HTTP2TransportNIOPosixTests.swift 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482
  1. /*
  2. * Copyright 2024, gRPC Authors All rights reserved.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. import GRPCCore
  17. import GRPCNIOTransportCore
  18. import GRPCNIOTransportHTTP2Posix
  19. import XCTest
  20. #if canImport(NIOSSL)
  21. import NIOSSL
  22. #endif
  23. final class HTTP2TransportNIOPosixTests: XCTestCase {
  24. func testGetListeningAddress_IPv4() async throws {
  25. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  26. address: .ipv4(host: "0.0.0.0", port: 0),
  27. config: .defaults(transportSecurity: .plaintext)
  28. )
  29. try await withThrowingDiscardingTaskGroup { group in
  30. group.addTask {
  31. try await transport.listen { _, _ in }
  32. }
  33. group.addTask {
  34. let address = try await transport.listeningAddress
  35. let ipv4Address = try XCTUnwrap(address.ipv4)
  36. XCTAssertNotEqual(ipv4Address.port, 0)
  37. transport.beginGracefulShutdown()
  38. }
  39. }
  40. }
  41. func testGetListeningAddress_IPv6() async throws {
  42. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  43. address: .ipv6(host: "::1", port: 0),
  44. config: .defaults(transportSecurity: .plaintext)
  45. )
  46. try await withThrowingDiscardingTaskGroup { group in
  47. group.addTask {
  48. try await transport.listen { _, _ in }
  49. }
  50. group.addTask {
  51. let address = try await transport.listeningAddress
  52. let ipv6Address = try XCTUnwrap(address.ipv6)
  53. XCTAssertNotEqual(ipv6Address.port, 0)
  54. transport.beginGracefulShutdown()
  55. }
  56. }
  57. }
  58. func testGetListeningAddress_UnixDomainSocket() async throws {
  59. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  60. address: .unixDomainSocket(path: "/tmp/posix-uds-test"),
  61. config: .defaults(transportSecurity: .plaintext)
  62. )
  63. try await withThrowingDiscardingTaskGroup { group in
  64. group.addTask {
  65. try await transport.listen { _, _ in }
  66. }
  67. group.addTask {
  68. let address = try await transport.listeningAddress
  69. XCTAssertEqual(
  70. address.unixDomainSocket,
  71. GRPCNIOTransportCore.SocketAddress.UnixDomainSocket(path: "/tmp/posix-uds-test")
  72. )
  73. transport.beginGracefulShutdown()
  74. }
  75. }
  76. }
  77. func testGetListeningAddress_Vsock() async throws {
  78. try XCTSkipUnless(self.vsockAvailable(), "Vsock unavailable")
  79. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  80. address: .vsock(contextID: .any, port: .any),
  81. config: .defaults(transportSecurity: .plaintext)
  82. )
  83. try await withThrowingDiscardingTaskGroup { group in
  84. group.addTask {
  85. try await transport.listen { _, _ in }
  86. }
  87. group.addTask {
  88. let address = try await transport.listeningAddress
  89. XCTAssertNotNil(address.virtualSocket)
  90. transport.beginGracefulShutdown()
  91. }
  92. }
  93. }
  94. func testGetListeningAddress_InvalidAddress() async {
  95. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  96. address: .unixDomainSocket(path: "/this/should/be/an/invalid/path"),
  97. config: .defaults(transportSecurity: .plaintext)
  98. )
  99. try? await withThrowingDiscardingTaskGroup { group in
  100. group.addTask {
  101. try await transport.listen { _, _ in }
  102. }
  103. group.addTask {
  104. do {
  105. _ = try await transport.listeningAddress
  106. XCTFail("Should have thrown a RuntimeError")
  107. } catch let error as RuntimeError {
  108. XCTAssertEqual(error.code, .serverIsStopped)
  109. XCTAssertEqual(
  110. error.message,
  111. """
  112. There is no listening address bound for this server: there may have \
  113. been an error which caused the transport to close, or it may have shut down.
