;
+
+ @Before
+ public void setUp() throws Exception {
+
+ cleanupForTests(InstrumentationRegistry.getTargetContext());
+
+ Intent serviceIntent = new Intent(InstrumentationRegistry.getTargetContext(), OpenPgpService.class);
+ IBinder binder = mServiceRule.bindService(serviceIntent);
+
+ mApi = new OpenPgpApi(InstrumentationRegistry.getTargetContext(),
+ IOpenPgpService.Stub.asInterface(binder));
+
+ }
+
+ @Test
+ public void testStuff() throws Exception {
+
+ // TODO why does this not ask for general usage permissions?!
+
+ {
+ Intent intent = new Intent();
+ intent.setAction(OpenPgpApi.ACTION_ENCRYPT);
+ intent.putExtra(OpenPgpApi.EXTRA_REQUEST_ASCII_ARMOR, true);
+ intent.putExtra(OpenPgpApi.EXTRA_KEY_IDS, new long[] { 0x9D604D2F310716A3L });
+
+ ByteArrayInputStream is = new ByteArrayInputStream("swag".getBytes());
+ ByteArrayOutputStream os = new ByteArrayOutputStream();
+
+ Intent result = mApi.executeApi(intent, is, os);
+
+ assertThat("result is pending accept",
+ result.getIntExtra(OpenPgpApi.RESULT_CODE, OpenPgpApi.RESULT_CODE_ERROR),
+ is(OpenPgpApi.RESULT_CODE_USER_INTERACTION_REQUIRED));
+
+ PendingIntent pi = result.getParcelableExtra(OpenPgpApi.RESULT_INTENT);
+ pi.send();
+
+ onView(withText(R.string.api_register_allow)).perform(click());
+
+ }
+
+ byte[] ciphertext;
+ {
+ Intent intent = new Intent();
+ intent.setAction(OpenPgpApi.ACTION_ENCRYPT);
+ intent.putExtra(OpenPgpApi.EXTRA_REQUEST_ASCII_ARMOR, true);
+ intent.putExtra(OpenPgpApi.EXTRA_KEY_IDS, new long[] { 0x9D604D2F310716A3L });
+
+ ByteArrayInputStream is = new ByteArrayInputStream("swag".getBytes());
+ ByteArrayOutputStream os = new ByteArrayOutputStream();
+
+ Intent result = mApi.executeApi(intent, is, os);
+
+ assertThat("result is ok",
+ result.getIntExtra(OpenPgpApi.RESULT_CODE, OpenPgpApi.RESULT_CODE_ERROR),
+ is(OpenPgpApi.RESULT_CODE_SUCCESS));
+
+ ciphertext = os.toByteArray();
+ }
+
+ { // decrypt
+ Intent intent = new Intent();
+ intent.setAction(OpenPgpApi.ACTION_DECRYPT_VERIFY);
+
+ ByteArrayInputStream is = new ByteArrayInputStream(ciphertext);
+ ByteArrayOutputStream os = new ByteArrayOutputStream();
+
+ Intent result = mApi.executeApi(intent, is, os);
+
+ assertThat("result is pending input",
+ result.getIntExtra(OpenPgpApi.RESULT_CODE, OpenPgpApi.RESULT_CODE_ERROR),
+ is(OpenPgpApi.RESULT_CODE_USER_INTERACTION_REQUIRED));
+
+ PendingIntent pi = result.getParcelableExtra(OpenPgpApi.RESULT_INTENT);
+ pi.send();
+
+ onData(withKeyItemId(0x9D604D2F310716A3L))
+ .inAdapterView(isAssignableFrom(AdapterView.class))
+ .perform(click());
+
+ onView(withText(R.string.api_settings_save)).perform(click());
+
+ // unfortunately, getting the activity result from the
+
+ }
+
+ { // decrypt again, this time pending passphrase
+ Intent intent = new Intent();
+ intent.setAction(OpenPgpApi.ACTION_DECRYPT_VERIFY);
+
+ ByteArrayInputStream is = new ByteArrayInputStream(ciphertext);
+ ByteArrayOutputStream os = new ByteArrayOutputStream();
+
+ Intent result = mApi.executeApi(intent, is, os);
+
+ assertThat("result is pending passphrase",
+ result.getIntExtra(OpenPgpApi.RESULT_CODE, OpenPgpApi.RESULT_CODE_ERROR),
+ is(OpenPgpApi.RESULT_CODE_USER_INTERACTION_REQUIRED));
+
+ PendingIntent pi = result.getParcelableExtra(OpenPgpApi.RESULT_INTENT);
+ pi.send();
+
+ onView(withId(R.id.passphrase_passphrase)).perform(typeText("x"));
+ onView(withText(R.string.btn_unlock)).perform(click());
+ }
+
+ { // decrypt again, NOW it should work with passphrase cached =)
+ Intent intent = new Intent();
+ intent.setAction(OpenPgpApi.ACTION_DECRYPT_VERIFY);
+
+ ByteArrayInputStream is = new ByteArrayInputStream(ciphertext);
+ ByteArrayOutputStream os = new ByteArrayOutputStream();
+
+ Intent result = mApi.executeApi(intent, is, os);
+
+ assertThat("result is pending passphrase",
+ result.getIntExtra(OpenPgpApi.RESULT_CODE, OpenPgpApi.RESULT_CODE_ERROR),
+ is(OpenPgpApi.RESULT_CODE_SUCCESS));
+
+ byte[] plaintext = os.toByteArray();
+ assertThat("decrypted plaintext matches plaintext", new String(plaintext), is("swag"));
+
+ }
+
+ }
+
+}
diff --git a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/AsymmetricFileOperationTests.java b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/AsymmetricFileOperationTests.java
new file mode 100644
index 000000000..5570b627f
--- /dev/null
+++ b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/AsymmetricFileOperationTests.java
@@ -0,0 +1,389 @@
+/*
+ * Copyright (C) 2015 Vincent Breitmoser <look@my.amazin.horse>
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+package org.sufficientlysecure.keychain.ui;
+
+
+import java.io.File;
+
+import android.annotation.TargetApi;
+import android.app.Activity;
+import android.app.Instrumentation.ActivityResult;
+import android.content.Intent;
+import android.net.Uri;
+import android.os.Build.VERSION;
+import android.os.Build.VERSION_CODES;
+import android.support.test.espresso.intent.Intents;
+import android.support.test.espresso.intent.rule.IntentsTestRule;
+import android.support.test.runner.AndroidJUnit4;
+import android.test.suitebuilder.annotation.LargeTest;
+import android.widget.AdapterView;
+
+import org.junit.Before;
+import org.junit.Rule;
+import org.junit.Test;
+import org.junit.runner.RunWith;
+import org.sufficientlysecure.keychain.R;
+import org.sufficientlysecure.keychain.TestHelpers;
+import org.sufficientlysecure.keychain.service.PassphraseCacheService;
+import org.sufficientlysecure.keychain.ui.util.Notify.Style;
+
+import static android.support.test.InstrumentationRegistry.getInstrumentation;
+import static android.support.test.espresso.Espresso.onData;
+import static android.support.test.espresso.Espresso.onView;
+import static android.support.test.espresso.Espresso.openActionBarOverflowOrOptionsMenu;
+import static android.support.test.espresso.Espresso.pressBack;
+import static android.support.test.espresso.action.ViewActions.click;
+import static android.support.test.espresso.action.ViewActions.typeText;
+import static android.support.test.espresso.assertion.ViewAssertions.matches;
+import static android.support.test.espresso.intent.matcher.IntentMatchers.hasAction;
+import static android.support.test.espresso.intent.matcher.IntentMatchers.hasCategories;
+import static android.support.test.espresso.intent.matcher.IntentMatchers.hasExtra;
+import static android.support.test.espresso.intent.matcher.IntentMatchers.hasExtraWithKey;
+import static android.support.test.espresso.intent.matcher.IntentMatchers.hasType;
+import static android.support.test.espresso.matcher.ViewMatchers.assertThat;
+import static android.support.test.espresso.matcher.ViewMatchers.hasDescendant;
+import static android.support.test.espresso.matcher.ViewMatchers.isAssignableFrom;
+import static android.support.test.espresso.matcher.ViewMatchers.isDescendantOfA;
+import static android.support.test.espresso.matcher.ViewMatchers.isDisplayed;
