|
|
|
/*
|
|
|
|
*
|
|
|
|
* Copyright 2015, Google Inc.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions are
|
|
|
|
* met:
|
|
|
|
*
|
|
|
|
* * Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* * Redistributions in binary form must reproduce the above
|
|
|
|
* copyright notice, this list of conditions and the following disclaimer
|
|
|
|
* in the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
* * Neither the name of Google Inc. nor the names of its
|
|
|
|
* contributors may be used to endorse or promote products derived from
|
|
|
|
* this software without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <grpc/support/port_platform.h>
|
|
|
|
|
|
|
|
#include "src/core/lib/security/credentials/credentials.h"
|
|
|
|
|
|
|
|
#include <openssl/rsa.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include <grpc/support/alloc.h>
|
|
|
|
#include <grpc/support/log.h>
|
|
|
|
#include <grpc/support/string_util.h>
|
|
|
|
#include <grpc/support/time.h>
|
|
|
|
|
|
|
|
#include "src/core/lib/http/httpcli.h"
|
|
|
|
#include "src/core/lib/security/credentials/composite/composite_credentials.h"
|
|
|
|
#include "src/core/lib/security/credentials/fake/fake_credentials.h"
|
|
|
|
#include "src/core/lib/security/credentials/google_default/google_default_credentials.h"
|
|
|
|
#include "src/core/lib/security/credentials/jwt/jwt_credentials.h"
|
|
|
|
#include "src/core/lib/security/credentials/oauth2/oauth2_credentials.h"
|
|
|
|
#include "src/core/lib/support/env.h"
|
|
|
|
#include "src/core/lib/support/string.h"
|
|
|
|
#include "src/core/lib/support/tmpfile.h"
|
|
|
|
#include "test/core/util/test_config.h"
|
|
|
|
|
|
|
|
/* -- Mock channel credentials. -- */
|
|
|
|
|
|
|
|
static grpc_channel_credentials *grpc_mock_channel_credentials_create(
|
|
|
|
const grpc_channel_credentials_vtable *vtable) {
|
|
|
|
grpc_channel_credentials *c = gpr_malloc(sizeof(*c));
|
|
|
|
memset(c, 0, sizeof(*c));
|
|
|
|
c->type = "mock";
|
|
|
|
c->vtable = vtable;
|
|
|
|
gpr_ref_init(&c->refcount, 1);
|
|
|
|
return c;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* -- Constants. -- */
|
|
|
|
|
|
|
|
static const char test_google_iam_authorization_token[] = "blahblahblhahb";
|
|
|
|
static const char test_google_iam_authority_selector[] = "respectmyauthoritah";
|
|
|
|
static const char test_oauth2_bearer_token[] =
|
|
|
|
"Bearer blaaslkdjfaslkdfasdsfasf";
|
Updating moe_db.txt with the latest equivalence since the ruby import changed the exported structure.
Change on 2014/12/01 by nnoble <nnoble@google.com>
-------------
new [] file for grpc testing.
Change on 2014/12/02 by donnadionne <donnadionne@google.com>
-------------
Fix unfinished calls in thread_stress_test.
Previously we had an early return if we cancelled a stream part way through a
message. Correct this, so that half close and full close signals are propagated
up the stack correctly so that higher level state machines can see the
termination.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Remove dependency on internal C code.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Turn off the flaky bit from thread_stress_test.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Add test cases of empty request/response, request streaming, response streaming, and half duplex streaming.
Bring up the GFE/ESF for mannual test:
[] build java/com/google/net/[]/testing/integration/hexa:server_components_env
[]-bin/java/com/google/net/[]/testing/integration/hexa/server_components_env --manual --rpc_port=25000 --use_autobahn
Change on 2014/12/02 by chenw <chenw@google.com>
-------------
Make echo/server.c and fling/server.c shutdown cleanly on SIGINT, and update
the relevant tests to exercise this mechanism.
Now "[] coverage" and the memory leak detector are able to see into the
server processes.
Change on 2014/12/02 by pmarks <pmarks@google.com>
-------------
Allow the # of channels to be configurable in this performance test. The threads will use the channels in statically-defined round-robin order (not based on when RPCs complete on any channel). The interesting cases are #channels=1 or #channels=#threads (we previously only had the latter case)
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Fixed a typo and reworded a comment.
Change on 2014/12/02 by gnezdo <gnezdo@google.com>
-------------
Require the grpc_call in this ClientContext to be NULL before allowing set_call to be invoked. Otherwise, it's an indication of a leak somewhere.
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Correctly return status other than ok and add a test for it.
Change on 2014/12/02 by yangg <yangg@google.com>
-------------
Better C++ guards for grpc_security.h
Change on 2014/12/02 by nnoble <nnoble@google.com>
-------------
Use nullptr instead of NULL for consistency.
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Updates the ruby gRPC service class to require the serialization method to be
a static method
- this brings it inline with the proto3 ruby API
- it adds a monkey patch to allow existing proto (beefcake) to continue working.
Change on 2014/12/02 by temiola <temiola@google.com>
-------------
Adding a buildable unit to the blue print file.
Added the buildable unit as its name will be usesd as tap project id.
This test will fail right away in tap until tests are actually added.
Change on 2014/12/02 by donnadionne <donnadionne@google.com>
-------------
Move interop ESF C++ server from Java to grpc directory.
Tests passed:
[] test javatests/com/google/net/[]/testing/integration/hexa/...
[] test net/grpc/testing/interop/esf_server/...
Change on 2014/12/02 by chenw <chenw@google.com>
-------------
Return a lame channel as opposed to NULL when secure channel creation fails.
- Looks like we're going to need something similar server-side.
- I changed the prototype of the lame client channel factory to take an
explicit void as I think this is better practice in C. Let me know if you
disagree and I will revert these changes.
Change on 2014/12/02 by jboeuf <jboeuf@google.com>
-------------
Putting ALPN support where it belongs.
Change on 2014/12/02 by jboeuf <jboeuf@google.com>
-------------
GOAWAY send path.
Sends a GOAWAY frame when shutting down.
This is not read and understood yet.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Adds support for secure channels and servers.
- wraps new C apis (credentials, server_credentials) and Server#add_secure_http_port
- adds tests to ensure credentials and server credentials can be created
- updates client_server_spec to run the client_server wrapper layer end-to-end tests using a secure channel
Change on 2014/12/03 by temiola <temiola@google.com>
-------------
Fix existing issues regarding out of order events.
At the client side, using pluck as the client_metadata_read can happen anytime after invoke.
At the server side, allow halfclose_ok and rpc_end to come in reverse order.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
Don't track coverage of tests.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Change UnaryCall to conform standard test requirement of LargeUnaryCall.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
updating alpn version to h2-15 ensure all interop are on the same version and working.
Java and go are not ready for h2-16 yet.
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Add config to bring echo server in [].
This is used to test production GFE as its bckend.
Change on 2014/12/03 by chenw <chenw@google.com>
-------------
In preparation for fixing shutdown race issues, change em to take ownership of
the file descriptor. Add an API to grpc_tcp to take an already created
grpc_em_fd object, and change tcp_client to use that API.
This is needed because otherwise an em user's close() of the file descriptor
may race with libevent internals. That's not an issue yet because destroy()
frees the events inline, but that can't be done safely if there is a concurrent
poller.
Change on 2014/12/03 by klempner <klempner@google.com>
-------------
Fixing TAP opensource build
We don't want to compile and run C++ tests in the C target.
Change on 2014/12/03 by nnoble <nnoble@google.com>
-------------
Move and separate interop tests by languages.
Small fixes to the test runner.
Improving logging.
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Fixing the opensource build:
-) The C/C++ split wasn't done up to the 'dep' target level
-) The alpn.c file was missing from build.json
Change on 2014/12/03 by nnoble <nnoble@google.com>
-------------
Adding blue print files after projects exist
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Refactor StreamContext using the new completion_queue_pluck API.
The dedicated the poller thread has been removed.
This CL keeps the current behavior to make it short. There is one following to
make it usable for both client and server.
The tags for pluck is based on the address of this StreamContext object for potential debug use.
The Read/Write and Wait cannot be called concurrently now and this might need to be fixed.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
Binary encoding utilities.
Support base64 encoding, HPACK static huffman encoding, and doing both at once.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Enforce Makefile regeneration in presubmits.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Make CloseSend() send a real zero-length control message to indicate EOS.
Change on 2014/12/03 by zhaoq <zhaoq@google.com>
-------------
Prefer to create dualstack sockets for TCP clients and servers, with automatic
fallback for environments where IPV6_V6ONLY can't be turned off.
Change on 2014/12/03 by pmarks <pmarks@google.com>
-------------
Add opensource path to build targets.
Ensure that MOE is going to run.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Add PingPong test case. Delete FullDuplex test case. The latter is not specified for client in
https://docs.google.com/document/d/1dwrPpIu5EqiKVsquZfoOqTj7vP8fa1i49gornJo50Qw/edit#
Change on 2014/12/03 by chenw <chenw@google.com>
-------------
Make generate_projects.sh check out the generated targets.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
rspec cleanup
- stops declaring specs within the GRPC module
- splits Bidi streaming specs into a separate test suite
adding tests in the GRPC module was a mistake, it pollutes the module and can
affect other tests that run later by the test runner
the bidi tests are currently flaky, having them run in their own test suite
allows having two separate continuous builds (once ruby gRPC is on GitHub),
one that includes bidi where we tolerate flakiness, and another that does not,
where there should be no flakiness at all
Change on 2014/12/03 by temiola <temiola@google.com>
-------------
Adding support for composite and IAM credentials.
- For now, we don't do any checks on credentials compatibility in the
composite credentials. Maybe we'll add that later.
- Refactored the end to end security tests so that we always use the public API
(except for the fake security context which is not exposed).
Change on 2014/12/03 by jboeuf <jboeuf@google.com>
-------------
Make GPR library buildable in Visual Studio 2013.
Change on 2014/12/04 by jtattermusch <jtattermusch@google.com>
-------------
Adds codegen for ruby
This is being added now that ruby's proto and grpc apis are defined and stable
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Prevent NewStream() from sending negative or 0 timeout.
Change on 2014/12/04 by zhaoq <zhaoq@google.com>
-------------
Add a grpc_sockaddr_to_string() function, and use it when logging bind
failures. Also improve const-correctness in some earlier code.
I'm not certain whether inet_ntop() will need any platform-specific
implementations, but for now the compiler offers no complaints.
Demo:
$ []-bin/net/grpc/c/echo_server 1.2.3.4:80
... tcp_server.c:139] bind addr=[::ffff:1.2.3.4]:80: Permission denied
Change on 2014/12/04 by pmarks <pmarks@google.com>
-------------
Refactoring - moves c wrapped classes to a submodule Google::RPC::Core
- this allows for an explicit rule when reading through gRPC ruby code for telling
when an object is pure ruby or wrapped C
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Fixes the bidi_call
[]
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Fixing dev build when activating surface traces.
Change on 2014/12/04 by nnoble <nnoble@google.com>
-------------
Updates the tests to reflect that fact that some Credentials compose works.
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Making the generate_project_test actually do something.
Change on 2014/12/04 by nnoble <nnoble@google.com>
-------------
Rename "esf_server" to "[]4_server". Delete "test_sever" from Java directory.
Change on 2014/12/04 by chenw <chenw@google.com>
-------------
Added PHP client interop tests. Tested large_unary against the C++ server.
Change on 2014/12/04 by mlumish <mlumish@google.com>
-------------
Refactor grpc_create_dualstack_socket() by pulling the setsockopt into its own
function. This separates the magic test flag from the real fallback logic.
Change on 2014/12/04 by pmarks <pmarks@google.com>
-------------
Fixes the type of the constant used for test cert hostname
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Disabling these tests as they're causing flakiness.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Change intptr --> uintptr.
Handles the case where a void* turns into a negative number, which then gets
hashed into a negative bucket and segfaults.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Add a test fixture to force parsers to handle one byte at a time.
This should expand coverage and hopefully prevent errors at some point (it
seems to pass out of the box for now though).
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
The code generator isn't +x.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Updates math_client and math_server to allow construction using crednetials
By:
- Extending rpc_server constructor so that it takes a credentials keyword param
- Extending client_stub constructor so that it takes a credentials keyword param
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Format output a little more nicely.
Print each line of output separately - previously logging.info was truncating this at some maximum length, and logs were getting lost.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Up timeout for this test.
Under TSAN, if we process one byte at a time, this timeout can be reached - and I think this is the cause of the following flake:
[]
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Adding more error logging for ssl.
Change on 2014/12/05 by jboeuf <jboeuf@google.com>
-------------
Read path for goaway.
Still need to add hooks to deprecate a channel on the client side when goaway
is received.
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Separate accept() into server_accept() and server_end_of_initial_metadata().
This allows servers to initiate reads before finishing writing metadata.
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Fix for breakage 11512317 - adding missing test files.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
grpc c++ server side streaming support.
This is based on [] There is a lot of room to clean up the internal implementation which may require refactoring of CompletionQueue. The current cl serves as a working implementation with the missing interfaces.
The sample generated files are included and will be removed before submitting.
Change on 2014/12/05 by yangg <yangg@google.com>
-------------
Changed to the latest timeout format again (search "grpc-timeout" in [] for the spec).
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Fixing opensource build.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Making absolutely sure we can do the moe export by adding a sh_test for it.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Change :scheme psuedo-header from "grpc" to "http" or "https".
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Add server credential wrapping for c++ server. It only wraps ssl and []2 for now.
The ServerCredentials class and the factory class are in a similar fashion as
client side wrapping. The difference is the factory method returns shared_ptr
instead of unique_ptr as the server builder needs to keep a reference to it for
actually creating the server later.
The integration will happen in a following cl.
Change on 2014/12/05 by yangg <yangg@google.com>
-------------
Fixed bugs in new_grpc_docker_builder.sh
Change on 2014/12/05 by mlumish <mlumish@google.com>
-------------
In secure endpoint, hold a refcount for the life of a write callback if the
write does not complete immediately.
Change on 2014/12/05 by klempner <klempner@google.com>
-------------
Add migration support to MOE and have TAP verify it doesn't break.
Migration support allows mirroring commits from [] into the git repo, instead of just a dump of the current source.
Change on 2014/12/05 by ejona <ejona@google.com>
-------------
Change initial window size to 65535 according http2 draft 15.
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Re-enable the flaky cases in dualstack_socket_test, with additional logging to
help track down the problem if it surfaces again.
This also seems like a good opportunity to make grpc_socket_utils a separate
library, as it's not really specific to TCP.
Example output:
logspam: [], 26570) resolved 2 addrs in 37ms:
logspam: [0] [::1]:26570
logspam: [1] 127.0.0.1:26570
Change on 2014/12/05 by pmarks <pmarks@google.com>
-------------
Opensource build fixes.
-) A function that has a return type should actually return something.
