|
|
|
/*
|
|
|
|
*
|
|
|
|
* Copyright 2015 gRPC authors.
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <grpc/support/port_platform.h>
|
|
|
|
|
|
|
|
#include "src/core/lib/security/credentials/credentials.h"
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include <string>
|
|
|
|
|
|
|
|
#include <gmock/gmock.h>
|
|
|
|
#include <openssl/rsa.h>
|
|
|
|
|
|
|
|
#include "absl/strings/match.h"
|
|
|
|
#include "absl/strings/str_cat.h"
|
|
|
|
#include "absl/strings/str_format.h"
|
|
|
|
#include "absl/strings/str_replace.h"
|
|
|
|
|
|
|
|
#include <grpc/grpc_security.h>
|
|
|
|
#include <grpc/slice.h>
|
|
|
|
#include <grpc/support/alloc.h>
|
|
|
|
#include <grpc/support/log.h>
|
|
|
|
#include <grpc/support/string_util.h>
|
|
|
|
#include <grpc/support/time.h>
|
|
|
|
|
|
|
|
#include "src/core/lib/gpr/env.h"
|
|
|
|
#include "src/core/lib/gpr/string.h"
|
|
|
|
#include "src/core/lib/gpr/tmpfile.h"
|
|
|
|
#include "src/core/lib/gprpp/host_port.h"
|
|
|
|
#include "src/core/lib/gprpp/time.h"
|
|
|
|
#include "src/core/lib/http/httpcli.h"
|
|
|
|
#include "src/core/lib/http/httpcli_ssl_credentials.h"
|
|
|
|
#include "src/core/lib/iomgr/error.h"
|
|
|
|
#include "src/core/lib/promise/exec_ctx_wakeup_scheduler.h"
|
|
|
|
#include "src/core/lib/promise/promise.h"
|
|
|
|
#include "src/core/lib/promise/seq.h"
|
|
|
|
#include "src/core/lib/security/context/security_context.h"
|
|
|
|
#include "src/core/lib/security/credentials/composite/composite_credentials.h"
|
|
|
|
#include "src/core/lib/security/credentials/external/aws_external_account_credentials.h"
|
|
|
|
#include "src/core/lib/security/credentials/external/external_account_credentials.h"
|
|
|
|
#include "src/core/lib/security/credentials/external/file_external_account_credentials.h"
|
|
|
|
#include "src/core/lib/security/credentials/external/url_external_account_credentials.h"
|
|
|
|
#include "src/core/lib/security/credentials/fake/fake_credentials.h"
|
|
|
|
#include "src/core/lib/security/credentials/google_default/google_default_credentials.h"
|
|
|
|
#include "src/core/lib/security/credentials/iam/iam_credentials.h"
|
|
|
|
#include "src/core/lib/security/credentials/jwt/jwt_credentials.h"
|
|
|
|
#include "src/core/lib/security/credentials/oauth2/oauth2_credentials.h"
|
|
|
|
#include "src/core/lib/security/credentials/tls/grpc_tls_credentials_options.h"
|
|
|
|
#include "src/core/lib/security/credentials/xds/xds_credentials.h"
|
|
|
|
#include "src/core/lib/security/transport/auth_filters.h"
|
|
|
|
#include "src/core/lib/transport/error_utils.h"
|
|
|
|
#include "src/core/lib/uri/uri_parser.h"
|
|
|
|
#include "test/core/util/test_config.h"
|
|
|
|
|
|
|
|
namespace grpc_core {
|
|
|
|
|
|
|
|
using internal::grpc_flush_cached_google_default_credentials;
|
|
|
|
using internal::set_gce_tenancy_checker_for_testing;
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
|
|
|
auto* g_memory_allocator = new MemoryAllocator(
|
|
|
|
ResourceQuota::Default()->memory_quota()->CreateMemoryAllocator("test"));
|
|
|
|
|
|
|
|
/* -- Constants. -- */
|
|
|
|
|
|
|
|
const char test_google_iam_authorization_token[] = "blahblahblhahb";
|
|
|
|
const char test_google_iam_authority_selector[] = "respectmyauthoritah";
|
|
|
|
const char test_oauth2_bearer_token[] = "Bearer blaaslkdjfaslkdfasdsfasf";
|
Updating moe_db.txt with the latest equivalence since the ruby import changed the exported structure.
Change on 2014/12/01 by nnoble <nnoble@google.com>
-------------
new [] file for grpc testing.
Change on 2014/12/02 by donnadionne <donnadionne@google.com>
-------------
Fix unfinished calls in thread_stress_test.
