blob: 0bc7722cc1921f5597218f9b82515da3f51b9f36 [file] [log] [blame]
Adrien Béraudefe27372023-05-27 18:56:29 -04001/*
2 * Copyright (C) 2004-2023 Savoir-faire Linux Inc.
3 *
Adrien Béraudcb753622023-07-17 22:32:49 -04004 * This program is free software: you can redistribute it and/or modify
Adrien Béraudefe27372023-05-27 18:56:29 -04005 * it under the terms of the GNU General Public License as published by
Adrien Béraudcb753622023-07-17 22:32:49 -04006 * the Free Software Foundation, either version 3 of the License, or
Adrien Béraudefe27372023-05-27 18:56:29 -04007 * (at your option) any later version.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
Adrien Béraudcb753622023-07-17 22:32:49 -040011 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
Adrien Béraudefe27372023-05-27 18:56:29 -040012 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
Adrien Béraudcb753622023-07-17 22:32:49 -040015 * along with this program. If not, see <https://www.gnu.org/licenses/>.
Adrien Béraudefe27372023-05-27 18:56:29 -040016 */
Adrien Béraudefe27372023-05-27 18:56:29 -040017#include <cppunit/TestAssert.h>
18#include <cppunit/TestFixture.h>
19#include <cppunit/extensions/HelperMacros.h>
20
21#include "test_runner.h"
22#include "certstore.h"
23
Adrien Béraud1ae60aa2023-07-07 09:55:09 -040024namespace dhtnet {
Adrien Béraudefe27372023-05-27 18:56:29 -040025namespace test {
26
27class CertStoreTest : public CppUnit::TestFixture
28{
29public:
30 CertStoreTest()
31 {
32 }
33 ~CertStoreTest() { }
34 static std::string name() { return "certstore"; }
35 void setUp();
36 void tearDown();
37
38 std::string aliceId;
39 std::string bobId;
40
41private:
42 void trustStoreTest();
43 void getCertificateWithSplitted();
44
45 CPPUNIT_TEST_SUITE(CertStoreTest);
46 CPPUNIT_TEST(trustStoreTest);
47 CPPUNIT_TEST(getCertificateWithSplitted);
48 CPPUNIT_TEST_SUITE_END();
49};
50
51CPPUNIT_TEST_SUITE_NAMED_REGISTRATION(CertStoreTest, CertStoreTest::name());
52
53void
54CertStoreTest::setUp()
55{
56 /*auto actors = load_actors_and_wait_for_announcement("actors/alice-bob.yml");
57 aliceId = actors["alice"];
58 bobId = actors["bob"];*/
59}
60
61void
62CertStoreTest::tearDown()
63{
64 //wait_for_removal_of({aliceId, bobId});
65}
66
67void
68CertStoreTest::trustStoreTest()
69{
70 //auto aliceAccount = Manager::instance().getAccount<JamiAccount>(aliceId);
71
72 auto ca = dht::crypto::generateIdentity("test CA");
73 auto account = dht::crypto::generateIdentity("test account", ca, 4096, true);
74 auto device = dht::crypto::generateIdentity("test device", account);
75 auto device2 = dht::crypto::generateIdentity("test device 2", account);
76 /*auto storeSize = aliceAccount->certStore().getPinnedCertificates().size();
77 auto id = ca.second->getId().toString();
78 auto pinned = aliceAccount->certStore().getPinnedCertificates();
79 CPPUNIT_ASSERT(std::find_if(pinned.begin(), pinned.end(), [&](auto v) { return v == id; })
80 == pinned.end());
81
82 // Test certificate status
83 auto certAllowed = aliceAccount->accountManager()->getCertificatesByStatus(
Adrien Béraud1ae60aa2023-07-07 09:55:09 -040084 dhtnet::tls::TrustStore::PermissionStatus::ALLOWED);
Adrien Béraudefe27372023-05-27 18:56:29 -040085 CPPUNIT_ASSERT(
86 std::find_if(certAllowed.begin(), certAllowed.end(), [&](auto v) { return v == id; })
87 == certAllowed.end());
88 CPPUNIT_ASSERT(aliceAccount->accountManager()->getCertificateStatus(id)
Adrien Béraud1ae60aa2023-07-07 09:55:09 -040089 == dhtnet::tls::TrustStore::PermissionStatus::UNDEFINED);
90 aliceAccount->setCertificateStatus(ca.second, dhtnet::tls::TrustStore::PermissionStatus::ALLOWED);
Adrien Béraudefe27372023-05-27 18:56:29 -040091 certAllowed = aliceAccount->accountManager()->getCertificatesByStatus(
Adrien Béraud1ae60aa2023-07-07 09:55:09 -040092 dhtnet::tls::TrustStore::PermissionStatus::ALLOWED);
