SwiftObjectServerTests.swift 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666
  1. ////////////////////////////////////////////////////////////////////////////
  2. //
  3. // Copyright 2016 Realm Inc.
  4. //
  5. // Licensed under the Apache License, Version 2.0 (the "License");
  6. // you may not use this file except in compliance with the License.
  7. // You may obtain a copy of the License at
  8. //
  9. // http://www.apache.org/licenses/LICENSE-2.0
  10. //
  11. // Unless required by applicable law or agreed to in writing, software
  12. // distributed under the License is distributed on an "AS IS" BASIS,
  13. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. // See the License for the specific language governing permissions and
  15. // limitations under the License.
  16. //
  17. ////////////////////////////////////////////////////////////////////////////
  18. import XCTest
  19. import RealmSwift
  20. // Used by testOfflineClientReset
  21. // The naming here is nonstandard as the sync-1.x.realm test file comes from the .NET unit tests.
  22. // swiftlint:disable identifier_name
  23. @objc(Person)
  24. class Person: Object {
  25. @objc dynamic var FirstName: String?
  26. @objc dynamic var LastName: String?
  27. override class func shouldIncludeInDefaultSchema() -> Bool { return false }
  28. }
  29. class SwiftObjectServerTests: SwiftSyncTestCase {
  30. /// It should be possible to successfully open a Realm configured for sync.
  31. func testBasicSwiftSync() {
  32. let url = URL(string: "realm://127.0.0.1:9080/~/testBasicSync")!
  33. do {
  34. let user = try synchronouslyLogInUser(for: basicCredentials(register: true), server: authURL)
  35. let realm = try synchronouslyOpenRealm(url: url, user: user)
  36. XCTAssert(realm.isEmpty, "Freshly synced Realm was not empty...")
  37. } catch {
  38. XCTFail("Got an error: \(error)")
  39. }
  40. }
  41. /// If client B adds objects to a Realm, client A should see those new objects.
  42. func testSwiftAddObjects() {
  43. do {
  44. let user = try synchronouslyLogInUser(for: basicCredentials(register: isParent), server: authURL)
  45. let realm = try synchronouslyOpenRealm(url: realmURL, user: user)
  46. if isParent {
  47. waitForDownloads(for: realm)
  48. checkCount(expected: 0, realm, SwiftSyncObject.self)
  49. executeChild()
  50. waitForDownloads(for: realm)
  51. checkCount(expected: 3, realm, SwiftSyncObject.self)
  52. } else {
  53. // Add objects
  54. try realm.write {
  55. realm.add(SwiftSyncObject(value: ["child-1"]))
  56. realm.add(SwiftSyncObject(value: ["child-2"]))
  57. realm.add(SwiftSyncObject(value: ["child-3"]))
  58. }
  59. waitForUploads(for: realm)
  60. checkCount(expected: 3, realm, SwiftSyncObject.self)
  61. }
  62. } catch {
  63. XCTFail("Got an error: \(error) (process: \(isParent ? "parent" : "child"))")
  64. }
  65. }
  66. /// If client B removes objects from a Realm, client A should see those changes.
  67. func testSwiftDeleteObjects() {
  68. do {
  69. let user = try synchronouslyLogInUser(for: basicCredentials(register: isParent), server: authURL)
  70. let realm = try synchronouslyOpenRealm(url: realmURL, user: user)
  71. if isParent {
  72. try realm.write {
  73. realm.add(SwiftSyncObject(value: ["child-1"]))
  74. realm.add(SwiftSyncObject(value: ["child-2"]))
  75. realm.add(SwiftSyncObject(value: ["child-3"]))
  76. }
  77. waitForUploads(for: realm)
  78. checkCount(expected: 3, realm, SwiftSyncObject.self)
  79. executeChild()
  80. waitForDownloads(for: realm)
  81. checkCount(expected: 0, realm, SwiftSyncObject.self)
  82. } else {
  83. try realm.write {
  84. realm.deleteAll()
  85. }
  86. waitForUploads(for: realm)
  87. checkCount(expected: 0, realm, SwiftSyncObject.self)
  88. }
  89. } catch {
  90. XCTFail("Got an error: \(error) (process: \(isParent ? "parent" : "child"))")
  91. }
  92. }
  93. #if swift(>=3.2)
  94. func testConnectionState() {
  95. let user = try! synchronouslyLogInUser(for: basicCredentials(register: true), server: authURL)
  96. let realm = try! synchronouslyOpenRealm(url: realmURL, user: user)
  97. let session = realm.syncSession!