Previously we had an early return if we cancelled a stream part way through a
message. Correct this, so that half close and full close signals are propagated
up the stack correctly so that higher level state machines can see the
termination.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Remove dependency on internal C code.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Turn off the flaky bit from thread_stress_test.
Change on 2014/12/02 by ctiller <ctiller@google.com>
-------------
Add test cases of empty request/response, request streaming, response streaming, and half duplex streaming.
Bring up the GFE/ESF for mannual test:
[] build java/com/google/net/[]/testing/integration/hexa:server_components_env
[]-bin/java/com/google/net/[]/testing/integration/hexa/server_components_env --manual --rpc_port=25000 --use_autobahn
Change on 2014/12/02 by chenw <chenw@google.com>
-------------
Make echo/server.c and fling/server.c shutdown cleanly on SIGINT, and update
the relevant tests to exercise this mechanism.
Now "[] coverage" and the memory leak detector are able to see into the
server processes.
Change on 2014/12/02 by pmarks <pmarks@google.com>
-------------
Allow the # of channels to be configurable in this performance test. The threads will use the channels in statically-defined round-robin order (not based on when RPCs complete on any channel). The interesting cases are #channels=1 or #channels=#threads (we previously only had the latter case)
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Fixed a typo and reworded a comment.
Change on 2014/12/02 by gnezdo <gnezdo@google.com>
-------------
Require the grpc_call in this ClientContext to be NULL before allowing set_call to be invoked. Otherwise, it's an indication of a leak somewhere.
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Correctly return status other than ok and add a test for it.
Change on 2014/12/02 by yangg <yangg@google.com>
-------------
Better C++ guards for grpc_security.h
Change on 2014/12/02 by nnoble <nnoble@google.com>
-------------
Use nullptr instead of NULL for consistency.
Change on 2014/12/02 by vpai <vpai@google.com>
-------------
Updates the ruby gRPC service class to require the serialization method to be
a static method
- this brings it inline with the proto3 ruby API
- it adds a monkey patch to allow existing proto (beefcake) to continue working.
Change on 2014/12/02 by temiola <temiola@google.com>
-------------
Adding a buildable unit to the blue print file.
Added the buildable unit as its name will be usesd as tap project id.
This test will fail right away in tap until tests are actually added.
Change on 2014/12/02 by donnadionne <donnadionne@google.com>
-------------
Move interop ESF C++ server from Java to grpc directory.
Tests passed:
[] test javatests/com/google/net/[]/testing/integration/hexa/...
[] test net/grpc/testing/interop/esf_server/...
Change on 2014/12/02 by chenw <chenw@google.com>
-------------
Return a lame channel as opposed to NULL when secure channel creation fails.
- Looks like we're going to need something similar server-side.
- I changed the prototype of the lame client channel factory to take an
explicit void as I think this is better practice in C. Let me know if you
disagree and I will revert these changes.
Change on 2014/12/02 by jboeuf <jboeuf@google.com>
-------------
Putting ALPN support where it belongs.
Change on 2014/12/02 by jboeuf <jboeuf@google.com>
-------------
GOAWAY send path.
Sends a GOAWAY frame when shutting down.
This is not read and understood yet.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Adds support for secure channels and servers.
- wraps new C apis (credentials, server_credentials) and Server#add_secure_http_port
- adds tests to ensure credentials and server credentials can be created
- updates client_server_spec to run the client_server wrapper layer end-to-end tests using a secure channel
Change on 2014/12/03 by temiola <temiola@google.com>
-------------
Fix existing issues regarding out of order events.
At the client side, using pluck as the client_metadata_read can happen anytime after invoke.
At the server side, allow halfclose_ok and rpc_end to come in reverse order.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
Don't track coverage of tests.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Change UnaryCall to conform standard test requirement of LargeUnaryCall.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
updating alpn version to h2-15 ensure all interop are on the same version and working.
Java and go are not ready for h2-16 yet.
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Add config to bring echo server in [].
This is used to test production GFE as its bckend.
Change on 2014/12/03 by chenw <chenw@google.com>
-------------
In preparation for fixing shutdown race issues, change em to take ownership of
the file descriptor. Add an API to grpc_tcp to take an already created
grpc_em_fd object, and change tcp_client to use that API.
This is needed because otherwise an em user's close() of the file descriptor
may race with libevent internals. That's not an issue yet because destroy()
frees the events inline, but that can't be done safely if there is a concurrent
poller.