Adrien Béraudefe27372023-05-27 18:56:29 -040093 CPPUNIT_ASSERT(
94 std::find_if(certAllowed.begin(), certAllowed.end(), [&](auto v) { return v == id; })
95 != certAllowed.end());
96 CPPUNIT_ASSERT(aliceAccount->accountManager()->getCertificateStatus(id)
Adrien Béraud1ae60aa2023-07-07 09:55:09 -040097 == dhtnet::tls::TrustStore::PermissionStatus::ALLOWED);
98 aliceAccount->setCertificateStatus(ca.second, dhtnet::tls::TrustStore::PermissionStatus::UNDEFINED);
Adrien Béraudefe27372023-05-27 18:56:29 -040099 CPPUNIT_ASSERT(aliceAccount->accountManager()->getCertificateStatus(id)
Adrien Béraud1ae60aa2023-07-07 09:55:09 -0400100 == dhtnet::tls::TrustStore::PermissionStatus::UNDEFINED);
101 aliceAccount->setCertificateStatus(ca.second, dhtnet::tls::TrustStore::PermissionStatus::ALLOWED);
Adrien Béraudefe27372023-05-27 18:56:29 -0400102 CPPUNIT_ASSERT(aliceAccount->accountManager()->getCertificateStatus(id)
Adrien Béraud1ae60aa2023-07-07 09:55:09 -0400103 == dhtnet::tls::TrustStore::PermissionStatus::ALLOWED);
Adrien Béraudefe27372023-05-27 18:56:29 -0400104
105 // Test getPinnedCertificates
106 pinned = aliceAccount->certStore().getPinnedCertificates();
107 CPPUNIT_ASSERT(pinned.size() == storeSize + 2);
108 CPPUNIT_ASSERT(std::find_if(pinned.begin(), pinned.end(), [&](auto v) { return v == id; })
109 != pinned.end());
110
111 // Test findCertificateByUID & findIssuer
112 CPPUNIT_ASSERT(!aliceAccount->certStore().findCertificateByUID("NON_EXISTING_ID"));
113 auto cert = aliceAccount->certStore().findCertificateByUID(id);
114 CPPUNIT_ASSERT(cert);
115 auto issuer = aliceAccount->certStore().findIssuer(cert);
116 CPPUNIT_ASSERT(issuer);
117 CPPUNIT_ASSERT(issuer->getId().toString() == id);
118
119 // Test is allowed
120 CPPUNIT_ASSERT(aliceAccount->accountManager()->isAllowed(*ca.second));
121 CPPUNIT_ASSERT(aliceAccount->accountManager()->isAllowed(*account.second));
122 CPPUNIT_ASSERT(aliceAccount->accountManager()->isAllowed(*device.second));
123
124 // Ban device
Adrien Béraud1ae60aa2023-07-07 09:55:09 -0400125 aliceAccount->setCertificateStatus(device.second, dhtnet::tls::TrustStore::PermissionStatus::BANNED);
Adrien Béraudefe27372023-05-27 18:56:29 -0400126 CPPUNIT_ASSERT(aliceAccount->accountManager()->getCertificateStatus(device.second->getId().toString())
Adrien Béraud1ae60aa2023-07-07 09:55:09 -0400127 == dhtnet::tls::TrustStore::PermissionStatus::BANNED);
Adrien Béraudefe27372023-05-27 18:56:29 -0400128 CPPUNIT_ASSERT(aliceAccount->accountManager()->getCertificateStatus(id)
Adrien Béraud1ae60aa2023-07-07 09:55:09 -0400129 == dhtnet::tls::TrustStore::PermissionStatus::ALLOWED);
Adrien Béraudefe27372023-05-27 18:56:29 -0400130
131 CPPUNIT_ASSERT(aliceAccount->accountManager()->isAllowed(*ca.second));
132 CPPUNIT_ASSERT(aliceAccount->accountManager()->isAllowed(*account.second));
133 CPPUNIT_ASSERT(not aliceAccount->accountManager()->isAllowed(*device.second));
134
135 // Ban account
Adrien Béraud1ae60aa2023-07-07 09:55:09 -0400136 aliceAccount->setCertificateStatus(account.second, dhtnet::tls::TrustStore::PermissionStatus::BANNED);
Adrien Béraudefe27372023-05-27 18:56:29 -0400137 CPPUNIT_ASSERT(aliceAccount->accountManager()->getCertificateStatus(account.second->getId().toString())
Adrien Béraud1ae60aa2023-07-07 09:55:09 -0400138 == dhtnet::tls::TrustStore::PermissionStatus::BANNED);
Adrien Béraudefe27372023-05-27 18:56:29 -0400139 CPPUNIT_ASSERT(aliceAccount->accountManager()->isAllowed(*ca.second));
140 CPPUNIT_ASSERT(not aliceAccount->accountManager()->isAllowed(*account.second));
141 CPPUNIT_ASSERT(not aliceAccount->accountManager()->isAllowed(*device2.second));
142
143 // Unban account
144 aliceAccount->setCertificateStatus(account.second,
Adrien Béraud1ae60aa2023-07-07 09:55:09 -0400145 dhtnet::tls::TrustStore::PermissionStatus::ALLOWED);
