HTTP2TransportNIOPosixTests.swift 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474
  1. /*
  2. * Copyright 2024, gRPC Authors All rights reserved.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. import GRPCCore
  17. import GRPCNIOTransportCore
  18. import GRPCNIOTransportHTTP2Posix
  19. import NIOSSL
  20. import XCTest
  21. @available(gRPCSwiftNIOTransport 2.0, *)
  22. final class HTTP2TransportNIOPosixTests: XCTestCase {
  23. func testGetListeningAddress_IPv4() async throws {
  24. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  25. address: .ipv4(host: "0.0.0.0", port: 0),
  26. transportSecurity: .plaintext
  27. )
  28. try await withThrowingDiscardingTaskGroup { group in
  29. group.addTask {
  30. try await transport.listen { _, _ in }
  31. }
  32. group.addTask {
  33. let address = try await transport.listeningAddress
  34. let ipv4Address = try XCTUnwrap(address.ipv4)
  35. XCTAssertNotEqual(ipv4Address.port, 0)
  36. transport.beginGracefulShutdown()
  37. }
  38. }
  39. }
  40. func testGetListeningAddress_IPv6() async throws {
  41. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  42. address: .ipv6(host: "::1", port: 0),
  43. transportSecurity: .plaintext
  44. )
  45. try await withThrowingDiscardingTaskGroup { group in
  46. group.addTask {
  47. try await transport.listen { _, _ in }
  48. }
  49. group.addTask {
  50. let address = try await transport.listeningAddress
  51. let ipv6Address = try XCTUnwrap(address.ipv6)
  52. XCTAssertNotEqual(ipv6Address.port, 0)
  53. transport.beginGracefulShutdown()
  54. }
  55. }
  56. }
  57. func testGetListeningAddress_UnixDomainSocket() async throws {
  58. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  59. address: .unixDomainSocket(path: "/tmp/posix-uds-test"),
  60. transportSecurity: .plaintext
  61. )
  62. try await withThrowingDiscardingTaskGroup { group in
  63. group.addTask {
  64. try await transport.listen { _, _ in }
  65. }
  66. group.addTask {
  67. let address = try await transport.listeningAddress
  68. XCTAssertEqual(
  69. address.unixDomainSocket,
  70. GRPCNIOTransportCore.SocketAddress.UnixDomainSocket(path: "/tmp/posix-uds-test")
  71. )
  72. transport.beginGracefulShutdown()
  73. }
  74. }
  75. }
  76. func testGetListeningAddress_Vsock() async throws {
  77. try XCTSkipUnless(self.vsockAvailable(), "Vsock unavailable")
  78. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  79. address: .vsock(contextID: .any, port: .any),
  80. transportSecurity: .plaintext
  81. )
  82. try await withThrowingDiscardingTaskGroup { group in
  83. group.addTask {
  84. try await transport.listen { _, _ in }
  85. }
  86. group.addTask {
  87. let address = try await transport.listeningAddress
  88. XCTAssertNotNil(address.virtualSocket)
  89. transport.beginGracefulShutdown()
  90. }
  91. }
  92. }
  93. func testGetListeningAddress_InvalidAddress() async {
  94. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  95. address: .unixDomainSocket(path: "/this/should/be/an/invalid/path"),
  96. transportSecurity: .plaintext
  97. )
  98. try? await withThrowingDiscardingTaskGroup { group in
  99. group.addTask {
  100. try await transport.listen { _, _ in }
  101. }
  102. group.addTask {
  103. do {
  104. _ = try await transport.listeningAddress
  105. XCTFail("Should have thrown a RuntimeError")
  106. } catch let error as RuntimeError {
  107. XCTAssertEqual(error.code, .serverIsStopped)
  108. XCTAssertEqual(
  109. error.message,
  110. """
  111. There is no listening address bound for this server: there may have \
  112. been an error which caused the transport to close, or it may have shut down.
  113. """
  114. )
  115. }
  116. }
  117. }
  118. }
  119. func testGetListeningAddress_StoppedListening() async throws {
  120. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.Posix(
  121. address: .ipv4(host: "0.0.0.0", port: 0),
  122. transportSecurity: .plaintext
  123. )
  124. try? await withThrowingDiscardingTaskGroup { group in
  125. group.addTask {
  126. try await transport.listen { _, _ in }
  127. do {
  128. _ = try await transport.listeningAddress
  129. XCTFail("Should have thrown a RuntimeError")
  130. } catch let error as RuntimeError {
  131. XCTAssertEqual(error.code, .serverIsStopped)
  132. XCTAssertEqual(
  133. error.message,
  134. """
  135. There is no listening address bound for this server: there may have \
  136. been an error which caused the transport to close, or it may have shut down.