Change on 2014/12/03 by klempner <klempner@google.com>
-------------
Fixing TAP opensource build
We don't want to compile and run C++ tests in the C target.
Change on 2014/12/03 by nnoble <nnoble@google.com>
-------------
Move and separate interop tests by languages.
Small fixes to the test runner.
Improving logging.
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Fixing the opensource build:
-) The C/C++ split wasn't done up to the 'dep' target level
-) The alpn.c file was missing from build.json
Change on 2014/12/03 by nnoble <nnoble@google.com>
-------------
Adding blue print files after projects exist
Change on 2014/12/03 by donnadionne <donnadionne@google.com>
-------------
Refactor StreamContext using the new completion_queue_pluck API.
The dedicated the poller thread has been removed.
This CL keeps the current behavior to make it short. There is one following to
make it usable for both client and server.
The tags for pluck is based on the address of this StreamContext object for potential debug use.
The Read/Write and Wait cannot be called concurrently now and this might need to be fixed.
Change on 2014/12/03 by yangg <yangg@google.com>
-------------
Binary encoding utilities.
Support base64 encoding, HPACK static huffman encoding, and doing both at once.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Enforce Makefile regeneration in presubmits.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Make CloseSend() send a real zero-length control message to indicate EOS.
Change on 2014/12/03 by zhaoq <zhaoq@google.com>
-------------
Prefer to create dualstack sockets for TCP clients and servers, with automatic
fallback for environments where IPV6_V6ONLY can't be turned off.
Change on 2014/12/03 by pmarks <pmarks@google.com>
-------------
Add opensource path to build targets.
Ensure that MOE is going to run.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
Add PingPong test case. Delete FullDuplex test case. The latter is not specified for client in
https://docs.google.com/document/d/1dwrPpIu5EqiKVsquZfoOqTj7vP8fa1i49gornJo50Qw/edit#
Change on 2014/12/03 by chenw <chenw@google.com>
-------------
Make generate_projects.sh check out the generated targets.
Change on 2014/12/03 by ctiller <ctiller@google.com>
-------------
rspec cleanup
- stops declaring specs within the GRPC module
- splits Bidi streaming specs into a separate test suite
adding tests in the GRPC module was a mistake, it pollutes the module and can
affect other tests that run later by the test runner
the bidi tests are currently flaky, having them run in their own test suite
allows having two separate continuous builds (once ruby gRPC is on GitHub),
one that includes bidi where we tolerate flakiness, and another that does not,
where there should be no flakiness at all
Change on 2014/12/03 by temiola <temiola@google.com>
-------------
Adding support for composite and IAM credentials.
- For now, we don't do any checks on credentials compatibility in the
composite credentials. Maybe we'll add that later.
- Refactored the end to end security tests so that we always use the public API
(except for the fake security context which is not exposed).
Change on 2014/12/03 by jboeuf <jboeuf@google.com>
-------------
Make GPR library buildable in Visual Studio 2013.
Change on 2014/12/04 by jtattermusch <jtattermusch@google.com>
-------------
Adds codegen for ruby
This is being added now that ruby's proto and grpc apis are defined and stable
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Prevent NewStream() from sending negative or 0 timeout.
Change on 2014/12/04 by zhaoq <zhaoq@google.com>
-------------
Add a grpc_sockaddr_to_string() function, and use it when logging bind
failures. Also improve const-correctness in some earlier code.
I'm not certain whether inet_ntop() will need any platform-specific
implementations, but for now the compiler offers no complaints.
Demo:
$ []-bin/net/grpc/c/echo_server 1.2.3.4:80
... tcp_server.c:139] bind addr=[::ffff:1.2.3.4]:80: Permission denied
Change on 2014/12/04 by pmarks <pmarks@google.com>
-------------
Refactoring - moves c wrapped classes to a submodule Google::RPC::Core
- this allows for an explicit rule when reading through gRPC ruby code for telling
when an object is pure ruby or wrapped C
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Fixes the bidi_call
[]
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Fixing dev build when activating surface traces.
Change on 2014/12/04 by nnoble <nnoble@google.com>
-------------
Updates the tests to reflect that fact that some Credentials compose works.
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Making the generate_project_test actually do something.
Change on 2014/12/04 by nnoble <nnoble@google.com>
-------------
Rename "esf_server" to "[]4_server". Delete "test_sever" from Java directory.
Change on 2014/12/04 by chenw <chenw@google.com>
-------------
Added PHP client interop tests. Tested large_unary against the C++ server.
