HTTP2TransportNIOPosixTests.swift 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483
  1. /*
  2. * Copyright 2024, gRPC Authors All rights reserved.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. import GRPCCore
  17. import GRPCNIOTransportCore
  18. import GRPCNIOTransportHTTP2Posix
  19. import XCTest
  20. #if canImport(NIOSSL)
  21. import NIOSSL
  22. #endif
  23. @available(macOS 15.0, iOS 18.0, watchOS 11.0, tvOS 18.0, visionOS 2.0, *)
  24. final class HTTP2TransportNIOPosixTests: XCTestCase {
  25. func testGetListeningAddress_IPv4() async throws {
  26. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  27. address: .ipv4(host: "0.0.0.0", port: 0),
  28. config: .defaults(transportSecurity: .plaintext)
  29. )
  30. try await withThrowingDiscardingTaskGroup { group in
  31. group.addTask {
  32. try await transport.listen { _, _ in }
  33. }
  34. group.addTask {
  35. let address = try await transport.listeningAddress
  36. let ipv4Address = try XCTUnwrap(address.ipv4)
  37. XCTAssertNotEqual(ipv4Address.port, 0)
  38. transport.beginGracefulShutdown()
  39. }
  40. }
  41. }
  42. func testGetListeningAddress_IPv6() async throws {
  43. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  44. address: .ipv6(host: "::1", port: 0),
  45. config: .defaults(transportSecurity: .plaintext)
  46. )
  47. try await withThrowingDiscardingTaskGroup { group in
  48. group.addTask {
  49. try await transport.listen { _, _ in }
  50. }
  51. group.addTask {
  52. let address = try await transport.listeningAddress
  53. let ipv6Address = try XCTUnwrap(address.ipv6)
  54. XCTAssertNotEqual(ipv6Address.port, 0)
  55. transport.beginGracefulShutdown()
  56. }
  57. }
  58. }
  59. func testGetListeningAddress_UnixDomainSocket() async throws {
  60. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  61. address: .unixDomainSocket(path: "/tmp/posix-uds-test"),
  62. config: .defaults(transportSecurity: .plaintext)
  63. )
  64. try await withThrowingDiscardingTaskGroup { group in
  65. group.addTask {
  66. try await transport.listen { _, _ in }
  67. }
  68. group.addTask {
  69. let address = try await transport.listeningAddress
  70. XCTAssertEqual(
  71. address.unixDomainSocket,
  72. GRPCNIOTransportCore.SocketAddress.UnixDomainSocket(path: "/tmp/posix-uds-test")
  73. )
  74. transport.beginGracefulShutdown()
  75. }
  76. }
  77. }
  78. func testGetListeningAddress_Vsock() async throws {
  79. try XCTSkipUnless(self.vsockAvailable(), "Vsock unavailable")
  80. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  81. address: .vsock(contextID: .any, port: .any),
  82. config: .defaults(transportSecurity: .plaintext)
  83. )
  84. try await withThrowingDiscardingTaskGroup { group in
  85. group.addTask {
  86. try await transport.listen { _, _ in }
  87. }
  88. group.addTask {
  89. let address = try await transport.listeningAddress
  90. XCTAssertNotNil(address.virtualSocket)
  91. transport.beginGracefulShutdown()
  92. }
  93. }
  94. }
  95. func testGetListeningAddress_InvalidAddress() async {
  96. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  97. address: .unixDomainSocket(path: "/this/should/be/an/invalid/path"),
  98. config: .defaults(transportSecurity: .plaintext)
  99. )
  100. try? await withThrowingDiscardingTaskGroup { group in
  101. group.addTask {
  102. try await transport.listen { _, _ in }
  103. }
  104. group.addTask {
  105. do {
  106. _ = try await transport.listeningAddress
  107. XCTFail("Should have thrown a RuntimeError")
  108. } catch let error as RuntimeError {
  109. XCTAssertEqual(error.code, .serverIsStopped)
  110. XCTAssertEqual(
  111. error.message,
  112. """
  113. There is no listening address bound for this server: there may have \
  114. been an error which caused the transport to close, or it may have shut down.