  137. """
  138. )
  139. }
  140. }
  141. group.addTask {
  142. let address = try await transport.listeningAddress
  143. XCTAssertNotNil(address.ipv4)
  144. transport.beginGracefulShutdown()
  145. }
  146. }
  147. }
  148. func testServerConfig_Defaults() throws {
  149. let grpcConfig = HTTP2ServerTransport.Posix.Config.defaults
  150. XCTAssertEqual(grpcConfig.compression, HTTP2ServerTransport.Config.Compression.defaults)
  151. XCTAssertEqual(grpcConfig.connection, HTTP2ServerTransport.Config.Connection.defaults)
  152. XCTAssertEqual(grpcConfig.http2, HTTP2ServerTransport.Config.HTTP2.defaults)
  153. XCTAssertEqual(grpcConfig.rpc, HTTP2ServerTransport.Config.RPC.defaults)
  154. }
  155. func testClientConfig_Defaults() throws {
  156. let grpcConfig = HTTP2ClientTransport.Posix.Config.defaults
  157. XCTAssertEqual(grpcConfig.compression, HTTP2ClientTransport.Config.Compression.defaults)
  158. XCTAssertEqual(grpcConfig.connection, HTTP2ClientTransport.Config.Connection.defaults)
  159. XCTAssertEqual(grpcConfig.http2, HTTP2ClientTransport.Config.HTTP2.defaults)
  160. XCTAssertEqual(grpcConfig.backoff, HTTP2ClientTransport.Config.Backoff.defaults)
  161. }
  162. static let samplePemCert = """
  163. -----BEGIN CERTIFICATE-----
  164. MIIGGzCCBAOgAwIBAgIJAJ/X0Fo0ynmEMA0GCSqGSIb3DQEBCwUAMIGjMQswCQYD
  165. VQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNU2FuIEZyYW5z
  166. b2t5bzEuMCwGA1UECgwlU2FuIEZyYW5zb2t5byBJbnN0aXR1dGUgb2YgVGVjaG5v
  167. bG9neTEVMBMGA1UECwwMUm9ib3RpY3MgTGFiMSAwHgYDVQQDDBdyb2JvdHMuc2Fu
  168. ZnJhbnNva3lvLmVkdTAeFw0xNzEwMTYyMTAxMDJaFw00NzEwMDkyMTAxMDJaMIGj
  169. MQswCQYDVQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNU2Fu
  170. IEZyYW5zb2t5bzEuMCwGA1UECgwlU2FuIEZyYW5zb2t5byBJbnN0aXR1dGUgb2Yg
  171. VGVjaG5vbG9neTEVMBMGA1UECwwMUm9ib3RpY3MgTGFiMSAwHgYDVQQDDBdyb2Jv
  172. dHMuc2FuZnJhbnNva3lvLmVkdTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
  173. ggIBAO9rzJOOE8cmsIqAJMCrHDxkBAMgZhMsJ863MnWtVz5JIJK6CKI/Nu26tEzo
  174. kHy3EI9565RwikvauheMsWaTFA4PD/P+s1DtxRCGIcK5x+SoTN7Drn5ZueoJNZRf
  175. TYuN+gwyhprzrZrYjXpvEVPYuSIeUqK5XGrTyFA2uGj9wY3f9IF4rd7JT0ewRb1U
  176. 8OcR7xQbXKGjkY4iJE1TyfmIsBZboKaG/aYa9KbnWyTkDssaELWUIKrjwwuPgVgS
  177. vlAYmo12MlsGEzkO9z78jvFmhUOsaEldM8Ua2AhOKW0oSYgauVuro/Ap/o5zn8PD
  178. IDapl9g+5vjN2LucqX2a9utoFvxSKXT4NvfpL9fJvzdBNMM4xpqtHIkV0fkiMbWk
  179. EW2FFlOXKnIJV8wT4a9iduuIDMg8O7oc+gt9pG9MHTWthXm4S29DARTqfZ48bW77
  180. z8RrEURV03o05b/twuAJSRyyOCUi61yMo3YNytebjY2W3Pxqpq+YmT5qhqBZDLlT
  181. LMptuFdISv6SQgg7JoFHGMWRXUavMj/sn5qZD4pQyZToHJ2Vtg5W/MI1pKwc3oKD
  182. 6M3/7Gf35r92V/ox6XT7+fnEsAH8AtQiZJkEbvzJ5lpUihSIaV3a/S+jnk7Lw8Tp
  183. vjtpfjOg+wBblc38Oa9tk2WdXwYDbnvbeL26WmyHwQTUBi1jAgMBAAGjUDBOMB0G
  184. A1UdDgQWBBToPRmTBQEF5F5LcPiUI5qBNPBU+DAfBgNVHSMEGDAWgBToPRmTBQEF
  185. 5F5LcPiUI5qBNPBU+DAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBCwUAA4ICAQCY
  186. gxM5lufF2lTB9sH0s1E1VTERv37qoapNP+aw06oZkAD67QOTXFzbsM3JU1diY6rV
