HTTP2TransportNIOPosixTests.swift 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473
  1. /*
  2. * Copyright 2024, gRPC Authors All rights reserved.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. import GRPCCore
  17. import GRPCNIOTransportCore
  18. import GRPCNIOTransportHTTP2Posix
  19. import NIOSSL
  20. import XCTest
  21. final class HTTP2TransportNIOPosixTests: XCTestCase {
  22. func testGetListeningAddress_IPv4() async throws {
  23. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  24. address: .ipv4(host: "0.0.0.0", port: 0),
  25. transportSecurity: .plaintext
  26. )
  27. try await withThrowingDiscardingTaskGroup { group in
  28. group.addTask {
  29. try await transport.listen { _, _ in }
  30. }
  31. group.addTask {
  32. let address = try await transport.listeningAddress
  33. let ipv4Address = try XCTUnwrap(address.ipv4)
  34. XCTAssertNotEqual(ipv4Address.port, 0)
  35. transport.beginGracefulShutdown()
  36. }
  37. }
  38. }
  39. func testGetListeningAddress_IPv6() async throws {
  40. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  41. address: .ipv6(host: "::1", port: 0),
  42. transportSecurity: .plaintext
  43. )
  44. try await withThrowingDiscardingTaskGroup { group in
  45. group.addTask {
  46. try await transport.listen { _, _ in }
  47. }
  48. group.addTask {
  49. let address = try await transport.listeningAddress
  50. let ipv6Address = try XCTUnwrap(address.ipv6)
  51. XCTAssertNotEqual(ipv6Address.port, 0)
  52. transport.beginGracefulShutdown()
  53. }
  54. }
  55. }
  56. func testGetListeningAddress_UnixDomainSocket() async throws {
  57. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  58. address: .unixDomainSocket(path: "/tmp/posix-uds-test"),
  59. transportSecurity: .plaintext
  60. )
  61. try await withThrowingDiscardingTaskGroup { group in
  62. group.addTask {
  63. try await transport.listen { _, _ in }
  64. }
  65. group.addTask {
  66. let address = try await transport.listeningAddress
  67. XCTAssertEqual(
  68. address.unixDomainSocket,
  69. GRPCNIOTransportCore.SocketAddress.UnixDomainSocket(path: "/tmp/posix-uds-test")
  70. )
  71. transport.beginGracefulShutdown()
  72. }
  73. }
  74. }
  75. func testGetListeningAddress_Vsock() async throws {
  76. try XCTSkipUnless(self.vsockAvailable(), "Vsock unavailable")
  77. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  78. address: .vsock(contextID: .any, port: .any),
  79. transportSecurity: .plaintext
  80. )
  81. try await withThrowingDiscardingTaskGroup { group in
  82. group.addTask {
  83. try await transport.listen { _, _ in }
  84. }
  85. group.addTask {
  86. let address = try await transport.listeningAddress
  87. XCTAssertNotNil(address.virtualSocket)
  88. transport.beginGracefulShutdown()
  89. }
  90. }
  91. }
  92. func testGetListeningAddress_InvalidAddress() async {
  93. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  94. address: .unixDomainSocket(path: "/this/should/be/an/invalid/path"),
  95. transportSecurity: .plaintext
  96. )
  97. try? await withThrowingDiscardingTaskGroup { group in
  98. group.addTask {
  99. try await transport.listen { _, _ in }
  100. }
  101. group.addTask {
  102. do {
  103. _ = try await transport.listeningAddress
  104. XCTFail("Should have thrown a RuntimeError")
  105. } catch let error as RuntimeError {
  106. XCTAssertEqual(error.code, .serverIsStopped)
  107. XCTAssertEqual(
  108. error.message,
  109. """
  110. There is no listening address bound for this server: there may have \
  111. been an error which caused the transport to close, or it may have shut down.
  112. """
  113. )
  114. }
  115. }
  116. }
  117. }
  118. func testGetListeningAddress_StoppedListening() async throws {
  119. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  120. address: .ipv4(host: "0.0.0.0", port: 0),
  121. transportSecurity: .plaintext
  122. )
  123. try? await withThrowingDiscardingTaskGroup { group in
  124. group.addTask {
  125. try await transport.listen { _, _ in }
  126. do {
  127. _ = try await transport.listeningAddress
  128. XCTFail("Should have thrown a RuntimeError")
  129. } catch let error as RuntimeError {
  130. XCTAssertEqual(error.code, .serverIsStopped)
  131. XCTAssertEqual(
  132. error.message,
  133. """
  134. There is no listening address bound for this server: there may have \
  135. been an error which caused the transport to close, or it may have shut down.