  115. """
  116. )
  117. }
  118. }
  119. }
  120. }
  121. func testGetListeningAddress_StoppedListening() async throws {
  122. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  123. address: .ipv4(host: "0.0.0.0", port: 0),
  124. config: .defaults(transportSecurity: .plaintext)
  125. )
  126. try? await withThrowingDiscardingTaskGroup { group in
  127. group.addTask {
  128. try await transport.listen { _, _ in }
  129. do {
  130. _ = try await transport.listeningAddress
  131. XCTFail("Should have thrown a RuntimeError")
  132. } catch let error as RuntimeError {
  133. XCTAssertEqual(error.code, .serverIsStopped)
  134. XCTAssertEqual(
  135. error.message,
  136. """
  137. There is no listening address bound for this server: there may have \
  138. been an error which caused the transport to close, or it may have shut down.
  139. """
  140. )
  141. }
  142. }
  143. group.addTask {
  144. let address = try await transport.listeningAddress
  145. XCTAssertNotNil(address.ipv4)
  146. transport.beginGracefulShutdown()
  147. }
  148. }
  149. }
  150. func testServerConfig_Defaults() throws {
  151. let grpcConfig = HTTP2ServerTransport.Posix.Config.defaults(
  152. transportSecurity: .plaintext
  153. )
  154. XCTAssertEqual(grpcConfig.compression, HTTP2ServerTransport.Config.Compression.defaults)
  155. XCTAssertEqual(grpcConfig.connection, HTTP2ServerTransport.Config.Connection.defaults)
  156. XCTAssertEqual(grpcConfig.http2, HTTP2ServerTransport.Config.HTTP2.defaults)
  157. XCTAssertEqual(grpcConfig.rpc, HTTP2ServerTransport.Config.RPC.defaults)
  158. }
  159. func testClientConfig_Defaults() throws {
  160. let grpcConfig = HTTP2ClientTransport.Posix.Config.defaults(
  161. transportSecurity: .plaintext
  162. )
  163. XCTAssertEqual(grpcConfig.compression, HTTP2ClientTransport.Config.Compression.defaults)
  164. XCTAssertEqual(grpcConfig.connection, HTTP2ClientTransport.Config.Connection.defaults)
  165. XCTAssertEqual(grpcConfig.http2, HTTP2ClientTransport.Config.HTTP2.defaults)
  166. XCTAssertEqual(grpcConfig.backoff, HTTP2ClientTransport.Config.Backoff.defaults)
  167. }
  168. #if canImport(NIOSSL)
  169. static let samplePemCert = """
  170. -----BEGIN CERTIFICATE-----
  171. MIIGGzCCBAOgAwIBAgIJAJ/X0Fo0ynmEMA0GCSqGSIb3DQEBCwUAMIGjMQswCQYD
  172. VQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNU2FuIEZyYW5z
  173. b2t5bzEuMCwGA1UECgwlU2FuIEZyYW5zb2t5byBJbnN0aXR1dGUgb2YgVGVjaG5v
  174. bG9neTEVMBMGA1UECwwMUm9ib3RpY3MgTGFiMSAwHgYDVQQDDBdyb2JvdHMuc2Fu
  175. ZnJhbnNva3lvLmVkdTAeFw0xNzEwMTYyMTAxMDJaFw00NzEwMDkyMTAxMDJaMIGj
  176. MQswCQYDVQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNU2Fu
  177. IEZyYW5zb2t5bzEuMCwGA1UECgwlU2FuIEZyYW5zb2t5byBJbnN0aXR1dGUgb2Yg
  178. VGVjaG5vbG9neTEVMBMGA1UECwwMUm9ib3RpY3MgTGFiMSAwHgYDVQQDDBdyb2Jv
  179. dHMuc2FuZnJhbnNva3lvLmVkdTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
  180. ggIBAO9rzJOOE8cmsIqAJMCrHDxkBAMgZhMsJ863MnWtVz5JIJK6CKI/Nu26tEzo
  181. kHy3EI9565RwikvauheMsWaTFA4PD/P+s1DtxRCGIcK5x+SoTN7Drn5ZueoJNZRf
  182. TYuN+gwyhprzrZrYjXpvEVPYuSIeUqK5XGrTyFA2uGj9wY3f9IF4rd7JT0ewRb1U