  187. Y0g9CLzRO7gZY+kmi1WWnsYiMMSIGjIfsB8S+ot43LME+AJXPVeDZQnoZ6KQ/9r+
  188. 71Umi4AKLoZ9dInyUIM3EHg9pg5B0eEINrh4J+OPGtlC3NMiWxdmIkZwzfXa+64Z
  189. 8k5aX5piMTI+9BQSMWw5l7tFT/PISuI8b/Ln4IUBXKA0xkONXVnjPOmS0h7MBoc2
  190. EipChDKnK+Mtm9GQewOCKdS2nsrCndGkIBnUix4ConUYIoywVzWGMD+9OzKNg76d
  191. O6A7MxdjEdKhf1JDvklxInntDUDTlSFL4iEFELwyRseoTzj8vJE+cL6h6ClasYQ6
  192. p0EeL3UpICYerfIvPhohftCivCH3k7Q1BSf0fq73cQ55nrFAHrqqYjD7HBeBS9hn
  193. 3L6bz9Eo6U9cuxX42k3l1N44BmgcDPin0+CRTirEmahUMb3gmvoSZqQ3Cz86GkIg
  194. 7cNJosc9NyevQlU9SX3ptEbv33tZtlB5GwgZ2hiGBTY0C3HaVFjLpQiSS5ygZLgI
  195. /+AKtah7sTHIAtpUH1ZZEgKPl1Hg6J4x/dBkuk3wxPommNHaYaHREXF+fHMhBrSi
  196. yH8agBmmECpa21SVnr7vrL+KSqfuF+GxwjSNsSR4SA==
  197. -----END CERTIFICATE-----
  198. """
  199. static let samplePemKey = """
  200. -----BEGIN RSA PRIVATE KEY-----
  201. MIIJKAIBAAKCAgEA72vMk44TxyawioAkwKscPGQEAyBmEywnzrcyda1XPkkgkroI
  202. oj827bq0TOiQfLcQj3nrlHCKS9q6F4yxZpMUDg8P8/6zUO3FEIYhwrnH5KhM3sOu
  203. flm56gk1lF9Ni436DDKGmvOtmtiNem8RU9i5Ih5SorlcatPIUDa4aP3Bjd/0gXit
  204. 3slPR7BFvVTw5xHvFBtcoaORjiIkTVPJ+YiwFlugpob9phr0pudbJOQOyxoQtZQg
  205. quPDC4+BWBK+UBiajXYyWwYTOQ73PvyO8WaFQ6xoSV0zxRrYCE4pbShJiBq5W6uj
  206. 8Cn+jnOfw8MgNqmX2D7m+M3Yu5ypfZr262gW/FIpdPg29+kv18m/N0E0wzjGmq0c
  207. iRXR+SIxtaQRbYUWU5cqcglXzBPhr2J264gMyDw7uhz6C32kb0wdNa2FebhLb0MB
  208. FOp9njxtbvvPxGsRRFXTejTlv+3C4AlJHLI4JSLrXIyjdg3K15uNjZbc/Gqmr5iZ
  209. PmqGoFkMuVMsym24V0hK/pJCCDsmgUcYxZFdRq8yP+yfmpkPilDJlOgcnZW2Dlb8
  210. wjWkrBzegoPozf/sZ/fmv3ZX+jHpdPv5+cSwAfwC1CJkmQRu/MnmWlSKFIhpXdr9
  211. L6OeTsvDxOm+O2l+M6D7AFuVzfw5r22TZZ1fBgNue9t4vbpabIfBBNQGLWMCAwEA
  212. AQKCAgArWV9PEBhwpIaubQk6gUC5hnpbfpA8xG/os67FM79qHZ9yMZDCn6N4Y6el
  213. jS4sBpFPCQoodD/2AAJVpTmxksu8x+lhiio5avOVTFPsh+qzce2JH/EGG4TX5Rb4
  214. aFEIBYrSjotknt49/RuQoW+HuOO8U7UulVUwWmwYae/1wow6/eOtVYZVoilil33p
  215. C+oaTFr3TwT0l0MRcwkTnyogrikDw09RF3vxiUvmtFkCUvCCwZNo7QsFJfv4qeEH
  216. a01d/zZsiowPgwgT+qu1kdDn0GIsoJi5P9DRzUx0JILHqtW1ePE6sdca8t+ON00k
  217. Cr5YZ1iA5NK5Fbw6K+FcRqSSduRCLYXAnI5GH1zWMki5TUdl+psvCnpdZK5wysGe
  218. tYfIbrVHXIlg7J3R4BrbMF4q3HwOppTHMrqsGyRVCCSjDwXjreugInV0CRzlapDs
  219. JNEVyrbt6Ild6ie7c1AJqTpibJ9lVYRVpG35Dni9RJy5Uk5m89uWnF9PCjCRCHOf
  220. 4UATY+qie6wlu0E8y43LcTvDi8ROXQQoCnys2ES8DmS+GKJ1uzG1l8jx3jF9BMAJ
  221. kyzZfSmPwuS2NUk8sftYQ8neJSgk4DOV4h7x5ghaBWYzseomy3uo3gD4IyuiO56K
  222. y7IYZnXSt2s8LfzhVcB5I4IZbSIvP/MAEkGMC09SV+dEcEJSQQKCAQEA/uJex1ef
  223. g+q4gb/C4/biPr+ZRFheVuHu49ES0DXxoxmTbosGRDPRFBLwtPxCLuzHXa1Du2Vc
  224. c0E12zLy8wNczv5bGAxynPo57twJCyeptFNFJkb+0uxRrCi+CZ56Qertg2jr460Q
  225. cg+TMYxauDleLzR7uwL6VnOhTSq3CVTA2TrQ+kjIHgVqmmpwgk5bPBRDj2EuqdyD
  226. dEQmt4z/0fFFBmW6iBcXS9y8Q1rCnAHKjDUEoXKyJYL85szupjUuerOt6iTIe7CJ
  227. pH0REwQO4djwM4Ju/PEGfBs+RqgNXoHmBMcFdf9RdogCuFit7lX0+LlRT/KJitan
  228. LaaFgY1TXTVkcwKCAQEA8HgZuPGVHQTMHCOfNesXxnCY9Dwqa9ZVukqDLMaZ0TVy
  229. PIqXhdNeVCWpP+VXWhj9JRLNuW8VWYMxk+poRmsZgbdwSbq30ljsGlfoupCpXfhd