Change on 2014/12/04 by mlumish <mlumish@google.com>
-------------
Refactor grpc_create_dualstack_socket() by pulling the setsockopt into its own
function. This separates the magic test flag from the real fallback logic.
Change on 2014/12/04 by pmarks <pmarks@google.com>
-------------
Fixes the type of the constant used for test cert hostname
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Disabling these tests as they're causing flakiness.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Change intptr --> uintptr.
Handles the case where a void* turns into a negative number, which then gets
hashed into a negative bucket and segfaults.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Add a test fixture to force parsers to handle one byte at a time.
This should expand coverage and hopefully prevent errors at some point (it
seems to pass out of the box for now though).
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
The code generator isn't +x.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Updates math_client and math_server to allow construction using crednetials
By:
- Extending rpc_server constructor so that it takes a credentials keyword param
- Extending client_stub constructor so that it takes a credentials keyword param
Change on 2014/12/04 by temiola <temiola@google.com>
-------------
Format output a little more nicely.
Print each line of output separately - previously logging.info was truncating this at some maximum length, and logs were getting lost.
Change on 2014/12/04 by ctiller <ctiller@google.com>
-------------
Up timeout for this test.
Under TSAN, if we process one byte at a time, this timeout can be reached - and I think this is the cause of the following flake:
[]
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Adding more error logging for ssl.
Change on 2014/12/05 by jboeuf <jboeuf@google.com>
-------------
Read path for goaway.
Still need to add hooks to deprecate a channel on the client side when goaway
is received.
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Separate accept() into server_accept() and server_end_of_initial_metadata().
This allows servers to initiate reads before finishing writing metadata.
Change on 2014/12/05 by ctiller <ctiller@google.com>
-------------
Fix for breakage 11512317 - adding missing test files.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
grpc c++ server side streaming support.
This is based on [] There is a lot of room to clean up the internal implementation which may require refactoring of CompletionQueue. The current cl serves as a working implementation with the missing interfaces.
The sample generated files are included and will be removed before submitting.
Change on 2014/12/05 by yangg <yangg@google.com>
-------------
Changed to the latest timeout format again (search "grpc-timeout" in [] for the spec).
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Fixing opensource build.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Making absolutely sure we can do the moe export by adding a sh_test for it.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Change :scheme psuedo-header from "grpc" to "http" or "https".
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Add server credential wrapping for c++ server. It only wraps ssl and []2 for now.
The ServerCredentials class and the factory class are in a similar fashion as
client side wrapping. The difference is the factory method returns shared_ptr
instead of unique_ptr as the server builder needs to keep a reference to it for
actually creating the server later.
The integration will happen in a following cl.
Change on 2014/12/05 by yangg <yangg@google.com>
-------------
Fixed bugs in new_grpc_docker_builder.sh
Change on 2014/12/05 by mlumish <mlumish@google.com>
-------------
In secure endpoint, hold a refcount for the life of a write callback if the
write does not complete immediately.
Change on 2014/12/05 by klempner <klempner@google.com>
-------------
Add migration support to MOE and have TAP verify it doesn't break.
Migration support allows mirroring commits from [] into the git repo, instead of just a dump of the current source.
Change on 2014/12/05 by ejona <ejona@google.com>
-------------
Change initial window size to 65535 according http2 draft 15.
Change on 2014/12/05 by zhaoq <zhaoq@google.com>
-------------
Re-enable the flaky cases in dualstack_socket_test, with additional logging to
help track down the problem if it surfaces again.
This also seems like a good opportunity to make grpc_socket_utils a separate
library, as it's not really specific to TCP.
Example output:
logspam: [], 26570) resolved 2 addrs in 37ms:
logspam: [0] [::1]:26570
logspam: [1] 127.0.0.1:26570
Change on 2014/12/05 by pmarks <pmarks@google.com>
-------------
Opensource build fixes.
-) A function that has a return type should actually return something.
-) Don't pass unsigned chars to strlen and strncmp.