-) Don't pass unsigned chars to strlen and strncmp.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Created by MOE: http://code.google.com/p/moe-java
MOE_MIGRATED_REVID=81458281
10 years ago
|
|
|
|
|
|
|
/* This JSON key was generated with the GCE console and revoked immediately.
|
|
|
|
The identifiers have been changed as well.
|
|
|
|
Maximum size for a string literal is 509 chars in C89, yay! */
|
|
|
|
static const char test_json_key_str_part1[] =
|
|
|
|
"{ \"private_key\": \"-----BEGIN PRIVATE KEY-----"
|
|
|
|
"\\nMIICeAIBADANBgkqhkiG9w0BAQEFAASCAmIwggJeAgEAAoGBAOEvJsnoHnyHkXcp\\n7mJE"
|
|
|
|
"qg"
|
|
|
|
"WGjiw71NfXByguekSKho65FxaGbsnSM9SMQAqVk7Q2rG+I0OpsT0LrWQtZ\\nyjSeg/"
|
|
|
|
"rWBQvS4hle4LfijkP3J5BG+"
|
|
|
|
"IXDMP8RfziNRQsenAXDNPkY4kJCvKux2xdD\\nOnVF6N7dL3nTYZg+"
|
|
|
|
"uQrNsMTz9UxVAgMBAAECgYEAzbLewe1xe9vy+2GoSsfib+28\\nDZgSE6Bu/"
|
|
|
|
"zuFoPrRc6qL9p2SsnV7txrunTyJkkOnPLND9ABAXybRTlcVKP/sGgza\\n/"
|
|
|
|
"8HpCqFYM9V8f34SBWfD4fRFT+n/"
|
|
|
|
"73cfRUtGXdXpseva2lh8RilIQfPhNZAncenU\\ngqXjDvpkypEusgXAykECQQD+";
|
|
|
|
static const char test_json_key_str_part2[] =
|
|
|
|
"53XxNVnxBHsYb+AYEfklR96yVi8HywjVHP34+OQZ\\nCslxoHQM8s+"
|
|
|
|
"dBnjfScLu22JqkPv04xyxmt0QAKm9+vTdAkEA4ib7YvEAn2jXzcCI\\nEkoy2L/"
|
|
|
|
"XydR1GCHoacdfdAwiL2npOdnbvi4ZmdYRPY1LSTO058tQHKVXV7NLeCa3\\nAARh2QJBAMKeDA"
|
|
|
|
"G"
|
|
|
|
"W303SQv2cZTdbeaLKJbB5drz3eo3j7dDKjrTD9JupixFbzcGw\\n8FZi5c8idxiwC36kbAL6Hz"
|
|
|
|
"A"
|
|
|
|
"ZoX+ofI0CQE6KCzPJTtYNqyShgKAZdJ8hwOcvCZtf\\n6z8RJm0+"
|
|
|
|
"6YBd38lfh5j8mZd7aHFf6I17j5AQY7oPEc47TjJj/"
|
|
|
|
"5nZ68ECQQDvYuI3\\nLyK5fS8g0SYbmPOL9TlcHDOqwG0mrX9qpg5DC2fniXNSrrZ64GTDKdzZ"
|
|
|
|
"Y"
|
|
|
|
"Ap6LI9W\\nIqv4vr6y38N79TTC\\n-----END PRIVATE KEY-----\\n\", ";
|
|
|
|
static const char test_json_key_str_part3[] =
|
|
|
|
"\"private_key_id\": \"e6b5137873db8d2ef81e06a47289e6434ec8a165\", "
|
|
|
|
"\"client_email\": "
|
|
|
|
"\"777-abaslkan11hlb6nmim3bpspl31ud@developer.gserviceaccount."
|
|
|
|
"com\", \"client_id\": "
|
|
|
|
"\"777-abaslkan11hlb6nmim3bpspl31ud.apps.googleusercontent."
|
|
|
|
"com\", \"type\": \"service_account\" }";
|
|
|
|
|
|
|
|
/* Test refresh token. */
|
|
|
|
static const char test_refresh_token_str[] =
|
|
|
|
"{ \"client_id\": \"32555999999.apps.googleusercontent.com\","
|
|
|
|
" \"client_secret\": \"EmssLNjJy1332hD4KFsecret\","
|
|
|
|
" \"refresh_token\": \"1/Blahblasj424jladJDSGNf-u4Sua3HDA2ngjd42\","
|
|
|
|
" \"type\": \"authorized_user\"}";
|
|
|
|
|
|
|
|
static const char valid_oauth2_json_response[] =
|
|
|
|
"{\"access_token\":\"ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_\","
|
|
|
|
" \"expires_in\":3599, "
|
|
|
|
" \"token_type\":\"Bearer\"}";
|
|
|
|
|
|
|
|
static const char test_user_data[] = "user data";
|
|
|
|
|
|
|
|
static const char test_scope[] = "perm1 perm2";
|
|
|
|
|
|
|
|
static const char test_signed_jwt[] =
|
|
|
|
"eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImY0OTRkN2M1YWU2MGRmOTcyNmM4YW"
|
|
|
|
"U0MDcyZTViYTdmZDkwODg2YzcifQ";
|
|
|
|
|
|
|
|
static const char test_service_url[] = "https://foo.com/foo.v1";
|
|
|
|
static const char other_test_service_url[] = "https://bar.com/bar.v1";
|
|
|
|
|
|
|
|
static const char test_method[] = "ThisIsNotAMethod";
|
|
|
|
|
|
|
|
/* -- Utils. -- */
|
|
|
|
|
|
|
|
static char *test_json_key_str(void) {
|
|
|
|
size_t result_len = strlen(test_json_key_str_part1) +
|
|
|
|
strlen(test_json_key_str_part2) +
|
|
|
|
strlen(test_json_key_str_part3);
|
|
|
|
char *result = gpr_malloc(result_len + 1);
|
|
|
|
char *current = result;
|
|
|
|
strcpy(result, test_json_key_str_part1);
|
|
|
|
current += strlen(test_json_key_str_part1);
|
|
|
|
strcpy(current, test_json_key_str_part2);
|
|
|
|
current += strlen(test_json_key_str_part2);
|
|
|
|
strcpy(current, test_json_key_str_part3);
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
typedef struct {
|
Updating moe_db.txt with the latest equivalence since the ruby import changed the exported structure.
Change on 2014/12/01 by nnoble <nnoble@google.com>
-------------
new [] file for grpc testing.
Change on 2014/12/02 by donnadionne <donnadionne@google.com>
-------------
Fix unfinished calls in thread_stress_test.
Previously we had an early return if we cancelled a stream part way through a
message. Correct this, so that half close and full close signals are propagated
up the stack correctly so that higher level state machines can see the
termination.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Remove dependency on internal C code.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Turn off the flaky bit from thread_stress_test.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Add test cases of empty request/response, request streaming, response streaming, and half duplex streaming.
Bring up the GFE/ESF for mannual test:
[] build java/com/google/net/[]/testing/integration/hexa:server_components_env
[]-bin/java/com/google/net/[]/testing/integration/hexa/server_components_env --manual --rpc_port=25000 --use_autobahn
Change on 2014/12/02 by chenw <chenw@google.com>
-------------
Make echo/server.c and fling/server.c shutdown cleanly on SIGINT, and update
the relevant tests to exercise this mechanism.
Now "[] coverage" and the memory leak detector are able to see into the
server processes.
Change on 2014/12/02 by pmarks <pmarks@google.com>
-------------
Allow the # of channels to be configurable in this performance test. The threads will use the channels in statically-defined round-robin order (not based on when RPCs complete on any channel). The interesting cases are #channels=1 or #channels=#threads (we previously only had the latter case)
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Fixed a typo and reworded a comment.
Change on 2014/12/02 by gnezdo <gnezdo@google.com>
-------------
Require the grpc_call in this ClientContext to be NULL before allowing set_call to be invoked. Otherwise, it's an indication of a leak somewhere.
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Correctly return status other than ok and add a test for it.
Change on 2014/12/02 by yangg <yangg@google.com>
-------------
Better C++ guards for grpc_security.h
Change on 2014/12/02 by nnoble <nnoble@google.com>
-------------
Use nullptr instead of NULL for consistency.
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Updates the ruby gRPC service class to require the serialization method to be
a static method
- this brings it inline with the proto3 ruby API
- it adds a monkey patch to allow existing proto (beefcake) to continue working.
Change on 2014/12/02 by temiola <temiola@google.com>
-------------
Adding a buildable unit to the blue print file.
Added the buildable unit as its name will be usesd as tap project id.
This test will fail right away in tap until tests are actually added.
Change on 2014/12/02 by donnadionne <donnadionne@google.com>
-------------
Move interop ESF C++ server from Java to grpc directory.
Tests passed:
[] test javatests/com/google/net/[]/testing/integration/hexa/...
[] test net/grpc/testing/interop/esf_server/...
Change on 2014/12/02 by chenw <chenw@google.com>
-------------
Return a lame channel as opposed to NULL when secure channel creation fails.
- Looks like we're going to need something similar server-side.
- I changed the prototype of the lame client channel factory to take an
explicit void as I think this is better practice in C. Let me know if you
disagree and I will revert these changes.
Change on 2014/12/02 by jboeuf <jboeuf@google.com>
-------------
Putting ALPN support where it belongs.
Change on 2014/12/02 by jboeuf <jboeuf@google.com>
-------------
GOAWAY send path.
Sends a GOAWAY frame when shutting down.
This is not read and understood yet.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Adds support for secure channels and servers.
- wraps new C apis (credentials, server_credentials) and Server#add_secure_http_port
- adds tests to ensure credentials and server credentials can be created
- updates client_server_spec to run the client_server wrapper layer end-to-end tests using a secure channel
Change on 2014/12/03 by temiola <temiola@google.com>
-------------
Fix existing issues regarding out of order events.
At the client side, using pluck as the client_metadata_read can happen anytime after invoke.
At the server side, allow halfclose_ok and rpc_end to come in reverse order.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
Don't track coverage of tests.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Change UnaryCall to conform standard test requirement of LargeUnaryCall.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
updating alpn version to h2-15 ensure all interop are on the same version and working.
Java and go are not ready for h2-16 yet.
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Add config to bring echo server in [].
This is used to test production GFE as its bckend.
Change on 2014/12/03 by chenw <chenw@google.com>
-------------
In preparation for fixing shutdown race issues, change em to take ownership of
the file descriptor. Add an API to grpc_tcp to take an already created
grpc_em_fd object, and change tcp_client to use that API.
This is needed because otherwise an em user's close() of the file descriptor
may race with libevent internals. That's not an issue yet because destroy()
frees the events inline, but that can't be done safely if there is a concurrent
poller.
Change on 2014/12/03 by klempner <klempner@google.com>
-------------
Fixing TAP opensource build
We don't want to compile and run C++ tests in the C target.
Change on 2014/12/03 by nnoble <nnoble@google.com>
-------------
Move and separate interop tests by languages.
Small fixes to the test runner.
Improving logging.
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Fixing the opensource build:
-) The C/C++ split wasn't done up to the 'dep' target level
-) The alpn.c file was missing from build.json
Change on 2014/12/03 by nnoble <nnoble@google.com>
-------------
Adding blue print files after projects exist
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Refactor StreamContext using the new completion_queue_pluck API.
The dedicated the poller thread has been removed.
This CL keeps the current behavior to make it short. There is one following to
make it usable for both client and server.
The tags for pluck is based on the address of this StreamContext object for potential debug use.
The Read/Write and Wait cannot be called concurrently now and this might need to be fixed.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
Binary encoding utilities.
Support base64 encoding, HPACK static huffman encoding, and doing both at once.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Enforce Makefile regeneration in presubmits.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Make CloseSend() send a real zero-length control message to indicate EOS.
Change on 2014/12/03 by zhaoq <zhaoq@google.com>
-------------
Prefer to create dualstack sockets for TCP clients and servers, with automatic
fallback for environments where IPV6_V6ONLY can't be turned off.
Change on 2014/12/03 by pmarks <pmarks@google.com>
-------------
Add opensource path to build targets.
Ensure that MOE is going to run.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Add PingPong test case. Delete FullDuplex test case. The latter is not specified for client in
https://docs.google.com/document/d/1dwrPpIu5EqiKVsquZfoOqTj7vP8fa1i49gornJo50Qw/edit#
Change on 2014/12/03 by chenw <chenw@google.com>
-------------
Make generate_projects.sh check out the generated targets.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
rspec cleanup
- stops declaring specs within the GRPC module
- splits Bidi streaming specs into a separate test suite
adding tests in the GRPC module was a mistake, it pollutes the module and can
affect other tests that run later by the test runner
the bidi tests are currently flaky, having them run in their own test suite
allows having two separate continuous builds (once ruby gRPC is on GitHub),
one that includes bidi where we tolerate flakiness, and another that does not,
where there should be no flakiness at all
Change on 2014/12/03 by temiola <temiola@google.com>
-------------
Adding support for composite and IAM credentials.
- For now, we don't do any checks on credentials compatibility in the
composite credentials. Maybe we'll add that later.
- Refactored the end to end security tests so that we always use the public API
(except for the fake security context which is not exposed).
Change on 2014/12/03 by jboeuf <jboeuf@google.com>
-------------
Make GPR library buildable in Visual Studio 2013.
Change on 2014/12/04 by jtattermusch <jtattermusch@google.com>
-------------
Adds codegen for ruby
This is being added now that ruby's proto and grpc apis are defined and stable
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Prevent NewStream() from sending negative or 0 timeout.
Change on 2014/12/04 by zhaoq <zhaoq@google.com>
-------------
Add a grpc_sockaddr_to_string() function, and use it when logging bind
failures. Also improve const-correctness in some earlier code.
I'm not certain whether inet_ntop() will need any platform-specific
implementations, but for now the compiler offers no complaints.
Demo:
$ []-bin/net/grpc/c/echo_server 1.2.3.4:80
... tcp_server.c:139] bind addr=[::ffff:1.2.3.4]:80: Permission denied
Change on 2014/12/04 by pmarks <pmarks@google.com>
-------------
Refactoring - moves c wrapped classes to a submodule Google::RPC::Core
- this allows for an explicit rule when reading through gRPC ruby code for telling
when an object is pure ruby or wrapped C
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Fixes the bidi_call
[]
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Fixing dev build when activating surface traces.
Change on 2014/12/04 by nnoble <nnoble@google.com>
-------------
Updates the tests to reflect that fact that some Credentials compose works.
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Making the generate_project_test actually do something.
Change on 2014/12/04 by nnoble <nnoble@google.com>
-------------
Rename "esf_server" to "[]4_server". Delete "test_sever" from Java directory.
Change on 2014/12/04 by chenw <chenw@google.com>
-------------
Added PHP client interop tests. Tested large_unary against the C++ server.
Change on 2014/12/04 by mlumish <mlumish@google.com>
-------------
Refactor grpc_create_dualstack_socket() by pulling the setsockopt into its own
function. This separates the magic test flag from the real fallback logic.
Change on 2014/12/04 by pmarks <pmarks@google.com>
-------------
Fixes the type of the constant used for test cert hostname
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Disabling these tests as they're causing flakiness.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Change intptr --> uintptr.
Handles the case where a void* turns into a negative number, which then gets
hashed into a negative bucket and segfaults.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Add a test fixture to force parsers to handle one byte at a time.
This should expand coverage and hopefully prevent errors at some point (it
seems to pass out of the box for now though).
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
The code generator isn't +x.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Updates math_client and math_server to allow construction using crednetials
By:
- Extending rpc_server constructor so that it takes a credentials keyword param
- Extending client_stub constructor so that it takes a credentials keyword param
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Format output a little more nicely.
Print each line of output separately - previously logging.info was truncating this at some maximum length, and logs were getting lost.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Up timeout for this test.
Under TSAN, if we process one byte at a time, this timeout can be reached - and I think this is the cause of the following flake:
[]
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Adding more error logging for ssl.
Change on 2014/12/05 by jboeuf <jboeuf@google.com>
-------------
Read path for goaway.
Still need to add hooks to deprecate a channel on the client side when goaway
is received.
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Separate accept() into server_accept() and server_end_of_initial_metadata().
This allows servers to initiate reads before finishing writing metadata.
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Fix for breakage 11512317 - adding missing test files.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
grpc c++ server side streaming support.
This is based on [] There is a lot of room to clean up the internal implementation which may require refactoring of CompletionQueue. The current cl serves as a working implementation with the missing interfaces.
The sample generated files are included and will be removed before submitting.
Change on 2014/12/05 by yangg <yangg@google.com>
-------------
Changed to the latest timeout format again (search "grpc-timeout" in [] for the spec).
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Fixing opensource build.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Making absolutely sure we can do the moe export by adding a sh_test for it.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Change :scheme psuedo-header from "grpc" to "http" or "https".
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Add server credential wrapping for c++ server. It only wraps ssl and []2 for now.
The ServerCredentials class and the factory class are in a similar fashion as
client side wrapping. The difference is the factory method returns shared_ptr
instead of unique_ptr as the server builder needs to keep a reference to it for
actually creating the server later.
The integration will happen in a following cl.
Change on 2014/12/05 by yangg <yangg@google.com>
-------------
Fixed bugs in new_grpc_docker_builder.sh
Change on 2014/12/05 by mlumish <mlumish@google.com>
-------------
In secure endpoint, hold a refcount for the life of a write callback if the
write does not complete immediately.
Change on 2014/12/05 by klempner <klempner@google.com>
-------------
Add migration support to MOE and have TAP verify it doesn't break.
Migration support allows mirroring commits from [] into the git repo, instead of just a dump of the current source.
Change on 2014/12/05 by ejona <ejona@google.com>
-------------
Change initial window size to 65535 according http2 draft 15.
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Re-enable the flaky cases in dualstack_socket_test, with additional logging to
help track down the problem if it surfaces again.
This also seems like a good opportunity to make grpc_socket_utils a separate
library, as it's not really specific to TCP.