  183. 8OcR7xQbXKGjkY4iJE1TyfmIsBZboKaG/aYa9KbnWyTkDssaELWUIKrjwwuPgVgS
  184. vlAYmo12MlsGEzkO9z78jvFmhUOsaEldM8Ua2AhOKW0oSYgauVuro/Ap/o5zn8PD
  185. IDapl9g+5vjN2LucqX2a9utoFvxSKXT4NvfpL9fJvzdBNMM4xpqtHIkV0fkiMbWk
  186. EW2FFlOXKnIJV8wT4a9iduuIDMg8O7oc+gt9pG9MHTWthXm4S29DARTqfZ48bW77
  187. z8RrEURV03o05b/twuAJSRyyOCUi61yMo3YNytebjY2W3Pxqpq+YmT5qhqBZDLlT
  188. LMptuFdISv6SQgg7JoFHGMWRXUavMj/sn5qZD4pQyZToHJ2Vtg5W/MI1pKwc3oKD
  189. 6M3/7Gf35r92V/ox6XT7+fnEsAH8AtQiZJkEbvzJ5lpUihSIaV3a/S+jnk7Lw8Tp
  190. vjtpfjOg+wBblc38Oa9tk2WdXwYDbnvbeL26WmyHwQTUBi1jAgMBAAGjUDBOMB0G
  191. A1UdDgQWBBToPRmTBQEF5F5LcPiUI5qBNPBU+DAfBgNVHSMEGDAWgBToPRmTBQEF
  192. 5F5LcPiUI5qBNPBU+DAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBCwUAA4ICAQCY
  193. gxM5lufF2lTB9sH0s1E1VTERv37qoapNP+aw06oZkAD67QOTXFzbsM3JU1diY6rV
  194. Y0g9CLzRO7gZY+kmi1WWnsYiMMSIGjIfsB8S+ot43LME+AJXPVeDZQnoZ6KQ/9r+
  195. 71Umi4AKLoZ9dInyUIM3EHg9pg5B0eEINrh4J+OPGtlC3NMiWxdmIkZwzfXa+64Z
  196. 8k5aX5piMTI+9BQSMWw5l7tFT/PISuI8b/Ln4IUBXKA0xkONXVnjPOmS0h7MBoc2
  197. EipChDKnK+Mtm9GQewOCKdS2nsrCndGkIBnUix4ConUYIoywVzWGMD+9OzKNg76d
  198. O6A7MxdjEdKhf1JDvklxInntDUDTlSFL4iEFELwyRseoTzj8vJE+cL6h6ClasYQ6
  199. p0EeL3UpICYerfIvPhohftCivCH3k7Q1BSf0fq73cQ55nrFAHrqqYjD7HBeBS9hn
  200. 3L6bz9Eo6U9cuxX42k3l1N44BmgcDPin0+CRTirEmahUMb3gmvoSZqQ3Cz86GkIg
  201. 7cNJosc9NyevQlU9SX3ptEbv33tZtlB5GwgZ2hiGBTY0C3HaVFjLpQiSS5ygZLgI
  202. /+AKtah7sTHIAtpUH1ZZEgKPl1Hg6J4x/dBkuk3wxPommNHaYaHREXF+fHMhBrSi
  203. yH8agBmmECpa21SVnr7vrL+KSqfuF+GxwjSNsSR4SA==
  204. -----END CERTIFICATE-----
  205. """
  206. static let samplePemKey = """
  207. -----BEGIN RSA PRIVATE KEY-----
  208. MIIJKAIBAAKCAgEA72vMk44TxyawioAkwKscPGQEAyBmEywnzrcyda1XPkkgkroI
  209. oj827bq0TOiQfLcQj3nrlHCKS9q6F4yxZpMUDg8P8/6zUO3FEIYhwrnH5KhM3sOu
  210. flm56gk1lF9Ni436DDKGmvOtmtiNem8RU9i5Ih5SorlcatPIUDa4aP3Bjd/0gXit
  211. 3slPR7BFvVTw5xHvFBtcoaORjiIkTVPJ+YiwFlugpob9phr0pudbJOQOyxoQtZQg
  212. quPDC4+BWBK+UBiajXYyWwYTOQ73PvyO8WaFQ6xoSV0zxRrYCE4pbShJiBq5W6uj
  213. 8Cn+jnOfw8MgNqmX2D7m+M3Yu5ypfZr262gW/FIpdPg29+kv18m/N0E0wzjGmq0c
  214. iRXR+SIxtaQRbYUWU5cqcglXzBPhr2J264gMyDw7uhz6C32kb0wdNa2FebhLb0MB
  215. FOp9njxtbvvPxGsRRFXTejTlv+3C4AlJHLI4JSLrXIyjdg3K15uNjZbc/Gqmr5iZ
  216. PmqGoFkMuVMsym24V0hK/pJCCDsmgUcYxZFdRq8yP+yfmpkPilDJlOgcnZW2Dlb8
  217. wjWkrBzegoPozf/sZ/fmv3ZX+jHpdPv5+cSwAfwC1CJkmQRu/MnmWlSKFIhpXdr9
  218. L6OeTsvDxOm+O2l+M6D7AFuVzfw5r22TZZ1fBgNue9t4vbpabIfBBNQGLWMCAwEA
  219. AQKCAgArWV9PEBhwpIaubQk6gUC5hnpbfpA8xG/os67FM79qHZ9yMZDCn6N4Y6el
  220. jS4sBpFPCQoodD/2AAJVpTmxksu8x+lhiio5avOVTFPsh+qzce2JH/EGG4TX5Rb4
  221. aFEIBYrSjotknt49/RuQoW+HuOO8U7UulVUwWmwYae/1wow6/eOtVYZVoilil33p
  222. C+oaTFr3TwT0l0MRcwkTnyogrikDw09RF3vxiUvmtFkCUvCCwZNo7QsFJfv4qeEH
  223. a01d/zZsiowPgwgT+qu1kdDn0GIsoJi5P9DRzUx0JILHqtW1ePE6sdca8t+ON00k
  224. Cr5YZ1iA5NK5Fbw6K+FcRqSSduRCLYXAnI5GH1zWMki5TUdl+psvCnpdZK5wysGe
  225. tYfIbrVHXIlg7J3R4BrbMF4q3HwOppTHMrqsGyRVCCSjDwXjreugInV0CRzlapDs
  226. JNEVyrbt6Ild6ie7c1AJqTpibJ9lVYRVpG35Dni9RJy5Uk5m89uWnF9PCjCRCHOf
  227. 4UATY+qie6wlu0E8y43LcTvDi8ROXQQoCnys2ES8DmS+GKJ1uzG1l8jx3jF9BMAJ