  98. func wait(forState desiredState: SyncSession.ConnectionState) {
  99. let ex = expectation(description: "Wait for connection state: \(desiredState)")
  100. let token = session.observe(\SyncSession.connectionState, options: .initial) { s, _ in
  101. if s.connectionState == desiredState {
  102. ex.fulfill()
  103. }
  104. }
  105. waitForExpectations(timeout: 2.0)
  106. token.invalidate()
  107. }
  108. wait(forState: .connected)
  109. session.suspend()
  110. wait(forState: .disconnected)
  111. session.resume()
  112. wait(forState: .connecting)
  113. wait(forState: .connected)
  114. }
  115. #endif // Swift >= 3.2
  116. // MARK: - Client reset
  117. func testClientReset() {
  118. do {
  119. let user = try synchronouslyLogInUser(for: basicCredentials(register: isParent), server: authURL)
  120. let realm = try synchronouslyOpenRealm(url: realmURL, user: user)
  121. var theError: SyncError?
  122. let ex = expectation(description: "Waiting for error handler to be called...")
  123. SyncManager.shared.errorHandler = { (error, session) in
  124. if let error = error as? SyncError {
  125. theError = error
  126. } else {
  127. XCTFail("Error \(error) was not a sync error. Something is wrong.")
  128. }
  129. ex.fulfill()
  130. }
  131. user.simulateClientResetError(forSession: realmURL)
  132. waitForExpectations(timeout: 10, handler: nil)
  133. XCTAssertNotNil(theError)
  134. XCTAssertTrue(theError!.code == SyncError.Code.clientResetError)
  135. let resetInfo = theError!.clientResetInfo()
  136. XCTAssertNotNil(resetInfo)
  137. XCTAssertTrue(resetInfo!.0.contains("io.realm.object-server-recovered-realms/recovered_realm"))
  138. XCTAssertNotNil(realm)
  139. } catch {
  140. XCTFail("Got an error: \(error) (process: \(isParent ? "parent" : "child"))")
  141. }
  142. }
  143. func testClientResetManualInitiation() {
  144. do {
  145. let user = try synchronouslyLogInUser(for: basicCredentials(register: isParent), server: authURL)
  146. var theError: SyncError?
  147. try autoreleasepool {
  148. let realm = try synchronouslyOpenRealm(url: realmURL, user: user)
  149. let ex = expectation(description: "Waiting for error handler to be called...")
  150. SyncManager.shared.errorHandler = { (error, session) in
  151. if let error = error as? SyncError {
  152. theError = error
  153. } else {
  154. XCTFail("Error \(error) was not a sync error. Something is wrong.")
  155. }
  156. ex.fulfill()
  157. }
  158. user.simulateClientResetError(forSession: realmURL)
  159. waitForExpectations(timeout: 10, handler: nil)
  160. XCTAssertNotNil(theError)
  161. XCTAssertNotNil(realm)
  162. }
  163. let (path, errorToken) = theError!.clientResetInfo()!
  164. XCTAssertFalse(FileManager.default.fileExists(atPath: path))
  165. SyncSession.immediatelyHandleError(errorToken)
  166. XCTAssertTrue(FileManager.default.fileExists(atPath: path))
  167. } catch {
  168. XCTFail("Got an error: \(error) (process: \(isParent ? "parent" : "child"))")
  169. }
  170. }
  171. // MARK: - Progress notifiers
  172. func testStreamingDownloadNotifier() {
  173. let bigObjectCount = 2
  174. do {
  175. var callCount = 0
  176. var transferred = 0
  177. var transferrable = 0
  178. let user = try synchronouslyLogInUser(for: basicCredentials(register: isParent), server: authURL)
  179. let realm = try synchronouslyOpenRealm(url: realmURL, user: user)
  180. if isParent {
  181. let session = realm.syncSession
  182. XCTAssertNotNil(session)
  183. let ex = expectation(description: "streaming-downloads-expectation")
  184. var hasBeenFulfilled = false
  185. let token = session!.addProgressNotification(for: .download, mode: .reportIndefinitely) { p in
  186. callCount += 1
  187. XCTAssert(p.transferredBytes >= transferred)
  188. XCTAssert(p.transferrableBytes >= transferrable)
  189. transferred = p.transferredBytes
  190. transferrable = p.transferrableBytes
  191. if p.transferredBytes > 0 && p.isTransferComplete && !hasBeenFulfilled {
  192. ex.fulfill()
  193. hasBeenFulfilled = true
  194. }
  195. }
  196. // Wait for the child process to upload all the data.