+import static android.support.test.espresso.matcher.ViewMatchers.withId;
+import static android.support.test.espresso.matcher.ViewMatchers.withText;
+import static org.hamcrest.CoreMatchers.allOf;
+import static org.hamcrest.CoreMatchers.hasItem;
+import static org.hamcrest.CoreMatchers.is;
+import static org.sufficientlysecure.keychain.TestHelpers.checkSnackbar;
+import static org.sufficientlysecure.keychain.TestHelpers.getImageNames;
+import static org.sufficientlysecure.keychain.TestHelpers.importKeysFromResource;
+import static org.sufficientlysecure.keychain.TestHelpers.pickRandom;
+import static org.sufficientlysecure.keychain.TestHelpers.randomString;
+import static org.sufficientlysecure.keychain.actions.CustomActions.tokenEncryptViewAddToken;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.isRecyclerItemView;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withDisplayedChild;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withEncryptionStatus;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withKeyItemId;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withSignatureMyKey;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withSignatureNone;
+
+
+@RunWith(AndroidJUnit4.class)
+@LargeTest
+public class AsymmetricFileOperationTests {
+
+ @Rule
+ public final IntentsTestRule<MainActivity> mActivity
+ = new IntentsTestRule<MainActivity>(MainActivity.class) {
+ @Override
+ protected Intent getActivityIntent() {
+ Intent intent = super.getActivityIntent();
+ intent.putExtra(MainActivity.EXTRA_SKIP_FIRST_TIME, true);
+ intent.putExtra(MainActivity.EXTRA_INIT_FRAG, MainActivity.ID_ENCRYPT_DECRYPT);
+ return intent;
+ }
+ };
+
+ @Before
+ public void setUp() throws Exception {
+ Activity activity = mActivity.getActivity();
+
+ TestHelpers.copyFiles();
+
+ // import these two, make sure they're there
+ importKeysFromResource(activity, "x.sec.asc");
+
+ // make sure no passphrases are cached
+ PassphraseCacheService.clearCachedPassphrases(activity);
+ }
+
+ @Test
+ public void testFileSaveEncryptDecrypt() throws Exception {
+
+ // navigate to 'encrypt text'
+ onView(withId(R.id.encrypt_files)).perform(click());
+
+ File file = pickRandom(getImageNames());
+ File outputFile = new File(getInstrumentation().getTargetContext().getFilesDir(), "output-token.gpg");
+
+ { // encrypt
+
+ // the EncryptKeyCompletionView is tested individually
+ onView(withId(R.id.recipient_list)).perform(tokenEncryptViewAddToken(0x9D604D2F310716A3L));
+
+ handleAddFileIntent(file);
+ onView(withId(R.id.file_list_entry_add)).perform(click());
+
+ handleSaveEncryptedFileIntent(outputFile);
+ onView(withId(R.id.encrypt_save)).perform(click());
+
+ assertThat("output file has been written", true, is(outputFile.exists()));
+
+ }
+
+ // go to decrypt from clipboard view
+ pressBack();
+
+ handleOpenFileIntentKitKat(outputFile);
+ onView(withId(R.id.decrypt_files)).perform(click());
+
+ { // decrypt
+ onView(withId(R.id.passphrase_passphrase)).perform(typeText("x"));
+ onView(withText(R.string.btn_unlock)).perform(click());
+
+ onView(isRecyclerItemView(R.id.decrypted_files_list,
+ hasDescendant(withText(file.getName()))))
+ .check(matches(allOf(withEncryptionStatus(true), withSignatureNone())));
+ }
+
+ { // delete original file
+
+ // open context menu
+ onView(allOf(isDescendantOfA(isRecyclerItemView(R.id.decrypted_files_list,
+ hasDescendant(withText(file.getName())))),
+ withId(R.id.context_menu))).perform(click());
+
+ // delete file
+ onView(withText(R.string.btn_delete_original)).perform(click());
+
+ checkSnackbar(Style.OK, R.string.file_delete_ok);
+ assertThat("output file has been deleted", false, is(outputFile.exists()));
+
+ // open context menu
+ onView(allOf(isDescendantOfA(isRecyclerItemView(R.id.decrypted_files_list,
+ hasDescendant(withText(file.getName())))),
+ withId(R.id.context_menu))).perform(click());
+
+ // delete file
+ onView(withText(R.string.btn_delete_original)).perform(click());
+
+ checkSnackbar(Style.WARN, R.string.file_delete_none);
+
+ }
+
+ { // save file (*after* deletion~)
+
+ // open context menu
+ onView(allOf(isDescendantOfA(isRecyclerItemView(R.id.decrypted_files_list,
+ hasDescendant(withText(file.getName())))),
+ withId(R.id.context_menu))).perform(click());
+
+ File savedFile =
+ new File(getInstrumentation().getTargetContext().getFilesDir(), "vo.png");
+ handleSaveDecryptedFileIntent(savedFile, file.getName());
+
+ // save decrypted content
+ onView(withText(R.string.btn_save_file)).perform(click());
+
+ checkSnackbar(Style.OK, R.string.file_saved);
+ assertThat("decrypted file has been saved", true, is(savedFile.exists()));
+
+ // cleanup
+ // noinspection ResultOfMethodCallIgnored
+ file.delete();
+
+ }
+
+ }
+
+ private void handleAddFileIntent(File file) {
+ if (VERSION.SDK_INT >= VERSION_CODES.KITKAT) {
+ handleAddFileIntentKitKat(file);
+ } else {
+ handleAddFileIntentOlder(file);
+ }
+ }
+
+ @TargetApi(VERSION_CODES.KITKAT)
+ private void handleAddFileIntentKitKat(File file) {
+ Intent data = new Intent();
+ data.setData(Uri.fromFile(file));
+
+ Intents.intending(allOf(
+ hasAction(Intent.ACTION_OPEN_DOCUMENT),
+ hasType("*/*"),
+ hasCategories(hasItem(Intent.CATEGORY_OPENABLE)),
+ hasExtraWithKey(Intent.EXTRA_ALLOW_MULTIPLE)
+ )).respondWith(
+ new ActivityResult(Activity.RESULT_OK, data)
+ );
+ }
+
+ private void handleAddFileIntentOlder(File file) {
+ Intent data = new Intent();
+ data.setData(Uri.fromFile(file));
+
+ Intents.intending(allOf(
+ hasAction(Intent.ACTION_GET_CONTENT),
+ hasType("*/*"),
+ hasCategories(hasItem(Intent.CATEGORY_OPENABLE))
+ )).respondWith(
+ new ActivityResult(Activity.RESULT_OK, data)
+ );
+ }
+
+ @TargetApi(VERSION_CODES.KITKAT)
+ private void handleSaveDecryptedFileIntent(File file, String expectedTitle) {
+ Intent data = new Intent();
+ data.setData(Uri.fromFile(file));
+
+ Intents.intending(allOf(
+ hasAction(Intent.ACTION_CREATE_DOCUMENT),
+ hasExtra("android.content.extra.SHOW_ADVANCED", true),
+ hasExtra(Intent.EXTRA_TITLE, expectedTitle),
+ hasCategories(hasItem(Intent.CATEGORY_OPENABLE))
+ )).respondWith(
+ new ActivityResult(Activity.RESULT_OK, data)
+ );
+ }
+
+ @TargetApi(VERSION_CODES.KITKAT)
+ private void handleSaveEncryptedFileIntent(File file) {
+
+ try {
+ //noinspection ResultOfMethodCallIgnored
+ file.delete();
+ } catch (Exception e) {
+ // nvm
+ }
+
+ Intent data = new Intent();
+ data.setData(Uri.fromFile(file));
+
+ Intents.intending(allOf(
+ hasAction(Intent.ACTION_CREATE_DOCUMENT),
+ hasType("*/*"),
+ hasExtra("android.content.extra.SHOW_ADVANCED", true),
+ hasCategories(hasItem(Intent.CATEGORY_OPENABLE))
+ )).respondWith(
+ new ActivityResult(Activity.RESULT_OK, data)
+ );
+ }
+
+ @TargetApi(VERSION_CODES.KITKAT)
+ private void handleOpenFileIntentKitKat(File file) {
+ Intent data = new Intent();
+ data.setData(Uri.fromFile(file));
+
+ Intents.intending(allOf(
+ hasAction(Intent.ACTION_OPEN_DOCUMENT),
+ hasType("*/*"),
