diff options
Diffstat (limited to 'test/network_tests/malicious_data_tests/malicious_data_test_service.cpp')
-rw-r--r-- | test/network_tests/malicious_data_tests/malicious_data_test_service.cpp | 185 |
1 files changed, 185 insertions, 0 deletions
diff --git a/test/network_tests/malicious_data_tests/malicious_data_test_service.cpp b/test/network_tests/malicious_data_tests/malicious_data_test_service.cpp new file mode 100644 index 0000000..0227acb --- /dev/null +++ b/test/network_tests/malicious_data_tests/malicious_data_test_service.cpp @@ -0,0 +1,185 @@ +// Copyright (C) 2014-2017 Bayerische Motoren Werke Aktiengesellschaft (BMW AG) +// This Source Code Form is subject to the terms of the Mozilla Public +// License, v. 2.0. If a copy of the MPL was not distributed with this +// file, You can obtain one at http://mozilla.org/MPL/2.0/. + +#include <chrono> +#include <condition_variable> +#include <iomanip> +#include <iostream> +#include <sstream> +#include <thread> +#include <map> +#include <algorithm> +#include <atomic> +#include <future> + +#include <gtest/gtest.h> + +#include <vsomeip/vsomeip.hpp> +#include <vsomeip/internal/logger.hpp> + +#include "malicious_data_test_globals.hpp" + +class malicious_data_test_service { +public: + malicious_data_test_service(struct malicious_data_test::service_info _service_info, malicious_data_test::test_mode_e _testmode) : + service_info_(_service_info), + testmode_(_testmode), + app_(vsomeip::runtime::get()->create_application("malicious_data_test_service")), + wait_until_registered_(true), + wait_until_shutdown_method_called_(true), + received_events_(0), + received_methodcalls_(0), + offer_thread_(std::bind(&malicious_data_test_service::run, this)) { + if (!app_->init()) { + ADD_FAILURE() << "Couldn't initialize application"; + return; + } + app_->register_state_handler( + std::bind(&malicious_data_test_service::on_state, this, + std::placeholders::_1)); + + std::set<vsomeip::eventgroup_t> its_eventgroups; + its_eventgroups.insert(_service_info.eventgroup_id); + app_->request_event(service_info_.service_id, service_info_.instance_id, + service_info_.event_id, its_eventgroups, vsomeip::event_type_e::ET_EVENT, + vsomeip::reliability_type_e::RT_UNKNOWN); + app_->register_message_handler(vsomeip::ANY_SERVICE, + vsomeip::ANY_INSTANCE, service_info_.shutdown_method_id, + std::bind(&malicious_data_test_service::on_shutdown_method_called, this, + std::placeholders::_1)); + app_->register_message_handler(service_info_.service_id, + service_info_.instance_id, service_info_.event_id, + std::bind(&malicious_data_test_service::on_event, this, + std::placeholders::_1)); + + app_->register_message_handler(static_cast<vsomeip::service_t>(service_info_.service_id + 1u), + service_info_.instance_id, 0x1, + std::bind(&malicious_data_test_service::on_message, this, + std::placeholders::_1)); + + // request service of client + app_->request_service(service_info_.service_id, service_info_.instance_id); + app_->subscribe(service_info_.service_id, service_info_.instance_id, + service_info_.eventgroup_id, 0, + service_info_.event_id); + + app_->start(); + } + + ~malicious_data_test_service() { + if (testmode_ == malicious_data_test::test_mode_e::MALICIOUS_EVENTS) { + EXPECT_EQ(9u, received_events_); + EXPECT_EQ(9u, received_methodcalls_); + } + offer_thread_.join(); + } + + void offer() { + app_->offer_service(static_cast<vsomeip::service_t>(service_info_.service_id + 1u), 0x1); + } + + void stop() { + app_->stop_offer_service(static_cast<vsomeip::service_t>(service_info_.service_id + 1u), 0x1); + app_->clear_all_handler(); + app_->stop(); + } + + void