  197. executeChild()
  198. waitForExpectations(timeout: 10.0, handler: nil)
  199. token!.invalidate()
  200. XCTAssert(callCount > 1)
  201. XCTAssert(transferred >= transferrable)
  202. } else {
  203. try realm.write {
  204. for _ in 0..<bigObjectCount {
  205. realm.add(SwiftHugeSyncObject())
  206. }
  207. }
  208. waitForUploads(for: realm)
  209. checkCount(expected: bigObjectCount, realm, SwiftHugeSyncObject.self)
  210. }
  211. } catch {
  212. XCTFail("Got an error: \(error) (process: \(isParent ? "parent" : "child"))")
  213. }
  214. }
  215. func testStreamingUploadNotifier() {
  216. let bigObjectCount = 2
  217. do {
  218. var transferred = 0
  219. var transferrable = 0
  220. let user = try synchronouslyLogInUser(for: basicCredentials(register: isParent), server: authURL)
  221. let realm = try synchronouslyOpenRealm(url: realmURL, user: user)
  222. let session = realm.syncSession
  223. XCTAssertNotNil(session)
  224. var ex = expectation(description: "initial upload")
  225. let token = session!.addProgressNotification(for: .upload, mode: .reportIndefinitely) { p in
  226. XCTAssert(p.transferredBytes >= transferred)
  227. XCTAssert(p.transferrableBytes >= transferrable)
  228. transferred = p.transferredBytes
  229. transferrable = p.transferrableBytes
  230. if p.transferredBytes > 0 && p.isTransferComplete {
  231. ex.fulfill()
  232. }
  233. }
  234. waitForExpectations(timeout: 10.0, handler: nil)
  235. ex = expectation(description: "write transaction upload")
  236. try realm.write {
  237. for _ in 0..<bigObjectCount {
  238. realm.add(SwiftHugeSyncObject())
  239. }
  240. }
  241. waitForExpectations(timeout: 10.0, handler: nil)
  242. token!.invalidate()
  243. XCTAssert(transferred >= transferrable)
  244. } catch {
  245. XCTFail("Got an error: \(error) (process: \(isParent ? "parent" : "child"))")
  246. }
  247. }
  248. // MARK: - Download Realm
  249. func testDownloadRealm() {
  250. let bigObjectCount = 2
  251. do {
  252. let user = try synchronouslyLogInUser(for: basicCredentials(register: isParent), server: authURL)
  253. if isParent {
  254. // Wait for the child process to upload everything.
  255. executeChild()
  256. let ex = expectation(description: "download-realm")
  257. let config = user.configuration(realmURL: realmURL, fullSynchronization: true)
  258. let pathOnDisk = ObjectiveCSupport.convert(object: config).pathOnDisk
  259. XCTAssertFalse(FileManager.default.fileExists(atPath: pathOnDisk))
  260. Realm.asyncOpen(configuration: config) { realm, error in
  261. XCTAssertNil(error)
  262. self.checkCount(expected: bigObjectCount, realm!, SwiftHugeSyncObject.self)
  263. ex.fulfill()
  264. }
  265. func fileSize(path: String) -> Int {
  266. if let attr = try? FileManager.default.attributesOfItem(atPath: path) {
  267. return attr[.size] as! Int
  268. }
  269. return 0
  270. }
  271. XCTAssertFalse(RLMHasCachedRealmForPath(pathOnDisk))
  272. waitForExpectations(timeout: 10.0, handler: nil)
  273. XCTAssertGreaterThan(fileSize(path: pathOnDisk), 0)
  274. XCTAssertFalse(RLMHasCachedRealmForPath(pathOnDisk))
  275. } else {
  276. let realm = try synchronouslyOpenRealm(url: realmURL, user: user)
  277. // Write lots of data to the Realm, then wait for it to be uploaded.