+ hasCategories(hasItem(Intent.CATEGORY_OPENABLE))
+ // hasExtraWithKey(Intent.EXTRA_ALLOW_MULTIPLE)
+ )).respondWith(
+ new ActivityResult(Activity.RESULT_OK, data)
+ );
+ }
+
+ @Test
+ public void testSignVerify() throws Exception {
+
+ String cleartext = randomString(10, 30);
+
+ // navigate to 'encrypt text'
+ onView(withId(R.id.encrypt_text)).perform(click());
+
+ { // sign
+
+ onView(withId(R.id.encrypt_copy)).perform(click());
+ checkSnackbar(Style.ERROR, R.string.error_empty_text);
+
+ onView(withId(R.id.result_signature_icon)).check(matches(withDisplayedChild(0)));
+ onView(withId(R.id.sign)).perform(click());
+ onData(withKeyItemId(0x9D604D2F310716A3L))
+ .inAdapterView(isAssignableFrom(AdapterView.class))
+ .perform(click());
+ onView(withId(R.id.result_signature_icon)).check(matches(withDisplayedChild(1)));
+
+ onView(withId(R.id.encrypt_text_text)).perform(typeText(cleartext));
+
+ onView(withId(R.id.encrypt_copy)).perform(click());
+
+ onView(withId(R.id.passphrase_passphrase)).perform(typeText("x"));
+ onView(withText(R.string.btn_unlock)).perform(click());
+
+ checkSnackbar(Style.OK, R.string.msg_se_success);
+
+ }
+
+ // go to decrypt from clipboard view
+ pressBack();
+
+ onView(withId(R.id.decrypt_from_clipboard)).perform(click());
+
+ { // decrypt
+
+ onView(isRecyclerItemView(R.id.decrypted_files_list,
+ hasDescendant(withText(R.string.filename_unknown))))
+ .check(matches(allOf(withEncryptionStatus(false), withSignatureMyKey())));
+
+ // open context menu
+ onView(allOf(isDescendantOfA(isRecyclerItemView(R.id.decrypted_files_list,
+ hasDescendant(withText(R.string.filename_unknown)))),
+ withId(R.id.context_menu))).perform(click());
+
+ // check if log looks ok
+ onView(withText(R.string.snackbar_details)).perform(click());
+ onView(withText(R.string.msg_dc_clear_signature_ok)).check(matches(isDisplayed()));
+ pressBack();
+
+ }
+
+ }
+
+ @Test
+ public void testGeneralErrorHandling() throws Exception {
+
+ // navigate to encrypt files fragment
+ onView(withId(R.id.encrypt_files)).perform(click());
+
+ File[] files = getImageNames();
+
+ { // encrypt screen
+
+ onView(withId(R.id.encrypt_share)).perform(click());
+ checkSnackbar(Style.ERROR, R.string.error_no_file_selected);
+
+ handleAddFileIntent(files[0]);
+ onView(withId(R.id.file_list_entry_add)).perform(click());
+
+ handleAddFileIntent(files[1]);
+ onView(withId(R.id.file_list_entry_add)).perform(click());
+
+ onView(withId(R.id.encrypt_share)).perform(click());
+ checkSnackbar(Style.ERROR, R.string.select_encryption_key);
+
+ onView(withId(R.id.sign)).perform(click());
+ onData(withKeyItemId(0x9D604D2F310716A3L))
+ .inAdapterView(isAssignableFrom(AdapterView.class))
+ .perform(click());
+
+ onView(withId(R.id.encrypt_share)).perform(click());
+ checkSnackbar(Style.ERROR, R.string.error_detached_signature);
+
+ // the EncryptKeyCompletionView is tested individually
+ onView(withId(R.id.recipient_list)).perform(tokenEncryptViewAddToken(0x9D604D2F310716A3L));
+
+ onView(withId(R.id.encrypt_save)).perform(click());
+ checkSnackbar(Style.ERROR, R.string.error_multi_files);
+
+ openActionBarOverflowOrOptionsMenu(getInstrumentation().getTargetContext());
+ onView(withText(R.string.btn_copy_encrypted_signed)).perform(click());
+ checkSnackbar(Style.ERROR, R.string.error_multi_clipboard);
+
+ }
+
+ }
+
+}
diff --git a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/AsymmetricTextOperationTests.java b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/AsymmetricTextOperationTests.java
new file mode 100644
index 000000000..cb3d2cb17
--- /dev/null
+++ b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/AsymmetricTextOperationTests.java
@@ -0,0 +1,185 @@
+/*
+ * Copyright (C) 2015 Vincent Breitmoser <look@my.amazin.horse>
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+package org.sufficientlysecure.keychain.ui;
+
+
+import android.app.Activity;
+import android.content.Intent;
+import android.support.test.rule.ActivityTestRule;
+import android.support.test.runner.AndroidJUnit4;
+import android.test.suitebuilder.annotation.LargeTest;
+import android.widget.AdapterView;
+
+import org.junit.Before;
+import org.junit.Rule;
+import org.junit.Test;
+import org.junit.runner.RunWith;
+import org.sufficientlysecure.keychain.R;
+import org.sufficientlysecure.keychain.service.PassphraseCacheService;
+import org.sufficientlysecure.keychain.ui.util.Notify.Style;
+import org.sufficientlysecure.keychain.util.FileHelper;
+
+import static android.support.test.espresso.Espresso.onData;
+import static android.support.test.espresso.Espresso.onView;
+import static android.support.test.espresso.Espresso.pressBack;
+import static android.support.test.espresso.action.ViewActions.click;
+import static android.support.test.espresso.action.ViewActions.typeText;
+import static android.support.test.espresso.assertion.ViewAssertions.matches;
+import static android.support.test.espresso.matcher.ViewMatchers.hasDescendant;
+import static android.support.test.espresso.matcher.ViewMatchers.isAssignableFrom;
+import static android.support.test.espresso.matcher.ViewMatchers.isDescendantOfA;
+import static android.support.test.espresso.matcher.ViewMatchers.isDisplayed;
+import static android.support.test.espresso.matcher.ViewMatchers.withId;
+import static android.support.test.espresso.matcher.ViewMatchers.withText;
+import static org.hamcrest.CoreMatchers.allOf;
+import static org.sufficientlysecure.keychain.TestHelpers.checkSnackbar;
+import static org.sufficientlysecure.keychain.TestHelpers.importKeysFromResource;
+import static org.sufficientlysecure.keychain.TestHelpers.randomString;
+import static org.sufficientlysecure.keychain.actions.CustomActions.tokenEncryptViewAddToken;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.isRecyclerItemView;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withDisplayedChild;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withEncryptionStatus;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withKeyItemId;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withSignatureMyKey;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withSignatureNone;
+
+
+@RunWith(AndroidJUnit4.class)
+@LargeTest
+public class AsymmetricTextOperationTests {
+
+ @Rule
+ public final ActivityTestRule<MainActivity> mActivity
+ = new ActivityTestRule<MainActivity>(MainActivity.class) {
+ @Override
+ protected Intent getActivityIntent() {
+ Intent intent = super.getActivityIntent();
+ intent.putExtra(MainActivity.EXTRA_SKIP_FIRST_TIME, true);
+ intent.putExtra(MainActivity.EXTRA_INIT_FRAG, MainActivity.ID_ENCRYPT_DECRYPT);
+ return intent;
+ }
+ };
+
+ @Before
+ public void setUp() throws Exception {
+ Activity activity = mActivity.getActivity();
+
+ // import these two, make sure they're there
+ importKeysFromResource(activity, "x.sec.asc");
+
+ // make sure no passphrases are cached
+ PassphraseCacheService.clearCachedPassphrases(activity);