  228. kyzZfSmPwuS2NUk8sftYQ8neJSgk4DOV4h7x5ghaBWYzseomy3uo3gD4IyuiO56K
  229. y7IYZnXSt2s8LfzhVcB5I4IZbSIvP/MAEkGMC09SV+dEcEJSQQKCAQEA/uJex1ef
  230. g+q4gb/C4/biPr+ZRFheVuHu49ES0DXxoxmTbosGRDPRFBLwtPxCLuzHXa1Du2Vc
  231. c0E12zLy8wNczv5bGAxynPo57twJCyeptFNFJkb+0uxRrCi+CZ56Qertg2jr460Q
  232. cg+TMYxauDleLzR7uwL6VnOhTSq3CVTA2TrQ+kjIHgVqmmpwgk5bPBRDj2EuqdyD
  233. dEQmt4z/0fFFBmW6iBcXS9y8Q1rCnAHKjDUEoXKyJYL85szupjUuerOt6iTIe7CJ
  234. pH0REwQO4djwM4Ju/PEGfBs+RqgNXoHmBMcFdf9RdogCuFit7lX0+LlRT/KJitan
  235. LaaFgY1TXTVkcwKCAQEA8HgZuPGVHQTMHCOfNesXxnCY9Dwqa9ZVukqDLMaZ0TVy
  236. PIqXhdNeVCWpP+VXWhj9JRLNuW8VWYMxk+poRmsZgbdwSbq30ljsGlfoupCpXfhd
  237. AIhUeRwLVl4XnaHW+MjAmY/rqO156/LvNbV5e0YsqObzynlTczmhhYwi48x1tdf0
  238. iuCn8o3+Ikv8xM7MuMnv5QmGp2l8Q3BhwxLN1x4MXfbG+4BGsqavudIkt71RVbSb
  239. Sp7U4Khq3UEnCekrceRLQpJykRFu11/ntPsJ0Q+fLuvuRUMg/wsq8WTuVlwLrw46
  240. hlRcq6S99jc9j2TbidxHyps6j8SDnEsEFHMHH8THUQKCAQAd03WN1CYZdL0UidEP
  241. hhNhjmAsDD814Yhn5k5SSQ22rUaAWApqrrmXpMPAGgjQnuqRfrX/VtQjtIzN0r91
  242. Sn5wxnj4bnR3BB0FY4A3avPD4z6jRQmKuxavk7DxRTc/QXN7vipkYRscjdAGq0ru
  243. ZeAsm/Kipq2Oskc81XPHxsAua2CK+TtZr/6ShUQXK34noKNrQs8IF4LWdycksX46
  244. Hgaawgq65CDYwsLRCuzc/qSqFYYuMlLAavyXMYH3tx9yQlZmoNlJCBaDRhNaa04m
  245. hZFOJcRBGx9MJI/8CqxN09uL0ZJFBZSNz0qqMc5gpnRdKqpmNZZ8xbOYdvUGfPg1
  246. XwsbAoIBAGdH7iRU/mp8SP48/oC1/HwqmEcuIDo40JE2t6hflGkav3npPLMp2XXi
  247. xxK+egokeXWW4e0nHNBZXM3e+/JixY3FL+E65QDfWGjoIPkgcN3/clJsO3vY47Ww
  248. rAv0GtS3xKEwA1OGy7rfmIZE72xW84+HwmXQPltbAVjOm52jj1sO6eVMIFY5TlGE
  249. uYf+Gkez0+lXchItaEW+2v5h8S7XpRAmkcgrjDHnDcqNy19vXKOm8pvWJDBppZxq
  250. A05qa1J7byekprhP+H9gnbBJsimsv/3zL19oOZ/ROBx98S/+ULZbMh/H1BWUqFI7
  251. 36Da/L/1cJBAo6JkEPLr9VCjJwgqCEECggEBAI6+35Lf4jDwRPvZV7kE+FQuFp1G
  252. /tKxIJtPOZU3sbOVlsFsOoyEfV6+HbpeWxlWnrOnKRFOLoC3s5MVTjPglu1rC0ZX
  253. 4b0wMetvun5S1MGadB808rvu5EsEB1vznz1vOXV8oDdkdgBiiUcKewSeCrG1IrXy
  254. B9ux859S3JjELzeuNdz+xHqu2AqR22gtqN72tJUEQ95qLGZ8vo+ytY9MDVDqoSWJ
  255. 9pqHXFUVLmwHTM0/pciXN4Kx1IL9FZ3fjXgME0vdYpWYQkcvSKLsswXN+LnYcpoQ
  256. h33H/Kz4yji7jPN6Uk9wMyG7XGqpjYAuKCd6V3HEHUiGJZzho/VBgb3TVnw=
  257. -----END RSA PRIVATE KEY-----
  258. """
  259. func testServerTLSConfig_Defaults() throws {
  260. let grpcTLSConfig = HTTP2ServerTransport.Posix.Config.TLS.defaults(
  261. certificateChain: [
  262. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  263. ],
  264. privateKey: .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  265. )
  266. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  267. XCTAssertEqual(
  268. nioSSLTLSConfig.certificateChain,
  269. [
  270. .certificate(
  271. try NIOSSLCertificate(
  272. bytes: Array(Self.samplePemCert.utf8),
  273. format: .pem
  274. )
  275. )
  276. ]
  277. )
  278. XCTAssertEqual(
  279. nioSSLTLSConfig.privateKey,
  280. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  281. )
  282. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  283. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .none)
  284. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  285. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  286. }
  287. func testServerTLSConfig_mTLS() throws {