  278. try realm.write {
  279. for _ in 0..<bigObjectCount {
  280. realm.add(SwiftHugeSyncObject())
  281. }
  282. }
  283. waitForUploads(for: realm)
  284. checkCount(expected: bigObjectCount, realm, SwiftHugeSyncObject.self)
  285. }
  286. } catch {
  287. XCTFail("Got an error: \(error) (process: \(isParent ? "parent" : "child"))")
  288. }
  289. }
  290. // MARK: - Administration
  291. func testRetrieveUserInfo() {
  292. let adminUsername = "jyaku.swift"
  293. let nonAdminUsername = "meela.swift@realm.example.org"
  294. let password = "p"
  295. let server = SwiftObjectServerTests.authServerURL()
  296. // Create a non-admin user.
  297. _ = logInUser(for: .init(username: nonAdminUsername, password: password, register: true),
  298. server: server)
  299. // Create an admin user.
  300. let adminUser = createAdminUser(for: server, username: adminUsername)
  301. // Look up information about the non-admin user from the admin user.
  302. let ex = expectation(description: "Should be able to look up user information")
  303. adminUser.retrieveInfo(forUser: nonAdminUsername, identityProvider: .usernamePassword) { (userInfo, err) in
  304. XCTAssertNil(err)
  305. XCTAssertNotNil(userInfo)
  306. guard let userInfo = userInfo else {
  307. return
  308. }
  309. let account = userInfo.accounts.first!
  310. XCTAssertEqual(account.providerUserIdentity, nonAdminUsername)
  311. XCTAssertEqual(account.provider, Provider.usernamePassword)
  312. XCTAssertFalse(userInfo.isAdmin)
  313. ex.fulfill()
  314. }
  315. waitForExpectations(timeout: 10.0, handler: nil)
  316. }
  317. // MARK: - Authentication
  318. func testInvalidCredentials() {
  319. do {
  320. let username = "testInvalidCredentialsUsername"
  321. let credentials = SyncCredentials.usernamePassword(username: username,
  322. password: "THIS_IS_A_PASSWORD",
  323. register: true)
  324. _ = try synchronouslyLogInUser(for: credentials, server: authURL)
  325. // Now log in the same user, but with a bad password.
  326. let ex = expectation(description: "wait for user login")
  327. let credentials2 = SyncCredentials.usernamePassword(username: username, password: "NOT_A_VALID_PASSWORD")
  328. SyncUser.logIn(with: credentials2, server: authURL) { user, error in
  329. XCTAssertNil(user)
  330. XCTAssertTrue(error is SyncAuthError)
  331. let castError = error as! SyncAuthError
  332. XCTAssertEqual(castError.code, SyncAuthError.invalidCredential)
  333. ex.fulfill()
  334. }
  335. waitForExpectations(timeout: 2.0, handler: nil)
  336. } catch {
  337. XCTFail("Got an error: \(error) (process: \(isParent ? "parent" : "child"))")
  338. }
  339. }
  340. // MARK: - User-specific functionality
  341. func testUserExpirationCallback() {
  342. do {
  343. let user = try synchronouslyLogInUser(for: basicCredentials(), server: authURL)
  344. // Set a callback on the user
  345. var blockCalled = false
  346. let ex = expectation(description: "Error callback should fire upon receiving an error")
  347. user.errorHandler = { (u, error) in
  348. XCTAssertEqual(u.identity, user.identity)
  349. XCTAssertEqual(error.code, .accessDeniedOrInvalidPath)
  350. blockCalled = true
  351. ex.fulfill()
  352. }
  353. // Screw up the token on the user.
  354. manuallySetRefreshToken(for: user, value: "not-a-real-token")
  355. // Try to open a Realm with the user; this will cause our errorHandler block defined above to be fired.
  356. XCTAssertFalse(blockCalled)
  357. _ = try immediatelyOpenRealm(url: realmURL, user: user)
  358. waitForExpectations(timeout: 10.0, handler: nil)
  359. XCTAssertEqual(user.state, .loggedOut)
  360. } catch {
  361. XCTFail("Got an error: \(error) (process: \(isParent ? "parent" : "child"))")
  362. }
  363. }
  364. // MARK: - Offline client reset
  365. func testOfflineClientReset() {
  366. let user = try! synchronouslyLogInUser(for: basicCredentials(), server: authURL)
  367. let sourceFileURL = Bundle(for: type(of: self)).url(forResource: "sync-1.x", withExtension: "realm")!