  114. """
  115. )
  116. }
  117. }
  118. }
  119. }
  120. func testGetListeningAddress_StoppedListening() async throws {
  121. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  122. address: .ipv4(host: "0.0.0.0", port: 0),
  123. config: .defaults(transportSecurity: .plaintext)
  124. )
  125. try? await withThrowingDiscardingTaskGroup { group in
  126. group.addTask {
  127. try await transport.listen { _, _ in }
  128. do {
  129. _ = try await transport.listeningAddress
  130. XCTFail("Should have thrown a RuntimeError")
  131. } catch let error as RuntimeError {
  132. XCTAssertEqual(error.code, .serverIsStopped)
  133. XCTAssertEqual(
  134. error.message,
  135. """
  136. There is no listening address bound for this server: there may have \
  137. been an error which caused the transport to close, or it may have shut down.
  138. """
  139. )
  140. }
  141. }
  142. group.addTask {
  143. let address = try await transport.listeningAddress
  144. XCTAssertNotNil(address.ipv4)
  145. transport.beginGracefulShutdown()
  146. }
  147. }
  148. }
  149. func testServerConfig_Defaults() throws {
  150. let grpcConfig = HTTP2ServerTransport.Posix.Config.defaults(
  151. transportSecurity: .plaintext
  152. )
  153. XCTAssertEqual(grpcConfig.compression, HTTP2ServerTransport.Config.Compression.defaults)
  154. XCTAssertEqual(grpcConfig.connection, HTTP2ServerTransport.Config.Connection.defaults)
  155. XCTAssertEqual(grpcConfig.http2, HTTP2ServerTransport.Config.HTTP2.defaults)
  156. XCTAssertEqual(grpcConfig.rpc, HTTP2ServerTransport.Config.RPC.defaults)
  157. }
  158. func testClientConfig_Defaults() throws {
  159. let grpcConfig = HTTP2ClientTransport.Posix.Config.defaults(
  160. transportSecurity: .plaintext
  161. )
  162. XCTAssertEqual(grpcConfig.compression, HTTP2ClientTransport.Config.Compression.defaults)
  163. XCTAssertEqual(grpcConfig.connection, HTTP2ClientTransport.Config.Connection.defaults)
  164. XCTAssertEqual(grpcConfig.http2, HTTP2ClientTransport.Config.HTTP2.defaults)
  165. XCTAssertEqual(grpcConfig.backoff, HTTP2ClientTransport.Config.Backoff.defaults)
  166. }
  167. #if canImport(NIOSSL)
  168. static let samplePemCert = """
  169. -----BEGIN CERTIFICATE-----
  170. MIIGGzCCBAOgAwIBAgIJAJ/X0Fo0ynmEMA0GCSqGSIb3DQEBCwUAMIGjMQswCQYD
  171. VQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNU2FuIEZyYW5z
  172. b2t5bzEuMCwGA1UECgwlU2FuIEZyYW5zb2t5byBJbnN0aXR1dGUgb2YgVGVjaG5v
  173. bG9neTEVMBMGA1UECwwMUm9ib3RpY3MgTGFiMSAwHgYDVQQDDBdyb2JvdHMuc2Fu
  174. ZnJhbnNva3lvLmVkdTAeFw0xNzEwMTYyMTAxMDJaFw00NzEwMDkyMTAxMDJaMIGj
  175. MQswCQYDVQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNU2Fu
  176. IEZyYW5zb2t5bzEuMCwGA1UECgwlU2FuIEZyYW5zb2t5byBJbnN0aXR1dGUgb2Yg
  177. VGVjaG5vbG9neTEVMBMGA1UECwwMUm9ib3RpY3MgTGFiMSAwHgYDVQQDDBdyb2Jv
  178. dHMuc2FuZnJhbnNva3lvLmVkdTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
  179. ggIBAO9rzJOOE8cmsIqAJMCrHDxkBAMgZhMsJ863MnWtVz5JIJK6CKI/Nu26tEzo
  180. kHy3EI9565RwikvauheMsWaTFA4PD/P+s1DtxRCGIcK5x+SoTN7Drn5ZueoJNZRf
  181. TYuN+gwyhprzrZrYjXpvEVPYuSIeUqK5XGrTyFA2uGj9wY3f9IF4rd7JT0ewRb1U
