]> git.saurik.com Git - apple/security.git/blob - OSX/sec/securityd/Regressions/secd-100-initialsync.m
Security-59306.11.20.tar.gz
[apple/security.git] / OSX / sec / securityd / Regressions / secd-100-initialsync.m
1 //
2 // secd-100-initialsync.c
3 // sec
4 //
5
6
7 /*
8 * Copyright (c) 2014 Apple Inc. All Rights Reserved.
9 *
10 * @APPLE_LICENSE_HEADER_START@
11 *
12 * This file contains Original Code and/or Modifications of Original Code
13 * as defined in and that are subject to the Apple Public Source License
14 * Version 2.0 (the 'License'). You may not use this file except in
15 * compliance with the License. Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this
17 * file.
18 *
19 * The Original Code and all software distributed under the License are
20 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
21 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
22 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
23 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
24 * Please see the License for the specific language governing rights and
25 * limitations under the License.
26 *
27 * @APPLE_LICENSE_HEADER_END@
28 */
29
30
31 #include <Security/SecBase.h>
32 #include <Security/SecItem.h>
33
34 #include <CoreFoundation/CFDictionary.h>
35
36 #include "keychain/SecureObjectSync/SOSAccount.h"
37 #include <Security/SecureObjectSync/SOSCloudCircle.h>
38 #include "keychain/SecureObjectSync/SOSInternal.h"
39 #include "keychain/SecureObjectSync/SOSUserKeygen.h"
40 #include "keychain/SecureObjectSync/SOSTransport.h"
41
42 #include <stdlib.h>
43 #include <unistd.h>
44
45 #include "secd_regressions.h"
46 #include <utilities/SecCFWrappers.h>
47 #include <Security/SecKeyPriv.h>
48
49 #include <securityd/SOSCloudCircleServer.h>
50
51 #include "SOSAccountTesting.h"
52
53 #include "SecdTestKeychainUtilities.h"
54
55 static void tests(void)
56 {
57
58 CFErrorRef error = NULL;
59 CFDataRef cfpassword = CFDataCreate(NULL, (uint8_t *) "FooFooFoo", 10);
60 CFStringRef cfaccount = CFSTR("test@test.org");
61 CFSetRef initialSyncViews = SOSViewCopyViewSet(kViewSetInitial);
62 CFMutableSetRef alwaysOnViews = SOSViewCopyViewSet(kViewSetAlwaysOn);
63 CFSetRef defaultViews = SOSViewCopyViewSet(kViewSetDefault);
64 int initialSyncViewCount = (int) CFSetGetCount(initialSyncViews);
65 CFReleaseNull(initialSyncViews);
66 CFSetRef backupSyncViews = SOSViewCopyViewSet(kViewSetRequiredForBackup);
67 int backupSyncViewCount = (int) CFSetGetCount(backupSyncViews);
68 CFReleaseNull(backupSyncViews);
69 int expectedStartupViewCount;
70
71 if(initialSyncViewCount == 0) {
72 CFSetUnion(alwaysOnViews, defaultViews);
73 expectedStartupViewCount = (int) CFSetGetCount(alwaysOnViews);
74 } else {
75 CFMutableSetRef isViews = CFSetCreateMutableCopy(kCFAllocatorDefault, 0, initialSyncViews);
76 CFSetUnion(isViews, backupSyncViews);
77 expectedStartupViewCount = (int) CFSetGetCount(isViews);
78 CFReleaseNull(isViews);
79 }
80 CFReleaseNull(alwaysOnViews);
81 CFReleaseNull(defaultViews);
82
83
84
85 CFMutableDictionaryRef changes = CFDictionaryCreateMutableForCFTypes(kCFAllocatorDefault);
86
87 SOSDataSourceFactoryRef test_factory = SOSTestDataSourceFactoryCreate();
88 SOSDataSourceRef test_source = SOSTestDataSourceCreate();
89 SOSTestDataSourceFactorySetDataSource(test_factory, CFSTR("TestType"), test_source);
90
91 SOSAccount* alice_account = CreateAccountForLocalChanges(CFSTR("AliceAccount"),CFSTR("TestType") );
92 SOSAccount* bob_account = CreateAccountForLocalChanges(CFSTR("BobAccount"),CFSTR("TestType") );
93
94 ok(SOSAccountAssertUserCredentialsAndUpdate(alice_account, cfaccount, cfpassword, &error), "Credential setting (%@)", error);
95
96 ok(SOSAccountJoinCircles_wTxn(alice_account, &error), "Join circle: %@", error);
97 ok(SOSAccountCheckHasBeenInSync_wTxn(alice_account), "Alice account initial sync done");
98
99 ok(SOSAccountAssertUserCredentialsAndUpdate(bob_account, cfaccount, cfpassword, &error), "Credential setting (%@)", error);
100 CFReleaseNull(error);
101 CFReleaseNull(cfpassword);
102
103 is(ProcessChangesUntilNoChange(changes, alice_account, bob_account, NULL), 1, "updates");
104
105 ok(SOSAccountJoinCircles_wTxn(bob_account, &error), "Bob Applies (%@)", error);
106 CFReleaseNull(error);
107
108 is(ProcessChangesUntilNoChange(changes, alice_account, bob_account, NULL), 4, "updates");
109
110 {
111 CFArrayRef applicants = SOSAccountCopyApplicants(alice_account, &error);
112
113 ok(applicants && CFArrayGetCount(applicants) == 1, "See one applicant %@ (%@)", applicants, error);
114 ok(SOSAccountAcceptApplicants(alice_account, applicants, &error), "Alice accepts (%@)", error);
115 CFReleaseNull(error);
116 CFReleaseNull(applicants);
117 }
118
119
120 is(ProcessChangesUntilNoChange(changes, alice_account, bob_account, NULL), 3, "updates");
121
122 accounts_agree("bob&alice pair", bob_account, alice_account);
123
124 if(initialSyncViewCount > 0) {
125 ok(!SOSAccountCheckHasBeenInSync_wTxn(bob_account), "Bob should not be initially synced");
126 }
127 CFSetRef bob_viewSet = SOSPeerInfoCopyEnabledViews(bob_account.peerInfo);
128 is(CFSetGetCount(bob_viewSet), expectedStartupViewCount, "bob's initial view set should be just the initial sync and backup views");
129 CFReleaseNull(bob_viewSet);
130
131 if(initialSyncViewCount > 0) {
132 ok(!SOSAccountCheckHasBeenInSync_wTxn(bob_account), "Bob should not be initially synced");
133 }
134
135 SOSAccountPeerGotInSync_wTxn(bob_account, alice_account.peerInfo);
136
137 if(initialSyncViewCount > 0) {
138 bob_viewSet = SOSPeerInfoCopyEnabledViews(bob_account.peerInfo);
139 is(CFSetGetCount(bob_viewSet), backupSyncViewCount, "bob's initial view set should be just the back up");
140 CFReleaseNull(bob_viewSet);
141 } else {
142 ok(true, "don't mess with the total test count");
143 }
144 bob_account = nil;
145 alice_account = nil;
146
147 SOSDataSourceFactoryRelease(test_factory);
148
149 SOSTestCleanup();
150 }
151
152 int secd_100_initialsync(int argc, char *const *argv)
153 {
154 plan_tests(33);
155
156 secd_test_setup_temp_keychain(__FUNCTION__, NULL);
157
158 tests();
159
160 return 0;
161 }