+ }
+
+ @Test
+ public void testTextEncryptDecryptFromToken() throws Exception {
+
+ // navigate to 'encrypt text'
+ onView(withId(R.id.encrypt_text)).perform(click());
+
+ String cleartext = randomString(10, 30);
+
+ { // encrypt
+
+ // the EncryptKeyCompletionView is tested individually
+ onView(withId(R.id.result_encryption_icon)).check(matches(withDisplayedChild(0)));
+ onView(withId(R.id.recipient_list)).perform(tokenEncryptViewAddToken(0x9D604D2F310716A3L));
+ onView(withId(R.id.result_encryption_icon)).check(matches(withDisplayedChild(1)));
+
+ onView(withId(R.id.encrypt_text_text)).perform(typeText(cleartext));
+
+ onView(withId(R.id.encrypt_copy)).perform(click());
+ }
+
+ // go to decrypt from clipboard view
+ pressBack();
+ onView(withId(R.id.decrypt_from_clipboard)).perform(click());
+
+ { // decrypt
+ onView(withId(R.id.passphrase_passphrase)).perform(typeText("x"));
+ onView(withText(R.string.btn_unlock)).perform(click());
+
+ onView(isRecyclerItemView(R.id.decrypted_files_list,
+ hasDescendant(withText(R.string.filename_unknown_text))))
+ .check(matches(allOf(
+ hasDescendant(withText(FileHelper.readableFileSize(cleartext.length()))),
+ withEncryptionStatus(true),
+ withSignatureNone()
+ )));
+
+ }
+
+ }
+
+ @Test
+ public void testSignVerify() throws Exception {
+
+ String cleartext = randomString(10, 30);
+
+ // navigate to 'encrypt text'
+ onView(withId(R.id.encrypt_text)).perform(click());
+
+ { // sign
+
+ onView(withId(R.id.encrypt_copy)).perform(click());
+ checkSnackbar(Style.ERROR, R.string.error_empty_text);
+
+ onView(withId(R.id.result_signature_icon)).check(matches(withDisplayedChild(0)));
+ onView(withId(R.id.sign)).perform(click());
+ onData(withKeyItemId(0x9D604D2F310716A3L))
+ .inAdapterView(isAssignableFrom(AdapterView.class))
+ .perform(click());
+ onView(withId(R.id.result_signature_icon)).check(matches(withDisplayedChild(1)));
+
+ onView(withId(R.id.encrypt_text_text)).perform(typeText(cleartext));
+
+ onView(withId(R.id.encrypt_copy)).perform(click());
+
+ onView(withId(R.id.passphrase_passphrase)).perform(typeText("x"));
+ onView(withText(R.string.btn_unlock)).perform(click());
+
+ checkSnackbar(Style.OK, R.string.msg_se_success);
+
+ }
+
+ // go to decrypt from clipboard view
+ pressBack();
+
+ onView(withId(R.id.decrypt_from_clipboard)).perform(click());
+
+ { // decrypt
+
+ onView(isRecyclerItemView(R.id.decrypted_files_list,
+ hasDescendant(withText(R.string.filename_unknown))))
+ .check(matches(allOf(withEncryptionStatus(false), withSignatureMyKey())));
+
+ // open context menu
+ onView(allOf(isDescendantOfA(isRecyclerItemView(R.id.decrypted_files_list,
+ hasDescendant(withText(R.string.filename_unknown)))),
+ withId(R.id.context_menu))).perform(click());
+
+ // check if log looks ok
+ onView(withText(R.string.snackbar_details)).perform(click());
+ onView(withText(R.string.msg_dc_clear_signature_ok)).check(matches(isDisplayed()));
+ pressBack();
+
+ }
+
+ }
+
+}
diff --git a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/CreateKeyActivityTest.java b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/CreateKeyActivityTest.java
index c3741fdef..cf8e7ae12 100644
--- a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/CreateKeyActivityTest.java
+++ b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/CreateKeyActivityTest.java
@@ -15,17 +15,20 @@
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
-package org.sufficientlysecure.keychain;
+package org.sufficientlysecure.keychain.ui;
+
+import android.support.test.espresso.matcher.ViewMatchers;
import android.support.test.rule.ActivityTestRule;
import android.support.test.runner.AndroidJUnit4;
+import android.test.suitebuilder.annotation.LargeTest;
import android.text.method.HideReturnsTransformationMethod;
import android.text.method.PasswordTransformationMethod;
import org.junit.Rule;
import org.junit.Test;
import org.junit.runner.RunWith;
-import org.sufficientlysecure.keychain.ui.CreateKeyActivity;
+import org.sufficientlysecure.keychain.R;
import static android.support.test.espresso.Espresso.onView;
import static android.support.test.espresso.action.ViewActions.click;
@@ -44,6 +47,7 @@ import static org.sufficientlysecure.keychain.matcher.EditTextMatchers.withError
import static org.sufficientlysecure.keychain.matcher.EditTextMatchers.withTransformationMethod;
@RunWith(AndroidJUnit4.class)
+@LargeTest
public class CreateKeyActivityTest {
public static final String SAMPLE_NAME = "Sample Name";
@@ -52,12 +56,16 @@ public class CreateKeyActivityTest {
public static final String SAMPLE_PASSWORD = "sample_password";
@Rule
- public ActivityTestRule<CreateKeyActivity> mActivityRule = new ActivityTestRule<>(CreateKeyActivity.class);
+ public final ActivityTestRule<CreateKeyActivity> mActivity
+ = new ActivityTestRule<>(CreateKeyActivity.class);
@Test
public void testCreateMyKey() {
+
+ mActivity.getActivity();
+
// Clicks create my key
- onView(withId(R.id.create_key_create_key_button))
+ onView(ViewMatchers.withId(R.id.create_key_create_key_button))
.perform(click());
// Clicks next with empty name
diff --git a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/EditKeyTest.java b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/EditKeyTest.java
new file mode 100644
index 000000000..13583818d
--- /dev/null
+++ b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/EditKeyTest.java
@@ -0,0 +1,90 @@
+/*
+ * Copyright (C) 2015 Vincent Breitmoser <look@my.amazin.horse>
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+package org.sufficientlysecure.keychain.ui;
+
+
+import android.app.Activity;
+import android.content.Intent;
+import android.support.test.espresso.matcher.ViewMatchers;
+import android.support.test.rule.ActivityTestRule;
+import android.support.test.runner.AndroidJUnit4;
+import android.test.suitebuilder.annotation.LargeTest;
+import android.widget.AdapterView;
+
+import org.junit.FixMethodOrder;
+import org.junit.Rule;
+import org.junit.Test;
+import org.junit.runner.RunWith;
+import org.junit.runners.MethodSorters;
+import org.sufficientlysecure.keychain.R;
+import org.sufficientlysecure.keychain.provider.KeychainDatabase;
+import org.sufficientlysecure.keychain.ui.util.Notify.Style;
+
+import static android.support.test.espresso.Espresso.onData;
+import static android.support.test.espresso.Espresso.onView;
+import static android.support.test.espresso.action.ViewActions.click;
+import static android.support.test.espresso.matcher.ViewMatchers.isAssignableFrom;
+import static android.support.test.espresso.matcher.ViewMatchers.isDescendantOfA;
+import static android.support.test.espresso.matcher.ViewMatchers.withId;
+import static android.support.test.espresso.matcher.ViewMatchers.withText;
+import static org.hamcrest.CoreMatchers.allOf;
+import static org.sufficientlysecure.keychain.TestHelpers.checkSnackbar;