  182. 8OcR7xQbXKGjkY4iJE1TyfmIsBZboKaG/aYa9KbnWyTkDssaELWUIKrjwwuPgVgS
  183. vlAYmo12MlsGEzkO9z78jvFmhUOsaEldM8Ua2AhOKW0oSYgauVuro/Ap/o5zn8PD
  184. IDapl9g+5vjN2LucqX2a9utoFvxSKXT4NvfpL9fJvzdBNMM4xpqtHIkV0fkiMbWk
  185. EW2FFlOXKnIJV8wT4a9iduuIDMg8O7oc+gt9pG9MHTWthXm4S29DARTqfZ48bW77
  186. z8RrEURV03o05b/twuAJSRyyOCUi61yMo3YNytebjY2W3Pxqpq+YmT5qhqBZDLlT
  187. LMptuFdISv6SQgg7JoFHGMWRXUavMj/sn5qZD4pQyZToHJ2Vtg5W/MI1pKwc3oKD
  188. 6M3/7Gf35r92V/ox6XT7+fnEsAH8AtQiZJkEbvzJ5lpUihSIaV3a/S+jnk7Lw8Tp
  189. vjtpfjOg+wBblc38Oa9tk2WdXwYDbnvbeL26WmyHwQTUBi1jAgMBAAGjUDBOMB0G
  190. A1UdDgQWBBToPRmTBQEF5F5LcPiUI5qBNPBU+DAfBgNVHSMEGDAWgBToPRmTBQEF
  191. 5F5LcPiUI5qBNPBU+DAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBCwUAA4ICAQCY
  192. gxM5lufF2lTB9sH0s1E1VTERv37qoapNP+aw06oZkAD67QOTXFzbsM3JU1diY6rV
  193. Y0g9CLzRO7gZY+kmi1WWnsYiMMSIGjIfsB8S+ot43LME+AJXPVeDZQnoZ6KQ/9r+
  194. 71Umi4AKLoZ9dInyUIM3EHg9pg5B0eEINrh4J+OPGtlC3NMiWxdmIkZwzfXa+64Z
  195. 8k5aX5piMTI+9BQSMWw5l7tFT/PISuI8b/Ln4IUBXKA0xkONXVnjPOmS0h7MBoc2
  196. EipChDKnK+Mtm9GQewOCKdS2nsrCndGkIBnUix4ConUYIoywVzWGMD+9OzKNg76d
  197. O6A7MxdjEdKhf1JDvklxInntDUDTlSFL4iEFELwyRseoTzj8vJE+cL6h6ClasYQ6
  198. p0EeL3UpICYerfIvPhohftCivCH3k7Q1BSf0fq73cQ55nrFAHrqqYjD7HBeBS9hn
  199. 3L6bz9Eo6U9cuxX42k3l1N44BmgcDPin0+CRTirEmahUMb3gmvoSZqQ3Cz86GkIg
  200. 7cNJosc9NyevQlU9SX3ptEbv33tZtlB5GwgZ2hiGBTY0C3HaVFjLpQiSS5ygZLgI
  201. /+AKtah7sTHIAtpUH1ZZEgKPl1Hg6J4x/dBkuk3wxPommNHaYaHREXF+fHMhBrSi
  202. yH8agBmmECpa21SVnr7vrL+KSqfuF+GxwjSNsSR4SA==
  203. -----END CERTIFICATE-----
  204. """
  205. static let samplePemKey = """
  206. -----BEGIN RSA PRIVATE KEY-----
  207. MIIJKAIBAAKCAgEA72vMk44TxyawioAkwKscPGQEAyBmEywnzrcyda1XPkkgkroI
  208. oj827bq0TOiQfLcQj3nrlHCKS9q6F4yxZpMUDg8P8/6zUO3FEIYhwrnH5KhM3sOu
  209. flm56gk1lF9Ni436DDKGmvOtmtiNem8RU9i5Ih5SorlcatPIUDa4aP3Bjd/0gXit
  210. 3slPR7BFvVTw5xHvFBtcoaORjiIkTVPJ+YiwFlugpob9phr0pudbJOQOyxoQtZQg
  211. quPDC4+BWBK+UBiajXYyWwYTOQ73PvyO8WaFQ6xoSV0zxRrYCE4pbShJiBq5W6uj
  212. 8Cn+jnOfw8MgNqmX2D7m+M3Yu5ypfZr262gW/FIpdPg29+kv18m/N0E0wzjGmq0c
  213. iRXR+SIxtaQRbYUWU5cqcglXzBPhr2J264gMyDw7uhz6C32kb0wdNa2FebhLb0MB
  214. FOp9njxtbvvPxGsRRFXTejTlv+3C4AlJHLI4JSLrXIyjdg3K15uNjZbc/Gqmr5iZ
  215. PmqGoFkMuVMsym24V0hK/pJCCDsmgUcYxZFdRq8yP+yfmpkPilDJlOgcnZW2Dlb8
  216. wjWkrBzegoPozf/sZ/fmv3ZX+jHpdPv5+cSwAfwC1CJkmQRu/MnmWlSKFIhpXdr9
  217. L6OeTsvDxOm+O2l+M6D7AFuVzfw5r22TZZ1fBgNue9t4vbpabIfBBNQGLWMCAwEA
  218. AQKCAgArWV9PEBhwpIaubQk6gUC5hnpbfpA8xG/os67FM79qHZ9yMZDCn6N4Y6el
  219. jS4sBpFPCQoodD/2AAJVpTmxksu8x+lhiio5avOVTFPsh+qzce2JH/EGG4TX5Rb4
  220. aFEIBYrSjotknt49/RuQoW+HuOO8U7UulVUwWmwYae/1wow6/eOtVYZVoilil33p
  221. C+oaTFr3TwT0l0MRcwkTnyogrikDw09RF3vxiUvmtFkCUvCCwZNo7QsFJfv4qeEH
  222. a01d/zZsiowPgwgT+qu1kdDn0GIsoJi5P9DRzUx0JILHqtW1ePE6sdca8t+ON00k
  223. Cr5YZ1iA5NK5Fbw6K+FcRqSSduRCLYXAnI5GH1zWMki5TUdl+psvCnpdZK5wysGe
  224. tYfIbrVHXIlg7J3R4BrbMF4q3HwOppTHMrqsGyRVCCSjDwXjreugInV0CRzlapDs
  225. JNEVyrbt6Ild6ie7c1AJqTpibJ9lVYRVpG35Dni9RJy5Uk5m89uWnF9PCjCRCHOf
  226. 4UATY+qie6wlu0E8y43LcTvDi8ROXQQoCnys2ES8DmS+GKJ1uzG1l8jx3jF9BMAJ
