]> git.saurik.com Git - apple/security.git/blob - keychain/ckks/tests/CKKSLoggerTests.m
Security-58286.251.4.tar.gz
[apple/security.git] / keychain / ckks / tests / CKKSLoggerTests.m
1 /*
2 * Copyright (c) 2017 Apple Inc. All Rights Reserved.
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
11 * file.
12 *
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
20 *
21 * @APPLE_LICENSE_HEADER_END@
22 */
23
24 #if OCTAGON
25
26 #import "CKKSTests.h"
27 #import "keychain/ckks/CKKSAnalytics.h"
28 #import <Security/SFSQLite.h>
29 #import <Foundation/Foundation.h>
30 #import <CloudKit/CloudKit.h>
31 #import <CloudKit/CloudKit_Private.h>
32 #import <XCTest/XCTest.h>
33 #import <OCMock/OCMock.h>
34
35 static NSString* tablePath = nil;
36
37 @interface SQLiteTests : XCTestCase
38 @end
39
40 @implementation SQLiteTests
41
42 + (void)setUp
43 {
44 [super setUp];
45
46 tablePath = [NSTemporaryDirectory() stringByAppendingPathComponent:@"test_table.db"];
47 }
48
49 - (void)setUp
50 {
51 [super setUp];
52
53 [[NSFileManager defaultManager] removeItemAtPath:tablePath error:nil];
54 }
55
56 - (void)tearDown
57 {
58 [[NSFileManager defaultManager] removeItemAtPath:tablePath error:nil];
59
60 [super tearDown];
61 }
62
63 - (void)testCreateLoggingDatabase
64 {
65 NSString* schema = @"CREATE table test (test_column INTEGER);";
66 SFSQLite* sqlTable = [[SFSQLite alloc] initWithPath:tablePath schema:schema];
67 NSError* error = nil;
68 XCTAssertTrue([sqlTable openWithError:&error], @"failed to open sql database");
69 XCTAssertNil(error, "encountered error opening database: %@", error);
70 XCTAssertTrue([[NSFileManager defaultManager] fileExistsAtPath:tablePath]);
71 [sqlTable close];
72 }
73
74 - (void)testInsertAndDelete
75 {
76 NSString* schema = @"CREATE table test (test_column INTEGER);";
77 SFSQLite* sqlTable = [[SFSQLite alloc] initWithPath:tablePath schema:schema];
78 NSError* error = nil;
79 XCTAssertTrue([sqlTable openWithError:&error], @"failed to open sql database");
80 XCTAssertNil(error, "encountered error opening database: %@", error);
81
82 [sqlTable insertOrReplaceInto:@"test" values:@{@"test_column" : @(1)}];
83 [sqlTable insertOrReplaceInto:@"test" values:@{@"test_column" : @(2)}];
84 [sqlTable insertOrReplaceInto:@"test" values:@{@"test_column" : @(3)}];
85 XCTAssertTrue([[sqlTable selectAllFrom:@"test" where:nil bindings:nil] count] == 3);
86
87 [sqlTable deleteFrom:@"test" where:@"test_column = ?" bindings:@[@3]];
88 XCTAssertTrue([[sqlTable selectAllFrom:@"test" where:nil bindings:nil] count] == 2);
89
90 [sqlTable executeSQL:@"delete from test"];
91 XCTAssertTrue([[sqlTable selectAllFrom:@"test" where:nil bindings:nil] count] == 0);
92 }
93
94 - (void)testDontCrashWhenThereAreNoWritePermissions
95 {
96 NSString* schema = @"CREATE table test (test_column INTEGER);";
97 SFSQLite* sqlTable = [[SFSQLite alloc] initWithPath:tablePath schema:schema];
98
99 NSError* error = nil;
100 XCTAssertNoThrow([sqlTable openWithError:&error], @"opening database threw an exception");
101 XCTAssertNil(error, "encountered error opening database: %@", error);
102 XCTAssertNoThrow([sqlTable close], @"closing database threw an exception");
103
104 NSDictionary* originalAttributes = [[NSFileManager defaultManager] attributesOfItemAtPath:tablePath error:&error];
105 XCTAssertNil(error, @"encountered error getting database file attributes: %@", error);
106
107 [[NSFileManager defaultManager] setAttributes:@{NSFilePosixPermissions : @(400), NSFileImmutable : @(YES)} ofItemAtPath:tablePath error:&error];
108 XCTAssertNil(error, @"encountered error setting database file attributes: %@", error);
109 XCTAssertNoThrow([sqlTable openWithError:&error]);
110 XCTAssertNil(error, @"encounterd error when opening file without permissions: %@", error);
111
112 XCTAssertFalse([sqlTable executeSQL:@"insert or replace into test (test_column) VALUES (1)"],
113 @"writing to read-only database succeeded");
114
115 [[NSFileManager defaultManager] setAttributes:originalAttributes ofItemAtPath:tablePath error:&error];
116 XCTAssertNil(error, @"encountered error setting database file attributes back to original attributes: %@", error);
