HTTP2TransportNIOTransportServicesTests.swift 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216
  1. /*
  2. * Copyright 2024, gRPC Authors All rights reserved.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #if canImport(Network)
  17. import GRPCCore
  18. import GRPCNIOTransportCore
  19. import GRPCNIOTransportHTTP2TransportServices
  20. import XCTest
  21. import NIOSSL
  22. @available(gRPCSwiftNIOTransport 2.0, *)
  23. final class HTTP2TransportNIOTransportServicesTests: XCTestCase {
  24. func testGetListeningAddress_IPv4() async throws {
  25. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.TransportServices(
  26. address: .ipv4(host: "0.0.0.0", port: 0),
  27. transportSecurity: .plaintext
  28. )
  29. try await withThrowingDiscardingTaskGroup { group in
  30. group.addTask {
  31. try await transport.listen { _, _ in }
  32. }
  33. group.addTask {
  34. let address = try await transport.listeningAddress
  35. let ipv4Address = try XCTUnwrap(address.ipv4)
  36. XCTAssertNotEqual(ipv4Address.port, 0)
  37. transport.beginGracefulShutdown()
  38. }
  39. }
  40. }
  41. func testGetListeningAddress_IPv6() async throws {
  42. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.TransportServices(
  43. address: .ipv6(host: "::1", port: 0),
  44. transportSecurity: .plaintext
  45. )
  46. try await withThrowingDiscardingTaskGroup { group in
  47. group.addTask {
  48. try await transport.listen { _, _ in }
  49. }
  50. group.addTask {
  51. let address = try await transport.listeningAddress
  52. let ipv6Address = try XCTUnwrap(address.ipv6)
  53. XCTAssertNotEqual(ipv6Address.port, 0)
  54. transport.beginGracefulShutdown()
  55. }
  56. }
  57. }
  58. func testGetListeningAddress_UnixDomainSocket() async throws {
  59. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.TransportServices(
  60. address: .unixDomainSocket(path: "/tmp/niots-uds-test"),
  61. transportSecurity: .plaintext
  62. )
  63. defer {
  64. // NIOTS does not unlink the UDS on close.
  65. try? FileManager.default.removeItem(atPath: "/tmp/niots-uds-test")
  66. }
  67. try await withThrowingDiscardingTaskGroup { group in
  68. group.addTask {
  69. try await transport.listen { _, _ in }
  70. }
  71. group.addTask {
  72. let address = try await transport.listeningAddress
  73. XCTAssertEqual(
  74. address.unixDomainSocket,
  75. GRPCNIOTransportCore.SocketAddress.UnixDomainSocket(path: "/tmp/niots-uds-test")
  76. )
  77. transport.beginGracefulShutdown()
  78. }
  79. }
  80. }
  81. func testGetListeningAddress_InvalidAddress() async {
  82. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.TransportServices(
  83. address: .unixDomainSocket(path: "/this/should/be/an/invalid/path"),
  84. transportSecurity: .plaintext
  85. )
  86. try? await withThrowingDiscardingTaskGroup { group in
  87. group.addTask {
  88. try await transport.listen { _, _ in }
  89. }
  90. group.addTask {
  91. do {
  92. _ = try await transport.listeningAddress
  93. XCTFail("Should have thrown a RuntimeError")
  94. } catch let error as RuntimeError {
  95. XCTAssertEqual(error.code, .serverIsStopped)
  96. XCTAssertEqual(
  97. error.message,
  98. """
  99. There is no listening address bound for this server: there may have \
  100. been an error which caused the transport to close, or it may have shut down.
  101. """
  102. )
  103. }
  104. }
  105. }
  106. }
  107. func testGetListeningAddress_StoppedListening() async throws {
  108. let transport = GRPCNIOTransportCore.HTTP2ServerTransport.TransportServices(
  109. address: .ipv4(host: "0.0.0.0", port: 0),
  110. transportSecurity: .plaintext
  111. )
  112. try? await withThrowingDiscardingTaskGroup { group in
  113. group.addTask {
  114. try await transport.listen { _, _ in }
  115. do {
  116. _ = try await transport.listeningAddress
  117. XCTFail("Should have thrown a RuntimeError")
  118. } catch let error as RuntimeError {
  119. XCTAssertEqual(error.code, .serverIsStopped)
  120. XCTAssertEqual(
  121. error.message,
  122. """
  123. There is no listening address bound for this server: there may have \
  124. been an error which caused the transport to close, or it may have shut down.
