summaryrefslogtreecommitdiff
path: root/test/unit_tests/security_tests/ut_remove_security_policy.cpp
blob: b3d677018af9d7828c910765e0184387605f210e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
// Copyright (C) 2022 Bayerische Motoren Werke Aktiengesellschaft (BMW AG)
// This Source Code Form is subject to the terms of the Mozilla Public
// License, v. 2.0. If a copy of the MPL was not distributed with this
// file, You can obtain one at http://mozilla.org/MPL/2.0/.

#include <gtest/gtest.h>

#include "../../common/utility.hpp"

namespace {
vsomeip_v3::uid_t invalid_uid = 1;
vsomeip_v3::uid_t valid_uid = 4002200;
vsomeip_v3::gid_t invalid_gid = 1;
vsomeip_v3::gid_t valid_gid = 4003014;
}

TEST(remove_security_policy_test, check_no_policies_loaded)
{
    std::unique_ptr<vsomeip_v3::policy_manager_impl> security(new vsomeip_v3::policy_manager_impl);

    // no policies loaded -> remove_security_policy will return true independent of the uid or gid
    EXPECT_FALSE(security->remove_security_policy(valid_uid, valid_gid));
    EXPECT_FALSE(security->remove_security_policy(invalid_uid, valid_gid));
    EXPECT_FALSE(security->remove_security_policy(valid_uid, invalid_gid));
    EXPECT_FALSE(security->remove_security_policy(invalid_uid, invalid_gid));
}

TEST(remove_security_policy_test, check_policies_loaded)
{
    std::unique_ptr<vsomeip_v3::policy_manager_impl> security(new vsomeip_v3::policy_manager_impl);

    // force load of some policies
    std::set<std::string> its_failed;
    std::vector<vsomeip_v3::configuration_element> policy_elements;
    std::vector<std::string> dir_skip;
    utility::read_data(utility::get_all_files_in_dir(utility::get_policies_path(), dir_skip),
                       policy_elements, its_failed);

    for (const auto &e : policy_elements)
        security->load(e, false);

    // check if the load worked
    ASSERT_TRUE(policy_elements.size() > 0);
    ASSERT_TRUE(its_failed.size() == 0);

    // the check_credentials_ and the policy_enabled_ variables should be set to true
    ASSERT_FALSE(security->is_audit());
    ASSERT_TRUE(security->is_enabled());

    // invalid uid and gid -> remove_security_policy must return false
    EXPECT_FALSE(security->remove_security_policy(invalid_uid, invalid_gid));

    // invalid uid and valid gid -> remove_security_policy must return false
    EXPECT_FALSE(security->remove_security_policy(invalid_uid, valid_gid));

    // valid uid and invalid gid -> remove_security_policy must return false
    EXPECT_FALSE(security->remove_security_policy(valid_uid, invalid_gid));

    // valid uid and gid -> remove_security_policy must return true
    EXPECT_TRUE(security->remove_security_policy(valid_uid, valid_gid));
}