/* * Copyright(c) 2006 to 2020 ADLINK Technology Limited and others * * This program and the accompanying materials are made available under the * terms of the Eclipse Public License v. 2.0 which is available at * http://www.eclipse.org/legal/epl-2.0, or the Eclipse Distribution License * v. 1.0 which is available at * http://www.eclipse.org/org/documents/edl-v10.php. * * SPDX-License-Identifier: EPL-2.0 OR BSD-3-Clause */ #include #include #include "dds/dds.h" #include "CUnit/Test.h" #include "CUnit/Theory.h" #include "dds/version.h" #include "dds/ddsrt/cdtors.h" #include "dds/ddsrt/environ.h" #include "dds/ddsrt/process.h" #include "dds/ddsrt/heap.h" #include "dds/ddsrt/string.h" #include "dds/ddsi/q_config.h" #include "dds/ddsi/ddsi_domaingv.h" #include "dds/ddsi/q_misc.h" #include "dds/ddsi/ddsi_xqos.h" #include "dds/security/dds_security_api.h" #include "common/config_env.h" #include "common/access_control_wrapper.h" #include "common/security_config_test_utils.h" #include "common/test_identity.h" static const char *config = "${CYCLONEDDS_URI}${CYCLONEDDS_URI:+,}" "" " " " 0" " \\${CYCLONEDDS_PID}" " " " " " " " " " data:," TEST_IDENTITY1_CERTIFICATE "" " data:," TEST_IDENTITY1_PRIVATE_KEY "" " data:," TEST_IDENTITY_CA1_CERTIFICATE "" " " " " " " " ${INCL_GOV:+}${TEST_GOVERNANCE}${INCL_GOV:+}" " ${INCL_PERM_CA:+}${TEST_PERMISSIONS_CA}${INCL_PERM_CA:+}" " ${INCL_PERM:+}${TEST_PERMISSIONS}${INCL_PERM:+}" " " " " " " " " " " ""; #define DDS_DOMAINID1 0 #define DDS_DOMAINID2 1 static dds_entity_t g_domain1 = 0; static dds_entity_t g_participant1 = 0; static dds_entity_t g_domain2 = 0; static dds_entity_t g_participant2 = 0; static void access_control_init(bool incl_gov, const char * gov, bool incl_perm, const char * perm, bool incl_ca, const char * ca, bool exp_pp_fail) { struct kvp config_vars[] = { { "INCL_GOV", incl_gov ? "1" : "", 2 }, { "INCL_PERM", incl_perm ? "1" : "", 2 }, { "INCL_PERM_CA", incl_ca ? "1" : "", 2 }, { "TEST_GOVERNANCE", gov, 1 }, { "TEST_PERMISSIONS", perm, 1 }, { "TEST_PERMISSIONS_CA", ca, 1 }, { NULL, NULL, 0 } }; char *conf = ddsrt_expand_vars_sh (config, &expand_lookup_vars_env, config_vars); CU_ASSERT_EQUAL_FATAL (expand_lookup_unmatched (config_vars), 0); g_domain1 = dds_create_domain (DDS_DOMAINID1, conf); g_domain2 = dds_create_domain (DDS_DOMAINID2, conf); dds_free (conf); g_participant1 = dds_create_participant (DDS_DOMAINID1, NULL, NULL); g_participant2 = dds_create_participant (DDS_DOMAINID2, NULL, NULL); CU_ASSERT_EQUAL_FATAL (exp_pp_fail, g_participant1 <= 0); CU_ASSERT_EQUAL_FATAL (exp_pp_fail, g_participant2 <= 0); } static void access_control_fini(bool delete_pp) { if (delete_pp) { CU_ASSERT_EQUAL_FATAL (dds_delete (g_participant1), DDS_RETCODE_OK); CU_ASSERT_EQUAL_FATAL (dds_delete (g_participant2), DDS_RETCODE_OK); } CU_ASSERT_EQUAL_FATAL (dds_delete (g_domain1), DDS_RETCODE_OK); CU_ASSERT_EQUAL_FATAL (dds_delete (g_domain2), DDS_RETCODE_OK); } #define PF_F "file:" #define PF_D "data:," #define GOV_F PF_F COMMON_ETC_PATH("default_governance.p7s") #define GOV_FNE PF_F COMMON_ETC_PATH("default_governance_non_existing.p7s") #define GOV_DI PF_D COMMON_ETC_PATH("default_governance.p7s") #define PERM_F PF_F COMMON_ETC_PATH("default_permissions.p7s") #define PERM_FNE PF_F COMMON_ETC_PATH("default_permissions_non_existing.p7s") #define PERM_DI PF_D COMMON_ETC_PATH("default_permissions.p7s") #define CA_F PF_F COMMON_ETC_PATH("default_permissions_ca.pem") #define CA_FNE PF_F COMMON_ETC_PATH("default_permissions_ca_non_existing.pem") #define CA_DI PF_D COMMON_ETC_PATH("default_permissions_ca.pem") #define CA_D PF_D TEST_PERMISSIONS_CA_CERTIFICATE CU_TheoryDataPoints(ddssec_access_control, config_parameters_file) = { CU_DataPoints(const char *, /* */"existing files", /* | */"non-existing files", /* | | */"non-existing governance file", /* | | | */"non-existing permissions file", /* | | | | */"non-existing permissions ca file", /* | | | | | */"empty governance", /* | | | | | | */"empty permissions", /* | | | | | | | */"empty permissions ca", /* | | | | | | | | */"all empty", /* | | | | | | | | | */"invalid governance uri type", /* | | | | | | | | | | */"permissions ca type data", /* | | | | | | | | | | | */"no governance element", /* | | | | | | | | | | | | */"no permissions element", /* | | | | | | | | | | | | | */"no permissions ca element"), CU_DataPoints(const char *, GOV_F, GOV_FNE, GOV_FNE, GOV_F, GOV_F, "", GOV_F, GOV_F, "", GOV_DI, GOV_F, "", GOV_F, GOV_F), // Governance config CU_DataPoints(const char *, PERM_F, PERM_FNE, PERM_F, PERM_FNE, PERM_F, PERM_F, "", PERM_F, "", PERM_F, PERM_F, PERM_F, "", PERM_F), // Permissions config CU_DataPoints(const char *, CA_F, CA_FNE, CA_F, CA_F, CA_FNE, CA_F, CA_F, "", "", CA_F, CA_D, CA_F, CA_F, ""), // Permissions CA CU_DataPoints(bool, true, true, true, true, true, true, true, true, true, true, true, false, false, false), // include empty config elements CU_DataPoints(bool, false, true, true, true, true, true, true, true, false, true, false, true, true, true) // expect failure }; CU_Theory((const char * test_descr, const char * gov, const char * perm, const char * ca, bool incl_empty_els, bool exp_fail), ddssec_access_control, config_parameters_file) { printf("running test config_parameters_file: %s\n", test_descr); access_control_init (incl_empty_els || strlen (gov), gov, incl_empty_els || strlen (perm), perm, incl_empty_els || strlen (ca), ca, exp_fail); access_control_fini (!exp_fail); }