  227. kyzZfSmPwuS2NUk8sftYQ8neJSgk4DOV4h7x5ghaBWYzseomy3uo3gD4IyuiO56K
  228. y7IYZnXSt2s8LfzhVcB5I4IZbSIvP/MAEkGMC09SV+dEcEJSQQKCAQEA/uJex1ef
  229. g+q4gb/C4/biPr+ZRFheVuHu49ES0DXxoxmTbosGRDPRFBLwtPxCLuzHXa1Du2Vc
  230. c0E12zLy8wNczv5bGAxynPo57twJCyeptFNFJkb+0uxRrCi+CZ56Qertg2jr460Q
  231. cg+TMYxauDleLzR7uwL6VnOhTSq3CVTA2TrQ+kjIHgVqmmpwgk5bPBRDj2EuqdyD
  232. dEQmt4z/0fFFBmW6iBcXS9y8Q1rCnAHKjDUEoXKyJYL85szupjUuerOt6iTIe7CJ
  233. pH0REwQO4djwM4Ju/PEGfBs+RqgNXoHmBMcFdf9RdogCuFit7lX0+LlRT/KJitan
  234. LaaFgY1TXTVkcwKCAQEA8HgZuPGVHQTMHCOfNesXxnCY9Dwqa9ZVukqDLMaZ0TVy
  235. PIqXhdNeVCWpP+VXWhj9JRLNuW8VWYMxk+poRmsZgbdwSbq30ljsGlfoupCpXfhd
  236. AIhUeRwLVl4XnaHW+MjAmY/rqO156/LvNbV5e0YsqObzynlTczmhhYwi48x1tdf0
  237. iuCn8o3+Ikv8xM7MuMnv5QmGp2l8Q3BhwxLN1x4MXfbG+4BGsqavudIkt71RVbSb
  238. Sp7U4Khq3UEnCekrceRLQpJykRFu11/ntPsJ0Q+fLuvuRUMg/wsq8WTuVlwLrw46
  239. hlRcq6S99jc9j2TbidxHyps6j8SDnEsEFHMHH8THUQKCAQAd03WN1CYZdL0UidEP
  240. hhNhjmAsDD814Yhn5k5SSQ22rUaAWApqrrmXpMPAGgjQnuqRfrX/VtQjtIzN0r91
  241. Sn5wxnj4bnR3BB0FY4A3avPD4z6jRQmKuxavk7DxRTc/QXN7vipkYRscjdAGq0ru
  242. ZeAsm/Kipq2Oskc81XPHxsAua2CK+TtZr/6ShUQXK34noKNrQs8IF4LWdycksX46
  243. Hgaawgq65CDYwsLRCuzc/qSqFYYuMlLAavyXMYH3tx9yQlZmoNlJCBaDRhNaa04m
  244. hZFOJcRBGx9MJI/8CqxN09uL0ZJFBZSNz0qqMc5gpnRdKqpmNZZ8xbOYdvUGfPg1
  245. XwsbAoIBAGdH7iRU/mp8SP48/oC1/HwqmEcuIDo40JE2t6hflGkav3npPLMp2XXi
  246. xxK+egokeXWW4e0nHNBZXM3e+/JixY3FL+E65QDfWGjoIPkgcN3/clJsO3vY47Ww
  247. rAv0GtS3xKEwA1OGy7rfmIZE72xW84+HwmXQPltbAVjOm52jj1sO6eVMIFY5TlGE
  248. uYf+Gkez0+lXchItaEW+2v5h8S7XpRAmkcgrjDHnDcqNy19vXKOm8pvWJDBppZxq
  249. A05qa1J7byekprhP+H9gnbBJsimsv/3zL19oOZ/ROBx98S/+ULZbMh/H1BWUqFI7
  250. 36Da/L/1cJBAo6JkEPLr9VCjJwgqCEECggEBAI6+35Lf4jDwRPvZV7kE+FQuFp1G
  251. /tKxIJtPOZU3sbOVlsFsOoyEfV6+HbpeWxlWnrOnKRFOLoC3s5MVTjPglu1rC0ZX
  252. 4b0wMetvun5S1MGadB808rvu5EsEB1vznz1vOXV8oDdkdgBiiUcKewSeCrG1IrXy
  253. B9ux859S3JjELzeuNdz+xHqu2AqR22gtqN72tJUEQ95qLGZ8vo+ytY9MDVDqoSWJ
  254. 9pqHXFUVLmwHTM0/pciXN4Kx1IL9FZ3fjXgME0vdYpWYQkcvSKLsswXN+LnYcpoQ
  255. h33H/Kz4yji7jPN6Uk9wMyG7XGqpjYAuKCd6V3HEHUiGJZzho/VBgb3TVnw=
  256. -----END RSA PRIVATE KEY-----
  257. """
  258. func testServerTLSConfig_Defaults() throws {
  259. let grpcTLSConfig = HTTP2ServerTransport.Posix.Config.TLS.defaults(
  260. certificateChain: [
  261. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  262. ],
  263. privateKey: .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  264. )
  265. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  266. XCTAssertEqual(
  267. nioSSLTLSConfig.certificateChain,
  268. [
  269. .certificate(
  270. try NIOSSLCertificate(
  271. bytes: Array(Self.samplePemCert.utf8),
  272. format: .pem
  273. )
  274. )
  275. ]
  276. )
  277. XCTAssertEqual(
  278. nioSSLTLSConfig.privateKey,
  279. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  280. )
  281. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  282. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .none)
  283. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  284. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  285. }
  286. func testServerTLSConfig_mTLS() throws {