  368. let fileName = "\(UUID()).realm"
  369. let fileURL = URL(fileURLWithPath: NSTemporaryDirectory()).appendingPathComponent(fileName)
  370. try! FileManager.default.copyItem(at: sourceFileURL, to: fileURL)
  371. let syncConfig = RLMSyncConfiguration(user: user, realmURL: realmURL)
  372. syncConfig.customFileURL = fileURL
  373. let config = Realm.Configuration(syncConfiguration: ObjectiveCSupport.convert(object: syncConfig))
  374. do {
  375. _ = try Realm(configuration: config)
  376. } catch let e as Realm.Error where e.code == .incompatibleSyncedFile {
  377. var backupConfiguration = e.backupConfiguration
  378. XCTAssertNotNil(backupConfiguration)
  379. // Open the backup Realm with a schema subset since it was created using the schema from .NET's unit tests.
  380. backupConfiguration!.objectTypes = [Person.self]
  381. let backupRealm = try! Realm(configuration: backupConfiguration!)
  382. let people = backupRealm.objects(Person.self)
  383. XCTAssertEqual(people.count, 1)
  384. XCTAssertEqual(people[0].FirstName, "John")
  385. XCTAssertEqual(people[0].LastName, "Smith")
  386. // Verify that we can now successfully open the original synced Realm.
  387. _ = try! Realm(configuration: config)
  388. } catch {
  389. fatalError("Unexpected error: \(error)")
  390. }
  391. }
  392. // MARK: - Partial sync
  393. func populateTestRealm(_ username: String) {
  394. autoreleasepool {
  395. let credentials = SyncCredentials.usernamePassword(username: username, password: "a", register: true)
  396. let user = try! synchronouslyLogInUser(for: credentials, server: authURL)
  397. let realm = try! synchronouslyOpenRealm(configuration: user.configuration())
  398. try! realm.write {
  399. realm.add(SwiftPartialSyncObjectA(number: 0, string: "realm"))
  400. realm.add(SwiftPartialSyncObjectA(number: 1, string: ""))
  401. realm.add(SwiftPartialSyncObjectA(number: 2, string: ""))
  402. realm.add(SwiftPartialSyncObjectA(number: 3, string: ""))
  403. realm.add(SwiftPartialSyncObjectA(number: 4, string: "realm"))
  404. realm.add(SwiftPartialSyncObjectA(number: 5, string: "sync"))
  405. realm.add(SwiftPartialSyncObjectA(number: 6, string: "partial"))
  406. realm.add(SwiftPartialSyncObjectA(number: 7, string: "partial"))
  407. realm.add(SwiftPartialSyncObjectA(number: 8, string: "partial"))
  408. realm.add(SwiftPartialSyncObjectA(number: 9, string: "partial"))
  409. realm.add(SwiftPartialSyncObjectB(number: 0, firstString: "", secondString: ""))
  410. realm.add(SwiftPartialSyncObjectB(number: 1, firstString: "", secondString: ""))
  411. realm.add(SwiftPartialSyncObjectB(number: 2, firstString: "", secondString: ""))
  412. realm.add(SwiftPartialSyncObjectB(number: 3, firstString: "", secondString: ""))
  413. realm.add(SwiftPartialSyncObjectB(number: 4, firstString: "", secondString: ""))
  414. realm.add(SwiftPartialSyncObjectB(number: 5, firstString: "", secondString: ""))
  415. realm.add(SwiftPartialSyncObjectB(number: 6, firstString: "", secondString: ""))
  416. realm.add(SwiftPartialSyncObjectB(number: 7, firstString: "", secondString: ""))
  417. realm.add(SwiftPartialSyncObjectB(number: 8, firstString: "", secondString: ""))
  418. realm.add(SwiftPartialSyncObjectB(number: 9, firstString: "", secondString: ""))
  419. }
  420. waitForUploads(for: realm)
  421. }
  422. }
  423. func testPartialSync() {
  424. populateTestRealm(#function)
  425. let credentials = SyncCredentials.usernamePassword(username: #function, password: "a")
  426. let user = try! synchronouslyLogInUser(for: credentials, server: authURL)
  427. let realm = try! synchronouslyOpenRealm(configuration: user.configuration())
  428. let results = realm.objects(SwiftPartialSyncObjectA.self).filter("number > 5")
  429. let subscription = results.subscribe(named: "query")
  430. XCTAssertEqual(subscription.state, .creating)
  431. waitForState(subscription, .complete)
  432. // Verify that we got what we're looking for
  433. XCTAssertEqual(results.count, 4)
  434. for object in results {
  435. XCTAssertGreaterThan(object.number, 5)
  436. XCTAssertEqual(object.string, "partial")
  437. }
  438. // And that we didn't get anything else.