+import static org.sufficientlysecure.keychain.TestHelpers.importKeysFromResource;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withKeyItemId;
+
+
+@FixMethodOrder(MethodSorters.NAME_ASCENDING)
+@RunWith(AndroidJUnit4.class)
+@LargeTest
+public class EditKeyTest {
+
+ @Rule
+ public final ActivityTestRule<MainActivity> mActivity
+ = new ActivityTestRule<MainActivity>(MainActivity.class) {
+ @Override
+ protected Intent getActivityIntent() {
+ Intent intent = super.getActivityIntent();
+ intent.putExtra(MainActivity.EXTRA_SKIP_FIRST_TIME, true);
+ return intent;
+ }
+ };
+
+ @Test
+ public void test01Edit() throws Exception {
+ Activity activity = mActivity.getActivity();
+
+ new KeychainDatabase(activity).clearDatabase();
+
+ // import key for testing, get a stable initial state
+ importKeysFromResource(activity, "x.sec.asc");
+
+ // navigate to edit key dialog
+ onData(withKeyItemId(0x9D604D2F310716A3L))
+ .inAdapterView(allOf(isAssignableFrom(AdapterView.class),
+ isDescendantOfA(ViewMatchers.withId(R.id.key_list_list))))
+ .perform(click());
+ onView(withId(R.id.menu_key_view_edit)).perform(click());
+
+ // no-op should yield snackbar
+ onView(withText(R.string.btn_save)).perform(click());
+ checkSnackbar(Style.ERROR, R.string.msg_mf_error_noop);
+
+ }
+
+
+}
diff --git a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/MiscCryptOperationTests.java b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/MiscCryptOperationTests.java
new file mode 100644
index 000000000..9b26dfb15
--- /dev/null
+++ b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/MiscCryptOperationTests.java
@@ -0,0 +1,293 @@
+/*
+ * Copyright (C) 2015 Vincent Breitmoser <look@my.amazin.horse>
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+package org.sufficientlysecure.keychain.ui;
+
+
+import java.io.File;
+
+import android.annotation.TargetApi;
+import android.app.Activity;
+import android.app.Instrumentation.ActivityResult;
+import android.content.ClipData;
+import android.content.ClipboardManager;
+import android.content.Context;
+import android.content.Intent;
+import android.net.Uri;
+import android.os.Build.VERSION_CODES;
+import android.support.test.espresso.intent.Intents;
+import android.support.test.espresso.intent.rule.IntentsTestRule;
+import android.support.test.runner.AndroidJUnit4;
+import android.test.suitebuilder.annotation.LargeTest;
+import android.widget.AdapterView;
+
+import org.junit.Before;
+import org.junit.Rule;
+import org.junit.Test;
+import org.junit.runner.RunWith;
+import org.sufficientlysecure.keychain.Constants;
+import org.sufficientlysecure.keychain.R;
+import org.sufficientlysecure.keychain.TestHelpers;
+import org.sufficientlysecure.keychain.service.PassphraseCacheService;
+import org.sufficientlysecure.keychain.ui.util.Notify.Style;
+import org.sufficientlysecure.keychain.util.Preferences;
+
+import static android.support.test.InstrumentationRegistry.getInstrumentation;
+import static android.support.test.espresso.Espresso.onData;
+import static android.support.test.espresso.Espresso.onView;
+import static android.support.test.espresso.Espresso.openActionBarOverflowOrOptionsMenu;
+import static android.support.test.espresso.Espresso.pressBack;
+import static android.support.test.espresso.action.ViewActions.click;
+import static android.support.test.espresso.assertion.ViewAssertions.matches;
+import static android.support.test.espresso.intent.matcher.IntentMatchers.hasAction;
+import static android.support.test.espresso.intent.matcher.IntentMatchers.hasCategories;
+import static android.support.test.espresso.intent.matcher.IntentMatchers.hasType;
+import static android.support.test.espresso.matcher.ViewMatchers.hasDescendant;
+import static android.support.test.espresso.matcher.ViewMatchers.hasSibling;
+import static android.support.test.espresso.matcher.ViewMatchers.isAssignableFrom;
+import static android.support.test.espresso.matcher.ViewMatchers.isChecked;
+import static android.support.test.espresso.matcher.ViewMatchers.isDescendantOfA;
+import static android.support.test.espresso.matcher.ViewMatchers.isNotChecked;
+import static android.support.test.espresso.matcher.ViewMatchers.withChild;
+import static android.support.test.espresso.matcher.ViewMatchers.withId;
+import static android.support.test.espresso.matcher.ViewMatchers.withText;
+import static org.hamcrest.CoreMatchers.allOf;
+import static org.hamcrest.CoreMatchers.hasItem;
+import static org.sufficientlysecure.keychain.TestHelpers.checkSnackbar;
+import static org.sufficientlysecure.keychain.TestHelpers.dismissSnackbar;
+import static org.sufficientlysecure.keychain.TestHelpers.getImageNames;
+import static org.sufficientlysecure.keychain.TestHelpers.importKeysFromResource;
+import static org.sufficientlysecure.keychain.TestHelpers.pickRandom;
+import static org.sufficientlysecure.keychain.TestHelpers.randomString;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.isRecyclerItemView;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withDisplayedChild;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withKeyItemId;
+import static org.sufficientlysecure.keychain.matcher.DrawableMatcher.withDrawable;
+
+
+@RunWith(AndroidJUnit4.class)
+@LargeTest
+public class MiscCryptOperationTests {
+
+ @Rule
+ public final IntentsTestRule<MainActivity> mActivityRule
+ = new IntentsTestRule<MainActivity>(MainActivity.class) {
+ @Override
+ protected Intent getActivityIntent() {
+ Intent intent = super.getActivityIntent();
+ intent.putExtra(MainActivity.EXTRA_SKIP_FIRST_TIME, true);
+ intent.putExtra(MainActivity.EXTRA_INIT_FRAG, MainActivity.ID_ENCRYPT_DECRYPT);
+ return intent;
+ }
+ };
+ private Activity mActivity;
+
+ @Before
+ public void setUp() throws Exception {
+ // clear dis shit
+ Preferences.getPreferences(getInstrumentation().getTargetContext()).clear();
+
+ mActivity = mActivityRule.getActivity();
+
+ TestHelpers.copyFiles();
+
+ // import these two, make sure they're there
+ importKeysFromResource(mActivity, "x.sec.asc");
+
+ // make sure no passphrases are cached
+ PassphraseCacheService.clearCachedPassphrases(mActivity);
+ }
+
+ @Test
+ public void testDecryptNonPgpFile() throws Exception {
+
+ // decrypt any non-pgp file
+ File file = pickRandom(getImageNames());
+ handleOpenFileIntentKitKat(file);
+ onView(withId(R.id.decrypt_files)).perform(click());
+
+ { // decrypt
+
+ // open context menu
+ onView(allOf(isDescendantOfA(isRecyclerItemView(R.id.decrypted_files_list,
+ hasDescendant(allOf(
+ hasDescendant(withDrawable(R.drawable.status_signature_invalid_cutout_24dp, true)),
+ hasDescendant(withText(R.string.msg_dc_error_invalid_data)))))),
+ withId(R.id.result_error_log))).perform(click());
+
+ }
+
+ }
+
+ @Test
+ public void testDecryptEmptySelection() throws Exception {
+
+ // decrypt any non-pgp file
+ handleOpenFileEmptyKitKat();
+ onView(withId(R.id.decrypt_files)).perform(click());
+
+ checkSnackbar(Style.ERROR, R.string.no_file_selected);
+
+ }
+
+ @Test