  125. """
  126. )
  127. }
  128. }
  129. group.addTask {
  130. let address = try await transport.listeningAddress
  131. XCTAssertNotNil(address.ipv4)
  132. transport.beginGracefulShutdown()
  133. }
  134. }
  135. }
  136. @Sendable private static func loadIdentity() throws -> SecIdentity {
  137. let certificateKeyPairs = try SelfSignedCertificateKeyPairs()
  138. let password = "somepassword"
  139. let bundle = NIOSSLPKCS12Bundle(
  140. certificateChain: [
  141. try NIOSSLCertificate(bytes: certificateKeyPairs.server.certificate, format: .der)
  142. ],
  143. privateKey: try NIOSSLPrivateKey(bytes: certificateKeyPairs.server.key, format: .der)
  144. )
  145. let pkcs12Bytes = try bundle.serialize(passphrase: password.utf8)
  146. let options = [kSecImportExportPassphrase as String: password]
  147. var rawItems: CFArray?
  148. let status = SecPKCS12Import(
  149. Data(pkcs12Bytes) as CFData,
  150. options as CFDictionary,
  151. &rawItems
  152. )
  153. guard status == errSecSuccess else {
  154. XCTFail("Failed to import PKCS12 bundle: status \(status).")
  155. throw HTTP2TransportNIOTransportServicesTestsError.failedToImportPKCS12
  156. }
  157. let items = rawItems! as! [[String: Any]]
  158. let firstItem = items[0]
  159. let identity = firstItem[kSecImportItemIdentity as String] as! SecIdentity
  160. return identity
  161. }
  162. func testServerConfig_Defaults() throws {
  163. let grpcTLSConfig = HTTP2ServerTransport.TransportServices.TLS.defaults(
  164. identityProvider: Self.loadIdentity
  165. )
  166. let grpcConfig = HTTP2ServerTransport.TransportServices.Config.defaults
  167. XCTAssertEqual(grpcConfig.compression, HTTP2ServerTransport.Config.Compression.defaults)
  168. XCTAssertEqual(grpcConfig.connection, HTTP2ServerTransport.Config.Connection.defaults)
  169. XCTAssertEqual(grpcConfig.http2, HTTP2ServerTransport.Config.HTTP2.defaults)
  170. XCTAssertEqual(grpcConfig.rpc, HTTP2ServerTransport.Config.RPC.defaults)
  171. XCTAssertNotNil(grpcTLSConfig.identityProvider)
  172. XCTAssertEqual(grpcTLSConfig.trustRoots, .systemDefault)
  173. XCTAssertEqual(grpcTLSConfig.clientCertificateVerification, .noVerification)
  174. XCTAssertEqual(grpcTLSConfig.requireALPN, false)
  175. }
  176. func testClientConfig_Defaults() throws {
  177. let grpcTLSConfig = HTTP2ClientTransport.TransportServices.TLS.defaults
  178. let grpcConfig = HTTP2ClientTransport.TransportServices.Config.defaults
  179. XCTAssertEqual(grpcConfig.compression, HTTP2ClientTransport.Config.Compression.defaults)
  180. XCTAssertEqual(grpcConfig.connection, HTTP2ClientTransport.Config.Connection.defaults)
  181. XCTAssertEqual(grpcConfig.http2, HTTP2ClientTransport.Config.HTTP2.defaults)
  182. XCTAssertEqual(grpcConfig.backoff, HTTP2ClientTransport.Config.Backoff.defaults)
  183. XCTAssertNil(grpcTLSConfig.identityProvider)
  184. XCTAssertEqual(grpcTLSConfig.serverCertificateVerification, .fullVerification)
  185. XCTAssertEqual(grpcTLSConfig.trustRoots, .systemDefault)
  186. }
  187. }
  188. enum HTTP2TransportNIOTransportServicesTestsError: Error {
  189. case failedToImportPKCS12
  190. }
  191. #endif