HTTP2TransportNIOTransportServicesTests.swift 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215
  1. /*
  2. * Copyright 2024, gRPC Authors All rights reserved.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #if canImport(Network)
  17. import GRPCCore
  18. import GRPCNIOTransportCore
  19. import GRPCNIOTransportHTTP2TransportServices
  20. import XCTest
  21. import NIOSSL
  22. final class HTTP2TransportNIOTransportServicesTests: XCTestCase {
  23. func testGetListeningAddress_IPv4() async throws {
  24. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.TransportServices(
  25. address: .ipv4(host: "0.0.0.0", port: 0),
  26. transportSecurity: .plaintext
  27. )
  28. try await withThrowingDiscardingTaskGroup { group in
  29. group.addTask {
  30. try await transport.listen { _, _ in }
  31. }
  32. group.addTask {
  33. let address = try await transport.listeningAddress
  34. let ipv4Address = try XCTUnwrap(address.ipv4)
  35. XCTAssertNotEqual(ipv4Address.port, 0)
  36. transport.beginGracefulShutdown()
  37. }
  38. }
  39. }
  40. func testGetListeningAddress_IPv6() async throws {
  41. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.TransportServices(
  42. address: .ipv6(host: "::1", port: 0),
  43. transportSecurity: .plaintext
  44. )
  45. try await withThrowingDiscardingTaskGroup { group in
  46. group.addTask {
  47. try await transport.listen { _, _ in }
  48. }
  49. group.addTask {
  50. let address = try await transport.listeningAddress
  51. let ipv6Address = try XCTUnwrap(address.ipv6)
  52. XCTAssertNotEqual(ipv6Address.port, 0)
  53. transport.beginGracefulShutdown()
  54. }
  55. }
  56. }
  57. func testGetListeningAddress_UnixDomainSocket() async throws {
  58. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.TransportServices(
  59. address: .unixDomainSocket(path: "/tmp/niots-uds-test"),
  60. transportSecurity: .plaintext
  61. )
  62. defer {
  63. // NIOTS does not unlink the UDS on close.
  64. try? FileManager.default.removeItem(atPath: "/tmp/niots-uds-test")
  65. }
  66. try await withThrowingDiscardingTaskGroup { group in
  67. group.addTask {
  68. try await transport.listen { _, _ in }
  69. }
  70. group.addTask {
  71. let address = try await transport.listeningAddress
  72. XCTAssertEqual(
  73. address.unixDomainSocket,
  74. GRPCNIOTransportCore.SocketAddress.UnixDomainSocket(path: "/tmp/niots-uds-test")
  75. )
  76. transport.beginGracefulShutdown()
  77. }
  78. }
  79. }
  80. func testGetListeningAddress_InvalidAddress() async {
  81. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.TransportServices(
  82. address: .unixDomainSocket(path: "/this/should/be/an/invalid/path"),
  83. transportSecurity: .plaintext
  84. )
  85. try? await withThrowingDiscardingTaskGroup { group in
  86. group.addTask {
  87. try await transport.listen { _, _ in }
  88. }
  89. group.addTask {
  90. do {
  91. _ = try await transport.listeningAddress
  92. XCTFail("Should have thrown a RuntimeError")
  93. } catch let error as RuntimeError {
  94. XCTAssertEqual(error.code, .serverIsStopped)
  95. XCTAssertEqual(
  96. error.message,
  97. """
  98. There is no listening address bound for this server: there may have \
  99. been an error which caused the transport to close, or it may have shut down.
  100. """
  101. )
  102. }
  103. }
  104. }
  105. }
  106. func testGetListeningAddress_StoppedListening() async throws {
  107. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.TransportServices(
  108. address: .ipv4(host: "0.0.0.0", port: 0),
  109. transportSecurity: .plaintext
  110. )
  111. try? await withThrowingDiscardingTaskGroup { group in
  112. group.addTask {
  113. try await transport.listen { _, _ in }
  114. do {
  115. _ = try await transport.listeningAddress
  116. XCTFail("Should have thrown a RuntimeError")
  117. } catch let error as RuntimeError {
  118. XCTAssertEqual(error.code, .serverIsStopped)
  119. XCTAssertEqual(
  120. error.message,
  121. """
  122. There is no listening address bound for this server: there may have \
  123. been an error which caused the transport to close, or it may have shut down.