  136. """
  137. )
  138. }
  139. }
  140. group.addTask {
  141. let address = try await transport.listeningAddress
  142. XCTAssertNotNil(address.ipv4)
  143. transport.beginGracefulShutdown()
  144. }
  145. }
  146. }
  147. func testServerConfig_Defaults() throws {
  148. let grpcConfig = HTTP2ServerTransport.Posix.Config.defaults
  149. XCTAssertEqual(grpcConfig.compression, HTTP2ServerTransport.Config.Compression.defaults)
  150. XCTAssertEqual(grpcConfig.connection, HTTP2ServerTransport.Config.Connection.defaults)
  151. XCTAssertEqual(grpcConfig.http2, HTTP2ServerTransport.Config.HTTP2.defaults)
  152. XCTAssertEqual(grpcConfig.rpc, HTTP2ServerTransport.Config.RPC.defaults)
  153. }
  154. func testClientConfig_Defaults() throws {
  155. let grpcConfig = HTTP2ClientTransport.Posix.Config.defaults
  156. XCTAssertEqual(grpcConfig.compression, HTTP2ClientTransport.Config.Compression.defaults)
  157. XCTAssertEqual(grpcConfig.connection, HTTP2ClientTransport.Config.Connection.defaults)
  158. XCTAssertEqual(grpcConfig.http2, HTTP2ClientTransport.Config.HTTP2.defaults)
  159. XCTAssertEqual(grpcConfig.backoff, HTTP2ClientTransport.Config.Backoff.defaults)
  160. }
  161. static let samplePemCert = """
  162. -----BEGIN CERTIFICATE-----
  163. MIIGGzCCBAOgAwIBAgIJAJ/X0Fo0ynmEMA0GCSqGSIb3DQEBCwUAMIGjMQswCQYD
  164. VQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNU2FuIEZyYW5z
  165. b2t5bzEuMCwGA1UECgwlU2FuIEZyYW5zb2t5byBJbnN0aXR1dGUgb2YgVGVjaG5v
  166. bG9neTEVMBMGA1UECwwMUm9ib3RpY3MgTGFiMSAwHgYDVQQDDBdyb2JvdHMuc2Fu
  167. ZnJhbnNva3lvLmVkdTAeFw0xNzEwMTYyMTAxMDJaFw00NzEwMDkyMTAxMDJaMIGj
  168. MQswCQYDVQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNU2Fu
  169. IEZyYW5zb2t5bzEuMCwGA1UECgwlU2FuIEZyYW5zb2t5byBJbnN0aXR1dGUgb2Yg
  170. VGVjaG5vbG9neTEVMBMGA1UECwwMUm9ib3RpY3MgTGFiMSAwHgYDVQQDDBdyb2Jv
  171. dHMuc2FuZnJhbnNva3lvLmVkdTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
  172. ggIBAO9rzJOOE8cmsIqAJMCrHDxkBAMgZhMsJ863MnWtVz5JIJK6CKI/Nu26tEzo
  173. kHy3EI9565RwikvauheMsWaTFA4PD/P+s1DtxRCGIcK5x+SoTN7Drn5ZueoJNZRf
  174. TYuN+gwyhprzrZrYjXpvEVPYuSIeUqK5XGrTyFA2uGj9wY3f9IF4rd7JT0ewRb1U
  175. 8OcR7xQbXKGjkY4iJE1TyfmIsBZboKaG/aYa9KbnWyTkDssaELWUIKrjwwuPgVgS
  176. vlAYmo12MlsGEzkO9z78jvFmhUOsaEldM8Ua2AhOKW0oSYgauVuro/Ap/o5zn8PD
  177. IDapl9g+5vjN2LucqX2a9utoFvxSKXT4NvfpL9fJvzdBNMM4xpqtHIkV0fkiMbWk
  178. EW2FFlOXKnIJV8wT4a9iduuIDMg8O7oc+gt9pG9MHTWthXm4S29DARTqfZ48bW77
  179. z8RrEURV03o05b/twuAJSRyyOCUi61yMo3YNytebjY2W3Pxqpq+YmT5qhqBZDLlT
  180. LMptuFdISv6SQgg7JoFHGMWRXUavMj/sn5qZD4pQyZToHJ2Vtg5W/MI1pKwc3oKD
  181. 6M3/7Gf35r92V/ox6XT7+fnEsAH8AtQiZJkEbvzJ5lpUihSIaV3a/S+jnk7Lw8Tp
  182. vjtpfjOg+wBblc38Oa9tk2WdXwYDbnvbeL26WmyHwQTUBi1jAgMBAAGjUDBOMB0G
  183. A1UdDgQWBBToPRmTBQEF5F5LcPiUI5qBNPBU+DAfBgNVHSMEGDAWgBToPRmTBQEF
  184. 5F5LcPiUI5qBNPBU+DAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBCwUAA4ICAQCY
  185. gxM5lufF2lTB9sH0s1E1VTERv37qoapNP+aw06oZkAD67QOTXFzbsM3JU1diY6rV