  287. let grpcTLSConfig = HTTP2ServerTransport.Posix.Config.TLS.mTLS(
  288. certificateChain: [
  289. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  290. ],
  291. privateKey: .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  292. )
  293. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  294. XCTAssertEqual(
  295. nioSSLTLSConfig.certificateChain,
  296. [
  297. .certificate(
  298. try NIOSSLCertificate(
  299. bytes: Array(Self.samplePemCert.utf8),
  300. format: .pem
  301. )
  302. )
  303. ]
  304. )
  305. XCTAssertEqual(
  306. nioSSLTLSConfig.privateKey,
  307. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  308. )
  309. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  310. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .noHostnameVerification)
  311. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  312. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  313. }
  314. func testServerTLSConfig_FullVerifyClient() throws {
  315. var grpcTLSConfig = HTTP2ServerTransport.Posix.Config.TLS.defaults(
  316. certificateChain: [
  317. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  318. ],
  319. privateKey: .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  320. )
  321. grpcTLSConfig.clientCertificateVerification = .fullVerification
  322. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  323. XCTAssertEqual(
  324. nioSSLTLSConfig.certificateChain,
  325. [
  326. .certificate(
  327. try NIOSSLCertificate(
  328. bytes: Array(Self.samplePemCert.utf8),
  329. format: .pem
  330. )
  331. )
  332. ]
  333. )
  334. XCTAssertEqual(
  335. nioSSLTLSConfig.privateKey,
  336. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  337. )
  338. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  339. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .fullVerification)
  340. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  341. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  342. }
  343. func testServerTLSConfig_CustomTrustRoots() throws {
  344. var grpcTLSConfig = HTTP2ServerTransport.Posix.Config.TLS.defaults(
  345. certificateChain: [
  346. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  347. ],
  348. privateKey: .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  349. )
  350. grpcTLSConfig.trustRoots = .certificates([.bytes(Array(Self.samplePemCert.utf8), format: .pem)])
  351. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  352. XCTAssertEqual(
  353. nioSSLTLSConfig.certificateChain,
  354. [
  355. .certificate(
  356. try NIOSSLCertificate(
  357. bytes: Array(Self.samplePemCert.utf8),
  358. format: .pem
  359. )
  360. )
  361. ]
  362. )
  363. XCTAssertEqual(
  364. nioSSLTLSConfig.privateKey,
  365. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  366. )
  367. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  368. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .none)
  369. XCTAssertEqual(
  370. nioSSLTLSConfig.trustRoots,
  371. .certificates(try NIOSSLCertificate.fromPEMBytes(Array(Self.samplePemCert.utf8)))