Adrien Béraudefe27372023-05-27 18:56:29 -0400146 CPPUNIT_ASSERT(aliceAccount->accountManager()->getCertificateStatus(account.second->getId().toString())
Adrien Béraud1ae60aa2023-07-07 09:55:09 -0400147 == dhtnet::tls::TrustStore::PermissionStatus::ALLOWED);
Adrien Béraudefe27372023-05-27 18:56:29 -0400148 CPPUNIT_ASSERT(aliceAccount->accountManager()->isAllowed(*ca.second));
149 CPPUNIT_ASSERT(aliceAccount->accountManager()->isAllowed(*account.second));
150 CPPUNIT_ASSERT(aliceAccount->accountManager()->isAllowed(*device2.second));
151
152 // Ban CA
Adrien Béraud1ae60aa2023-07-07 09:55:09 -0400153 aliceAccount->setCertificateStatus(ca.second, dhtnet::tls::TrustStore::PermissionStatus::BANNED);
Adrien Béraudefe27372023-05-27 18:56:29 -0400154 CPPUNIT_ASSERT(aliceAccount->accountManager()->getCertificateStatus(ca.second->getId().toString())
Adrien Béraud1ae60aa2023-07-07 09:55:09 -0400155 == dhtnet::tls::TrustStore::PermissionStatus::BANNED);
Adrien Béraudefe27372023-05-27 18:56:29 -0400156 CPPUNIT_ASSERT(not aliceAccount->accountManager()->isAllowed(*ca.second));
157 CPPUNIT_ASSERT(not aliceAccount->accountManager()->isAllowed(*account.second));
158 CPPUNIT_ASSERT(not aliceAccount->accountManager()->isAllowed(*device2.second));
159
Adrien Béraud1ae60aa2023-07-07 09:55:09 -0400160 aliceAccount->setCertificateStatus(ca.second, dhtnet::tls::TrustStore::PermissionStatus::BANNED);
Adrien Béraudefe27372023-05-27 18:56:29 -0400161 CPPUNIT_ASSERT(aliceAccount->accountManager()->getCertificateStatus(ca.second->getId().toString())
Adrien Béraud1ae60aa2023-07-07 09:55:09 -0400162 == dhtnet::tls::TrustStore::PermissionStatus::BANNED);
Adrien Béraudefe27372023-05-27 18:56:29 -0400163
164 // Test unpin
165 aliceAccount->certStore().unpinCertificate(id);
166 pinned = aliceAccount->certStore().getPinnedCertificates();
167 CPPUNIT_ASSERT(std::find_if(pinned.begin(), pinned.end(), [&](auto v) { return v == id; })
168 == pinned.end());
169
170 // Test statusToStr
Adrien Béraud1ae60aa2023-07-07 09:55:09 -0400171 CPPUNIT_ASSERT(strcmp(dhtnet::tls::statusToStr(dhtnet::tls::TrustStatus::TRUSTED),
172 libdhtnet::Certificate::TrustStatus::TRUSTED)
Adrien Béraudefe27372023-05-27 18:56:29 -0400173 == 0);
Adrien Béraud1ae60aa2023-07-07 09:55:09 -0400174 CPPUNIT_ASSERT(strcmp(dhtnet::tls::statusToStr(dhtnet::tls::TrustStatus::UNTRUSTED),
175 libdhtnet::Certificate::TrustStatus::UNTRUSTED)
Adrien Béraudefe27372023-05-27 18:56:29 -0400176 == 0);*/
177}
178
179void
180CertStoreTest::getCertificateWithSplitted()
181{
182 //auto aliceAccount = Manager::instance().getAccount<JamiAccount>(aliceId);
183 auto ca = dht::crypto::generateIdentity("test CA");
184 auto account = dht::crypto::generateIdentity("test account", ca, 4096, true);
185 auto device = dht::crypto::generateIdentity("test device", account);
186
187 auto caCert = std::make_shared<dht::crypto::Certificate>(ca.second->toString(false));
188 auto accountCert = std::make_shared<dht::crypto::Certificate>(account.second->toString(false));
189 auto devicePartialCert = std::make_shared<dht::crypto::Certificate>(
190 device.second->toString(false));
191
192 /*aliceAccount->certStore().pinCertificate(caCert);
193 aliceAccount->certStore().pinCertificate(accountCert);
194 aliceAccount->certStore().pinCertificate(devicePartialCert);
195
196 auto fullCert = aliceAccount->certStore().getCertificate(device.second->getId().toString());
197 CPPUNIT_ASSERT(fullCert->issuer && fullCert->issuer->getUID() == accountCert->getUID());
198 CPPUNIT_ASSERT(fullCert->issuer->issuer
199 && fullCert->issuer->issuer->getUID() == caCert->getUID());*/
200}
201
202} // namespace test
Sébastien Blin464bdff2023-07-19 08:02:53 -0400203} // namespace dhtnet
Adrien Béraudefe27372023-05-27 18:56:29 -0400204
Adrien Béraud1ae60aa2023-07-07 09:55:09 -0400205JAMI_TEST_RUNNER(dhtnet::test::CertStoreTest::name());