  186. Y0g9CLzRO7gZY+kmi1WWnsYiMMSIGjIfsB8S+ot43LME+AJXPVeDZQnoZ6KQ/9r+
  187. 71Umi4AKLoZ9dInyUIM3EHg9pg5B0eEINrh4J+OPGtlC3NMiWxdmIkZwzfXa+64Z
  188. 8k5aX5piMTI+9BQSMWw5l7tFT/PISuI8b/Ln4IUBXKA0xkONXVnjPOmS0h7MBoc2
  189. EipChDKnK+Mtm9GQewOCKdS2nsrCndGkIBnUix4ConUYIoywVzWGMD+9OzKNg76d
  190. O6A7MxdjEdKhf1JDvklxInntDUDTlSFL4iEFELwyRseoTzj8vJE+cL6h6ClasYQ6
  191. p0EeL3UpICYerfIvPhohftCivCH3k7Q1BSf0fq73cQ55nrFAHrqqYjD7HBeBS9hn
  192. 3L6bz9Eo6U9cuxX42k3l1N44BmgcDPin0+CRTirEmahUMb3gmvoSZqQ3Cz86GkIg
  193. 7cNJosc9NyevQlU9SX3ptEbv33tZtlB5GwgZ2hiGBTY0C3HaVFjLpQiSS5ygZLgI
  194. /+AKtah7sTHIAtpUH1ZZEgKPl1Hg6J4x/dBkuk3wxPommNHaYaHREXF+fHMhBrSi
  195. yH8agBmmECpa21SVnr7vrL+KSqfuF+GxwjSNsSR4SA==
  196. -----END CERTIFICATE-----
  197. """
  198. static let samplePemKey = """
  199. -----BEGIN RSA PRIVATE KEY-----
  200. MIIJKAIBAAKCAgEA72vMk44TxyawioAkwKscPGQEAyBmEywnzrcyda1XPkkgkroI
  201. oj827bq0TOiQfLcQj3nrlHCKS9q6F4yxZpMUDg8P8/6zUO3FEIYhwrnH5KhM3sOu
  202. flm56gk1lF9Ni436DDKGmvOtmtiNem8RU9i5Ih5SorlcatPIUDa4aP3Bjd/0gXit
  203. 3slPR7BFvVTw5xHvFBtcoaORjiIkTVPJ+YiwFlugpob9phr0pudbJOQOyxoQtZQg
  204. quPDC4+BWBK+UBiajXYyWwYTOQ73PvyO8WaFQ6xoSV0zxRrYCE4pbShJiBq5W6uj
  205. 8Cn+jnOfw8MgNqmX2D7m+M3Yu5ypfZr262gW/FIpdPg29+kv18m/N0E0wzjGmq0c
  206. iRXR+SIxtaQRbYUWU5cqcglXzBPhr2J264gMyDw7uhz6C32kb0wdNa2FebhLb0MB
  207. FOp9njxtbvvPxGsRRFXTejTlv+3C4AlJHLI4JSLrXIyjdg3K15uNjZbc/Gqmr5iZ
  208. PmqGoFkMuVMsym24V0hK/pJCCDsmgUcYxZFdRq8yP+yfmpkPilDJlOgcnZW2Dlb8
  209. wjWkrBzegoPozf/sZ/fmv3ZX+jHpdPv5+cSwAfwC1CJkmQRu/MnmWlSKFIhpXdr9
  210. L6OeTsvDxOm+O2l+M6D7AFuVzfw5r22TZZ1fBgNue9t4vbpabIfBBNQGLWMCAwEA
  211. AQKCAgArWV9PEBhwpIaubQk6gUC5hnpbfpA8xG/os67FM79qHZ9yMZDCn6N4Y6el
  212. jS4sBpFPCQoodD/2AAJVpTmxksu8x+lhiio5avOVTFPsh+qzce2JH/EGG4TX5Rb4
  213. aFEIBYrSjotknt49/RuQoW+HuOO8U7UulVUwWmwYae/1wow6/eOtVYZVoilil33p
  214. C+oaTFr3TwT0l0MRcwkTnyogrikDw09RF3vxiUvmtFkCUvCCwZNo7QsFJfv4qeEH
  215. a01d/zZsiowPgwgT+qu1kdDn0GIsoJi5P9DRzUx0JILHqtW1ePE6sdca8t+ON00k
  216. Cr5YZ1iA5NK5Fbw6K+FcRqSSduRCLYXAnI5GH1zWMki5TUdl+psvCnpdZK5wysGe
  217. tYfIbrVHXIlg7J3R4BrbMF4q3HwOppTHMrqsGyRVCCSjDwXjreugInV0CRzlapDs
  218. JNEVyrbt6Ild6ie7c1AJqTpibJ9lVYRVpG35Dni9RJy5Uk5m89uWnF9PCjCRCHOf
  219. 4UATY+qie6wlu0E8y43LcTvDi8ROXQQoCnys2ES8DmS+GKJ1uzG1l8jx3jF9BMAJ
  220. kyzZfSmPwuS2NUk8sftYQ8neJSgk4DOV4h7x5ghaBWYzseomy3uo3gD4IyuiO56K
  221. y7IYZnXSt2s8LfzhVcB5I4IZbSIvP/MAEkGMC09SV+dEcEJSQQKCAQEA/uJex1ef
  222. g+q4gb/C4/biPr+ZRFheVuHu49ES0DXxoxmTbosGRDPRFBLwtPxCLuzHXa1Du2Vc
  223. c0E12zLy8wNczv5bGAxynPo57twJCyeptFNFJkb+0uxRrCi+CZ56Qertg2jr460Q
  224. cg+TMYxauDleLzR7uwL6VnOhTSq3CVTA2TrQ+kjIHgVqmmpwgk5bPBRDj2EuqdyD
  225. dEQmt4z/0fFFBmW6iBcXS9y8Q1rCnAHKjDUEoXKyJYL85szupjUuerOt6iTIe7CJ
  226. pH0REwQO4djwM4Ju/PEGfBs+RqgNXoHmBMcFdf9RdogCuFit7lX0+LlRT/KJitan
  227. LaaFgY1TXTVkcwKCAQEA8HgZuPGVHQTMHCOfNesXxnCY9Dwqa9ZVukqDLMaZ0TVy
  228. PIqXhdNeVCWpP+VXWhj9JRLNuW8VWYMxk+poRmsZgbdwSbq30ljsGlfoupCpXfhd