117 }
118
119 - (void)testDontCrashFromInternalErrors
120 {
121 NSString* schema = @"CREATE table test (test_column INTEGER);";
122 SFSQLite* sqlTable = [[SFSQLite alloc] initWithPath:tablePath schema:schema];
123
124 NSError* error = nil;
125 XCTAssertTrue([sqlTable openWithError:&error], @"failed to open database");
126 XCTAssertNil(error, "encountered error opening database: %@", error);
127
128 // delete the table to create havoc
129 XCTAssertTrue([sqlTable executeSQL:@"drop table test;"], @"deleting test table should have worked");
130
131 XCTAssertNoThrow([sqlTable insertOrReplaceInto:@"test" values:@{@"test_column" : @(1)}], @"inserting into deleted table threw an exception");
132 }
133
134 @end
135
136 @interface CKKSAnalyticsTests : CloudKitKeychainSyncingTestsBase
137 @property id mockCKKSAnalytics;
138 @end
139
140 @implementation CKKSAnalyticsTests
141
142 - (void)setUp
143 {
144 self.mockCKKSAnalytics = OCMClassMock([CKKSAnalytics class]);
145 OCMStub([self.mockCKKSAnalytics databasePath]).andCall(self, @selector(databasePath));
146 [super setUp];
147 }
148
149 - (void)tearDown
150 {
151 [self.mockCKKSAnalytics stopMocking];
152 self.mockCKKSAnalytics = nil;
153 [super tearDown];
154 }
155
156 - (NSString*)databasePath
157 {
158 return [NSTemporaryDirectory() stringByAppendingPathComponent:@"test_ckks_analytics_v2.db"];
159 }
160
161 - (void)testLastSuccessfulXDate
162 {
163 [self createAndSaveFakeKeyHierarchy: self.keychainZoneID]; // Make life easy for this test.
164 [self startCKKSSubsystem];
165 CKRecord* ckr = [self createFakeRecord: self.keychainZoneID recordName:@"7B598D31-F9C5-481E-98AC-5A507ACB2D85"];
166 [self.keychainZone addToZone: ckr];
167
168 // Trigger a notification (with hilariously fake data)
169 [self.keychainView notifyZoneChange:nil];
170
171 [[[self.keychainView waitForFetchAndIncomingQueueProcessing] completionHandlerDidRunCondition] wait:4 * NSEC_PER_SEC];
172
173 NSDate* nowDate = [NSDate date];
174 NSTimeInterval timeInterval;
175
176 /*
177 * Check last sync date for class A
178 */
179 NSDate* syncADate = [[CKKSAnalytics logger] dateOfLastSuccessForEvent:CKKSEventProcessIncomingQueueClassA inView:self.keychainView];
180 XCTAssertNotNil(syncADate, "Failed to get a last successful A sync date");
181 timeInterval = [nowDate timeIntervalSinceDate:syncADate];
182 XCTAssertTrue(timeInterval >= 0.0 && timeInterval <= 15.0, "Last sync date does not look like a reasonable one");
183
184 /*
185 * Check last sync date for class C
186 */
187 NSDate *syncCDate = [[CKKSAnalytics logger] dateOfLastSuccessForEvent:CKKSEventProcessIncomingQueueClassC inView:self.keychainView];
188 XCTAssertNotNil(syncCDate, "Failed to get a last successful C sync date");
189 timeInterval = [nowDate timeIntervalSinceDate:syncCDate];
190 XCTAssertTrue(timeInterval >= 0.0 && timeInterval <= 15.0, "Last sync date does not look like a reasonable one");
191
192 /*
193 * Check last unlock date
194 */
195 NSDate* unlockDate = [[CKKSAnalytics logger] datePropertyForKey:CKKSAnalyticsLastUnlock];
196 XCTAssertNotNil(unlockDate, "Failed to get a last unlock date");
197 timeInterval = [nowDate timeIntervalSinceDate:unlockDate];
198 NSLog(@"timeinterval: %f\n", timeInterval);
199 XCTAssertTrue(timeInterval >= 0.0 && timeInterval <= 15.0, "Last unlock date does not look like a reasonable one");
200
201 sleep(1); // wait to be a differnt second
202
203 self.aksLockState = true;
204 [self.lockStateTracker recheck];
205
206 NSDate* newUnlockDate = [[CKKSAnalytics logger] datePropertyForKey:CKKSAnalyticsLastUnlock];
207 XCTAssertNotNil(newUnlockDate, "Failed to get a last unlock date");
208 XCTAssertEqualObjects(newUnlockDate, unlockDate, "unlock date not the same");
209
210 sleep(1); // wait to be a differnt second
211
212 self.aksLockState = false;
213 [self.lockStateTracker recheck];
214
215 sleep(1); // wait for the completion block to have time to fire
216
217 newUnlockDate = [[CKKSAnalytics logger] datePropertyForKey:CKKSAnalyticsLastUnlock];
218 XCTAssertNotNil(newUnlockDate, "Failed to get a last unlock date");