Example output:
logspam: [], 26570) resolved 2 addrs in 37ms:
logspam: [0] [::1]:26570
logspam: [1] 127.0.0.1:26570
Change on 2014/12/05 by pmarks <pmarks@google.com>
-------------
Opensource build fixes.
-) A function that has a return type should actually return something.
-) Don't pass unsigned chars to strlen and strncmp.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Created by MOE: http://code.google.com/p/moe-java
MOE_MIGRATED_REVID=81458281
10 years ago
|
|
|
const char *key;
|
|
|
|
const char *value;
|
|
|
|
} expected_md;
|
|
|
|
|
|
|
|
static grpc_httpcli_response http_response(int status, const char *body) {
|
|
|
|
grpc_httpcli_response response;
|
|
|
|
memset(&response, 0, sizeof(grpc_httpcli_response));
|
|
|
|
response.status = status;
|
|
|
|
response.body = gpr_strdup((char *)body);
|
|
|
|
response.body_length = strlen(body);
|
|
|
|
return response;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* -- Tests. -- */
|
|
|
|
|
|
|
|
static void test_empty_md_store(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_credentials_md_store *store = grpc_credentials_md_store_create(0);
|
|
|
|
GPR_ASSERT(store->num_entries == 0);
|
|
|
|
GPR_ASSERT(store->allocated == 0);
|
|
|
|
grpc_credentials_md_store_unref(&exec_ctx, store);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_ref_unref_empty_md_store(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_credentials_md_store *store = grpc_credentials_md_store_create(0);
|
|
|
|
grpc_credentials_md_store_ref(store);
|
|
|
|
grpc_credentials_md_store_ref(store);
|
|
|
|
GPR_ASSERT(store->num_entries == 0);
|
|
|
|
GPR_ASSERT(store->allocated == 0);
|
|
|
|
grpc_credentials_md_store_unref(&exec_ctx, store);
|
|
|
|
grpc_credentials_md_store_unref(&exec_ctx, store);
|
|
|
|
grpc_credentials_md_store_unref(&exec_ctx, store);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_add_to_empty_md_store(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_credentials_md_store *store = grpc_credentials_md_store_create(0);
|
|
|
|
const char *key_str = "hello";
|
|
|
|
const char *value_str = "there blah blah blah blah blah blah blah";
|
|
|
|
grpc_slice key = grpc_slice_from_copied_string(key_str);
|
|
|
|
grpc_slice value = grpc_slice_from_copied_string(value_str);
|
|
|
|
grpc_credentials_md_store_add(store, key, value);
|
|
|
|
GPR_ASSERT(store->num_entries == 1);
|
|
|
|
GPR_ASSERT(grpc_slice_cmp(key, store->entries[0].key) == 0);
|
|
|
|
GPR_ASSERT(grpc_slice_cmp(value, store->entries[0].value) == 0);
|
|
|
|
grpc_slice_unref(key);
|
|
|
|
grpc_slice_unref(value);
|
|
|
|
grpc_credentials_md_store_unref(&exec_ctx, store);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_add_cstrings_to_empty_md_store(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_credentials_md_store *store = grpc_credentials_md_store_create(0);
|
|
|
|
const char *key_str = "hello";
|
|
|
|
const char *value_str = "there blah blah blah blah blah blah blah";
|
|
|
|
grpc_credentials_md_store_add_cstrings(store, key_str, value_str);
|
|
|
|
GPR_ASSERT(store->num_entries == 1);
|
|
|
|
GPR_ASSERT(grpc_slice_str_cmp(store->entries[0].key, key_str) == 0);
|
|
|
|
GPR_ASSERT(grpc_slice_str_cmp(store->entries[0].value, value_str) == 0);
|
|
|
|
grpc_credentials_md_store_unref(&exec_ctx, store);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_empty_preallocated_md_store(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_credentials_md_store *store = grpc_credentials_md_store_create(4);
|
|
|
|
GPR_ASSERT(store->num_entries == 0);
|
|
|
|
GPR_ASSERT(store->allocated == 4);
|
|
|
|
GPR_ASSERT(store->entries != NULL);
|
|
|
|
grpc_credentials_md_store_unref(&exec_ctx, store);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_add_abunch_to_md_store(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_credentials_md_store *store = grpc_credentials_md_store_create(4);
|
|
|
|
size_t num_entries = 1000;
|
|
|
|
const char *key_str = "hello";
|
|
|
|
const char *value_str = "there blah blah blah blah blah blah blah";
|
|
|
|
size_t i;
|
|
|
|
for (i = 0; i < num_entries; i++) {
|
|
|
|
grpc_credentials_md_store_add_cstrings(store, key_str, value_str);
|
|
|
|
}
|
|
|
|
for (i = 0; i < num_entries; i++) {
|
|
|
|
GPR_ASSERT(grpc_slice_str_cmp(store->entries[i].key, key_str) == 0);
|
|
|
|
GPR_ASSERT(grpc_slice_str_cmp(store->entries[i].value, value_str) == 0);
|
|
|
|
}
|
|
|
|
grpc_credentials_md_store_unref(&exec_ctx, store);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_oauth2_token_fetcher_creds_parsing_ok(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_credentials_md_store *token_md = NULL;
|
|
|
|
gpr_timespec token_lifetime;
|
|
|
|
grpc_httpcli_response response =
|
|
|
|
http_response(200, valid_oauth2_json_response);
|
|
|
|
GPR_ASSERT(grpc_oauth2_token_fetcher_credentials_parse_server_response(
|
|
|
|
&exec_ctx, &response, &token_md, &token_lifetime) ==
|
|
|
|
GRPC_CREDENTIALS_OK);
|
|
|
|
GPR_ASSERT(token_lifetime.tv_sec == 3599);
|
|
|
|
GPR_ASSERT(token_lifetime.tv_nsec == 0);
|
|
|
|
GPR_ASSERT(token_md->num_entries == 1);
|
|
|
|
GPR_ASSERT(grpc_slice_str_cmp(token_md->entries[0].key, "authorization") ==
|
|
|
|
0);
|
|
|
|
GPR_ASSERT(grpc_slice_str_cmp(token_md->entries[0].value,
|
|
|
|
"Bearer ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_") ==
|
|
|
|
0);
|
|
|
|
grpc_credentials_md_store_unref(&exec_ctx, token_md);
|
|
|
|
grpc_http_response_destroy(&response);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_oauth2_token_fetcher_creds_parsing_bad_http_status(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_credentials_md_store *token_md = NULL;
|
|
|
|
gpr_timespec token_lifetime;
|
|
|
|
grpc_httpcli_response response =
|
|
|
|
http_response(401, valid_oauth2_json_response);
|
|
|
|
GPR_ASSERT(grpc_oauth2_token_fetcher_credentials_parse_server_response(
|
|
|
|
&exec_ctx, &response, &token_md, &token_lifetime) ==
|
|
|
|
GRPC_CREDENTIALS_ERROR);
|
|
|
|
grpc_http_response_destroy(&response);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_oauth2_token_fetcher_creds_parsing_empty_http_body(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_credentials_md_store *token_md = NULL;
|
|
|
|
gpr_timespec token_lifetime;
|
|
|
|
grpc_httpcli_response response = http_response(200, "");
|
|
|
|
GPR_ASSERT(grpc_oauth2_token_fetcher_credentials_parse_server_response(
|
|
|
|
&exec_ctx, &response, &token_md, &token_lifetime) ==
|
|
|
|
GRPC_CREDENTIALS_ERROR);
|
|
|
|
grpc_http_response_destroy(&response);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_oauth2_token_fetcher_creds_parsing_invalid_json(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_credentials_md_store *token_md = NULL;
|
|
|
|
gpr_timespec token_lifetime;
|
|
|
|
grpc_httpcli_response response =
|
|
|
|
http_response(200,
|
|
|
|
"{\"access_token\":\"ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_\","
|
|
|
|
" \"expires_in\":3599, "
|
|
|
|
" \"token_type\":\"Bearer\"");
|
|
|
|
GPR_ASSERT(grpc_oauth2_token_fetcher_credentials_parse_server_response(
|
|
|
|
&exec_ctx, &response, &token_md, &token_lifetime) ==
|
|
|
|
GRPC_CREDENTIALS_ERROR);
|
|
|
|
grpc_http_response_destroy(&response);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_oauth2_token_fetcher_creds_parsing_missing_token(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_credentials_md_store *token_md = NULL;
|
|
|
|
gpr_timespec token_lifetime;
|
|
|
|
grpc_httpcli_response response = http_response(200,
|
|
|
|
"{"
|
|
|
|
" \"expires_in\":3599, "
|
|
|
|
" \"token_type\":\"Bearer\"}");
|
|
|
|
GPR_ASSERT(grpc_oauth2_token_fetcher_credentials_parse_server_response(
|
|
|
|
&exec_ctx, &response, &token_md, &token_lifetime) ==
|
|
|
|
GRPC_CREDENTIALS_ERROR);
|
|
|
|
grpc_http_response_destroy(&response);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_oauth2_token_fetcher_creds_parsing_missing_token_type(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_credentials_md_store *token_md = NULL;
|
|
|
|
gpr_timespec token_lifetime;
|
|
|
|
grpc_httpcli_response response =
|
|
|
|
http_response(200,
|
|
|
|
"{\"access_token\":\"ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_\","
|
|
|
|
" \"expires_in\":3599, "
|
|
|
|
"}");
|
|
|
|
GPR_ASSERT(grpc_oauth2_token_fetcher_credentials_parse_server_response(
|
|
|
|
&exec_ctx, &response, &token_md, &token_lifetime) ==
|
|
|
|
GRPC_CREDENTIALS_ERROR);
|
|
|
|
grpc_http_response_destroy(&response);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_oauth2_token_fetcher_creds_parsing_missing_token_lifetime(
|
|
|
|
void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_credentials_md_store *token_md = NULL;
|
|
|
|
gpr_timespec token_lifetime;
|
|
|
|
grpc_httpcli_response response =
|
|
|
|
http_response(200,
|
|
|
|
"{\"access_token\":\"ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_\","
|
|
|
|
" \"token_type\":\"Bearer\"}");
|
|
|
|
GPR_ASSERT(grpc_oauth2_token_fetcher_credentials_parse_server_response(
|
|
|
|
&exec_ctx, &response, &token_md, &token_lifetime) ==
|
|
|
|
GRPC_CREDENTIALS_ERROR);
|
|
|
|
grpc_http_response_destroy(&response);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void check_metadata(expected_md *expected, grpc_credentials_md *md_elems,
|
|
|
|
size_t num_md) {
|
Updating moe_db.txt with the latest equivalence since the ruby import changed the exported structure.
Change on 2014/12/01 by nnoble <nnoble@google.com>
-------------
new [] file for grpc testing.
Change on 2014/12/02 by donnadionne <donnadionne@google.com>
-------------
Fix unfinished calls in thread_stress_test.
Previously we had an early return if we cancelled a stream part way through a
message. Correct this, so that half close and full close signals are propagated
up the stack correctly so that higher level state machines can see the
termination.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Remove dependency on internal C code.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Turn off the flaky bit from thread_stress_test.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Add test cases of empty request/response, request streaming, response streaming, and half duplex streaming.
Bring up the GFE/ESF for mannual test:
[] build java/com/google/net/[]/testing/integration/hexa:server_components_env
[]-bin/java/com/google/net/[]/testing/integration/hexa/server_components_env --manual --rpc_port=25000 --use_autobahn
Change on 2014/12/02 by chenw <chenw@google.com>
-------------
Make echo/server.c and fling/server.c shutdown cleanly on SIGINT, and update
the relevant tests to exercise this mechanism.
Now "[] coverage" and the memory leak detector are able to see into the
server processes.
Change on 2014/12/02 by pmarks <pmarks@google.com>
-------------
Allow the # of channels to be configurable in this performance test. The threads will use the channels in statically-defined round-robin order (not based on when RPCs complete on any channel). The interesting cases are #channels=1 or #channels=#threads (we previously only had the latter case)
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Fixed a typo and reworded a comment.
Change on 2014/12/02 by gnezdo <gnezdo@google.com>
-------------
Require the grpc_call in this ClientContext to be NULL before allowing set_call to be invoked. Otherwise, it's an indication of a leak somewhere.
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Correctly return status other than ok and add a test for it.
Change on 2014/12/02 by yangg <yangg@google.com>
-------------
Better C++ guards for grpc_security.h
Change on 2014/12/02 by nnoble <nnoble@google.com>
-------------
Use nullptr instead of NULL for consistency.
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Updates the ruby gRPC service class to require the serialization method to be
a static method
- this brings it inline with the proto3 ruby API
- it adds a monkey patch to allow existing proto (beefcake) to continue working.
Change on 2014/12/02 by temiola <temiola@google.com>
-------------
Adding a buildable unit to the blue print file.
Added the buildable unit as its name will be usesd as tap project id.
This test will fail right away in tap until tests are actually added.
Change on 2014/12/02 by donnadionne <donnadionne@google.com>
-------------
Move interop ESF C++ server from Java to grpc directory.
Tests passed:
[] test javatests/com/google/net/[]/testing/integration/hexa/...
[] test net/grpc/testing/interop/esf_server/...
Change on 2014/12/02 by chenw <chenw@google.com>
-------------
Return a lame channel as opposed to NULL when secure channel creation fails.
- Looks like we're going to need something similar server-side.
- I changed the prototype of the lame client channel factory to take an
explicit void as I think this is better practice in C. Let me know if you
disagree and I will revert these changes.
Change on 2014/12/02 by jboeuf <jboeuf@google.com>
-------------
Putting ALPN support where it belongs.
Change on 2014/12/02 by jboeuf <jboeuf@google.com>
-------------
GOAWAY send path.
Sends a GOAWAY frame when shutting down.
This is not read and understood yet.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Adds support for secure channels and servers.
- wraps new C apis (credentials, server_credentials) and Server#add_secure_http_port
- adds tests to ensure credentials and server credentials can be created
- updates client_server_spec to run the client_server wrapper layer end-to-end tests using a secure channel
Change on 2014/12/03 by temiola <temiola@google.com>
-------------
Fix existing issues regarding out of order events.
At the client side, using pluck as the client_metadata_read can happen anytime after invoke.
At the server side, allow halfclose_ok and rpc_end to come in reverse order.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
Don't track coverage of tests.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Change UnaryCall to conform standard test requirement of LargeUnaryCall.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
updating alpn version to h2-15 ensure all interop are on the same version and working.
Java and go are not ready for h2-16 yet.
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Add config to bring echo server in [].
This is used to test production GFE as its bckend.
Change on 2014/12/03 by chenw <chenw@google.com>
-------------
In preparation for fixing shutdown race issues, change em to take ownership of
the file descriptor. Add an API to grpc_tcp to take an already created
grpc_em_fd object, and change tcp_client to use that API.
This is needed because otherwise an em user's close() of the file descriptor
may race with libevent internals. That's not an issue yet because destroy()
frees the events inline, but that can't be done safely if there is a concurrent
poller.
Change on 2014/12/03 by klempner <klempner@google.com>
-------------
Fixing TAP opensource build
We don't want to compile and run C++ tests in the C target.
Change on 2014/12/03 by nnoble <nnoble@google.com>
-------------
Move and separate interop tests by languages.
Small fixes to the test runner.
Improving logging.
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Fixing the opensource build:
-) The C/C++ split wasn't done up to the 'dep' target level
-) The alpn.c file was missing from build.json
Change on 2014/12/03 by nnoble <nnoble@google.com>
-------------
Adding blue print files after projects exist
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Refactor StreamContext using the new completion_queue_pluck API.
The dedicated the poller thread has been removed.
This CL keeps the current behavior to make it short. There is one following to
make it usable for both client and server.
The tags for pluck is based on the address of this StreamContext object for potential debug use.
The Read/Write and Wait cannot be called concurrently now and this might need to be fixed.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
Binary encoding utilities.
Support base64 encoding, HPACK static huffman encoding, and doing both at once.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Enforce Makefile regeneration in presubmits.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Make CloseSend() send a real zero-length control message to indicate EOS.
Change on 2014/12/03 by zhaoq <zhaoq@google.com>
-------------
Prefer to create dualstack sockets for TCP clients and servers, with automatic
fallback for environments where IPV6_V6ONLY can't be turned off.
Change on 2014/12/03 by pmarks <pmarks@google.com>
-------------
Add opensource path to build targets.