+ public void testDecryptEmptyClipboard() throws Exception {
+
+ // decrypt any non-pgp file
+ ClipboardManager clipboard = (ClipboardManager) mActivity.getSystemService(Context.CLIPBOARD_SERVICE);
+ clipboard.setPrimaryClip(ClipData.newPlainText("", ""));
+
+ onView(withId(R.id.decrypt_from_clipboard)).perform(click());
+ checkSnackbar(Style.ERROR, R.string.error_clipboard_empty);
+
+ }
+
+ @Test
+ public void testDecryptNonPgpClipboard() throws Exception {
+
+ // decrypt any non-pgp file
+ ClipboardManager clipboard = (ClipboardManager) mActivity.getSystemService(Context.CLIPBOARD_SERVICE);
+ ClipData clip = ClipData.newPlainText(Constants.CLIPBOARD_LABEL, randomString(0, 50));
+ clipboard.setPrimaryClip(clip);
+ onView(withId(R.id.decrypt_from_clipboard)).perform(click());
+
+ { // decrypt
+
+ // open context menu
+ onView(allOf(isDescendantOfA(isRecyclerItemView(R.id.decrypted_files_list,
+ hasDescendant(allOf(
+ hasDescendant(withDrawable(R.drawable.status_signature_invalid_cutout_24dp, true)),
+ hasDescendant(withText(R.string.msg_dc_error_invalid_data)))))),
+ withId(R.id.result_error_log))).perform(click());
+
+ }
+
+ }
+
+ @TargetApi(VERSION_CODES.KITKAT)
+ private void handleOpenFileEmptyKitKat() {
+ Intent data = new Intent();
+ data.setData(null);
+
+ Intents.intending(allOf(
+ hasAction(Intent.ACTION_OPEN_DOCUMENT),
+ hasType("*/*"),
+ hasCategories(hasItem(Intent.CATEGORY_OPENABLE))
+ // hasExtraWithKey(Intent.EXTRA_ALLOW_MULTIPLE)
+ )).respondWith(
+ new ActivityResult(Activity.RESULT_OK, data)
+ );
+ }
+
+ @TargetApi(VERSION_CODES.KITKAT)
+ private void handleOpenFileIntentKitKat(File file) {
+ Intent data = new Intent();
+ data.setData(Uri.fromFile(file));
+
+ Intents.intending(allOf(
+ hasAction(Intent.ACTION_OPEN_DOCUMENT),
+ hasType("*/*"),
+ hasCategories(hasItem(Intent.CATEGORY_OPENABLE))
+ // hasExtraWithKey(Intent.EXTRA_ALLOW_MULTIPLE)
+ )).respondWith(
+ new ActivityResult(Activity.RESULT_OK, data)
+ );
+ }
+
+ @Test
+ public void testEncryptTokenFromKeyView() throws Exception {
+
+ // navigate to edit key dialog
+ onData(withKeyItemId(0x9D604D2F310716A3L))
+ .inAdapterView(allOf(isAssignableFrom(AdapterView.class),
+ isDescendantOfA(withId(R.id.key_list_list))))
+ .perform(click());
+ onView(withId(R.id.view_key_action_encrypt_text)).perform(click());
+
+ // make sure the encrypt is correctly set
+ onView(withId(R.id.result_encryption_icon)).check(matches(withDisplayedChild(1)));
+ // TODO check token id
+
+ }
+
+ @Test
+ public void testMenuSaveDefault() throws Exception {
+
+ onView(withId(R.id.encrypt_files)).perform(click());
+
+ { // save checked options
+
+ openActionBarOverflowOrOptionsMenu(mActivity);
+
+ // check initial button states
+ onView(allOf(withId(R.id.checkbox),
+ hasSibling(withChild(withText(R.string.label_delete_after_encryption)))))
+ .check(matches(isNotChecked()));
+ onView(allOf(withId(R.id.checkbox), hasSibling(withChild(withText(R.string.label_enable_compression)))))
+ .check(matches(isChecked()));
+ onView(allOf(withId(R.id.checkbox), hasSibling(withChild(withText(R.string.label_encrypt_filenames)))))
+ .check(matches(isChecked()));
+ onView(allOf(withId(R.id.checkbox), hasSibling(withChild(withText(R.string.label_file_ascii_armor)))))
+ .check(matches(isNotChecked()));
+
+ // press some buttons
+
+ onView(withText(R.string.label_enable_compression)).perform(click());
+ checkSnackbar(Style.OK, R.string.snack_compression_off);
+ onView(withText(R.string.btn_save_default)).perform(click());
+ checkSnackbar(Style.OK, R.string.btn_saved);
+ dismissSnackbar();
+
+ openActionBarOverflowOrOptionsMenu(mActivity);
+ onView(withText(R.string.label_encrypt_filenames)).perform(click());
+ checkSnackbar(Style.OK, R.string.snack_encrypt_filenames_off);
+ onView(withText(R.string.btn_save_default)).perform(click());
+ checkSnackbar(Style.OK, R.string.btn_saved);
+ dismissSnackbar();
+
+ openActionBarOverflowOrOptionsMenu(mActivity);
+ onView(withText(R.string.label_file_ascii_armor)).perform(click());
+ checkSnackbar(Style.OK, R.string.snack_armor_on);
+ onView(withText(R.string.btn_save_default)).perform(click());
+ checkSnackbar(Style.OK, R.string.btn_saved);
+ dismissSnackbar();
+
+ }
+
+ pressBack();
+ onView(withId(R.id.encrypt_files)).perform(click());
+
+ { // save checked options
+
+ openActionBarOverflowOrOptionsMenu(mActivity);
+
+ // check initial button states (as saved from before!)
+ onView(allOf(withId(R.id.checkbox),
+ hasSibling(withChild(withText(R.string.label_delete_after_encryption)))))
+ .check(matches(isNotChecked()));
+ onView(allOf(withId(R.id.checkbox), hasSibling(withChild(withText(R.string.label_enable_compression)))))
+ .check(matches(isNotChecked()));
+ onView(allOf(withId(R.id.checkbox), hasSibling(withChild(withText(R.string.label_encrypt_filenames)))))
+ .check(matches(isNotChecked()));
+ onView(allOf(withId(R.id.checkbox), hasSibling(withChild(withText(R.string.label_file_ascii_armor)))))
+ .check(matches(isChecked()));
+
+ }
+
+ }
+
+}
diff --git a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/SymmetricTextOperationTests.java b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/SymmetricTextOperationTests.java
new file mode 100644
index 000000000..3a34f15be
--- /dev/null
+++ b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/SymmetricTextOperationTests.java
@@ -0,0 +1,188 @@
+/*
+ * Copyright (C) 2015 Vincent Breitmoser <look@my.amazin.horse>
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+package org.sufficientlysecure.keychain.ui;
+
+
+import android.app.Activity;
+import android.app.Instrumentation.ActivityResult;
+import android.content.Intent;
+import android.support.test.espresso.intent.rule.IntentsTestRule;
+import android.support.test.espresso.matcher.ViewMatchers;
+import android.support.test.runner.AndroidJUnit4;
+import android.test.suitebuilder.annotation.LargeTest;
+
+import org.junit.FixMethodOrder;
+import org.junit.Rule;
+import org.junit.Test;
+import org.junit.runner.RunWith;
+import org.junit.runners.MethodSorters;
+import org.sufficientlysecure.keychain.R;
+import org.sufficientlysecure.keychain.provider.TemporaryStorageProvider;
+import org.sufficientlysecure.keychain.ui.util.Notify.Style;
+
+import static android.support.test.InstrumentationRegistry.getInstrumentation;
+import static android.support.test.espresso.Espresso.onView;
+import static android.support.test.espresso.Espresso.openActionBarOverflowOrOptionsMenu;
+import static android.support.test.espresso.Espresso.pressBack;
+import static android.support.test.espresso.action.ViewActions.click;
+import static android.support.test.espresso.action.ViewActions.typeText;
+import static android.support.test.espresso.assertion.ViewAssertions.matches;
+import static android.support.test.espresso.contrib.DrawerActions.openDrawer;
+import static android.support.test.espresso.intent.Intents.intended;
+import static android.support.test.espresso.intent.Intents.intending;