  439. XCTAssertEqual(realm.objects(SwiftPartialSyncObjectA.self).count, results.count)
  440. XCTAssertTrue(realm.objects(SwiftPartialSyncObjectB.self).isEmpty)
  441. // Re-subscribing to an existing named query may not report the query's state immediately,
  442. // but it should report it eventually.
  443. let subscription2 = realm.objects(SwiftPartialSyncObjectA.self).filter("number > 5").subscribe(named: "query")
  444. waitForState(subscription2, .complete)
  445. // Creating a subscription with the same name but different query should raise an error.
  446. let subscription3 = realm.objects(SwiftPartialSyncObjectA.self).filter("number < 5").subscribe(named: "query")
  447. waitForError(subscription3)
  448. // Unsubscribing should move the subscription to the invalidated state.
  449. subscription.unsubscribe()
  450. waitForState(subscription, .invalidated)
  451. }
  452. func testPartialSyncLimit() {
  453. populateTestRealm(#function)
  454. let credentials = SyncCredentials.usernamePassword(username: #function, password: "a")
  455. let user = try! synchronouslyLogInUser(for: credentials, server: authURL)
  456. let realm = try! synchronouslyOpenRealm(configuration: user.configuration())
  457. let results = realm.objects(SwiftPartialSyncObjectA.self).filter("number > 5")
  458. waitForState(results.subscribe(named: "query", limit: 1), .complete)
  459. XCTAssertEqual(results.count, 1)
  460. XCTAssertEqual(realm.objects(SwiftPartialSyncObjectA.self).count, 1)
  461. if let object = results.first {
  462. XCTAssertGreaterThan(object.number, 5)
  463. XCTAssertEqual(object.string, "partial")
  464. }
  465. let results2 = realm.objects(SwiftPartialSyncObjectA.self).sorted(byKeyPath: "number", ascending: false)
  466. waitForState(results2.subscribe(named: "query2", limit: 2), .complete)
  467. XCTAssertEqual(results2.count, 3)
  468. XCTAssertEqual(realm.objects(SwiftPartialSyncObjectA.self).count, 3)
  469. for object in results2 {
  470. XCTAssertTrue(object.number == 6 || object.number >= 8,
  471. "\(object.number) == 6 || \(object.number) >= 8")
  472. XCTAssertEqual(object.string, "partial")
  473. }
  474. }
  475. func testPartialSyncSubscriptions() {
  476. let credentials = SyncCredentials.usernamePassword(username: #function, password: "a", register: true)
  477. let user = try! synchronouslyLogInUser(for: credentials, server: authURL)
  478. let realm = try! synchronouslyOpenRealm(configuration: user.configuration())
  479. XCTAssertEqual(realm.subscriptions().count, 0)
  480. XCTAssertNil(realm.subscription(named: "query"))
  481. let subscription = realm.objects(SwiftPartialSyncObjectA.self).filter("number > 5").subscribe(named: "query")
  482. XCTAssertEqual(realm.subscriptions().count, 0)
  483. XCTAssertNil(realm.subscription(named: "query"))
  484. waitForState(subscription, .complete)
  485. XCTAssertEqual(realm.subscriptions().count, 1)
  486. let sub2 = realm.subscriptions().first!
  487. XCTAssertEqual(sub2.name, "query")
  488. XCTAssertEqual(sub2.state, .complete)
  489. let sub3 = realm.subscription(named: "query")!
  490. XCTAssertEqual(sub3.name, "query")
  491. XCTAssertEqual(sub3.state, .complete)
  492. for sub in realm.subscriptions() {
  493. XCTAssertEqual(sub.name, "query")
  494. XCTAssertEqual(sub.state, .complete)
  495. }
  496. XCTAssertNil(realm.subscription(named: "not query"))
  497. }
  498. // Partial sync subscriptions are only available in Swift 3.2 and newer.