Ensure that MOE is going to run.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Add PingPong test case. Delete FullDuplex test case. The latter is not specified for client in
https://docs.google.com/document/d/1dwrPpIu5EqiKVsquZfoOqTj7vP8fa1i49gornJo50Qw/edit#
Change on 2014/12/03 by chenw <chenw@google.com>
-------------
Make generate_projects.sh check out the generated targets.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
rspec cleanup
- stops declaring specs within the GRPC module
- splits Bidi streaming specs into a separate test suite
adding tests in the GRPC module was a mistake, it pollutes the module and can
affect other tests that run later by the test runner
the bidi tests are currently flaky, having them run in their own test suite
allows having two separate continuous builds (once ruby gRPC is on GitHub),
one that includes bidi where we tolerate flakiness, and another that does not,
where there should be no flakiness at all
Change on 2014/12/03 by temiola <temiola@google.com>
-------------
Adding support for composite and IAM credentials.
- For now, we don't do any checks on credentials compatibility in the
composite credentials. Maybe we'll add that later.
- Refactored the end to end security tests so that we always use the public API
(except for the fake security context which is not exposed).
Change on 2014/12/03 by jboeuf <jboeuf@google.com>
-------------
Make GPR library buildable in Visual Studio 2013.
Change on 2014/12/04 by jtattermusch <jtattermusch@google.com>
-------------
Adds codegen for ruby
This is being added now that ruby's proto and grpc apis are defined and stable
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Prevent NewStream() from sending negative or 0 timeout.
Change on 2014/12/04 by zhaoq <zhaoq@google.com>
-------------
Add a grpc_sockaddr_to_string() function, and use it when logging bind
failures. Also improve const-correctness in some earlier code.
I'm not certain whether inet_ntop() will need any platform-specific
implementations, but for now the compiler offers no complaints.
Demo:
$ []-bin/net/grpc/c/echo_server 1.2.3.4:80
... tcp_server.c:139] bind addr=[::ffff:1.2.3.4]:80: Permission denied
Change on 2014/12/04 by pmarks <pmarks@google.com>
-------------
Refactoring - moves c wrapped classes to a submodule Google::RPC::Core
- this allows for an explicit rule when reading through gRPC ruby code for telling
when an object is pure ruby or wrapped C
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Fixes the bidi_call
[]
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Fixing dev build when activating surface traces.
Change on 2014/12/04 by nnoble <nnoble@google.com>
-------------
Updates the tests to reflect that fact that some Credentials compose works.
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Making the generate_project_test actually do something.
Change on 2014/12/04 by nnoble <nnoble@google.com>
-------------
Rename "esf_server" to "[]4_server". Delete "test_sever" from Java directory.
Change on 2014/12/04 by chenw <chenw@google.com>
-------------
Added PHP client interop tests. Tested large_unary against the C++ server.
Change on 2014/12/04 by mlumish <mlumish@google.com>
-------------
Refactor grpc_create_dualstack_socket() by pulling the setsockopt into its own
function. This separates the magic test flag from the real fallback logic.
Change on 2014/12/04 by pmarks <pmarks@google.com>
-------------
Fixes the type of the constant used for test cert hostname
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Disabling these tests as they're causing flakiness.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Change intptr --> uintptr.
Handles the case where a void* turns into a negative number, which then gets
hashed into a negative bucket and segfaults.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Add a test fixture to force parsers to handle one byte at a time.
This should expand coverage and hopefully prevent errors at some point (it
seems to pass out of the box for now though).
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
The code generator isn't +x.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Updates math_client and math_server to allow construction using crednetials
By:
- Extending rpc_server constructor so that it takes a credentials keyword param
- Extending client_stub constructor so that it takes a credentials keyword param
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Format output a little more nicely.
Print each line of output separately - previously logging.info was truncating this at some maximum length, and logs were getting lost.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Up timeout for this test.
Under TSAN, if we process one byte at a time, this timeout can be reached - and I think this is the cause of the following flake:
[]
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Adding more error logging for ssl.
Change on 2014/12/05 by jboeuf <jboeuf@google.com>
-------------
Read path for goaway.
Still need to add hooks to deprecate a channel on the client side when goaway
is received.
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Separate accept() into server_accept() and server_end_of_initial_metadata().
This allows servers to initiate reads before finishing writing metadata.
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Fix for breakage 11512317 - adding missing test files.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
grpc c++ server side streaming support.
This is based on [] There is a lot of room to clean up the internal implementation which may require refactoring of CompletionQueue. The current cl serves as a working implementation with the missing interfaces.
The sample generated files are included and will be removed before submitting.
Change on 2014/12/05 by yangg <yangg@google.com>
-------------
Changed to the latest timeout format again (search "grpc-timeout" in [] for the spec).
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Fixing opensource build.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Making absolutely sure we can do the moe export by adding a sh_test for it.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Change :scheme psuedo-header from "grpc" to "http" or "https".
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Add server credential wrapping for c++ server. It only wraps ssl and []2 for now.
The ServerCredentials class and the factory class are in a similar fashion as
client side wrapping. The difference is the factory method returns shared_ptr
instead of unique_ptr as the server builder needs to keep a reference to it for
actually creating the server later.
The integration will happen in a following cl.
Change on 2014/12/05 by yangg <yangg@google.com>
-------------
Fixed bugs in new_grpc_docker_builder.sh
Change on 2014/12/05 by mlumish <mlumish@google.com>
-------------
In secure endpoint, hold a refcount for the life of a write callback if the
write does not complete immediately.
Change on 2014/12/05 by klempner <klempner@google.com>
-------------
Add migration support to MOE and have TAP verify it doesn't break.
Migration support allows mirroring commits from [] into the git repo, instead of just a dump of the current source.
Change on 2014/12/05 by ejona <ejona@google.com>
-------------
Change initial window size to 65535 according http2 draft 15.
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Re-enable the flaky cases in dualstack_socket_test, with additional logging to
help track down the problem if it surfaces again.
This also seems like a good opportunity to make grpc_socket_utils a separate
library, as it's not really specific to TCP.
Example output:
logspam: [], 26570) resolved 2 addrs in 37ms:
logspam: [0] [::1]:26570
logspam: [1] 127.0.0.1:26570
Change on 2014/12/05 by pmarks <pmarks@google.com>
-------------
Opensource build fixes.
-) A function that has a return type should actually return something.
-) Don't pass unsigned chars to strlen and strncmp.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Created by MOE: http://code.google.com/p/moe-java
MOE_MIGRATED_REVID=81458281
10 years ago
|
|
|
size_t i;
|
|
|
|
for (i = 0; i < num_md; i++) {
|
|
|
|
size_t j;
|
|
|
|
for (j = 0; j < num_md; j++) {
|
|
|
|
if (0 == grpc_slice_str_cmp(md_elems[j].key, expected[i].key)) {
|
|
|
|
GPR_ASSERT(grpc_slice_str_cmp(md_elems[j].value, expected[i].value) ==
|
|
|
|
0);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (j == num_md) {
|
|
|
|
gpr_log(GPR_ERROR, "key %s not found", expected[i].key);
|
|
|
|
GPR_ASSERT(0);
|
Updating moe_db.txt with the latest equivalence since the ruby import changed the exported structure.
Change on 2014/12/01 by nnoble <nnoble@google.com>
-------------
new [] file for grpc testing.
Change on 2014/12/02 by donnadionne <donnadionne@google.com>
-------------
Fix unfinished calls in thread_stress_test.
Previously we had an early return if we cancelled a stream part way through a
message. Correct this, so that half close and full close signals are propagated
up the stack correctly so that higher level state machines can see the
termination.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Remove dependency on internal C code.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Turn off the flaky bit from thread_stress_test.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Add test cases of empty request/response, request streaming, response streaming, and half duplex streaming.
Bring up the GFE/ESF for mannual test:
[] build java/com/google/net/[]/testing/integration/hexa:server_components_env
[]-bin/java/com/google/net/[]/testing/integration/hexa/server_components_env --manual --rpc_port=25000 --use_autobahn
Change on 2014/12/02 by chenw <chenw@google.com>
-------------
Make echo/server.c and fling/server.c shutdown cleanly on SIGINT, and update
the relevant tests to exercise this mechanism.
Now "[] coverage" and the memory leak detector are able to see into the
server processes.
Change on 2014/12/02 by pmarks <pmarks@google.com>
-------------
Allow the # of channels to be configurable in this performance test. The threads will use the channels in statically-defined round-robin order (not based on when RPCs complete on any channel). The interesting cases are #channels=1 or #channels=#threads (we previously only had the latter case)
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Fixed a typo and reworded a comment.
Change on 2014/12/02 by gnezdo <gnezdo@google.com>
-------------
Require the grpc_call in this ClientContext to be NULL before allowing set_call to be invoked. Otherwise, it's an indication of a leak somewhere.
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Correctly return status other than ok and add a test for it.
Change on 2014/12/02 by yangg <yangg@google.com>
-------------
Better C++ guards for grpc_security.h
Change on 2014/12/02 by nnoble <nnoble@google.com>
-------------
Use nullptr instead of NULL for consistency.
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Updates the ruby gRPC service class to require the serialization method to be
a static method
- this brings it inline with the proto3 ruby API
- it adds a monkey patch to allow existing proto (beefcake) to continue working.
Change on 2014/12/02 by temiola <temiola@google.com>
-------------
Adding a buildable unit to the blue print file.
Added the buildable unit as its name will be usesd as tap project id.
This test will fail right away in tap until tests are actually added.
Change on 2014/12/02 by donnadionne <donnadionne@google.com>
-------------
Move interop ESF C++ server from Java to grpc directory.
Tests passed:
[] test javatests/com/google/net/[]/testing/integration/hexa/...
[] test net/grpc/testing/interop/esf_server/...
Change on 2014/12/02 by chenw <chenw@google.com>
-------------
Return a lame channel as opposed to NULL when secure channel creation fails.
- Looks like we're going to need something similar server-side.
- I changed the prototype of the lame client channel factory to take an
explicit void as I think this is better practice in C. Let me know if you
disagree and I will revert these changes.
Change on 2014/12/02 by jboeuf <jboeuf@google.com>
-------------
Putting ALPN support where it belongs.
Change on 2014/12/02 by jboeuf <jboeuf@google.com>
-------------
GOAWAY send path.
Sends a GOAWAY frame when shutting down.
This is not read and understood yet.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Adds support for secure channels and servers.
- wraps new C apis (credentials, server_credentials) and Server#add_secure_http_port
- adds tests to ensure credentials and server credentials can be created
- updates client_server_spec to run the client_server wrapper layer end-to-end tests using a secure channel
Change on 2014/12/03 by temiola <temiola@google.com>
-------------
Fix existing issues regarding out of order events.
At the client side, using pluck as the client_metadata_read can happen anytime after invoke.
At the server side, allow halfclose_ok and rpc_end to come in reverse order.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
Don't track coverage of tests.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Change UnaryCall to conform standard test requirement of LargeUnaryCall.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
updating alpn version to h2-15 ensure all interop are on the same version and working.
Java and go are not ready for h2-16 yet.
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Add config to bring echo server in [].
This is used to test production GFE as its bckend.
Change on 2014/12/03 by chenw <chenw@google.com>
-------------
In preparation for fixing shutdown race issues, change em to take ownership of
the file descriptor. Add an API to grpc_tcp to take an already created
grpc_em_fd object, and change tcp_client to use that API.
This is needed because otherwise an em user's close() of the file descriptor
may race with libevent internals. That's not an issue yet because destroy()
frees the events inline, but that can't be done safely if there is a concurrent
poller.
Change on 2014/12/03 by klempner <klempner@google.com>
-------------
Fixing TAP opensource build
We don't want to compile and run C++ tests in the C target.
Change on 2014/12/03 by nnoble <nnoble@google.com>
-------------
Move and separate interop tests by languages.
Small fixes to the test runner.
Improving logging.
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Fixing the opensource build:
-) The C/C++ split wasn't done up to the 'dep' target level
-) The alpn.c file was missing from build.json
Change on 2014/12/03 by nnoble <nnoble@google.com>
-------------
Adding blue print files after projects exist
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Refactor StreamContext using the new completion_queue_pluck API.
The dedicated the poller thread has been removed.
This CL keeps the current behavior to make it short. There is one following to
make it usable for both client and server.
The tags for pluck is based on the address of this StreamContext object for potential debug use.
The Read/Write and Wait cannot be called concurrently now and this might need to be fixed.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
Binary encoding utilities.
Support base64 encoding, HPACK static huffman encoding, and doing both at once.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Enforce Makefile regeneration in presubmits.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Make CloseSend() send a real zero-length control message to indicate EOS.
Change on 2014/12/03 by zhaoq <zhaoq@google.com>
-------------
Prefer to create dualstack sockets for TCP clients and servers, with automatic
fallback for environments where IPV6_V6ONLY can't be turned off.
Change on 2014/12/03 by pmarks <pmarks@google.com>
-------------
Add opensource path to build targets.
Ensure that MOE is going to run.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Add PingPong test case. Delete FullDuplex test case. The latter is not specified for client in
https://docs.google.com/document/d/1dwrPpIu5EqiKVsquZfoOqTj7vP8fa1i49gornJo50Qw/edit#
Change on 2014/12/03 by chenw <chenw@google.com>
-------------
Make generate_projects.sh check out the generated targets.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
rspec cleanup
- stops declaring specs within the GRPC module
- splits Bidi streaming specs into a separate test suite
adding tests in the GRPC module was a mistake, it pollutes the module and can
affect other tests that run later by the test runner
the bidi tests are currently flaky, having them run in their own test suite
allows having two separate continuous builds (once ruby gRPC is on GitHub),
one that includes bidi where we tolerate flakiness, and another that does not,
where there should be no flakiness at all
Change on 2014/12/03 by temiola <temiola@google.com>
-------------
Adding support for composite and IAM credentials.
- For now, we don't do any checks on credentials compatibility in the
composite credentials. Maybe we'll add that later.
- Refactored the end to end security tests so that we always use the public API
(except for the fake security context which is not exposed).
Change on 2014/12/03 by jboeuf <jboeuf@google.com>
-------------
Make GPR library buildable in Visual Studio 2013.
Change on 2014/12/04 by jtattermusch <jtattermusch@google.com>
-------------
Adds codegen for ruby
This is being added now that ruby's proto and grpc apis are defined and stable
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Prevent NewStream() from sending negative or 0 timeout.
Change on 2014/12/04 by zhaoq <zhaoq@google.com>
-------------
Add a grpc_sockaddr_to_string() function, and use it when logging bind
failures. Also improve const-correctness in some earlier code.
I'm not certain whether inet_ntop() will need any platform-specific
implementations, but for now the compiler offers no complaints.
Demo:
$ []-bin/net/grpc/c/echo_server 1.2.3.4:80
... tcp_server.c:139] bind addr=[::ffff:1.2.3.4]:80: Permission denied
Change on 2014/12/04 by pmarks <pmarks@google.com>
-------------
Refactoring - moves c wrapped classes to a submodule Google::RPC::Core
- this allows for an explicit rule when reading through gRPC ruby code for telling
when an object is pure ruby or wrapped C
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Fixes the bidi_call
[]
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Fixing dev build when activating surface traces.
Change on 2014/12/04 by nnoble <nnoble@google.com>
-------------
Updates the tests to reflect that fact that some Credentials compose works.
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Making the generate_project_test actually do something.
Change on 2014/12/04 by nnoble <nnoble@google.com>
-------------
Rename "esf_server" to "[]4_server". Delete "test_sever" from Java directory.
Change on 2014/12/04 by chenw <chenw@google.com>
-------------
Added PHP client interop tests. Tested large_unary against the C++ server.
Change on 2014/12/04 by mlumish <mlumish@google.com>
-------------
Refactor grpc_create_dualstack_socket() by pulling the setsockopt into its own
function. This separates the magic test flag from the real fallback logic.
Change on 2014/12/04 by pmarks <pmarks@google.com>
-------------
Fixes the type of the constant used for test cert hostname
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Disabling these tests as they're causing flakiness.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Change intptr --> uintptr.
Handles the case where a void* turns into a negative number, which then gets
hashed into a negative bucket and segfaults.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Add a test fixture to force parsers to handle one byte at a time.
This should expand coverage and hopefully prevent errors at some point (it
seems to pass out of the box for now though).
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
The code generator isn't +x.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Updates math_client and math_server to allow construction using crednetials
By:
- Extending rpc_server constructor so that it takes a credentials keyword param
- Extending client_stub constructor so that it takes a credentials keyword param
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Format output a little more nicely.
Print each line of output separately - previously logging.info was truncating this at some maximum length, and logs were getting lost.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Up timeout for this test.