  229. AIhUeRwLVl4XnaHW+MjAmY/rqO156/LvNbV5e0YsqObzynlTczmhhYwi48x1tdf0
  230. iuCn8o3+Ikv8xM7MuMnv5QmGp2l8Q3BhwxLN1x4MXfbG+4BGsqavudIkt71RVbSb
  231. Sp7U4Khq3UEnCekrceRLQpJykRFu11/ntPsJ0Q+fLuvuRUMg/wsq8WTuVlwLrw46
  232. hlRcq6S99jc9j2TbidxHyps6j8SDnEsEFHMHH8THUQKCAQAd03WN1CYZdL0UidEP
  233. hhNhjmAsDD814Yhn5k5SSQ22rUaAWApqrrmXpMPAGgjQnuqRfrX/VtQjtIzN0r91
  234. Sn5wxnj4bnR3BB0FY4A3avPD4z6jRQmKuxavk7DxRTc/QXN7vipkYRscjdAGq0ru
  235. ZeAsm/Kipq2Oskc81XPHxsAua2CK+TtZr/6ShUQXK34noKNrQs8IF4LWdycksX46
  236. Hgaawgq65CDYwsLRCuzc/qSqFYYuMlLAavyXMYH3tx9yQlZmoNlJCBaDRhNaa04m
  237. hZFOJcRBGx9MJI/8CqxN09uL0ZJFBZSNz0qqMc5gpnRdKqpmNZZ8xbOYdvUGfPg1
  238. XwsbAoIBAGdH7iRU/mp8SP48/oC1/HwqmEcuIDo40JE2t6hflGkav3npPLMp2XXi
  239. xxK+egokeXWW4e0nHNBZXM3e+/JixY3FL+E65QDfWGjoIPkgcN3/clJsO3vY47Ww
  240. rAv0GtS3xKEwA1OGy7rfmIZE72xW84+HwmXQPltbAVjOm52jj1sO6eVMIFY5TlGE
  241. uYf+Gkez0+lXchItaEW+2v5h8S7XpRAmkcgrjDHnDcqNy19vXKOm8pvWJDBppZxq
  242. A05qa1J7byekprhP+H9gnbBJsimsv/3zL19oOZ/ROBx98S/+ULZbMh/H1BWUqFI7
  243. 36Da/L/1cJBAo6JkEPLr9VCjJwgqCEECggEBAI6+35Lf4jDwRPvZV7kE+FQuFp1G
  244. /tKxIJtPOZU3sbOVlsFsOoyEfV6+HbpeWxlWnrOnKRFOLoC3s5MVTjPglu1rC0ZX
  245. 4b0wMetvun5S1MGadB808rvu5EsEB1vznz1vOXV8oDdkdgBiiUcKewSeCrG1IrXy
  246. B9ux859S3JjELzeuNdz+xHqu2AqR22gtqN72tJUEQ95qLGZ8vo+ytY9MDVDqoSWJ
  247. 9pqHXFUVLmwHTM0/pciXN4Kx1IL9FZ3fjXgME0vdYpWYQkcvSKLsswXN+LnYcpoQ
  248. h33H/Kz4yji7jPN6Uk9wMyG7XGqpjYAuKCd6V3HEHUiGJZzho/VBgb3TVnw=
  249. -----END RSA PRIVATE KEY-----
  250. """
  251. func testServerTLSConfig_Defaults() throws {
  252. let grpcTLSConfig = HTTP2ServerTransport.Posix.TransportSecurity.TLS.defaults(
  253. certificateChain: [
  254. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  255. ],
  256. privateKey: .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  257. )
  258. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  259. XCTAssertEqual(
  260. nioSSLTLSConfig.certificateChain,
  261. [
  262. .certificate(
  263. try NIOSSLCertificate(
  264. bytes: Array(Self.samplePemCert.utf8),
  265. format: .pem
  266. )
  267. )
  268. ]
  269. )
  270. XCTAssertEqual(
  271. nioSSLTLSConfig.privateKey,
  272. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  273. )
  274. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  275. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .none)
  276. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  277. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  278. }
  279. func testServerTLSConfig_mTLS() throws {
  280. let grpcTLSConfig = HTTP2ServerTransport.Posix.TransportSecurity.TLS.mTLS(
  281. certificateChain: [
  282. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  283. ],
  284. privateKey: .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  285. )
  286. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  287. XCTAssertEqual(
  288. nioSSLTLSConfig.certificateChain,
  289. [
  290. .certificate(