  230. AIhUeRwLVl4XnaHW+MjAmY/rqO156/LvNbV5e0YsqObzynlTczmhhYwi48x1tdf0
  231. iuCn8o3+Ikv8xM7MuMnv5QmGp2l8Q3BhwxLN1x4MXfbG+4BGsqavudIkt71RVbSb
  232. Sp7U4Khq3UEnCekrceRLQpJykRFu11/ntPsJ0Q+fLuvuRUMg/wsq8WTuVlwLrw46
  233. hlRcq6S99jc9j2TbidxHyps6j8SDnEsEFHMHH8THUQKCAQAd03WN1CYZdL0UidEP
  234. hhNhjmAsDD814Yhn5k5SSQ22rUaAWApqrrmXpMPAGgjQnuqRfrX/VtQjtIzN0r91
  235. Sn5wxnj4bnR3BB0FY4A3avPD4z6jRQmKuxavk7DxRTc/QXN7vipkYRscjdAGq0ru
  236. ZeAsm/Kipq2Oskc81XPHxsAua2CK+TtZr/6ShUQXK34noKNrQs8IF4LWdycksX46
  237. Hgaawgq65CDYwsLRCuzc/qSqFYYuMlLAavyXMYH3tx9yQlZmoNlJCBaDRhNaa04m
  238. hZFOJcRBGx9MJI/8CqxN09uL0ZJFBZSNz0qqMc5gpnRdKqpmNZZ8xbOYdvUGfPg1
  239. XwsbAoIBAGdH7iRU/mp8SP48/oC1/HwqmEcuIDo40JE2t6hflGkav3npPLMp2XXi
  240. xxK+egokeXWW4e0nHNBZXM3e+/JixY3FL+E65QDfWGjoIPkgcN3/clJsO3vY47Ww
  241. rAv0GtS3xKEwA1OGy7rfmIZE72xW84+HwmXQPltbAVjOm52jj1sO6eVMIFY5TlGE
  242. uYf+Gkez0+lXchItaEW+2v5h8S7XpRAmkcgrjDHnDcqNy19vXKOm8pvWJDBppZxq
  243. A05qa1J7byekprhP+H9gnbBJsimsv/3zL19oOZ/ROBx98S/+ULZbMh/H1BWUqFI7
  244. 36Da/L/1cJBAo6JkEPLr9VCjJwgqCEECggEBAI6+35Lf4jDwRPvZV7kE+FQuFp1G
  245. /tKxIJtPOZU3sbOVlsFsOoyEfV6+HbpeWxlWnrOnKRFOLoC3s5MVTjPglu1rC0ZX
  246. 4b0wMetvun5S1MGadB808rvu5EsEB1vznz1vOXV8oDdkdgBiiUcKewSeCrG1IrXy
  247. B9ux859S3JjELzeuNdz+xHqu2AqR22gtqN72tJUEQ95qLGZ8vo+ytY9MDVDqoSWJ
  248. 9pqHXFUVLmwHTM0/pciXN4Kx1IL9FZ3fjXgME0vdYpWYQkcvSKLsswXN+LnYcpoQ
  249. h33H/Kz4yji7jPN6Uk9wMyG7XGqpjYAuKCd6V3HEHUiGJZzho/VBgb3TVnw=
  250. -----END RSA PRIVATE KEY-----
  251. """
  252. func testServerTLSConfig_Defaults() throws {
  253. let grpcTLSConfig = HTTP2ServerTransport.Posix.TransportSecurity.TLS.defaults(
  254. certificateChain: [
  255. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  256. ],
  257. privateKey: .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  258. )
  259. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  260. XCTAssertEqual(
  261. nioSSLTLSConfig.certificateChain,
  262. [
  263. .certificate(
  264. try NIOSSLCertificate(
  265. bytes: Array(Self.samplePemCert.utf8),
  266. format: .pem
  267. )
  268. )
  269. ]
  270. )
  271. XCTAssertEqual(
  272. nioSSLTLSConfig.privateKey,
  273. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  274. )
  275. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  276. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .none)
  277. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  278. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  279. }
  280. func testServerTLSConfig_mTLS() throws {
  281. let grpcTLSConfig = HTTP2ServerTransport.Posix.TransportSecurity.TLS.mTLS(
  282. certificateChain: [
  283. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  284. ],
  285. privateKey: .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  286. )
  287. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  288. XCTAssertEqual(
  289. nioSSLTLSConfig.certificateChain,
  290. [
  291. .certificate(
  292. try NIOSSLCertificate(