Under TSAN, if we process one byte at a time, this timeout can be reached - and I think this is the cause of the following flake:
[]
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Adding more error logging for ssl.
Change on 2014/12/05 by jboeuf <jboeuf@google.com>
-------------
Read path for goaway.
Still need to add hooks to deprecate a channel on the client side when goaway
is received.
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Separate accept() into server_accept() and server_end_of_initial_metadata().
This allows servers to initiate reads before finishing writing metadata.
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Fix for breakage 11512317 - adding missing test files.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
grpc c++ server side streaming support.
This is based on [] There is a lot of room to clean up the internal implementation which may require refactoring of CompletionQueue. The current cl serves as a working implementation with the missing interfaces.
The sample generated files are included and will be removed before submitting.
Change on 2014/12/05 by yangg <yangg@google.com>
-------------
Changed to the latest timeout format again (search "grpc-timeout" in [] for the spec).
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Fixing opensource build.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Making absolutely sure we can do the moe export by adding a sh_test for it.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Change :scheme psuedo-header from "grpc" to "http" or "https".
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Add server credential wrapping for c++ server. It only wraps ssl and []2 for now.
The ServerCredentials class and the factory class are in a similar fashion as
client side wrapping. The difference is the factory method returns shared_ptr
instead of unique_ptr as the server builder needs to keep a reference to it for
actually creating the server later.
The integration will happen in a following cl.
Change on 2014/12/05 by yangg <yangg@google.com>
-------------
Fixed bugs in new_grpc_docker_builder.sh
Change on 2014/12/05 by mlumish <mlumish@google.com>
-------------
In secure endpoint, hold a refcount for the life of a write callback if the
write does not complete immediately.
Change on 2014/12/05 by klempner <klempner@google.com>
-------------
Add migration support to MOE and have TAP verify it doesn't break.
Migration support allows mirroring commits from [] into the git repo, instead of just a dump of the current source.
Change on 2014/12/05 by ejona <ejona@google.com>
-------------
Change initial window size to 65535 according http2 draft 15.
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Re-enable the flaky cases in dualstack_socket_test, with additional logging to
help track down the problem if it surfaces again.
This also seems like a good opportunity to make grpc_socket_utils a separate
library, as it's not really specific to TCP.
Example output:
logspam: [], 26570) resolved 2 addrs in 37ms:
logspam: [0] [::1]:26570
logspam: [1] 127.0.0.1:26570
Change on 2014/12/05 by pmarks <pmarks@google.com>
-------------
Opensource build fixes.
-) A function that has a return type should actually return something.
-) Don't pass unsigned chars to strlen and strncmp.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Created by MOE: http://code.google.com/p/moe-java
MOE_MIGRATED_REVID=81458281
10 years ago
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void check_google_iam_metadata(grpc_exec_ctx *exec_ctx, void *user_data,
|
|
|
|
grpc_credentials_md *md_elems,
|
|
|
|
size_t num_md,
|
|
|
|
grpc_credentials_status status,
|
|
|
|
const char *error_details) {
|
|
|
|
grpc_call_credentials *c = (grpc_call_credentials *)user_data;
|
|
|
|
expected_md emd[] = {{GRPC_IAM_AUTHORIZATION_TOKEN_METADATA_KEY,
|
|
|
|
test_google_iam_authorization_token},
|
|
|
|
{GRPC_IAM_AUTHORITY_SELECTOR_METADATA_KEY,
|
|
|
|
test_google_iam_authority_selector}};
|
|
|
|
GPR_ASSERT(status == GRPC_CREDENTIALS_OK);
|
|
|
|
GPR_ASSERT(error_details == NULL);
|
|
|
|
GPR_ASSERT(num_md == 2);
|
|
|
|
check_metadata(emd, md_elems, num_md);
|
|
|
|
grpc_call_credentials_unref(exec_ctx, c);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_google_iam_creds(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_call_credentials *creds = grpc_google_iam_credentials_create(
|
|
|
|
test_google_iam_authorization_token, test_google_iam_authority_selector,
|
|
|
|
NULL);
|
|
|
|
grpc_auth_metadata_context auth_md_ctx = {test_service_url, test_method, NULL,
|
|
|
|
NULL};
|
|
|
|
grpc_call_credentials_get_request_metadata(
|
|
|
|
&exec_ctx, creds, NULL, auth_md_ctx, check_google_iam_metadata, creds);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void check_access_token_metadata(
|
|
|
|
grpc_exec_ctx *exec_ctx, void *user_data, grpc_credentials_md *md_elems,
|
|
|
|
size_t num_md, grpc_credentials_status status, const char *error_details) {
|
|
|
|
grpc_call_credentials *c = (grpc_call_credentials *)user_data;
|
|
|
|
expected_md emd[] = {{GRPC_AUTHORIZATION_METADATA_KEY, "Bearer blah"}};
|
|
|
|
GPR_ASSERT(status == GRPC_CREDENTIALS_OK);
|
|
|
|
GPR_ASSERT(error_details == NULL);
|
|
|
|
GPR_ASSERT(num_md == 1);
|
|
|
|
check_metadata(emd, md_elems, num_md);
|
|
|
|
grpc_call_credentials_unref(exec_ctx, c);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_access_token_creds(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_call_credentials *creds =
|
|
|
|
grpc_access_token_credentials_create("blah", NULL);
|
|
|
|
grpc_auth_metadata_context auth_md_ctx = {test_service_url, test_method, NULL,
|
|
|
|
NULL};
|
|
|
|
GPR_ASSERT(strcmp(creds->type, GRPC_CALL_CREDENTIALS_TYPE_OAUTH2) == 0);
|
|
|
|
grpc_call_credentials_get_request_metadata(
|
|
|
|
&exec_ctx, creds, NULL, auth_md_ctx, check_access_token_metadata, creds);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static grpc_security_status check_channel_oauth2_create_security_connector(
|
|
|
|
grpc_exec_ctx *exec_ctx, grpc_channel_credentials *c,
|
|
|
|
grpc_call_credentials *call_creds, const char *target,
|
|
|
|
const grpc_channel_args *args, grpc_channel_security_connector **sc,
|
|
|
|
grpc_channel_args **new_args) {
|
|
|
|
GPR_ASSERT(strcmp(c->type, "mock") == 0);
|
|
|
|
GPR_ASSERT(call_creds != NULL);
|
|
|
|
GPR_ASSERT(strcmp(call_creds->type, GRPC_CALL_CREDENTIALS_TYPE_OAUTH2) == 0);
|
|
|
|
return GRPC_SECURITY_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_channel_oauth2_composite_creds(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_channel_args *new_args;
|
|
|
|
grpc_channel_credentials_vtable vtable = {
|
|
|
|
NULL, check_channel_oauth2_create_security_connector, NULL};
|
|
|
|
grpc_channel_credentials *channel_creds =
|
|
|
|
grpc_mock_channel_credentials_create(&vtable);
|
|
|
|
grpc_call_credentials *oauth2_creds =
|
|
|
|
grpc_access_token_credentials_create("blah", NULL);
|
|
|
|
grpc_channel_credentials *channel_oauth2_creds =
|
|
|
|
grpc_composite_channel_credentials_create(channel_creds, oauth2_creds,
|
|
|
|
NULL);
|
|
|
|
grpc_channel_credentials_release(channel_creds);
|
|
|
|
grpc_call_credentials_release(oauth2_creds);
|
|
|
|
GPR_ASSERT(grpc_channel_credentials_create_security_connector(
|
|
|
|
&exec_ctx, channel_oauth2_creds, NULL, NULL, NULL,
|
|
|
|
&new_args) == GRPC_SECURITY_OK);
|
|
|
|
grpc_channel_credentials_release(channel_oauth2_creds);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void check_oauth2_google_iam_composite_metadata(
|
|
|
|
grpc_exec_ctx *exec_ctx, void *user_data, grpc_credentials_md *md_elems,
|
|
|
|
size_t num_md, grpc_credentials_status status, const char *error_details) {
|
|
|
|
grpc_call_credentials *c = (grpc_call_credentials *)user_data;
|
Updating moe_db.txt with the latest equivalence since the ruby import changed the exported structure.
Change on 2014/12/01 by nnoble <nnoble@google.com>
-------------
new [] file for grpc testing.
Change on 2014/12/02 by donnadionne <donnadionne@google.com>
-------------
Fix unfinished calls in thread_stress_test.
Previously we had an early return if we cancelled a stream part way through a
message. Correct this, so that half close and full close signals are propagated
up the stack correctly so that higher level state machines can see the
termination.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Remove dependency on internal C code.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Turn off the flaky bit from thread_stress_test.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Add test cases of empty request/response, request streaming, response streaming, and half duplex streaming.
Bring up the GFE/ESF for mannual test:
[] build java/com/google/net/[]/testing/integration/hexa:server_components_env
[]-bin/java/com/google/net/[]/testing/integration/hexa/server_components_env --manual --rpc_port=25000 --use_autobahn
Change on 2014/12/02 by chenw <chenw@google.com>
-------------
Make echo/server.c and fling/server.c shutdown cleanly on SIGINT, and update
the relevant tests to exercise this mechanism.
Now "[] coverage" and the memory leak detector are able to see into the
server processes.
Change on 2014/12/02 by pmarks <pmarks@google.com>
-------------
Allow the # of channels to be configurable in this performance test. The threads will use the channels in statically-defined round-robin order (not based on when RPCs complete on any channel). The interesting cases are #channels=1 or #channels=#threads (we previously only had the latter case)
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Fixed a typo and reworded a comment.
Change on 2014/12/02 by gnezdo <gnezdo@google.com>
-------------
Require the grpc_call in this ClientContext to be NULL before allowing set_call to be invoked. Otherwise, it's an indication of a leak somewhere.
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Correctly return status other than ok and add a test for it.
Change on 2014/12/02 by yangg <yangg@google.com>
-------------
Better C++ guards for grpc_security.h
Change on 2014/12/02 by nnoble <nnoble@google.com>
-------------
Use nullptr instead of NULL for consistency.
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Updates the ruby gRPC service class to require the serialization method to be
a static method
- this brings it inline with the proto3 ruby API
- it adds a monkey patch to allow existing proto (beefcake) to continue working.
Change on 2014/12/02 by temiola <temiola@google.com>
-------------
Adding a buildable unit to the blue print file.
Added the buildable unit as its name will be usesd as tap project id.
This test will fail right away in tap until tests are actually added.
Change on 2014/12/02 by donnadionne <donnadionne@google.com>
-------------
Move interop ESF C++ server from Java to grpc directory.
Tests passed:
[] test javatests/com/google/net/[]/testing/integration/hexa/...
[] test net/grpc/testing/interop/esf_server/...
Change on 2014/12/02 by chenw <chenw@google.com>
-------------
Return a lame channel as opposed to NULL when secure channel creation fails.
- Looks like we're going to need something similar server-side.
- I changed the prototype of the lame client channel factory to take an
explicit void as I think this is better practice in C. Let me know if you
disagree and I will revert these changes.
Change on 2014/12/02 by jboeuf <jboeuf@google.com>
-------------
Putting ALPN support where it belongs.
Change on 2014/12/02 by jboeuf <jboeuf@google.com>
-------------
GOAWAY send path.
Sends a GOAWAY frame when shutting down.
This is not read and understood yet.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Adds support for secure channels and servers.
- wraps new C apis (credentials, server_credentials) and Server#add_secure_http_port
- adds tests to ensure credentials and server credentials can be created
- updates client_server_spec to run the client_server wrapper layer end-to-end tests using a secure channel
Change on 2014/12/03 by temiola <temiola@google.com>
-------------
Fix existing issues regarding out of order events.
At the client side, using pluck as the client_metadata_read can happen anytime after invoke.
At the server side, allow halfclose_ok and rpc_end to come in reverse order.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
Don't track coverage of tests.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Change UnaryCall to conform standard test requirement of LargeUnaryCall.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
updating alpn version to h2-15 ensure all interop are on the same version and working.
Java and go are not ready for h2-16 yet.
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Add config to bring echo server in [].
This is used to test production GFE as its bckend.
Change on 2014/12/03 by chenw <chenw@google.com>
-------------
In preparation for fixing shutdown race issues, change em to take ownership of
the file descriptor. Add an API to grpc_tcp to take an already created
grpc_em_fd object, and change tcp_client to use that API.
This is needed because otherwise an em user's close() of the file descriptor
may race with libevent internals. That's not an issue yet because destroy()
frees the events inline, but that can't be done safely if there is a concurrent
poller.
Change on 2014/12/03 by klempner <klempner@google.com>
-------------
Fixing TAP opensource build
We don't want to compile and run C++ tests in the C target.
Change on 2014/12/03 by nnoble <nnoble@google.com>
-------------
Move and separate interop tests by languages.
Small fixes to the test runner.
Improving logging.
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Fixing the opensource build:
-) The C/C++ split wasn't done up to the 'dep' target level
-) The alpn.c file was missing from build.json
Change on 2014/12/03 by nnoble <nnoble@google.com>
-------------
Adding blue print files after projects exist
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Refactor StreamContext using the new completion_queue_pluck API.
The dedicated the poller thread has been removed.
This CL keeps the current behavior to make it short. There is one following to
make it usable for both client and server.
The tags for pluck is based on the address of this StreamContext object for potential debug use.
The Read/Write and Wait cannot be called concurrently now and this might need to be fixed.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
Binary encoding utilities.
Support base64 encoding, HPACK static huffman encoding, and doing both at once.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Enforce Makefile regeneration in presubmits.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Make CloseSend() send a real zero-length control message to indicate EOS.
Change on 2014/12/03 by zhaoq <zhaoq@google.com>
-------------
Prefer to create dualstack sockets for TCP clients and servers, with automatic
fallback for environments where IPV6_V6ONLY can't be turned off.
Change on 2014/12/03 by pmarks <pmarks@google.com>
-------------
Add opensource path to build targets.
Ensure that MOE is going to run.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Add PingPong test case. Delete FullDuplex test case. The latter is not specified for client in
https://docs.google.com/document/d/1dwrPpIu5EqiKVsquZfoOqTj7vP8fa1i49gornJo50Qw/edit#
Change on 2014/12/03 by chenw <chenw@google.com>
-------------
Make generate_projects.sh check out the generated targets.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
rspec cleanup
- stops declaring specs within the GRPC module
- splits Bidi streaming specs into a separate test suite
adding tests in the GRPC module was a mistake, it pollutes the module and can
affect other tests that run later by the test runner
the bidi tests are currently flaky, having them run in their own test suite
allows having two separate continuous builds (once ruby gRPC is on GitHub),
one that includes bidi where we tolerate flakiness, and another that does not,
where there should be no flakiness at all
Change on 2014/12/03 by temiola <temiola@google.com>
-------------
Adding support for composite and IAM credentials.
- For now, we don't do any checks on credentials compatibility in the
composite credentials. Maybe we'll add that later.
- Refactored the end to end security tests so that we always use the public API
(except for the fake security context which is not exposed).
Change on 2014/12/03 by jboeuf <jboeuf@google.com>
-------------
Make GPR library buildable in Visual Studio 2013.
Change on 2014/12/04 by jtattermusch <jtattermusch@google.com>
-------------
Adds codegen for ruby
This is being added now that ruby's proto and grpc apis are defined and stable
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Prevent NewStream() from sending negative or 0 timeout.
Change on 2014/12/04 by zhaoq <zhaoq@google.com>
-------------
Add a grpc_sockaddr_to_string() function, and use it when logging bind
failures. Also improve const-correctness in some earlier code.
I'm not certain whether inet_ntop() will need any platform-specific
implementations, but for now the compiler offers no complaints.
Demo:
$ []-bin/net/grpc/c/echo_server 1.2.3.4:80
... tcp_server.c:139] bind addr=[::ffff:1.2.3.4]:80: Permission denied
Change on 2014/12/04 by pmarks <pmarks@google.com>
-------------
Refactoring - moves c wrapped classes to a submodule Google::RPC::Core
- this allows for an explicit rule when reading through gRPC ruby code for telling
when an object is pure ruby or wrapped C
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Fixes the bidi_call
[]
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Fixing dev build when activating surface traces.
Change on 2014/12/04 by nnoble <nnoble@google.com>
-------------
Updates the tests to reflect that fact that some Credentials compose works.
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Making the generate_project_test actually do something.
Change on 2014/12/04 by nnoble <nnoble@google.com>
-------------
Rename "esf_server" to "[]4_server". Delete "test_sever" from Java directory.