  499. #if swift(>=3.2)
  500. func waitForState<T>(_ subscription: SyncSubscription<T>, _ desiredState: SyncSubscriptionState) {
  501. let ex = expectation(description: "Waiting for state \(desiredState)")
  502. let token = subscription.observe(\.state, options: .initial) { state in
  503. if state == desiredState {
  504. ex.fulfill()
  505. }
  506. }
  507. waitForExpectations(timeout: 20.0)
  508. token.invalidate()
  509. }
  510. func waitForError<T>(_ subscription: SyncSubscription<T>) {
  511. let ex = expectation(description: "Waiting for error state")
  512. let token = subscription.observe(\.state, options: .initial) { state in
  513. if case .error(_) = state {
  514. ex.fulfill()
  515. }
  516. }
  517. waitForExpectations(timeout: 20.0)
  518. token.invalidate()
  519. }
  520. #else
  521. func waitForState<T>(_ subscription: SyncSubscription<T>, _ desiredState: SyncSubscriptionState) {
  522. for _ in 0..<20 {
  523. if subscription.state == desiredState {
  524. return
  525. }
  526. RunLoop.current.run(until: Date().addingTimeInterval(1.0))
  527. }
  528. XCTFail("waitForState(\(subscription), \(desiredState)) timed out")
  529. }
  530. func waitForError<T>(_ subscription: SyncSubscription<T>) {
  531. for _ in 0..<20 {
  532. if case .error(_) = subscription.state {
  533. return
  534. }
  535. RunLoop.current.run(until: Date().addingTimeInterval(1.0))
  536. }
  537. XCTFail("waitForError(\(subscription)) timed out")
  538. }
  539. #endif // Swift >= 3.2
  540. // MARK: - Certificate Pinning
  541. func testSecureConnectionToLocalhostWithDefaultSecurity() {
  542. let user = try! synchronouslyLogInUser(for: basicCredentials(), server: authURL)
  543. let config = user.configuration(realmURL: URL(string: "realms://localhost:9443/~/default"),
  544. serverValidationPolicy: .system)
  545. let ex = expectation(description: "Waiting for error handler to be called")
  546. SyncManager.shared.errorHandler = { (error, session) in
  547. ex.fulfill()
  548. }
  549. _ = try! Realm(configuration: config)
  550. self.waitForExpectations(timeout: 4.0)
  551. }
  552. func testSecureConnectionToLocalhostWithValidationDisabled() {
  553. let user = try! synchronouslyLogInUser(for: basicCredentials(), server: authURL)
  554. let config = user.configuration(realmURL: URL(string: "realms://localhost:9443/~/default"),
  555. serverValidationPolicy: .none)
  556. SyncManager.shared.errorHandler = { (error, session) in
  557. XCTFail("Unexpected connection failure: \(error)")
  558. }
  559. let realm = try! Realm(configuration: config)
  560. self.waitForUploads(for: realm)
  561. }
  562. func testSecureConnectionToLocalhostWithPinnedCertificate() {
  563. let user = try! synchronouslyLogInUser(for: basicCredentials(), server: authURL)
  564. let certURL = URL(string: #file)!
  565. .deletingLastPathComponent()
  566. .appendingPathComponent("certificates")
  567. .appendingPathComponent("localhost.cer")
  568. let config = user.configuration(realmURL: URL(string: "realms://localhost:9443/~/default"),
  569. serverValidationPolicy: .pinCertificate(path: certURL))
  570. SyncManager.shared.errorHandler = { (error, session) in
  571. XCTFail("Unexpected connection failure: \(error)")
  572. }
  573. let realm = try! Realm(configuration: config)
  574. self.waitForUploads(for: realm)
  575. }
  576. func testSecureConnectionToLocalhostWithIncorrectPinnedCertificate() {
  577. let user = try! synchronouslyLogInUser(for: basicCredentials(), server: authURL)
  578. let certURL = URL(string: #file)!
  579. .deletingLastPathComponent()
  580. .appendingPathComponent("certificates")
  581. .appendingPathComponent("localhost-other.cer")
  582. let config = user.configuration(realmURL: URL(string: "realms://localhost:9443/~/default"),
  583. serverValidationPolicy: .pinCertificate(path: certURL))
  584. let ex = expectation(description: "Waiting for error handler to be called")
  585. SyncManager.shared.errorHandler = { (error, session) in
  586. ex.fulfill()
  587. }
  588. _ = try! Realm(configuration: config)
  589. self.waitForExpectations(timeout: 4.0)
  590. }
  591. }