  293. bytes: Array(Self.samplePemCert.utf8),
  294. format: .pem
  295. )
  296. )
  297. ]
  298. )
  299. XCTAssertEqual(
  300. nioSSLTLSConfig.privateKey,
  301. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  302. )
  303. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  304. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .noHostnameVerification)
  305. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  306. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  307. }
  308. func testServerTLSConfig_FullVerifyClient() throws {
  309. var grpcTLSConfig = HTTP2ServerTransport.Posix.TransportSecurity.TLS.defaults(
  310. certificateChain: [
  311. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  312. ],
  313. privateKey: .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  314. )
  315. grpcTLSConfig.clientCertificateVerification = .fullVerification
  316. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  317. XCTAssertEqual(
  318. nioSSLTLSConfig.certificateChain,
  319. [
  320. .certificate(
  321. try NIOSSLCertificate(
  322. bytes: Array(Self.samplePemCert.utf8),
  323. format: .pem
  324. )
  325. )
  326. ]
  327. )
  328. XCTAssertEqual(
  329. nioSSLTLSConfig.privateKey,
  330. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  331. )
  332. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  333. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .fullVerification)
  334. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  335. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  336. }
  337. func testServerTLSConfig_CustomTrustRoots() throws {
  338. var grpcTLSConfig = HTTP2ServerTransport.Posix.TransportSecurity.TLS.defaults(
  339. certificateChain: [
  340. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  341. ],
  342. privateKey: .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  343. )
  344. grpcTLSConfig.trustRoots = .certificates([.bytes(Array(Self.samplePemCert.utf8), format: .pem)])
  345. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  346. XCTAssertEqual(
  347. nioSSLTLSConfig.certificateChain,
  348. [
  349. .certificate(
  350. try NIOSSLCertificate(
  351. bytes: Array(Self.samplePemCert.utf8),
  352. format: .pem
  353. )
  354. )
  355. ]
  356. )
  357. XCTAssertEqual(
  358. nioSSLTLSConfig.privateKey,
  359. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  360. )
  361. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  362. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .none)
  363. XCTAssertEqual(
  364. nioSSLTLSConfig.trustRoots,
  365. .certificates(try NIOSSLCertificate.fromPEMBytes(Array(Self.samplePemCert.utf8)))
  366. )
  367. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  368. }
  369. func testClientTLSConfig_Defaults() throws {
  370. let grpcTLSConfig = HTTP2ClientTransport.Posix.TransportSecurity.TLS.defaults