Change on 2014/12/04 by chenw <chenw@google.com>
-------------
Added PHP client interop tests. Tested large_unary against the C++ server.
Change on 2014/12/04 by mlumish <mlumish@google.com>
-------------
Refactor grpc_create_dualstack_socket() by pulling the setsockopt into its own
function. This separates the magic test flag from the real fallback logic.
Change on 2014/12/04 by pmarks <pmarks@google.com>
-------------
Fixes the type of the constant used for test cert hostname
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Disabling these tests as they're causing flakiness.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Change intptr --> uintptr.
Handles the case where a void* turns into a negative number, which then gets
hashed into a negative bucket and segfaults.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Add a test fixture to force parsers to handle one byte at a time.
This should expand coverage and hopefully prevent errors at some point (it
seems to pass out of the box for now though).
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
The code generator isn't +x.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Updates math_client and math_server to allow construction using crednetials
By:
- Extending rpc_server constructor so that it takes a credentials keyword param
- Extending client_stub constructor so that it takes a credentials keyword param
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Format output a little more nicely.
Print each line of output separately - previously logging.info was truncating this at some maximum length, and logs were getting lost.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Up timeout for this test.
Under TSAN, if we process one byte at a time, this timeout can be reached - and I think this is the cause of the following flake:
[]
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Adding more error logging for ssl.
Change on 2014/12/05 by jboeuf <jboeuf@google.com>
-------------
Read path for goaway.
Still need to add hooks to deprecate a channel on the client side when goaway
is received.
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Separate accept() into server_accept() and server_end_of_initial_metadata().
This allows servers to initiate reads before finishing writing metadata.
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Fix for breakage 11512317 - adding missing test files.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
grpc c++ server side streaming support.
This is based on [] There is a lot of room to clean up the internal implementation which may require refactoring of CompletionQueue. The current cl serves as a working implementation with the missing interfaces.
The sample generated files are included and will be removed before submitting.
Change on 2014/12/05 by yangg <yangg@google.com>
-------------
Changed to the latest timeout format again (search "grpc-timeout" in [] for the spec).
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Fixing opensource build.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Making absolutely sure we can do the moe export by adding a sh_test for it.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Change :scheme psuedo-header from "grpc" to "http" or "https".
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Add server credential wrapping for c++ server. It only wraps ssl and []2 for now.
The ServerCredentials class and the factory class are in a similar fashion as
client side wrapping. The difference is the factory method returns shared_ptr
instead of unique_ptr as the server builder needs to keep a reference to it for
actually creating the server later.
The integration will happen in a following cl.
Change on 2014/12/05 by yangg <yangg@google.com>
-------------
Fixed bugs in new_grpc_docker_builder.sh
Change on 2014/12/05 by mlumish <mlumish@google.com>
-------------
In secure endpoint, hold a refcount for the life of a write callback if the
write does not complete immediately.
Change on 2014/12/05 by klempner <klempner@google.com>
-------------
Add migration support to MOE and have TAP verify it doesn't break.
Migration support allows mirroring commits from [] into the git repo, instead of just a dump of the current source.
Change on 2014/12/05 by ejona <ejona@google.com>
-------------
Change initial window size to 65535 according http2 draft 15.
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Re-enable the flaky cases in dualstack_socket_test, with additional logging to
help track down the problem if it surfaces again.
This also seems like a good opportunity to make grpc_socket_utils a separate
library, as it's not really specific to TCP.
Example output:
logspam: [], 26570) resolved 2 addrs in 37ms:
logspam: [0] [::1]:26570
logspam: [1] 127.0.0.1:26570
Change on 2014/12/05 by pmarks <pmarks@google.com>
-------------
Opensource build fixes.
-) A function that has a return type should actually return something.
-) Don't pass unsigned chars to strlen and strncmp.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Created by MOE: http://code.google.com/p/moe-java
MOE_MIGRATED_REVID=81458281
10 years ago
|
|
|
expected_md emd[] = {
|
|
|
|
{GRPC_AUTHORIZATION_METADATA_KEY, test_oauth2_bearer_token},
|
|
|
|
{GRPC_IAM_AUTHORIZATION_TOKEN_METADATA_KEY,
|
|
|
|
test_google_iam_authorization_token},
|
|
|
|
{GRPC_IAM_AUTHORITY_SELECTOR_METADATA_KEY,
|
|
|
|
test_google_iam_authority_selector}};
|
|
|
|
GPR_ASSERT(status == GRPC_CREDENTIALS_OK);
|
|
|
|
GPR_ASSERT(error_details == NULL);
|
|
|
|
GPR_ASSERT(num_md == 3);
|
|
|
|
check_metadata(emd, md_elems, num_md);
|
|
|
|
grpc_call_credentials_unref(exec_ctx, c);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_oauth2_google_iam_composite_creds(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
const grpc_call_credentials_array *creds_array;
|
|
|
|
grpc_auth_metadata_context auth_md_ctx = {test_service_url, test_method, NULL,
|
|
|
|
NULL};
|
|
|
|
grpc_call_credentials *oauth2_creds = grpc_md_only_test_credentials_create(
|
|
|
|
"authorization", test_oauth2_bearer_token, 0);
|
|
|
|
grpc_call_credentials *google_iam_creds = grpc_google_iam_credentials_create(
|
|
|
|
test_google_iam_authorization_token, test_google_iam_authority_selector,
|
|
|
|
NULL);
|
|
|
|
grpc_call_credentials *composite_creds =
|
|
|
|
grpc_composite_call_credentials_create(oauth2_creds, google_iam_creds,
|
|
|
|
NULL);
|
|
|
|
grpc_call_credentials_unref(&exec_ctx, oauth2_creds);
|
|
|
|
grpc_call_credentials_unref(&exec_ctx, google_iam_creds);
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(composite_creds->type, GRPC_CALL_CREDENTIALS_TYPE_COMPOSITE) == 0);
|
|
|
|
creds_array =
|
|
|
|
grpc_composite_call_credentials_get_credentials(composite_creds);
|
|
|
|
GPR_ASSERT(creds_array->num_creds == 2);
|
|
|
|
GPR_ASSERT(strcmp(creds_array->creds_array[0]->type,
|
|
|
|
GRPC_CALL_CREDENTIALS_TYPE_OAUTH2) == 0);
|
|
|
|
GPR_ASSERT(strcmp(creds_array->creds_array[1]->type,
|
|
|
|
GRPC_CALL_CREDENTIALS_TYPE_IAM) == 0);
|
|
|
|
grpc_call_credentials_get_request_metadata(
|
|
|
|
&exec_ctx, composite_creds, NULL, auth_md_ctx,
|
|
|
|
check_oauth2_google_iam_composite_metadata, composite_creds);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static grpc_security_status
|
|
|
|
check_channel_oauth2_google_iam_create_security_connector(
|
|
|
|
grpc_exec_ctx *exec_ctx, grpc_channel_credentials *c,
|
|
|
|
grpc_call_credentials *call_creds, const char *target,
|
|
|
|
const grpc_channel_args *args, grpc_channel_security_connector **sc,
|
|
|
|
grpc_channel_args **new_args) {
|
|
|
|
const grpc_call_credentials_array *creds_array;
|
|
|
|
GPR_ASSERT(strcmp(c->type, "mock") == 0);
|
|
|
|
GPR_ASSERT(call_creds != NULL);
|
|
|
|
GPR_ASSERT(strcmp(call_creds->type, GRPC_CALL_CREDENTIALS_TYPE_COMPOSITE) ==
|
|
|
|
0);
|
|
|
|
creds_array = grpc_composite_call_credentials_get_credentials(call_creds);
|
|
|
|
GPR_ASSERT(strcmp(creds_array->creds_array[0]->type,
|
|
|
|
GRPC_CALL_CREDENTIALS_TYPE_OAUTH2) == 0);
|
|
|
|
GPR_ASSERT(strcmp(creds_array->creds_array[1]->type,
|
|
|
|
GRPC_CALL_CREDENTIALS_TYPE_IAM) == 0);
|
|
|
|
return GRPC_SECURITY_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_channel_oauth2_google_iam_composite_creds(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_channel_args *new_args;
|
|
|
|
grpc_channel_credentials_vtable vtable = {
|
|
|
|
NULL, check_channel_oauth2_google_iam_create_security_connector, NULL};
|
|
|
|
grpc_channel_credentials *channel_creds =
|
|
|
|
grpc_mock_channel_credentials_create(&vtable);
|
|
|
|
grpc_call_credentials *oauth2_creds =
|
|
|
|
grpc_access_token_credentials_create("blah", NULL);
|
|
|
|
grpc_channel_credentials *channel_oauth2_creds =
|
|
|
|
grpc_composite_channel_credentials_create(channel_creds, oauth2_creds,
|
|
|
|
NULL);
|
|
|
|
grpc_call_credentials *google_iam_creds = grpc_google_iam_credentials_create(
|
|
|
|
test_google_iam_authorization_token, test_google_iam_authority_selector,
|
|
|
|
NULL);
|
|
|
|
grpc_channel_credentials *channel_oauth2_iam_creds =
|
|
|
|
grpc_composite_channel_credentials_create(channel_oauth2_creds,
|
|
|
|
google_iam_creds, NULL);
|
|
|
|
grpc_channel_credentials_release(channel_creds);
|
|
|
|
grpc_call_credentials_release(oauth2_creds);
|
|
|
|
grpc_channel_credentials_release(channel_oauth2_creds);
|
|
|
|
grpc_call_credentials_release(google_iam_creds);
|
|
|
|
|
|
|
|
GPR_ASSERT(grpc_channel_credentials_create_security_connector(
|
|
|
|
&exec_ctx, channel_oauth2_iam_creds, NULL, NULL, NULL,
|
|
|
|
&new_args) == GRPC_SECURITY_OK);
|
|
|
|
|
|
|
|
grpc_channel_credentials_release(channel_oauth2_iam_creds);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void on_oauth2_creds_get_metadata_success(
|
|
|
|
grpc_exec_ctx *exec_ctx, void *user_data, grpc_credentials_md *md_elems,
|
|
|
|
size_t num_md, grpc_credentials_status status, const char *error_details) {
|
|
|
|
GPR_ASSERT(status == GRPC_CREDENTIALS_OK);
|
|
|
|
GPR_ASSERT(error_details == NULL);
|
|
|
|
GPR_ASSERT(num_md == 1);
|
|
|
|
GPR_ASSERT(grpc_slice_str_cmp(md_elems[0].key, "authorization") == 0);
|
|
|
|
GPR_ASSERT(grpc_slice_str_cmp(md_elems[0].value,
|
|
|
|
"Bearer ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_") ==
|
|
|
|
0);
|
|
|
|
GPR_ASSERT(user_data != NULL);
|
|
|
|
GPR_ASSERT(strcmp((const char *)user_data, test_user_data) == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void on_oauth2_creds_get_metadata_failure(
|
|
|
|
grpc_exec_ctx *exec_ctx, void *user_data, grpc_credentials_md *md_elems,
|
|
|
|
size_t num_md, grpc_credentials_status status, const char *error_details) {
|
|
|
|
GPR_ASSERT(status == GRPC_CREDENTIALS_ERROR);
|
|
|
|
GPR_ASSERT(num_md == 0);
|
|
|
|
GPR_ASSERT(user_data != NULL);
|
|
|
|
GPR_ASSERT(strcmp((const char *)user_data, test_user_data) == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void validate_compute_engine_http_request(
|
|
|
|
const grpc_httpcli_request *request) {
|
|
|
|
GPR_ASSERT(request->handshaker != &grpc_httpcli_ssl);
|
|
|
|
GPR_ASSERT(strcmp(request->host, "metadata") == 0);
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(request->http.path,
|
|
|
|
"/computeMetadata/v1/instance/service-accounts/default/token") ==
|
|
|
|
0);
|
|
|
|
GPR_ASSERT(request->http.hdr_count == 1);
|
|
|
|
GPR_ASSERT(strcmp(request->http.hdrs[0].key, "Metadata-Flavor") == 0);
|
|
|
|
GPR_ASSERT(strcmp(request->http.hdrs[0].value, "Google") == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int compute_engine_httpcli_get_success_override(
|
|
|
|
grpc_exec_ctx *exec_ctx, const grpc_httpcli_request *request,
|
|
|
|
gpr_timespec deadline, grpc_closure *on_done,
|
|
|
|
grpc_httpcli_response *response) {
|
|
|
|
validate_compute_engine_http_request(request);
|
|
|
|
*response = http_response(200, valid_oauth2_json_response);
|
|
|
|
grpc_exec_ctx_sched(exec_ctx, on_done, GRPC_ERROR_NONE, NULL);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int compute_engine_httpcli_get_failure_override(
|
|
|
|
grpc_exec_ctx *exec_ctx, const grpc_httpcli_request *request,
|
|
|
|
gpr_timespec deadline, grpc_closure *on_done,
|
|
|
|
grpc_httpcli_response *response) {
|
|
|
|
validate_compute_engine_http_request(request);
|
|
|
|
*response = http_response(403, "Not Authorized.");
|
|
|
|
grpc_exec_ctx_sched(exec_ctx, on_done, GRPC_ERROR_NONE, NULL);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int httpcli_post_should_not_be_called(
|
|
|
|
grpc_exec_ctx *exec_ctx, const grpc_httpcli_request *request,
|
|
|
|
const char *body_bytes, size_t body_size, gpr_timespec deadline,
|
|
|
|
grpc_closure *on_done, grpc_httpcli_response *response) {
|
|
|
|
GPR_ASSERT("HTTP POST should not be called" == NULL);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int httpcli_get_should_not_be_called(grpc_exec_ctx *exec_ctx,
|
|
|
|
const grpc_httpcli_request *request,
|
|
|
|
gpr_timespec deadline,
|
|
|
|
grpc_closure *on_done,
|
|
|
|
grpc_httpcli_response *response) {
|
|
|
|
GPR_ASSERT("HTTP GET should not be called" == NULL);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_compute_engine_creds_success(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_call_credentials *compute_engine_creds =
|
|
|
|
grpc_google_compute_engine_credentials_create(NULL);
|
|
|
|
grpc_auth_metadata_context auth_md_ctx = {test_service_url, test_method, NULL,
|
|
|
|
NULL};
|
|
|
|
|
|
|
|
/* First request: http get should be called. */
|
|
|
|
grpc_httpcli_set_override(compute_engine_httpcli_get_success_override,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
grpc_call_credentials_get_request_metadata(
|
|
|
|
&exec_ctx, compute_engine_creds, NULL, auth_md_ctx,
|
|
|
|
on_oauth2_creds_get_metadata_success, (void *)test_user_data);
|
|
|
|
grpc_exec_ctx_flush(&exec_ctx);
|
|
|
|
|
|
|
|
/* Second request: the cached token should be served directly. */
|
|
|
|
grpc_httpcli_set_override(httpcli_get_should_not_be_called,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
grpc_call_credentials_get_request_metadata(
|
|
|
|
&exec_ctx, compute_engine_creds, NULL, auth_md_ctx,
|
|
|
|
on_oauth2_creds_get_metadata_success, (void *)test_user_data);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
|
|
|
|
grpc_call_credentials_unref(&exec_ctx, compute_engine_creds);
|
|
|
|
grpc_httpcli_set_override(NULL, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_compute_engine_creds_failure(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_auth_metadata_context auth_md_ctx = {test_service_url, test_method, NULL,
|
|
|
|
NULL};
|
|
|
|
grpc_call_credentials *compute_engine_creds =
|
|
|
|
grpc_google_compute_engine_credentials_create(NULL);
|
|
|
|
grpc_httpcli_set_override(compute_engine_httpcli_get_failure_override,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
grpc_call_credentials_get_request_metadata(
|
|
|
|
&exec_ctx, compute_engine_creds, NULL, auth_md_ctx,
|
|
|
|
on_oauth2_creds_get_metadata_failure, (void *)test_user_data);
|
|
|
|
grpc_call_credentials_unref(&exec_ctx, compute_engine_creds);
|
|
|
|
