blob: 17151c834185dc512dac41ecafe537007eac9fba [file] [log] [blame]
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -07001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
Davide Pesavento0f830802018-01-16 23:58:58 -05002/*
Davide Pesavento478d3382021-03-17 12:46:08 -04003 * Copyright (c) 2013-2021 Regents of the University of California.
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -07004 *
5 * This file is part of ndn-cxx library (NDN C++ library with eXperimental eXtensions).
6 *
7 * ndn-cxx library is free software: you can redistribute it and/or modify it under the
8 * terms of the GNU Lesser General Public License as published by the Free Software
9 * Foundation, either version 3 of the License, or (at your option) any later version.
10 *
11 * ndn-cxx library is distributed in the hope that it will be useful, but WITHOUT ANY
12 * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
13 * PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
14 *
15 * You should have received copies of the GNU General Public License and GNU Lesser
16 * General Public License along with ndn-cxx, e.g., in COPYING.md file. If not, see
17 * <http://www.gnu.org/licenses/>.
18 *
19 * See AUTHORS.md for complete list of ndn-cxx authors and contributors.
20 */
21
Alexander Afanasyev09236c22020-06-03 13:42:38 -040022#include "ndn-cxx/security/trust-anchor-container.hpp"
Davide Pesavento7e780642018-11-24 15:51:34 -050023#include "ndn-cxx/util/io.hpp"
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070024
Davide Pesavento7e780642018-11-24 15:51:34 -050025#include "tests/boost-test.hpp"
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -050026#include "tests/key-chain-fixture.hpp"
27#include "tests/unit/clock-fixture.hpp"
Davide Pesavento0f830802018-01-16 23:58:58 -050028
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070029#include <boost/filesystem.hpp>
30
31namespace ndn {
32namespace security {
Alexander Afanasyev09236c22020-06-03 13:42:38 -040033inline namespace v2 {
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070034namespace tests {
35
36using namespace ndn::tests;
37
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070038/**
39 * This fixture creates a directory and prepares two certificates.
40 * cert1 is written to a file under the directory, while cert2 is not.
41 */
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -050042class TrustAnchorContainerFixture : public ClockFixture, public KeyChainFixture
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070043{
44public:
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -050045 TrustAnchorContainerFixture()
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070046 {
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -050047 boost::filesystem::create_directories(certDirPath);
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070048
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -050049 identity1 = m_keyChain.createIdentity("/TestAnchorContainer/First");
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070050 cert1 = identity1.getDefaultKey().getDefaultCertificate();
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -050051 saveCert(cert1, certPath1.string());
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070052
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -050053 identity2 = m_keyChain.createIdentity("/TestAnchorContainer/Second");
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070054 cert2 = identity2.getDefaultKey().getDefaultCertificate();
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -050055 saveCert(cert2, certPath2.string());
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070056 }
57
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -050058 ~TrustAnchorContainerFixture() override
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070059 {
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -050060 boost::filesystem::remove_all(certDirPath);
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070061 }
62
63public:
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -050064 const boost::filesystem::path certDirPath{boost::filesystem::path(UNIT_TESTS_TMPDIR) / "test-cert-dir"};
65 const boost::filesystem::path certPath1{certDirPath / "trust-anchor-1.cert"};
66 const boost::filesystem::path certPath2{certDirPath / "trust-anchor-2.cert"};
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070067
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -050068 TrustAnchorContainer anchorContainer;
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070069
70 Identity identity1;
71 Identity identity2;
72
73 Certificate cert1;
74 Certificate cert2;
75};
76
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -050077BOOST_AUTO_TEST_SUITE(Security)
78BOOST_FIXTURE_TEST_SUITE(TestTrustAnchorContainer, TrustAnchorContainerFixture)
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070079
80// one static group and one dynamic group created from file
81BOOST_AUTO_TEST_CASE(Insert)
82{
83 // Static
84 anchorContainer.insert("group1", Certificate(cert1));
85 BOOST_CHECK(anchorContainer.find(cert1.getName()) != nullptr);
86 BOOST_CHECK(anchorContainer.find(identity1.getName()) != nullptr);
87 const Certificate* cert = anchorContainer.find(cert1.getName());
88 BOOST_CHECK_NO_THROW(anchorContainer.insert("group1", Certificate(cert1)));
89 BOOST_CHECK_EQUAL(cert, anchorContainer.find(cert1.getName())); // still the same instance of the certificate
90 // cannot add dynamic group when static already exists