  291. try NIOSSLCertificate(
  292. bytes: Array(Self.samplePemCert.utf8),
  293. format: .pem
  294. )
  295. )
  296. ]
  297. )
  298. XCTAssertEqual(
  299. nioSSLTLSConfig.privateKey,
  300. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  301. )
  302. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  303. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .noHostnameVerification)
  304. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  305. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  306. }
  307. func testServerTLSConfig_FullVerifyClient() throws {
  308. var grpcTLSConfig = HTTP2ServerTransport.Posix.TransportSecurity.TLS.defaults(
  309. certificateChain: [
  310. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  311. ],
  312. privateKey: .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  313. )
  314. grpcTLSConfig.clientCertificateVerification = .fullVerification
  315. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  316. XCTAssertEqual(
  317. nioSSLTLSConfig.certificateChain,
  318. [
  319. .certificate(
  320. try NIOSSLCertificate(
  321. bytes: Array(Self.samplePemCert.utf8),
  322. format: .pem
  323. )
  324. )
  325. ]
  326. )
  327. XCTAssertEqual(
  328. nioSSLTLSConfig.privateKey,
  329. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  330. )
  331. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  332. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .fullVerification)
  333. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  334. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  335. }
  336. func testServerTLSConfig_CustomTrustRoots() throws {
  337. var grpcTLSConfig = HTTP2ServerTransport.Posix.TransportSecurity.TLS.defaults(
  338. certificateChain: [
  339. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  340. ],
  341. privateKey: .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  342. )
  343. grpcTLSConfig.trustRoots = .certificates([.bytes(Array(Self.samplePemCert.utf8), format: .pem)])
  344. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  345. XCTAssertEqual(
  346. nioSSLTLSConfig.certificateChain,
  347. [
  348. .certificate(
  349. try NIOSSLCertificate(
  350. bytes: Array(Self.samplePemCert.utf8),
  351. format: .pem
  352. )
  353. )
  354. ]
  355. )
  356. XCTAssertEqual(
  357. nioSSLTLSConfig.privateKey,
  358. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  359. )
  360. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  361. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .none)
  362. XCTAssertEqual(
  363. nioSSLTLSConfig.trustRoots,
  364. .certificates(try NIOSSLCertificate.fromPEMBytes(Array(Self.samplePemCert.utf8)))
  365. )
  366. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  367. }
  368. func testClientTLSConfig_Defaults() throws {
  369. let grpcTLSConfig = HTTP2ClientTransport.Posix.TransportSecurity.TLS.defaults