  372. )
  373. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  374. }
  375. func testClientTLSConfig_Defaults() throws {
  376. let grpcTLSConfig = HTTP2ClientTransport.Posix.Config.TLS.defaults
  377. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  378. XCTAssertEqual(nioSSLTLSConfig.certificateChain, [])
  379. XCTAssertNil(nioSSLTLSConfig.privateKey)
  380. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  381. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .fullVerification)
  382. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  383. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  384. }
  385. func testClientTLSConfig_CustomCertificateChainAndPrivateKey() throws {
  386. var grpcTLSConfig = HTTP2ClientTransport.Posix.Config.TLS.defaults
  387. grpcTLSConfig.certificateChain = [
  388. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  389. ]
  390. grpcTLSConfig.privateKey = .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  391. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  392. XCTAssertEqual(
  393. nioSSLTLSConfig.certificateChain,
  394. [
  395. .certificate(
  396. try NIOSSLCertificate(
  397. bytes: Array(Self.samplePemCert.utf8),
  398. format: .pem
  399. )
  400. )
  401. ]
  402. )
  403. XCTAssertEqual(
  404. nioSSLTLSConfig.privateKey,
  405. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  406. )
  407. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  408. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .fullVerification)
  409. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  410. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  411. }
  412. func testClientTLSConfig_CustomTrustRoots() throws {
  413. var grpcTLSConfig = HTTP2ClientTransport.Posix.Config.TLS.defaults
  414. grpcTLSConfig.trustRoots = .certificates([.bytes(Array(Self.samplePemCert.utf8), format: .pem)])
  415. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  416. XCTAssertEqual(nioSSLTLSConfig.certificateChain, [])
  417. XCTAssertNil(nioSSLTLSConfig.privateKey)
  418. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  419. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .fullVerification)
  420. XCTAssertEqual(
  421. nioSSLTLSConfig.trustRoots,
  422. .certificates(try NIOSSLCertificate.fromPEMBytes(Array(Self.samplePemCert.utf8)))
  423. )
  424. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  425. }
  426. func testClientTLSConfig_CustomCertificateVerification() throws {
  427. var grpcTLSConfig = HTTP2ClientTransport.Posix.Config.TLS.defaults
  428. grpcTLSConfig.serverCertificateVerification = .noHostnameVerification
  429. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  430. XCTAssertEqual(nioSSLTLSConfig.certificateChain, [])
  431. XCTAssertNil(nioSSLTLSConfig.privateKey)
  432. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  433. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .noHostnameVerification)
  434. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  435. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  436. }
  437. #endif
  438. }