219 XCTAssertNotEqualObjects(newUnlockDate, unlockDate, "unlock date the same");
220 }
221
222 - (void)testRaceToCreateLoggers
223 {
224 dispatch_semaphore_t semaphore = dispatch_semaphore_create(0);
225 for (NSInteger i = 0; i < 5; i++) {
226 dispatch_async(dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0), ^{
227 CKKSAnalytics* logger = [CKKSAnalytics logger];
228 [logger logSuccessForEvent:(CKKSAnalyticsFailableEvent*)@"test_event" inView:self.keychainView];
229 dispatch_semaphore_signal(semaphore);
230 });
231 }
232
233 for (NSInteger i = 0; i < 5; i++) {
234 dispatch_semaphore_wait(semaphore, DISPATCH_TIME_FOREVER);
235 }
236 }
237
238 - (void)testUnderlayingError
239 {
240 NSDictionary *errorString = nil;
241 NSError *error = nil;
242
243 error = [NSError errorWithDomain:CKErrorDomain code:CKErrorPartialFailure userInfo:@{
244 CKPartialErrorsByItemIDKey : @{
245 @"recordid" : [NSError errorWithDomain:CKErrorDomain code:1 userInfo:nil],
246 }
247 }];
248
249 errorString = [[CKKSAnalytics logger] errorChain:error depth:0];
250
251 XCTAssertEqualObjects(errorString[@"domain"], CKErrorDomain, "error domain");
252 XCTAssertEqual([errorString[@"code"] intValue], CKErrorPartialFailure, "error code");
253
254 XCTAssertEqualObjects(errorString[@"oneCloudKitPartialFailure"][@"domain"], CKErrorDomain, "error domain");
255 XCTAssertEqual([errorString[@"oneCloudKitPartialFailure"][@"code"] intValue], 1, "error code");
256
257 /* interal partial error leaks out of CK */
258
259 error = [NSError errorWithDomain:CKErrorDomain code:CKErrorPartialFailure userInfo:@{
260 CKPartialErrorsByItemIDKey : @{
261 @"recordid1" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
262 @"recordid2" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
263 @"recordid3" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
264 @"recordid4" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
265 @"recordid5" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
266 @"recordid6" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
267 @"recordid7" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
268 @"recordid8" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
269 @"recordid9" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
270 @"recordid0" : [NSError errorWithDomain:CKErrorDomain code:1 userInfo:nil],
271 @"recordid10" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
272 @"recordid12" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
273 @"recordid13" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
274 @"recordid14" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
275 @"recordid15" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
276 @"recordid16" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
277 @"recordid17" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
278 @"recordid18" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
279 @"recordid19" : [NSError errorWithDomain:CKErrorDomain code:CKErrorBatchRequestFailed userInfo:nil],
280 }
281 }];
282
283 errorString = [[CKKSAnalytics logger] errorChain:error depth:0];
284
285 XCTAssertEqualObjects(errorString[@"domain"], CKErrorDomain, "error domain");
286 XCTAssertEqual([errorString[@"code"] intValue], CKErrorPartialFailure, "error code");
287
288 XCTAssertEqualObjects(errorString[@"oneCloudKitPartialFailure"][@"domain"], CKErrorDomain, "error domain");
289 XCTAssertEqualObjects(errorString[@"oneCloudKitPartialFailure"][@"code"], @1, "error code");
290
291
292
293
294 error = [NSError errorWithDomain:@"domain" code:1 userInfo:@{
295 NSUnderlyingErrorKey : [NSError errorWithDomain:CKErrorDomain code:1 userInfo:nil],
296 }];
297
298 errorString = [[CKKSAnalytics logger] errorChain:error depth:0];
299
300 XCTAssertEqualObjects(errorString[@"domain"], @"domain", "error domain");
301 XCTAssertEqual([errorString[@"code"] intValue], 1, "error code");
302
303 XCTAssertEqualObjects(errorString[@"child"][@"domain"], CKErrorDomain, "error domain");
304 XCTAssertEqual([errorString[@"child"][@"code"] intValue], 1, "error code");
305 }
306
307
308 @end
309
310 #endif