Davide Pesavento0f830802018-01-16 23:58:58 -050091 BOOST_CHECK_THROW(anchorContainer.insert("group1", certPath1.string(), 1_s), TrustAnchorContainer::Error);
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070092 BOOST_CHECK_EQUAL(anchorContainer.getGroup("group1").size(), 1);
93 BOOST_CHECK_EQUAL(anchorContainer.size(), 1);
94
95 // From file
Davide Pesavento0f830802018-01-16 23:58:58 -050096 anchorContainer.insert("group2", certPath2.string(), 1_s);
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -070097 BOOST_CHECK(anchorContainer.find(cert2.getName()) != nullptr);
98 BOOST_CHECK(anchorContainer.find(identity2.getName()) != nullptr);
99 BOOST_CHECK_THROW(anchorContainer.insert("group2", Certificate(cert2)), TrustAnchorContainer::Error);
Davide Pesavento0f830802018-01-16 23:58:58 -0500100 BOOST_CHECK_THROW(anchorContainer.insert("group2", certPath2.string(), 1_s), TrustAnchorContainer::Error);
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -0700101 BOOST_CHECK_EQUAL(anchorContainer.getGroup("group2").size(), 1);
102 BOOST_CHECK_EQUAL(anchorContainer.size(), 2);
103
104 boost::filesystem::remove(certPath2);
Davide Pesavento0f830802018-01-16 23:58:58 -0500105 advanceClocks(1_s, 11);
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -0700106
107 BOOST_CHECK(anchorContainer.find(identity2.getName()) == nullptr);
108 BOOST_CHECK(anchorContainer.find(cert2.getName()) == nullptr);
109 BOOST_CHECK_EQUAL(anchorContainer.getGroup("group2").size(), 0);
110 BOOST_CHECK_EQUAL(anchorContainer.size(), 1);
111
112 TrustAnchorGroup& group = anchorContainer.getGroup("group1");
113 auto staticGroup = dynamic_cast<StaticTrustAnchorGroup*>(&group);
114 BOOST_REQUIRE(staticGroup != nullptr);
115 BOOST_CHECK_EQUAL(staticGroup->size(), 1);
116 staticGroup->remove(cert1.getName());
117 BOOST_CHECK_EQUAL(staticGroup->size(), 0);
118 BOOST_CHECK_EQUAL(anchorContainer.size(), 0);
119
120 BOOST_CHECK_THROW(anchorContainer.getGroup("non-existing-group"), TrustAnchorContainer::Error);
121}
122
123BOOST_AUTO_TEST_CASE(DynamicAnchorFromDir)
124{
125 boost::filesystem::remove(certPath2);
126
Davide Pesavento0f830802018-01-16 23:58:58 -0500127 anchorContainer.insert("group", certDirPath.string(), 1_s, true /* isDir */);
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -0700128
129 BOOST_CHECK(anchorContainer.find(identity1.getName()) != nullptr);
130 BOOST_CHECK(anchorContainer.find(identity2.getName()) == nullptr);
131 BOOST_CHECK_EQUAL(anchorContainer.getGroup("group").size(), 1);
132
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -0500133 saveCert(cert2, certPath2.string());
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -0700134
Davide Pesavento0f830802018-01-16 23:58:58 -0500135 advanceClocks(100_ms, 11);
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -0700136
137 BOOST_CHECK(anchorContainer.find(identity1.getName()) != nullptr);
138 BOOST_CHECK(anchorContainer.find(identity2.getName()) != nullptr);
139 BOOST_CHECK_EQUAL(anchorContainer.getGroup("group").size(), 2);
140
141 boost::filesystem::remove_all(certDirPath);
142
Davide Pesavento0f830802018-01-16 23:58:58 -0500143 advanceClocks(100_ms, 11);
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -0700144
145 BOOST_CHECK(anchorContainer.find(identity1.getName()) == nullptr);
146 BOOST_CHECK(anchorContainer.find(identity2.getName()) == nullptr);
147 BOOST_CHECK_EQUAL(anchorContainer.getGroup("group").size(), 0);
148}
149
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -0500150BOOST_AUTO_TEST_CASE(FindByInterest)
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -0700151{
Davide Pesavento0f830802018-01-16 23:58:58 -0500152 anchorContainer.insert("group1", certPath1.string(), 1_s);
Davide Pesavento478d3382021-03-17 12:46:08 -0400153 Interest interest1;
154 interest1.setCanBePrefix(true);
155 interest1.setName(identity1.getName());
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -0700156 BOOST_CHECK(anchorContainer.find(interest1) != nullptr);
Davide Pesavento478d3382021-03-17 12:46:08 -0400157 interest1.setName(identity1.getName().getPrefix(-1));
158 BOOST_CHECK(anchorContainer.find(interest1) != nullptr);
159 interest1.setName(Name(identity1.getName()).appendVersion());
160 BOOST_CHECK(anchorContainer.find(interest1) == nullptr);
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -0700161
Davide Pesavento4c1ad4c2020-11-16 21:12:02 -0500162 auto cert3 = makeCert(identity1.getDefaultKey(), "3");
163 auto cert4 = makeCert(identity1.getDefaultKey(), "4");
164 auto cert5 = makeCert(identity1.getDefaultKey(), "5");
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -0700165
166 Certificate cert3Copy = cert3;
167 anchorContainer.insert("group2", std::move(cert3Copy));
168 anchorContainer.insert("group3", std::move(cert4));
169 anchorContainer.insert("group4", std::move(cert5));
170
Davide Pesavento478d3382021-03-17 12:46:08 -0400171 auto interest3 = Interest(cert3.getKeyName()).setCanBePrefix(true);
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -0700172 const Certificate* foundCert = anchorContainer.find(interest3);
173 BOOST_REQUIRE(foundCert != nullptr);
174 BOOST_CHECK(interest3.getName().isPrefixOf(foundCert->getName()));
175 BOOST_CHECK_EQUAL(foundCert->getName(), cert3.getName());
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -0700176}
177
178BOOST_AUTO_TEST_SUITE_END() // TestTrustAnchorContainer
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -0700179BOOST_AUTO_TEST_SUITE_END() // Security
180
181} // namespace tests
Alexander Afanasyev09236c22020-06-03 13:42:38 -0400182} // inline namespace v2
Qiuhan Ding4caa0cc2015-10-23 20:31:27 -0700183} // namespace security
184} // namespace ndn