grpc_httpcli_set_override(NULL, NULL);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void validate_refresh_token_http_request(
|
|
|
|
const grpc_httpcli_request *request, const char *body, size_t body_size) {
|
|
|
|
/* The content of the assertion is tested extensively in json_token_test. */
|
|
|
|
char *expected_body = NULL;
|
|
|
|
GPR_ASSERT(body != NULL);
|
|
|
|
GPR_ASSERT(body_size != 0);
|
|
|
|
gpr_asprintf(&expected_body, GRPC_REFRESH_TOKEN_POST_BODY_FORMAT_STRING,
|
|
|
|
"32555999999.apps.googleusercontent.com",
|
|
|
|
"EmssLNjJy1332hD4KFsecret",
|
|
|
|
"1/Blahblasj424jladJDSGNf-u4Sua3HDA2ngjd42");
|
|
|
|
GPR_ASSERT(strlen(expected_body) == body_size);
|
|
|
|
GPR_ASSERT(memcmp(expected_body, body, body_size) == 0);
|
|
|
|
gpr_free(expected_body);
|
|
|
|
GPR_ASSERT(request->handshaker == &grpc_httpcli_ssl);
|
|
|
|
GPR_ASSERT(strcmp(request->host, GRPC_GOOGLE_OAUTH2_SERVICE_HOST) == 0);
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(request->http.path, GRPC_GOOGLE_OAUTH2_SERVICE_TOKEN_PATH) == 0);
|
|
|
|
GPR_ASSERT(request->http.hdr_count == 1);
|
|
|
|
GPR_ASSERT(strcmp(request->http.hdrs[0].key, "Content-Type") == 0);
|
|
|
|
GPR_ASSERT(strcmp(request->http.hdrs[0].value,
|
|
|
|
"application/x-www-form-urlencoded") == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int refresh_token_httpcli_post_success(
|
|
|
|
grpc_exec_ctx *exec_ctx, const grpc_httpcli_request *request,
|
|
|
|
const char *body, size_t body_size, gpr_timespec deadline,
|
|
|
|
grpc_closure *on_done, grpc_httpcli_response *response) {
|
|
|
|
validate_refresh_token_http_request(request, body, body_size);
|
|
|
|
*response = http_response(200, valid_oauth2_json_response);
|
|
|
|
grpc_exec_ctx_sched(exec_ctx, on_done, GRPC_ERROR_NONE, NULL);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int refresh_token_httpcli_post_failure(
|
|
|
|
grpc_exec_ctx *exec_ctx, const grpc_httpcli_request *request,
|
|
|
|
const char *body, size_t body_size, gpr_timespec deadline,
|
|
|
|
grpc_closure *on_done, grpc_httpcli_response *response) {
|
|
|
|
validate_refresh_token_http_request(request, body, body_size);
|
|
|
|
*response = http_response(403, "Not Authorized.");
|
|
|
|
grpc_exec_ctx_sched(exec_ctx, on_done, GRPC_ERROR_NONE, NULL);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_refresh_token_creds_success(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_auth_metadata_context auth_md_ctx = {test_service_url, test_method, NULL,
|
|
|
|
NULL};
|
|
|
|
grpc_call_credentials *refresh_token_creds =
|
|
|
|
grpc_google_refresh_token_credentials_create(test_refresh_token_str,
|
|
|
|
NULL);
|
|
|
|
|
|
|
|
/* First request: http get should be called. */
|
|
|
|
grpc_httpcli_set_override(httpcli_get_should_not_be_called,
|
|
|
|
refresh_token_httpcli_post_success);
|
|
|
|
grpc_call_credentials_get_request_metadata(
|
|
|
|
&exec_ctx, refresh_token_creds, NULL, auth_md_ctx,
|
|
|
|
on_oauth2_creds_get_metadata_success, (void *)test_user_data);
|
|
|
|
grpc_exec_ctx_flush(&exec_ctx);
|
|
|
|
|
|
|
|
/* Second request: the cached token should be served directly. */
|
|
|
|
grpc_httpcli_set_override(httpcli_get_should_not_be_called,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
grpc_call_credentials_get_request_metadata(
|
|
|
|
&exec_ctx, refresh_token_creds, NULL, auth_md_ctx,
|
|
|
|
on_oauth2_creds_get_metadata_success, (void *)test_user_data);
|
|
|
|
grpc_exec_ctx_flush(&exec_ctx);
|
|
|
|
|
|
|
|
grpc_call_credentials_unref(&exec_ctx, refresh_token_creds);
|
|
|
|
grpc_httpcli_set_override(NULL, NULL);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_refresh_token_creds_failure(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_auth_metadata_context auth_md_ctx = {test_service_url, test_method, NULL,
|
|
|
|
NULL};
|
|
|
|
grpc_call_credentials *refresh_token_creds =
|
|
|
|
grpc_google_refresh_token_credentials_create(test_refresh_token_str,
|
|
|
|
NULL);
|
|
|
|
grpc_httpcli_set_override(httpcli_get_should_not_be_called,
|
|
|
|
refresh_token_httpcli_post_failure);
|
|
|
|
grpc_call_credentials_get_request_metadata(
|
|
|
|
&exec_ctx, refresh_token_creds, NULL, auth_md_ctx,
|
|
|
|
on_oauth2_creds_get_metadata_failure, (void *)test_user_data);
|
|
|
|
grpc_call_credentials_unref(&exec_ctx, refresh_token_creds);
|
|
|
|
grpc_httpcli_set_override(NULL, NULL);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void validate_jwt_encode_and_sign_params(
|
|
|
|
const grpc_auth_json_key *json_key, const char *scope,
|
|
|
|
gpr_timespec token_lifetime) {
|
|
|
|
GPR_ASSERT(grpc_auth_json_key_is_valid(json_key));
|
|
|
|
GPR_ASSERT(json_key->private_key != NULL);
|
|
|
|
GPR_ASSERT(RSA_check_key(json_key->private_key));
|
|
|
|
GPR_ASSERT(json_key->type != NULL &&
|
|
|
|
strcmp(json_key->type, "service_account") == 0);
|
|
|
|
GPR_ASSERT(json_key->private_key_id != NULL &&
|
|
|
|
strcmp(json_key->private_key_id,
|
|
|
|
"e6b5137873db8d2ef81e06a47289e6434ec8a165") == 0);
|
|
|
|
GPR_ASSERT(json_key->client_id != NULL &&
|
|
|
|
strcmp(json_key->client_id,
|
|
|
|
"777-abaslkan11hlb6nmim3bpspl31ud.apps."
|
|
|
|
"googleusercontent.com") == 0);
|
|
|
|
GPR_ASSERT(json_key->client_email != NULL &&
|
|
|
|
strcmp(json_key->client_email,
|
|
|
|
"777-abaslkan11hlb6nmim3bpspl31ud@developer."
|
|
|
|
"gserviceaccount.com") == 0);
|
|
|
|
if (scope != NULL) GPR_ASSERT(strcmp(scope, test_scope) == 0);
|
|
|
|
GPR_ASSERT(!gpr_time_cmp(token_lifetime, grpc_max_auth_token_lifetime()));
|
|
|
|
}
|
|
|
|
|
|
|
|
static char *encode_and_sign_jwt_success(const grpc_auth_json_key *json_key,
|
|
|
|
const char *audience,
|
|
|
|
gpr_timespec token_lifetime,
|
|
|
|
const char *scope) {
|
|
|
|
validate_jwt_encode_and_sign_params(json_key, scope, token_lifetime);
|
|
|
|
return gpr_strdup(test_signed_jwt);
|
|
|
|
}
|
|
|
|
|
|
|
|
static char *encode_and_sign_jwt_failure(const grpc_auth_json_key *json_key,
|
|
|
|
const char *audience,
|
|
|
|
gpr_timespec token_lifetime,
|
|
|
|
const char *scope) {
|
|
|
|
validate_jwt_encode_and_sign_params(json_key, scope, token_lifetime);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static char *encode_and_sign_jwt_should_not_be_called(
|
|
|
|
const grpc_auth_json_key *json_key, const char *audience,
|
|
|
|
gpr_timespec token_lifetime, const char *scope) {
|
|
|
|
GPR_ASSERT("grpc_jwt_encode_and_sign should not be called" == NULL);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void on_jwt_creds_get_metadata_success(
|
|
|
|
grpc_exec_ctx *exec_ctx, void *user_data, grpc_credentials_md *md_elems,
|
|
|
|
size_t num_md, grpc_credentials_status status, const char *error_details) {
|
|
|
|
char *expected_md_value;
|
|
|
|
gpr_asprintf(&expected_md_value, "Bearer %s", test_signed_jwt);
|
|
|
|
GPR_ASSERT(status == GRPC_CREDENTIALS_OK);
|
|
|
|
GPR_ASSERT(error_details == NULL);
|
|
|
|
GPR_ASSERT(num_md == 1);
|
|
|
|
GPR_ASSERT(grpc_slice_str_cmp(md_elems[0].key, "authorization") == 0);
|
|
|
|
GPR_ASSERT(grpc_slice_str_cmp(md_elems[0].value, expected_md_value) == 0);
|
|
|
|
GPR_ASSERT(user_data != NULL);
|
|
|
|
GPR_ASSERT(strcmp((const char *)user_data, test_user_data) == 0);
|
|
|
|
gpr_free(expected_md_value);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void on_jwt_creds_get_metadata_failure(
|
|
|
|
grpc_exec_ctx *exec_ctx, void *user_data, grpc_credentials_md *md_elems,
|
|
|
|
size_t num_md, grpc_credentials_status status, const char *error_details) {
|
|
|
|
GPR_ASSERT(status == GRPC_CREDENTIALS_ERROR);
|
|
|
|
GPR_ASSERT(num_md == 0);
|
|
|
|
GPR_ASSERT(user_data != NULL);
|
|
|
|
GPR_ASSERT(strcmp((const char *)user_data, test_user_data) == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_jwt_creds_success(void) {
|
|
|
|
char *json_key_string = test_json_key_str();
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_auth_metadata_context auth_md_ctx = {test_service_url, test_method, NULL,
|
|
|
|
NULL};
|
|
|
|
grpc_call_credentials *jwt_creds =
|
|
|
|
grpc_service_account_jwt_access_credentials_create(
|
|
|
|
json_key_string, grpc_max_auth_token_lifetime(), NULL);
|
|
|
|
|
|
|
|
/* First request: jwt_encode_and_sign should be called. */
|
|
|
|
grpc_jwt_encode_and_sign_set_override(encode_and_sign_jwt_success);
|
|
|
|
grpc_call_credentials_get_request_metadata(
|
|
|
|
&exec_ctx, jwt_creds, NULL, auth_md_ctx,
|
|
|
|
on_jwt_creds_get_metadata_success, (void *)test_user_data);
|
|
|
|
grpc_exec_ctx_flush(&exec_ctx);
|
|
|
|
|
|
|
|
/* Second request: the cached token should be served directly. */
|
|
|
|
grpc_jwt_encode_and_sign_set_override(
|
|
|
|
encode_and_sign_jwt_should_not_be_called);
|
|
|
|
grpc_call_credentials_get_request_metadata(
|
|
|
|
&exec_ctx, jwt_creds, NULL, auth_md_ctx,
|
|
|
|
on_jwt_creds_get_metadata_success, (void *)test_user_data);
|
|
|
|
grpc_exec_ctx_flush(&exec_ctx);
|
|
|
|
|
|
|
|
/* Third request: Different service url so jwt_encode_and_sign should be
|
|
|
|
called again (no caching). */
|
|
|
|
auth_md_ctx.service_url = other_test_service_url;
|
|
|
|
grpc_jwt_encode_and_sign_set_override(encode_and_sign_jwt_success);
|
|
|
|
grpc_call_credentials_get_request_metadata(
|
|
|
|
&exec_ctx, jwt_creds, NULL, auth_md_ctx,
|
|
|
|
on_jwt_creds_get_metadata_success, (void *)test_user_data);
|
|
|
|
grpc_exec_ctx_flush(&exec_ctx);
|
|
|
|
|
|
|
|
gpr_free(json_key_string);
|
|
|
|
grpc_call_credentials_unref(&exec_ctx, jwt_creds);
|
|
|
|
grpc_jwt_encode_and_sign_set_override(NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_jwt_creds_signing_failure(void) {
|
|
|
|
char *json_key_string = test_json_key_str();
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_auth_metadata_context auth_md_ctx = {test_service_url, test_method, NULL,
|
|
|
|
NULL};
|
|
|
|
grpc_call_credentials *jwt_creds =
|
|
|
|
grpc_service_account_jwt_access_credentials_create(
|
|
|
|
json_key_string, grpc_max_auth_token_lifetime(), NULL);
|
|
|
|
|
|
|
|
grpc_jwt_encode_and_sign_set_override(encode_and_sign_jwt_failure);
|
|
|
|
grpc_call_credentials_get_request_metadata(
|
|
|
|
&exec_ctx, jwt_creds, NULL, auth_md_ctx,
|
|
|
|
on_jwt_creds_get_metadata_failure, (void *)test_user_data);
|
|
|
|
|
|
|
|
gpr_free(json_key_string);
|
|
|
|
grpc_call_credentials_unref(&exec_ctx, jwt_creds);
|
|
|
|
grpc_jwt_encode_and_sign_set_override(NULL);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void set_google_default_creds_env_var_with_file_contents(
|
|
|
|
const char *file_prefix, const char *contents) {
|
|
|
|
size_t contents_len = strlen(contents);
|
|
|
|
char *creds_file_name;
|
|
|
|
FILE *creds_file = gpr_tmpfile(file_prefix, &creds_file_name);
|
|
|
|
GPR_ASSERT(creds_file_name != NULL);
|
|
|
|
GPR_ASSERT(creds_file != NULL);
|
|
|
|
GPR_ASSERT(fwrite(contents, 1, contents_len, creds_file) == contents_len);
|
|
|
|
fclose(creds_file);
|
|
|
|
gpr_setenv(GRPC_GOOGLE_CREDENTIALS_ENV_VAR, creds_file_name);
|
|
|
|
gpr_free(creds_file_name);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_google_default_creds_auth_key(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_service_account_jwt_access_credentials *jwt;
|
|
|
|
grpc_composite_channel_credentials *creds;
|
|
|
|
char *json_key = test_json_key_str();
|
|
|
|
grpc_flush_cached_google_default_credentials();
|
|
|
|
set_google_default_creds_env_var_with_file_contents(
|
|
|
|
"json_key_google_default_creds", json_key);
|
|
|
|
gpr_free(json_key);
|
|
|
|
creds = (grpc_composite_channel_credentials *)
|
|
|
|
grpc_google_default_credentials_create();
|
|
|
|
GPR_ASSERT(creds != NULL);
|
|
|
|
jwt = (grpc_service_account_jwt_access_credentials *)creds->call_creds;
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(jwt->key.client_id,
|
|
|
|
"777-abaslkan11hlb6nmim3bpspl31ud.apps.googleusercontent.com") ==
|
|
|
|
0);
|
|
|
|
grpc_channel_credentials_unref(&exec_ctx, &creds->base);
|
|
|
|
gpr_setenv(GRPC_GOOGLE_CREDENTIALS_ENV_VAR, ""); /* Reset. */
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_google_default_creds_refresh_token(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_google_refresh_token_credentials *refresh;
|
|
|
|
grpc_composite_channel_credentials *creds;
|
|
|
|
grpc_flush_cached_google_default_credentials();
|
|
|
|
set_google_default_creds_env_var_with_file_contents(
|
|
|
|
"refresh_token_google_default_creds", test_refresh_token_str);
|
|
|
|
creds = (grpc_composite_channel_credentials *)
|
|
|
|
grpc_google_default_credentials_create();
|
|
|
|
GPR_ASSERT(creds != NULL);
|
|
|
|
refresh = (grpc_google_refresh_token_credentials *)creds->call_creds;
|
|
|
|
GPR_ASSERT(strcmp(refresh->refresh_token.client_id,
|
|
|
|
"32555999999.apps.googleusercontent.com") == 0);
|
|
|
|
grpc_channel_credentials_unref(&exec_ctx, &creds->base);
|
|
|
|
gpr_setenv(GRPC_GOOGLE_CREDENTIALS_ENV_VAR, ""); /* Reset. */
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int default_creds_gce_detection_httpcli_get_success_override(
|
|
|
|
grpc_exec_ctx *exec_ctx, const grpc_httpcli_request *request,
|
|
|
|
gpr_timespec deadline, grpc_closure *on_done,
|
|
|
|
grpc_httpcli_response *response) {
|
|
|
|
*response = http_response(200, "");
|
|
|
|
grpc_http_header *headers = gpr_malloc(sizeof(*headers) * 1);
|
|
|
|
headers[0].key = gpr_strdup("Metadata-Flavor");
|
|
|
|
headers[0].value = gpr_strdup("Google");
|
|
|
|
response->hdr_count = 1;
|
|
|
|
response->hdrs = headers;
|
|
|
|
GPR_ASSERT(strcmp(request->http.path, "/") == 0);
|
|
|
|
GPR_ASSERT(strcmp(request->host, "metadata.google.internal") == 0);
|
|
|
|
grpc_exec_ctx_sched(exec_ctx, on_done, GRPC_ERROR_NONE, NULL);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static char *null_well_known_creds_path_getter(void) { return NULL; }
|
|
|
|
|
|
|
|
static void test_google_default_creds_gce(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_composite_channel_credentials *creds;
|
|
|
|
grpc_channel_credentials *cached_creds;
|
|
|
|
grpc_auth_metadata_context auth_md_ctx = {test_service_url, test_method, NULL,
|
|
|
|
NULL};
|
|
|
|
grpc_flush_cached_google_default_credentials();
|
|
|
|
gpr_setenv(GRPC_GOOGLE_CREDENTIALS_ENV_VAR, ""); /* Reset. */
|
|
|
|
grpc_override_well_known_credentials_path_getter(
|
|
|
|
null_well_known_creds_path_getter);
|
|
|
|
|
|
|
|
/* Simulate a successful detection of GCE. */
|
|
|
|
grpc_httpcli_set_override(
|
|
|
|
default_creds_gce_detection_httpcli_get_success_override,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
creds = (grpc_composite_channel_credentials *)
|
|
|
|
grpc_google_default_credentials_create();
|
|
|
|
|
|
|
|
/* Verify that the default creds actually embeds a GCE creds. */
|
|
|
|
GPR_ASSERT(creds != NULL);
|
|
|
|
GPR_ASSERT(creds->call_creds != NULL);
|
|
|
|
grpc_httpcli_set_override(compute_engine_httpcli_get_success_override,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
grpc_call_credentials_get_request_metadata(
|
|
|
|
&exec_ctx, creds->call_creds, NULL, auth_md_ctx,
|
|
|
|
on_oauth2_creds_get_metadata_success, (void *)test_user_data);
|
|
|
|
grpc_exec_ctx_flush(&exec_ctx);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
|
|
|
|
/* Check that we get a cached creds if we call
|
|
|
|
grpc_google_default_credentials_create again.
