/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.tika.parser.pkg; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertNotNull; import static org.junit.Assert.assertNull; import static org.junit.Assert.assertTrue; import static org.junit.Assert.fail; import javax.crypto.Cipher; import java.io.InputStream; import java.security.NoSuchAlgorithmException; import org.apache.tika.exception.EncryptedDocumentException; import org.apache.tika.exception.TikaException; import org.apache.tika.metadata.Metadata; import org.apache.tika.mime.MediaType; import org.apache.tika.parser.AutoDetectParser; import org.apache.tika.parser.Parser; import org.apache.tika.parser.PasswordProvider; import org.apache.tika.sax.BodyContentHandler; import org.junit.Test; import org.xml.sax.ContentHandler; /** * Test case for parsing 7z files. */ public class Seven7ParserTest extends AbstractPkgTest { private static final MediaType TYPE_7ZIP = MediaType.application("x-7z-compressed"); @Test public void test7ZParsing() throws Exception { Parser parser = new AutoDetectParser(); // Should auto-detect! ContentHandler handler = new BodyContentHandler(); Metadata metadata = new Metadata(); // Ensure 7zip is a parsable format assertTrue("No 7zip parser found", parser.getSupportedTypes(recursingContext).contains(TYPE_7ZIP)); // Parse try (InputStream stream = Seven7ParserTest.class.getResourceAsStream( "/test-documents/test-documents.7z")) { parser.parse(stream, handler, metadata, recursingContext); } assertEquals(TYPE_7ZIP.toString(), metadata.get(Metadata.CONTENT_TYPE)); String content = handler.toString(); assertContains("test-documents/testEXCEL.xls", content); assertContains("Sample Excel Worksheet", content); assertContains("test-documents/testHTML.html", content); assertContains("Test Indexation Html", content); assertContains("test-documents/testOpenOffice2.odt", content); assertContains("This is a sample Open Office document", content); assertContains("test-documents/testPDF.pdf", content); assertContains("Apache Tika", content); assertContains("test-documents/testPPT.ppt", content); assertContains("Sample Powerpoint Slide", content); assertContains("test-documents/testRTF.rtf", content); assertContains("indexation Word", content); assertContains("test-documents/testTXT.txt", content); assertContains("Test d'indexation de Txt", content); assertContains("test-documents/testWORD.doc", content); assertContains("This is a sample Microsoft Word Document", content); assertContains("test-documents/testXML.xml", content); assertContains("Rida Benjelloun", content); } /** * Tests that the ParseContext parser is correctly * fired for all the embedded entries. */ @Test public void testEmbedded() throws Exception { Parser parser = new AutoDetectParser(); // Should auto-detect! ContentHandler handler = new BodyContentHandler(); Metadata metadata = new Metadata(); try (InputStream stream = Seven7ParserTest.class.getResourceAsStream( "/test-documents/test-documents.7z")) { parser.parse(stream, handler, metadata, trackingContext); } // Should have found all 9 documents, but not the directory assertEquals(9, tracker.filenames.size()); assertEquals(9, tracker.mediatypes.size()); assertEquals(9, tracker.modifiedAts.size()); // Should have names but not content types, as 7z doesn't // store the content types assertEquals("test-documents/testEXCEL.xls", tracker.filenames.get(0)); assertEquals("test-documents/testHTML.html", tracker.filenames.get(1)); assertEquals("test-documents/testOpenOffice2.odt", tracker.filenames.get(2)); assertEquals("test-documents/testPDF.pdf", tracker.filenames.get(3)); assertEquals("test-documents/testPPT.ppt", tracker.filenames.get(4)); assertEquals("test-documents/testRTF.rtf", tracker.filenames.get(5)); assertEquals("test-documents/testTXT.txt", tracker.filenames.get(6)); assertEquals("test-documents/testWORD.doc", tracker.filenames.get(7)); assertEquals("test-documents/testXML.xml", tracker.filenames.get(8)); for(String type : tracker.mediatypes) { assertNull(type); } for(String mod : tracker.modifiedAts) { assertNotNull(mod); assertTrue("Modified at " + mod, mod.startsWith("20")); } } @Test public void testPasswordProtected() throws Exception { Parser parser = new AutoDetectParser(); ContentHandler handler = new BodyContentHandler(); Metadata metadata = new Metadata(); // No password, will fail with EncryptedDocumentException boolean ex = false; try (InputStream stream = Seven7ParserTest.class.getResourceAsStream( "/test-documents/test7Z_protected_passTika.7z")) { parser.parse(stream, handler, metadata, recursingContext); fail("Shouldn't be able to read a password protected 7z without the password"); } catch (EncryptedDocumentException e) { // Good ex = true; } assertTrue("test no password", ex); ex = false; // Wrong password currently silently gives no content // Ideally we'd like Commons Compress to give an error, but it doesn't... recursingContext.set(PasswordProvider.class, new PasswordProvider() { @Override public String getPassword(Metadata metadata) { return "wrong"; } }); handler = new BodyContentHandler(); try (InputStream stream = Seven7ParserTest.class.getResourceAsStream( "/test-documents/test7Z_protected_passTika.7z")) { parser.parse(stream, handler, metadata, recursingContext); fail("Shouldn't be able to read a password protected 7z with wrong password"); } catch (TikaException e) { //if JCE is installed, the cause will be: Caused by: org.tukaani.xz.CorruptedInputException: Compressed data is corrupt //if JCE is not installed, the message will include // "(do you have the JCE Unlimited Strength Jurisdiction Policy Files installed?") ex = true; } assertTrue("TikaException for bad password", ex); // Will be empty assertEquals("", handler.toString()); ex = false; // Right password works fine if JCE Unlimited Strength has been installed!!! if (isStrongCryptoAvailable()) { recursingContext.set(PasswordProvider.class, new PasswordProvider() { @Override public String getPassword(Metadata metadata) { return "Tika"; } }); handler = new BodyContentHandler(); try (InputStream stream = Seven7ParserTest.class.getResourceAsStream( "/test-documents/test7Z_protected_passTika.7z")) { parser.parse(stream, handler, metadata, recursingContext); } assertEquals(TYPE_7ZIP.toString(), metadata.get(Metadata.CONTENT_TYPE)); String content = handler.toString(); // Should get filename assertContains("text.txt", content); // Should get contents from the text file in the 7z file assertContains("TEST DATA FOR TIKA.", content); assertContains("This is text inside an encrypted 7zip (7z) file.", content); assertContains("It should be processed by Tika just fine!", content); assertContains("TIKA-1521", content); } else { //if jce is not installed, test for IOException wrapped in TikaException boolean ioe = false; recursingContext.set(PasswordProvider.class, new PasswordProvider() { @Override public String getPassword(Metadata metadata) { return "Tika"; } }); handler = new BodyContentHandler(); try (InputStream stream = Seven7ParserTest.class.getResourceAsStream( "/test-documents/test7Z_protected_passTika.7z")) { parser.parse(stream, handler, metadata, recursingContext); } catch (TikaException e) { ioe = true; } assertTrue("IOException because JCE was not installed", ioe); } } private static boolean isStrongCryptoAvailable() throws NoSuchAlgorithmException { return Cipher.getMaxAllowedKeyLength("AES/ECB/PKCS5Padding") >= 256; } }