on_state(vsomeip::state_type_e _state) { + VSOMEIP_INFO << "Application " << app_->get_name() << " is " + << (_state == vsomeip::state_type_e::ST_REGISTERED ? + "registered." : "deregistered."); + + if (_state == vsomeip::state_type_e::ST_REGISTERED) { + std::lock_guard<std::mutex> its_lock(mutex_); + wait_until_registered_ = false; + condition_.notify_one(); + } + } + + void on_shutdown_method_called(const std::shared_ptr<vsomeip::message> &_message) { + app_->send(vsomeip::runtime::get()->create_response(_message)); + VSOMEIP_WARNING << "************************************************************"; + VSOMEIP_WARNING << "Shutdown method called -> going down!"; + VSOMEIP_WARNING << "************************************************************"; + std::lock_guard<std::mutex> its_lock(mutex_); + wait_until_shutdown_method_called_ = false; + condition_.notify_one(); + } + + void on_event(const std::shared_ptr<vsomeip::message> &_message) { + EXPECT_EQ(service_info_.service_id, _message->get_service()); + EXPECT_EQ(service_info_.instance_id, _message->get_instance()); + EXPECT_EQ(service_info_.event_id, _message->get_method()); + EXPECT_EQ(std::uint32_t(0x7F), _message->get_length()); + received_events_++; + } + + void on_message(const std::shared_ptr<vsomeip::message> &_message) { + EXPECT_EQ(static_cast<vsomeip::service_t>(service_info_.service_id + 1u), _message->get_service()); + EXPECT_EQ(service_info_.instance_id, _message->get_instance()); + EXPECT_EQ(vsomeip::method_t(0x1), _message->get_method()); + EXPECT_EQ(std::uint32_t(0x7F), _message->get_length()); + received_methodcalls_++; + } + + void run() { + VSOMEIP_DEBUG << "[" << std::setw(4) << std::setfill('0') << std::hex + << service_info_.service_id << "] Running"; + std::unique_lock<std::mutex> its_lock(mutex_); + while (wait_until_registered_) { + condition_.wait(its_lock); + } + + VSOMEIP_DEBUG << "[" << std::setw(4) << std::setfill('0') << std::hex + << service_info_.service_id << "] Offering"; + offer(); + + while (wait_until_shutdown_method_called_) { + condition_.wait(its_lock); + } + stop(); + } + +private: + struct malicious_data_test::service_info service_info_; + malicious_data_test::test_mode_e testmode_; + std::shared_ptr<vsomeip::application> app_; + + bool wait_until_registered_; + bool wait_until_shutdown_method_called_; + std::uint32_t received_events_; + std::uint32_t received_methodcalls_; + std::mutex mutex_; + std::condition_variable condition_; + std::thread offer_thread_; +}; + +malicious_data_test::test_mode_e its_testmode(malicious_data_test::test_mode_e::MALICIOUS_EVENTS); + +TEST(someip_malicious_data_test, block_subscription_handler) +{ + malicious_data_test_service its_sample(malicious_data_test::service, its_testmode); +} + + +#if defined(__linux__) || defined(ANDROID) +int main(int argc, char** argv) +{ + ::testing::InitGoogleTest(&argc, argv); + std::string its_passed_testmode = argv[1]; + if (its_passed_testmode == std::string("MALICIOUS_EVENTS")) { + its_testmode = malicious_data_test::test_mode_e::MALICIOUS_EVENTS; + } else if (its_passed_testmode == std::string("PROTOCOL_VERSION")) { + its_testmode = malicious_data_test::test_mode_e::PROTOCOL_VERSION; + } else if (its_passed_testmode == std::string("MESSAGE_TYPE")) { + its_testmode = malicious_data_test::test_mode_e::MESSAGE_TYPE; + } else if (its_passed_testmode == std::string("RETURN_CODE")) { + its_testmode = malicious_data_test::test_mode_e::RETURN_CODE; + } else if (its_passed_testmode == std::string("WRONG_HEADER_FIELDS_UDP")) { + its_testmode = malicious_data_test::test_mode_e::WRONG_HEADER_FIELDS_UDP; + } + return RUN_ALL_TESTS(); +} +#endif |