|
|
|
|
GCE detection should not occur anymore either. */
|
|
|
|
grpc_httpcli_set_override(httpcli_get_should_not_be_called,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
cached_creds = grpc_google_default_credentials_create();
|
|
|
|
GPR_ASSERT(cached_creds == &creds->base);
|
|
|
|
|
|
|
|
/* Cleanup. */
|
|
|
|
grpc_channel_credentials_release(cached_creds);
|
|
|
|
grpc_channel_credentials_release(&creds->base);
|
|
|
|
grpc_httpcli_set_override(NULL, NULL);
|
|
|
|
grpc_override_well_known_credentials_path_getter(NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int default_creds_gce_detection_httpcli_get_failure_override(
|
|
|
|
grpc_exec_ctx *exec_ctx, const grpc_httpcli_request *request,
|
|
|
|
gpr_timespec deadline, grpc_closure *on_done,
|
|
|
|
grpc_httpcli_response *response) {
|
|
|
|
/* No magic header. */
|
|
|
|
GPR_ASSERT(strcmp(request->http.path, "/") == 0);
|
|
|
|
GPR_ASSERT(strcmp(request->host, "metadata.google.internal") == 0);
|
|
|
|
*response = http_response(200, "");
|
|
|
|
grpc_exec_ctx_sched(exec_ctx, on_done, GRPC_ERROR_NONE, NULL);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_no_google_default_creds(void) {
|
|
|
|
grpc_flush_cached_google_default_credentials();
|
|
|
|
gpr_setenv(GRPC_GOOGLE_CREDENTIALS_ENV_VAR, ""); /* Reset. */
|
|
|
|
grpc_override_well_known_credentials_path_getter(
|
|
|
|
null_well_known_creds_path_getter);
|
|
|
|
|
|
|
|
/* Simulate a successful detection of GCE. */
|
|
|
|
grpc_httpcli_set_override(
|
|
|
|
default_creds_gce_detection_httpcli_get_failure_override,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
GPR_ASSERT(grpc_google_default_credentials_create() == NULL);
|
|
|
|
|
|
|
|
/* Try a cached one. GCE detection should not occur anymore. */
|
|
|
|
grpc_httpcli_set_override(httpcli_get_should_not_be_called,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
GPR_ASSERT(grpc_google_default_credentials_create() == NULL);
|
|
|
|
|
|
|
|
/* Cleanup. */
|
|
|
|
grpc_httpcli_set_override(NULL, NULL);
|
|
|
|
grpc_override_well_known_credentials_path_getter(NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
typedef enum {
|
|
|
|
PLUGIN_INITIAL_STATE,
|
|
|
|
PLUGIN_GET_METADATA_CALLED_STATE,
|
|
|
|
PLUGIN_DESTROY_CALLED_STATE
|
|
|
|
} plugin_state;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
const char *key;
|
|
|
|
const char *value;
|
|
|
|
} plugin_metadata;
|
|
|
|
|
|
|
|
static const plugin_metadata plugin_md[] = {{"foo", "bar"}, {"hi", "there"}};
|
|
|
|
|
|
|
|
static void plugin_get_metadata_success(void *state,
|
|
|
|
grpc_auth_metadata_context context,
|
|
|
|
grpc_credentials_plugin_metadata_cb cb,
|
|
|
|
void *user_data) {
|
|
|
|
size_t i;
|
|
|
|
grpc_metadata md[GPR_ARRAY_SIZE(plugin_md)];
|
|
|
|
plugin_state *s = (plugin_state *)state;
|
|
|
|
GPR_ASSERT(strcmp(context.service_url, test_service_url) == 0);
|
|
|
|
GPR_ASSERT(strcmp(context.method_name, test_method) == 0);
|
|
|
|
GPR_ASSERT(context.channel_auth_context == NULL);
|
|
|
|
GPR_ASSERT(context.reserved == NULL);
|
|
|
|
*s = PLUGIN_GET_METADATA_CALLED_STATE;
|
|
|
|
for (i = 0; i < GPR_ARRAY_SIZE(plugin_md); i++) {
|
|
|
|
memset(&md[i], 0, sizeof(grpc_metadata));
|
|
|
|
md[i].key = plugin_md[i].key;
|
|
|
|
md[i].value = plugin_md[i].value;
|
|
|
|
md[i].value_length = strlen(plugin_md[i].value);
|
|
|
|
}
|
|
|
|
cb(user_data, md, GPR_ARRAY_SIZE(md), GRPC_STATUS_OK, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
static const char *plugin_error_details = "Could not get metadata for plugin.";
|
|
|
|
|
|
|
|
static void plugin_get_metadata_failure(void *state,
|
|
|
|
grpc_auth_metadata_context context,
|
|
|
|
grpc_credentials_plugin_metadata_cb cb,
|
|
|
|
void *user_data) {
|
|
|
|
plugin_state *s = (plugin_state *)state;
|
|
|
|
GPR_ASSERT(strcmp(context.service_url, test_service_url) == 0);
|
|
|
|
GPR_ASSERT(strcmp(context.method_name, test_method) == 0);
|
|
|
|
GPR_ASSERT(context.channel_auth_context == NULL);
|
|
|
|
GPR_ASSERT(context.reserved == NULL);
|
|
|
|
*s = PLUGIN_GET_METADATA_CALLED_STATE;
|
|
|
|
cb(user_data, NULL, 0, GRPC_STATUS_UNAUTHENTICATED, plugin_error_details);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void on_plugin_metadata_received_success(
|
|
|
|
grpc_exec_ctx *exec_ctx, void *user_data, grpc_credentials_md *md_elems,
|
|
|
|
size_t num_md, grpc_credentials_status status, const char *error_details) {
|
|
|
|
size_t i = 0;
|
|
|
|
GPR_ASSERT(user_data == NULL);
|
|
|
|
GPR_ASSERT(md_elems != NULL);
|
|
|
|
GPR_ASSERT(num_md == GPR_ARRAY_SIZE(plugin_md));
|
|
|
|
for (i = 0; i < num_md; i++) {
|
|
|
|
GPR_ASSERT(grpc_slice_str_cmp(md_elems[i].key, plugin_md[i].key) == 0);
|
|
|
|
GPR_ASSERT(grpc_slice_str_cmp(md_elems[i].value, plugin_md[i].value) == 0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void on_plugin_metadata_received_failure(
|
|
|
|
grpc_exec_ctx *exec_ctx, void *user_data, grpc_credentials_md *md_elems,
|
|
|
|
size_t num_md, grpc_credentials_status status, const char *error_details) {
|
|
|
|
GPR_ASSERT(user_data == NULL);
|
|
|
|
GPR_ASSERT(md_elems == NULL);
|
|
|
|
GPR_ASSERT(num_md == 0);
|
|
|
|
GPR_ASSERT(status == GRPC_CREDENTIALS_ERROR);
|
|
|
|
GPR_ASSERT(error_details != NULL);
|
|
|
|
GPR_ASSERT(strcmp(error_details, plugin_error_details) == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void plugin_destroy(void *state) {
|
|
|
|
plugin_state *s = (plugin_state *)state;
|
|
|
|
*s = PLUGIN_DESTROY_CALLED_STATE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_metadata_plugin_success(void) {
|
|
|
|
grpc_call_credentials *creds;
|
|
|
|
plugin_state state = PLUGIN_INITIAL_STATE;
|
|
|
|
grpc_metadata_credentials_plugin plugin;
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_auth_metadata_context auth_md_ctx = {test_service_url, test_method, NULL,
|
|
|
|
NULL};
|
|
|
|
|
|
|
|
plugin.state = &state;
|
|
|
|
plugin.get_metadata = plugin_get_metadata_success;
|
|
|
|
plugin.destroy = plugin_destroy;
|
|
|
|
|
|
|
|
creds = grpc_metadata_credentials_create_from_plugin(plugin, NULL);
|
|
|
|
GPR_ASSERT(state == PLUGIN_INITIAL_STATE);
|
|
|
|
grpc_call_credentials_get_request_metadata(
|
|
|
|
&exec_ctx, creds, NULL, auth_md_ctx, on_plugin_metadata_received_success,
|
|
|
|
NULL);
|
|
|
|
GPR_ASSERT(state == PLUGIN_GET_METADATA_CALLED_STATE);
|
|
|
|
grpc_call_credentials_release(creds);
|
|
|
|
GPR_ASSERT(state == PLUGIN_DESTROY_CALLED_STATE);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_metadata_plugin_failure(void) {
|
|
|
|
grpc_call_credentials *creds;
|
|
|
|
plugin_state state = PLUGIN_INITIAL_STATE;
|
|
|
|
grpc_metadata_credentials_plugin plugin;
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
grpc_auth_metadata_context auth_md_ctx = {test_service_url, test_method, NULL,
|
|
|
|
NULL};
|
|
|
|
|
|
|
|
plugin.state = &state;
|
|
|
|
plugin.get_metadata = plugin_get_metadata_failure;
|
|
|
|
plugin.destroy = plugin_destroy;
|
|
|
|
|
|
|
|
creds = grpc_metadata_credentials_create_from_plugin(plugin, NULL);
|
|
|
|
GPR_ASSERT(state == PLUGIN_INITIAL_STATE);
|
|
|
|
grpc_call_credentials_get_request_metadata(
|
|
|
|
&exec_ctx, creds, NULL, auth_md_ctx, on_plugin_metadata_received_failure,
|
|
|
|
NULL);
|
|
|
|
GPR_ASSERT(state == PLUGIN_GET_METADATA_CALLED_STATE);
|
|
|
|
grpc_call_credentials_release(creds);
|
|
|
|
GPR_ASSERT(state == PLUGIN_DESTROY_CALLED_STATE);
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_get_well_known_google_credentials_file_path(void) {
|
|
|
|
char *path;
|
|
|
|
char *home = gpr_getenv("HOME");
|
|
|
|
path = grpc_get_well_known_google_credentials_file_path();
|
|
|
|
GPR_ASSERT(path != NULL);
|
|
|
|
gpr_free(path);
|
|
|
|
#if defined(GPR_POSIX_ENV) || defined(GPR_LINUX_ENV)
|
|
|
|
unsetenv("HOME");
|
|
|
|
path = grpc_get_well_known_google_credentials_file_path();
|
|
|
|
GPR_ASSERT(path == NULL);
|
|
|
|
gpr_setenv("HOME", home);
|
|
|
|
gpr_free(path);
|
|
|
|
#endif /* GPR_POSIX_ENV || GPR_LINUX_ENV */
|
|
|
|
gpr_free(home);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_channel_creds_duplicate_without_call_creds(void) {
|
|
|
|
grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
|
|
|
|
|
|
|
grpc_channel_credentials *channel_creds =
|
|
|
|
grpc_fake_transport_security_credentials_create();
|
|
|
|
|
|
|
|
grpc_channel_credentials *dup =
|
|
|
|
grpc_channel_credentials_duplicate_without_call_credentials(
|
|
|
|
channel_creds);
|
|
|
|
GPR_ASSERT(dup == channel_creds);
|
|
|
|
grpc_channel_credentials_unref(&exec_ctx, dup);
|
|
|
|
|
|
|
|
grpc_call_credentials *call_creds =
|
|
|
|
grpc_access_token_credentials_create("blah", NULL);
|
|
|
|
grpc_channel_credentials *composite_creds =
|
|
|
|
grpc_composite_channel_credentials_create(channel_creds, call_creds,
|
|
|
|
NULL);
|
|
|
|
grpc_call_credentials_unref(&exec_ctx, call_creds);
|
|
|
|
dup = grpc_channel_credentials_duplicate_without_call_credentials(
|
|
|
|
composite_creds);
|
|
|
|
GPR_ASSERT(dup == channel_creds);
|
|
|
|
grpc_channel_credentials_unref(&exec_ctx, dup);
|
|
|
|
|
|
|
|
grpc_channel_credentials_unref(&exec_ctx, channel_creds);
|
|
|
|
grpc_channel_credentials_unref(&exec_ctx, composite_creds);
|
|
|
|
|
|
|
|
grpc_exec_ctx_finish(&exec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
int main(int argc, char **argv) {
|
|
|
|
grpc_test_init(argc, argv);
|
|
|
|
grpc_init();
|
|
|
|
test_empty_md_store();
|
|
|
|
test_ref_unref_empty_md_store();
|
|
|
|
test_add_to_empty_md_store();
|
|
|
|
test_add_cstrings_to_empty_md_store();
|
|
|
|
test_empty_preallocated_md_store();
|
|
|
|
test_add_abunch_to_md_store();
|
|
|
|
test_oauth2_token_fetcher_creds_parsing_ok();
|
|
|
|
test_oauth2_token_fetcher_creds_parsing_bad_http_status();
|
|
|
|
test_oauth2_token_fetcher_creds_parsing_empty_http_body();
|
|
|
|
test_oauth2_token_fetcher_creds_parsing_invalid_json();
|
|
|
|
test_oauth2_token_fetcher_creds_parsing_missing_token();
|
|
|
|
test_oauth2_token_fetcher_creds_parsing_missing_token_type();
|
|
|
|
test_oauth2_token_fetcher_creds_parsing_missing_token_lifetime();
|
|
|
|
test_google_iam_creds();
|
|
|
|
test_access_token_creds();
|
|
|
|
test_channel_oauth2_composite_creds();
|
|
|
|
test_oauth2_google_iam_composite_creds();
|
|
|
|
test_channel_oauth2_google_iam_composite_creds();
|
|
|
|
test_compute_engine_creds_success();
|
|
|
|
test_compute_engine_creds_failure();
|
|
|
|
test_refresh_token_creds_success();
|
|
|
|
test_refresh_token_creds_failure();
|
|
|
|
test_jwt_creds_success();
|
|
|
|
test_jwt_creds_signing_failure();
|
|
|
|
test_google_default_creds_auth_key();
|
|
|
|
test_google_default_creds_refresh_token();
|
|
|
|
test_google_default_creds_gce();
|
|
|
|
test_no_google_default_creds();
|
|
|
|
test_metadata_plugin_success();
|
|
|
|
test_metadata_plugin_failure();
|
|
|
|
test_get_well_known_google_credentials_file_path();
|
|
|
|
test_channel_creds_duplicate_without_call_creds();
|
|
|
|
grpc_shutdown();
|
|
|
|
return 0;
|
|
|
|
}
|