  370. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  371. XCTAssertEqual(nioSSLTLSConfig.certificateChain, [])
  372. XCTAssertNil(nioSSLTLSConfig.privateKey)
  373. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  374. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .fullVerification)
  375. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  376. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  377. }
  378. func testClientTLSConfig_CustomCertificateChainAndPrivateKey() throws {
  379. var grpcTLSConfig = HTTP2ClientTransport.Posix.TransportSecurity.TLS.defaults
  380. grpcTLSConfig.certificateChain = [
  381. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  382. ]
  383. grpcTLSConfig.privateKey = .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  384. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  385. XCTAssertEqual(
  386. nioSSLTLSConfig.certificateChain,
  387. [
  388. .certificate(
  389. try NIOSSLCertificate(
  390. bytes: Array(Self.samplePemCert.utf8),
  391. format: .pem
  392. )
  393. )
  394. ]
  395. )
  396. XCTAssertEqual(
  397. nioSSLTLSConfig.privateKey,
  398. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  399. )
  400. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  401. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .fullVerification)
  402. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  403. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  404. }
  405. func testClientTLSConfig_CustomTrustRoots() throws {
  406. var grpcTLSConfig = HTTP2ClientTransport.Posix.TransportSecurity.TLS.defaults
  407. grpcTLSConfig.trustRoots = .certificates([.bytes(Array(Self.samplePemCert.utf8), format: .pem)])
  408. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  409. XCTAssertEqual(nioSSLTLSConfig.certificateChain, [])
  410. XCTAssertNil(nioSSLTLSConfig.privateKey)
  411. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  412. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .fullVerification)
  413. XCTAssertEqual(
  414. nioSSLTLSConfig.trustRoots,
  415. .certificates(try NIOSSLCertificate.fromPEMBytes(Array(Self.samplePemCert.utf8)))
  416. )
  417. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  418. }
  419. func testClientTLSConfig_CustomCertificateVerification() throws {
  420. var grpcTLSConfig = HTTP2ClientTransport.Posix.TransportSecurity.TLS.defaults
  421. grpcTLSConfig.serverCertificateVerification = .noHostnameVerification
  422. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  423. XCTAssertEqual(nioSSLTLSConfig.certificateChain, [])
  424. XCTAssertNil(nioSSLTLSConfig.privateKey)
  425. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  426. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .noHostnameVerification)
  427. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  428. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  429. }
  430. }