  288. let grpcTLSConfig = HTTP2ServerTransport.Posix.Config.TLS.mTLS(
  289. certificateChain: [
  290. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  291. ],
  292. privateKey: .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  293. )
  294. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  295. XCTAssertEqual(
  296. nioSSLTLSConfig.certificateChain,
  297. [
  298. .certificate(
  299. try NIOSSLCertificate(
  300. bytes: Array(Self.samplePemCert.utf8),
  301. format: .pem
  302. )
  303. )
  304. ]
  305. )
  306. XCTAssertEqual(
  307. nioSSLTLSConfig.privateKey,
  308. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  309. )
  310. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  311. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .noHostnameVerification)
  312. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  313. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  314. }
  315. func testServerTLSConfig_FullVerifyClient() throws {
  316. var grpcTLSConfig = HTTP2ServerTransport.Posix.Config.TLS.defaults(
  317. certificateChain: [
  318. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  319. ],
  320. privateKey: .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  321. )
  322. grpcTLSConfig.clientCertificateVerification = .fullVerification
  323. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  324. XCTAssertEqual(
  325. nioSSLTLSConfig.certificateChain,
  326. [
  327. .certificate(
  328. try NIOSSLCertificate(
  329. bytes: Array(Self.samplePemCert.utf8),
  330. format: .pem
  331. )
  332. )
  333. ]
  334. )
  335. XCTAssertEqual(
  336. nioSSLTLSConfig.privateKey,
  337. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  338. )
  339. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  340. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .fullVerification)
  341. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  342. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  343. }
  344. func testServerTLSConfig_CustomTrustRoots() throws {
  345. var grpcTLSConfig = HTTP2ServerTransport.Posix.Config.TLS.defaults(
  346. certificateChain: [
  347. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  348. ],
  349. privateKey: .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  350. )
  351. grpcTLSConfig.trustRoots = .certificates([.bytes(Array(Self.samplePemCert.utf8), format: .pem)])
  352. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  353. XCTAssertEqual(
  354. nioSSLTLSConfig.certificateChain,
  355. [
  356. .certificate(
  357. try NIOSSLCertificate(
  358. bytes: Array(Self.samplePemCert.utf8),
  359. format: .pem
  360. )
  361. )
  362. ]
  363. )
  364. XCTAssertEqual(
  365. nioSSLTLSConfig.privateKey,
  366. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  367. )
  368. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  369. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .none)
  370. XCTAssertEqual(
  371. nioSSLTLSConfig.trustRoots,
  372. .certificates(try NIOSSLCertificate.fromPEMBytes(Array(Self.samplePemCert.utf8)))