  124. """
  125. )
  126. }
  127. }
  128. group.addTask {
  129. let address = try await transport.listeningAddress
  130. XCTAssertNotNil(address.ipv4)
  131. transport.beginGracefulShutdown()
  132. }
  133. }
  134. }
  135. @Sendable private static func loadIdentity() throws -> SecIdentity {
  136. let certificateKeyPairs = try SelfSignedCertificateKeyPairs()
  137. let password = "somepassword"
  138. let bundle = NIOSSLPKCS12Bundle(
  139. certificateChain: [
  140. try NIOSSLCertificate(bytes: certificateKeyPairs.server.certificate, format: .der)
  141. ],
  142. privateKey: try NIOSSLPrivateKey(bytes: certificateKeyPairs.server.key, format: .der)
  143. )
  144. let pkcs12Bytes = try bundle.serialize(passphrase: password.utf8)
  145. let options = [kSecImportExportPassphrase as String: password]
  146. var rawItems: CFArray?
  147. let status = SecPKCS12Import(
  148. Data(pkcs12Bytes) as CFData,
  149. options as CFDictionary,
  150. &rawItems
  151. )
  152. guard status == errSecSuccess else {
  153. XCTFail("Failed to import PKCS12 bundle: status \(status).")
  154. throw HTTP2TransportNIOTransportServicesTestsError.failedToImportPKCS12
  155. }
  156. let items = rawItems! as! [[String: Any]]
  157. let firstItem = items[0]
  158. let identity = firstItem[kSecImportItemIdentity as String] as! SecIdentity
  159. return identity
  160. }
  161. func testServerConfig_Defaults() throws {
  162. let grpcTLSConfig = HTTP2ServerTransport.TransportServices.TLS.defaults(
  163. identityProvider: Self.loadIdentity
  164. )
  165. let grpcConfig = HTTP2ServerTransport.TransportServices.Config.defaults
  166. XCTAssertEqual(grpcConfig.compression, HTTP2ServerTransport.Config.Compression.defaults)
  167. XCTAssertEqual(grpcConfig.connection, HTTP2ServerTransport.Config.Connection.defaults)
  168. XCTAssertEqual(grpcConfig.http2, HTTP2ServerTransport.Config.HTTP2.defaults)
  169. XCTAssertEqual(grpcConfig.rpc, HTTP2ServerTransport.Config.RPC.defaults)
  170. XCTAssertNotNil(grpcTLSConfig.identityProvider)
  171. XCTAssertEqual(grpcTLSConfig.trustRoots, .systemDefault)
  172. XCTAssertEqual(grpcTLSConfig.clientCertificateVerification, .noVerification)
  173. XCTAssertEqual(grpcTLSConfig.requireALPN, false)
  174. }
  175. func testClientConfig_Defaults() throws {
  176. let grpcTLSConfig = HTTP2ClientTransport.TransportServices.TLS.defaults
  177. let grpcConfig = HTTP2ClientTransport.TransportServices.Config.defaults
  178. XCTAssertEqual(grpcConfig.compression, HTTP2ClientTransport.Config.Compression.defaults)
  179. XCTAssertEqual(grpcConfig.connection, HTTP2ClientTransport.Config.Connection.defaults)
  180. XCTAssertEqual(grpcConfig.http2, HTTP2ClientTransport.Config.HTTP2.defaults)
  181. XCTAssertEqual(grpcConfig.backoff, HTTP2ClientTransport.Config.Backoff.defaults)
  182. XCTAssertNil(grpcTLSConfig.identityProvider)
  183. XCTAssertEqual(grpcTLSConfig.serverCertificateVerification, .fullVerification)
  184. XCTAssertEqual(grpcTLSConfig.trustRoots, .systemDefault)
  185. }
  186. }
  187. enum HTTP2TransportNIOTransportServicesTestsError: Error {
  188. case failedToImportPKCS12
  189. }
  190. #endif