+import static android.support.test.espresso.intent.matcher.IntentMatchers.hasAction;
+import static android.support.test.espresso.intent.matcher.IntentMatchers.hasData;
+import static android.support.test.espresso.intent.matcher.IntentMatchers.hasExtra;
+import static android.support.test.espresso.intent.matcher.IntentMatchers.hasExtraWithKey;
+import static android.support.test.espresso.intent.matcher.IntentMatchers.hasFlags;
+import static android.support.test.espresso.intent.matcher.IntentMatchers.hasType;
+import static android.support.test.espresso.intent.matcher.UriMatchers.hasHost;
+import static android.support.test.espresso.intent.matcher.UriMatchers.hasScheme;
+import static android.support.test.espresso.matcher.ViewMatchers.hasDescendant;
+import static android.support.test.espresso.matcher.ViewMatchers.isDescendantOfA;
+import static android.support.test.espresso.matcher.ViewMatchers.withId;
+import static android.support.test.espresso.matcher.ViewMatchers.withText;
+import static org.hamcrest.CoreMatchers.allOf;
+import static org.hamcrest.Matchers.equalTo;
+import static org.sufficientlysecure.keychain.TestHelpers.checkSnackbar;
+import static org.sufficientlysecure.keychain.TestHelpers.randomString;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.isRecyclerItemView;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withEncryptionStatus;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withSignatureNone;
+
+
+@FixMethodOrder(MethodSorters.NAME_ASCENDING)
+@RunWith(AndroidJUnit4.class)
+@LargeTest
+public class SymmetricTextOperationTests {
+
+ public static final String PASSPHRASE = randomString(5, 20);
+
+ @Rule
+ public final IntentsTestRule<MainActivity> mActivity
+ = new IntentsTestRule<MainActivity>(MainActivity.class) {
+ @Override
+ protected Intent getActivityIntent() {
+ Intent intent = super.getActivityIntent();
+ intent.putExtra(MainActivity.EXTRA_SKIP_FIRST_TIME, true);
+ intent.putExtra(MainActivity.EXTRA_INIT_FRAG, MainActivity.ID_ENCRYPT_DECRYPT);
+ return intent;
+ }
+ };
+
+ @Test
+ public void testSymmetricCryptClipboard() throws Exception {
+
+ mActivity.getActivity();
+
+ String text = randomString(10, 30);
+
+ // navigate to encrypt/decrypt
+ onView(withId(R.id.encrypt_text)).perform(click());
+
+ {
+ onView(withId(R.id.encrypt_text_text)).perform(typeText(text));
+
+ openActionBarOverflowOrOptionsMenu(getInstrumentation().getTargetContext());
+ onView(withText(R.string.label_symmetric)).perform(click());
+
+ onView(withId(R.id.passphrase)).perform(typeText(PASSPHRASE));
+
+ onView(withId(R.id.encrypt_copy)).perform(click());
+
+ checkSnackbar(Style.ERROR, R.string.passphrases_do_not_match);
+
+ onView(withId(R.id.passphraseAgain)).perform(typeText(PASSPHRASE));
+
+ onView(withId(R.id.encrypt_text_text)).check(matches(withText(text)));
+
+ onView(withId(R.id.encrypt_copy)).perform(click());
+
+ checkSnackbar(Style.OK, R.string.msg_se_success);
+ }
+
+ // go to decrypt from clipboard view
+ pressBack();
+ onView(withId(R.id.decrypt_from_clipboard)).perform(click());
+
+ {
+ onView(withId(R.id.passphrase_passphrase)).perform(typeText(PASSPHRASE));
+ onView(withText(R.string.btn_unlock)).perform(click());
+
+ onView(isRecyclerItemView(R.id.decrypted_files_list,
+ hasDescendant(withText(R.string.filename_unknown_text))))
+ .check(matches(allOf(withEncryptionStatus(true), withSignatureNone())));
+
+ intending(allOf(
+ hasAction("android.intent.action.CHOOSER"),
+ hasExtra(equalTo(Intent.EXTRA_INTENT), allOf(
+ hasAction(Intent.ACTION_VIEW),
+ hasFlags(Intent.FLAG_GRANT_READ_URI_PERMISSION),
+ hasData(allOf(hasScheme("content"), hasHost(TemporaryStorageProvider.CONTENT_AUTHORITY))),
+ hasType("text/plain")
+ ))
+ )).respondWith(new ActivityResult(Activity.RESULT_OK, null));
+
+ onView(allOf(isDescendantOfA(isRecyclerItemView(R.id.decrypted_files_list,
+ hasDescendant(withText(R.string.filename_unknown_text)))),
+ withId(R.id.file))).perform(click());
+
+ }
+
+ }
+
+ @Test
+ public void testSymmetricCryptShare() throws Exception {
+
+ mActivity.getActivity();
+
+ String text = randomString(10, 30);
+
+ // navigate to encrypt/decrypt
+ onView(withId(R.id.encrypt_text)).perform(click());
+
+ {
+ onView(withId(R.id.encrypt_text_text)).perform(typeText(text));
+
+ openActionBarOverflowOrOptionsMenu(getInstrumentation().getTargetContext());
+ onView(withText(R.string.label_symmetric)).perform(click());
+
+ onView(withId(R.id.passphrase)).perform(typeText(PASSPHRASE));
+
+ onView(withId(R.id.passphraseAgain)).perform(typeText(PASSPHRASE));
+
+ onView(withId(R.id.encrypt_text_text)).check(matches(withText(text)));
+
+ intending(allOf(
+ hasAction("android.intent.action.CHOOSER"),
+ hasExtra(equalTo(Intent.EXTRA_INTENT), allOf(
+ hasAction(Intent.ACTION_SEND),
+ hasFlags(Intent.FLAG_GRANT_READ_URI_PERMISSION),
+ hasExtraWithKey(Intent.EXTRA_TEXT),
+ hasType("text/plain")
+ ))
+ )).respondWith(new ActivityResult(Activity.RESULT_OK, null));
+
+ onView(withId(R.id.encrypt_share)).perform(click());
+
+ }
+
+ }
+
+
+}
diff --git a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/ViewKeyAdvShareTest.java b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/ViewKeyAdvShareTest.java
new file mode 100644
index 000000000..1e6a3f69e
--- /dev/null
+++ b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/ViewKeyAdvShareTest.java
@@ -0,0 +1,124 @@
+/*
+ * Copyright (C) 2015 Vincent Breitmoser <look@my.amazin.horse>
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+package org.sufficientlysecure.keychain.ui;
+
+
+import android.app.Activity;
+import android.app.Instrumentation.ActivityResult;
+import android.content.Intent;
+import android.support.test.espresso.intent.rule.IntentsTestRule;
+import android.support.test.runner.AndroidJUnit4;
+import android.test.suitebuilder.annotation.LargeTest;
+
+import org.junit.Before;
+import org.junit.FixMethodOrder;
+import org.junit.Rule;
+import org.junit.Test;
+import org.junit.runner.RunWith;
+import org.junit.runners.MethodSorters;
+import org.sufficientlysecure.keychain.R;
+import org.sufficientlysecure.keychain.compatibility.ClipboardReflection;
+import org.sufficientlysecure.keychain.provider.KeychainContract.KeyRings;
+import org.sufficientlysecure.keychain.provider.TemporaryStorageProvider;
+import org.sufficientlysecure.keychain.ui.util.Notify.Style;
+
+import static android.support.test.espresso.Espresso.onView;
+import static android.support.test.espresso.action.ViewActions.click;
+import static android.support.test.espresso.intent.Intents.intending;
+import static android.support.test.espresso.intent.matcher.IntentMatchers.hasAction;
+import static android.support.test.espresso.intent.matcher.IntentMatchers.hasExtra;
+import static android.support.test.espresso.intent.matcher.IntentMatchers.hasType;
+import static android.support.test.espresso.intent.matcher.UriMatchers.hasHost;