  373. )
  374. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  375. }
  376. func testClientTLSConfig_Defaults() throws {
  377. let grpcTLSConfig = HTTP2ClientTransport.Posix.Config.TLS.defaults
  378. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  379. XCTAssertEqual(nioSSLTLSConfig.certificateChain, [])
  380. XCTAssertNil(nioSSLTLSConfig.privateKey)
  381. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  382. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .fullVerification)
  383. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  384. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  385. }
  386. func testClientTLSConfig_CustomCertificateChainAndPrivateKey() throws {
  387. var grpcTLSConfig = HTTP2ClientTransport.Posix.Config.TLS.defaults
  388. grpcTLSConfig.certificateChain = [
  389. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  390. ]
  391. grpcTLSConfig.privateKey = .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  392. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  393. XCTAssertEqual(
  394. nioSSLTLSConfig.certificateChain,
  395. [
  396. .certificate(
  397. try NIOSSLCertificate(
  398. bytes: Array(Self.samplePemCert.utf8),
  399. format: .pem
  400. )
  401. )
  402. ]
  403. )
  404. XCTAssertEqual(
  405. nioSSLTLSConfig.privateKey,
  406. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  407. )
  408. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  409. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .fullVerification)
  410. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  411. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  412. }
  413. func testClientTLSConfig_CustomTrustRoots() throws {
  414. var grpcTLSConfig = HTTP2ClientTransport.Posix.Config.TLS.defaults
  415. grpcTLSConfig.trustRoots = .certificates([.bytes(Array(Self.samplePemCert.utf8), format: .pem)])
  416. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  417. XCTAssertEqual(nioSSLTLSConfig.certificateChain, [])
  418. XCTAssertNil(nioSSLTLSConfig.privateKey)
  419. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  420. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .fullVerification)
  421. XCTAssertEqual(
  422. nioSSLTLSConfig.trustRoots,
  423. .certificates(try NIOSSLCertificate.fromPEMBytes(Array(Self.samplePemCert.utf8)))
  424. )
  425. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  426. }
  427. func testClientTLSConfig_CustomCertificateVerification() throws {
  428. var grpcTLSConfig = HTTP2ClientTransport.Posix.Config.TLS.defaults
  429. grpcTLSConfig.serverCertificateVerification = .noHostnameVerification
  430. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  431. XCTAssertEqual(nioSSLTLSConfig.certificateChain, [])
  432. XCTAssertNil(nioSSLTLSConfig.privateKey)
  433. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  434. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .noHostnameVerification)
  435. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  436. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  437. }
  438. #endif
  439. }