  371. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  372. XCTAssertEqual(nioSSLTLSConfig.certificateChain, [])
  373. XCTAssertNil(nioSSLTLSConfig.privateKey)
  374. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  375. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .fullVerification)
  376. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  377. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  378. }
  379. func testClientTLSConfig_CustomCertificateChainAndPrivateKey() throws {
  380. var grpcTLSConfig = HTTP2ClientTransport.Posix.TransportSecurity.TLS.defaults
  381. grpcTLSConfig.certificateChain = [
  382. .bytes(Array(Self.samplePemCert.utf8), format: .pem)
  383. ]
  384. grpcTLSConfig.privateKey = .bytes(Array(Self.samplePemKey.utf8), format: .pem)
  385. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  386. XCTAssertEqual(
  387. nioSSLTLSConfig.certificateChain,
  388. [
  389. .certificate(
  390. try NIOSSLCertificate(
  391. bytes: Array(Self.samplePemCert.utf8),
  392. format: .pem
  393. )
  394. )
  395. ]
  396. )
  397. XCTAssertEqual(
  398. nioSSLTLSConfig.privateKey,
  399. .privateKey(try NIOSSLPrivateKey(bytes: Array(Self.samplePemKey.utf8), format: .pem))
  400. )
  401. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  402. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .fullVerification)
  403. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  404. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  405. }
  406. func testClientTLSConfig_CustomTrustRoots() throws {
  407. var grpcTLSConfig = HTTP2ClientTransport.Posix.TransportSecurity.TLS.defaults
  408. grpcTLSConfig.trustRoots = .certificates([.bytes(Array(Self.samplePemCert.utf8), format: .pem)])
  409. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  410. XCTAssertEqual(nioSSLTLSConfig.certificateChain, [])
  411. XCTAssertNil(nioSSLTLSConfig.privateKey)
  412. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  413. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .fullVerification)
  414. XCTAssertEqual(
  415. nioSSLTLSConfig.trustRoots,
  416. .certificates(try NIOSSLCertificate.fromPEMBytes(Array(Self.samplePemCert.utf8)))
  417. )
  418. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  419. }
  420. func testClientTLSConfig_CustomCertificateVerification() throws {
  421. var grpcTLSConfig = HTTP2ClientTransport.Posix.TransportSecurity.TLS.defaults
  422. grpcTLSConfig.serverCertificateVerification = .noHostnameVerification
  423. let nioSSLTLSConfig = try TLSConfiguration(grpcTLSConfig)
  424. XCTAssertEqual(nioSSLTLSConfig.certificateChain, [])
  425. XCTAssertNil(nioSSLTLSConfig.privateKey)
  426. XCTAssertEqual(nioSSLTLSConfig.minimumTLSVersion, .tlsv12)
  427. XCTAssertEqual(nioSSLTLSConfig.certificateVerification, .noHostnameVerification)
  428. XCTAssertEqual(nioSSLTLSConfig.trustRoots, .default)
  429. XCTAssertEqual(nioSSLTLSConfig.applicationProtocols, ["grpc-exp", "h2"])
  430. }
  431. }