+import static android.support.test.espresso.intent.matcher.UriMatchers.hasScheme;
+import static android.support.test.espresso.matcher.ViewMatchers.assertThat;
+import static android.support.test.espresso.matcher.ViewMatchers.withId;
+import static org.hamcrest.CoreMatchers.allOf;
+import static org.hamcrest.CoreMatchers.startsWith;
+import static org.hamcrest.Matchers.equalTo;
+import static org.hamcrest.Matchers.is;
+import static org.sufficientlysecure.keychain.TestHelpers.checkAndDismissSnackbar;
+import static org.sufficientlysecure.keychain.TestHelpers.cleanupForTests;
+
+
+@FixMethodOrder(MethodSorters.NAME_ASCENDING)
+@RunWith(AndroidJUnit4.class)
+@LargeTest
+public class ViewKeyAdvShareTest {
+
+ @Rule
+ public final IntentsTestRule<ViewKeyAdvActivity> mActivityRule
+ = new IntentsTestRule<ViewKeyAdvActivity>(ViewKeyAdvActivity.class) {
+ @Override
+ protected Intent getActivityIntent() {
+ Intent intent = super.getActivityIntent();
+ intent.setData(KeyRings.buildGenericKeyRingUri(0x9D604D2F310716A3L));
+ intent.putExtra(ViewKeyAdvActivity.EXTRA_SELECTED_TAB, ViewKeyAdvActivity.TAB_SHARE);
+ return intent;
+ }
+ };
+ private Activity mActivity;
+
+ @Before
+ public void setUp() throws Exception {
+ mActivity = mActivityRule.getActivity();
+
+ cleanupForTests(mActivity);
+ }
+
+ @Test
+ public void testShareOperations() throws Exception {
+
+ // no-op should yield snackbar
+ onView(withId(R.id.view_key_action_fingerprint_clipboard)).perform(click());
+ checkAndDismissSnackbar(Style.OK, R.string.fingerprint_copied_to_clipboard);
+ assertThat("clipboard data is fingerprint", ClipboardReflection.getClipboardText(mActivity),
+ is("c619d53f7a5f96f391a84ca79d604d2f310716a3"));
+
+ intending(allOf(
+ hasAction("android.intent.action.CHOOSER"),
+ hasExtra(equalTo(Intent.EXTRA_INTENT), allOf(
+ hasAction(Intent.ACTION_SEND),
+ hasType("text/plain"),
+ hasExtra(is(Intent.EXTRA_TEXT), is("openpgp4fpr:c619d53f7a5f96f391a84ca79d604d2f310716a3")),
+ hasExtra(is(Intent.EXTRA_STREAM),
+ allOf(hasScheme("content"), hasHost(TemporaryStorageProvider.CONTENT_AUTHORITY)))
+ ))
+ )).respondWith(new ActivityResult(Activity.RESULT_OK, null));
+ onView(withId(R.id.view_key_action_fingerprint_share)).perform(click());
+
+ onView(withId(R.id.view_key_action_key_clipboard)).perform(click());
+ checkAndDismissSnackbar(Style.OK, R.string.key_copied_to_clipboard);
+ assertThat("clipboard data is key",
+ ClipboardReflection.getClipboardText(mActivity), startsWith("----"));
+
+ intending(allOf(
+ hasAction("android.intent.action.CHOOSER"),
+ hasExtra(equalTo(Intent.EXTRA_INTENT), allOf(
+ hasAction(Intent.ACTION_SEND),
+ hasType("text/plain"),
+ hasExtra(is(Intent.EXTRA_TEXT), startsWith("----")),
+ hasExtra(is(Intent.EXTRA_STREAM),
+ allOf(hasScheme("content"), hasHost(TemporaryStorageProvider.CONTENT_AUTHORITY)))
+ ))
+ )).respondWith(new ActivityResult(Activity.RESULT_OK, null));
+ onView(withId(R.id.view_key_action_key_share)).perform(click());
+
+ }
+
+
+}
diff --git a/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/widget/EncryptKeyCompletionViewTest.java b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/widget/EncryptKeyCompletionViewTest.java
new file mode 100644
index 000000000..8618a0a07
--- /dev/null
+++ b/OpenKeychain/src/androidTest/java/org/sufficientlysecure/keychain/ui/widget/EncryptKeyCompletionViewTest.java
@@ -0,0 +1,91 @@
+/*
+ * Copyright (C) 2015 Vincent Breitmoser <look@my.amazin.horse>
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+package org.sufficientlysecure.keychain.ui.widget;
+
+
+import android.app.Activity;
+import android.content.Intent;
+import android.support.test.espresso.action.ViewActions;
+import android.support.test.espresso.matcher.RootMatchers;
+import android.support.test.espresso.matcher.ViewMatchers;
+import android.support.test.rule.ActivityTestRule;
+import android.support.test.runner.AndroidJUnit4;
+import android.test.suitebuilder.annotation.LargeTest;
+import android.view.KeyEvent;
+import android.widget.AdapterView;
+
+import org.junit.Rule;
+import org.junit.Test;
+import org.junit.runner.RunWith;
+import org.sufficientlysecure.keychain.R;
+import org.sufficientlysecure.keychain.ui.EncryptTextActivity;
+
+import static android.support.test.espresso.Espresso.onData;
+import static android.support.test.espresso.Espresso.onView;
+import static android.support.test.espresso.action.ViewActions.click;
+import static android.support.test.espresso.action.ViewActions.typeText;
+import static android.support.test.espresso.assertion.ViewAssertions.matches;
+import static android.support.test.espresso.matcher.ViewMatchers.hasDescendant;
+import static android.support.test.espresso.matcher.ViewMatchers.isAssignableFrom;
+import static android.support.test.espresso.matcher.ViewMatchers.withId;
+import static org.hamcrest.CoreMatchers.allOf;
+import static org.sufficientlysecure.keychain.TestHelpers.importKeysFromResource;
+import static org.sufficientlysecure.keychain.actions.CustomActions.tokenEncryptViewAddToken;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withKeyItemId;
+import static org.sufficientlysecure.keychain.matcher.CustomMatchers.withKeyToken;
+
+
+@RunWith(AndroidJUnit4.class)
+@LargeTest
+public class EncryptKeyCompletionViewTest {
+
+ @Rule
+ public final ActivityTestRule<EncryptTextActivity> mActivity
+ = new ActivityTestRule<>(EncryptTextActivity.class);
+
+ @Test
+ public void testTextEncryptDecryptFromToken() throws Exception {
+
+ Intent intent = new Intent();
+ intent.putExtra(EncryptTextActivity.EXTRA_ENCRYPTION_KEY_IDS, new long[] { 0x9D604D2F310716A3L });
+ Activity activity = mActivity.launchActivity(intent);
+
+ // import these two, make sure they're there
+ importKeysFromResource(activity, "x.sec.asc");
+
+ // check if the element passed in from intent
+ onView(ViewMatchers.withId(R.id.recipient_list)).check(matches(withKeyToken(0x9D604D2F310716A3L)));
+ onView(withId(R.id.recipient_list)).perform(ViewActions.pressKey(KeyEvent.KEYCODE_DEL));
+
+ // type X, select from list, check if it's there
+ onView(withId(R.id.recipient_list)).perform(typeText("x"));
+ onData(withKeyItemId(0x9D604D2F310716A3L)).inRoot(RootMatchers.isPlatformPopup())
+ .inAdapterView(allOf(isAssignableFrom(AdapterView.class),
+ hasDescendant(withId(R.id.key_list_item_name)))).perform(click());
+ onView(withId(R.id.recipient_list)).check(matches(withKeyToken(0x9D604D2F310716A3L)));
+ onView(withId(R.id.recipient_list)).perform(ViewActions.pressKey(KeyEvent.KEYCODE_DEL));
+ onView(withId(R.id.recipient_list)).perform(ViewActions.pressKey(KeyEvent.KEYCODE_DEL));
+
+ // add directly, check if it's there
+ onView(withId(R.id.recipient_list)).perform(tokenEncryptViewAddToken(0x9D604D2F310716A3L));
+ onView(withId(R.id.recipient_list)).check(matches(withKeyToken(0x9D604D2F310716A3L)));
+ onView(withId(R.id.recipient_list)).perform(ViewActions.pressKey(KeyEvent.KEYCODE_DEL));
+
+ }
+
+}