Change on 2014/12/05 by nnoble <nnoble@google.com>
-------------
Created by MOE: http://code.google.com/p/moe-java
MOE_MIGRATED_REVID=81458281
10 years ago
|
|
|
|
|
|
|
/* This JSON key was generated with the GCE console and revoked immediately.
|
|
|
|
The identifiers have been changed as well.
|
|
|
|
Maximum size for a string literal is 509 chars in C89, yay! */
|
|
|
|
const char test_json_key_str_part1[] =
|
|
|
|
"{ \"private_key\": \"-----BEGIN PRIVATE KEY-----"
|
|
|
|
"\\nMIICeAIBADANBgkqhkiG9w0BAQEFAASCAmIwggJeAgEAAoGBAOEvJsnoHnyHkXcp\\n7mJE"
|
|
|
|
"qg"
|
|
|
|
"WGjiw71NfXByguekSKho65FxaGbsnSM9SMQAqVk7Q2rG+I0OpsT0LrWQtZ\\nyjSeg/"
|
|
|
|
"rWBQvS4hle4LfijkP3J5BG+"
|
|
|
|
"IXDMP8RfziNRQsenAXDNPkY4kJCvKux2xdD\\nOnVF6N7dL3nTYZg+"
|
|
|
|
"uQrNsMTz9UxVAgMBAAECgYEAzbLewe1xe9vy+2GoSsfib+28\\nDZgSE6Bu/"
|
|
|
|
"zuFoPrRc6qL9p2SsnV7txrunTyJkkOnPLND9ABAXybRTlcVKP/sGgza\\n/"
|
|
|
|
"8HpCqFYM9V8f34SBWfD4fRFT+n/"
|
|
|
|
"73cfRUtGXdXpseva2lh8RilIQfPhNZAncenU\\ngqXjDvpkypEusgXAykECQQD+";
|
|
|
|
const char test_json_key_str_part2[] =
|
|
|
|
"53XxNVnxBHsYb+AYEfklR96yVi8HywjVHP34+OQZ\\nCslxoHQM8s+"
|
|
|
|
"dBnjfScLu22JqkPv04xyxmt0QAKm9+vTdAkEA4ib7YvEAn2jXzcCI\\nEkoy2L/"
|
|
|
|
"XydR1GCHoacdfdAwiL2npOdnbvi4ZmdYRPY1LSTO058tQHKVXV7NLeCa3\\nAARh2QJBAMKeDA"
|
|
|
|
"G"
|
|
|
|
"W303SQv2cZTdbeaLKJbB5drz3eo3j7dDKjrTD9JupixFbzcGw\\n8FZi5c8idxiwC36kbAL6Hz"
|
|
|
|
"A"
|
|
|
|
"ZoX+ofI0CQE6KCzPJTtYNqyShgKAZdJ8hwOcvCZtf\\n6z8RJm0+"
|
|
|
|
"6YBd38lfh5j8mZd7aHFf6I17j5AQY7oPEc47TjJj/"
|
|
|
|
"5nZ68ECQQDvYuI3\\nLyK5fS8g0SYbmPOL9TlcHDOqwG0mrX9qpg5DC2fniXNSrrZ64GTDKdzZ"
|
|
|
|
"Y"
|
|
|
|
"Ap6LI9W\\nIqv4vr6y38N79TTC\\n-----END PRIVATE KEY-----\\n\", ";
|
|
|
|
const char test_json_key_str_part3[] =
|
|
|
|
"\"private_key_id\": \"e6b5137873db8d2ef81e06a47289e6434ec8a165\", "
|
|
|
|
"\"client_email\": "
|
|
|
|
"\"777-abaslkan11hlb6nmim3bpspl31ud@developer.gserviceaccount."
|
|
|
|
"com\", \"client_id\": "
|
|
|
|
"\"777-abaslkan11hlb6nmim3bpspl31ud.apps.googleusercontent."
|
|
|
|
"com\", \"type\": \"service_account\" }";
|
|
|
|
|
|
|
|
/* Test refresh token. */
|
|
|
|
const char test_refresh_token_str[] =
|
|
|
|
"{ \"client_id\": \"32555999999.apps.googleusercontent.com\","
|
|
|
|
" \"client_secret\": \"EmssLNjJy1332hD4KFsecret\","
|
|
|
|
" \"refresh_token\": \"1/Blahblasj424jladJDSGNf-u4Sua3HDA2ngjd42\","
|
|
|
|
" \"type\": \"authorized_user\"}";
|
|
|
|
|
|
|
|
/* Test external account credentials. */
|
|
|
|
const char test_external_account_credentials_str[] =
|
|
|
|
"{\"type\":\"external_account\",\"audience\":\"audience\",\"subject_"
|
|
|
|
"token_type\":\"subject_token_type\",\"service_account_impersonation_"
|
|
|
|
"url\":\"https://iamcredentials.googleapis.com:5555/"
|
|
|
|
"service_account_impersonation_url\",\"token_url\":\"https://"
|
|
|
|
"sts.googleapis.com:5555/"
|
|
|
|
"token\",\"token_info_url\":\"https://sts.googleapis.com:5555/"
|
|
|
|
"token_info\",\"credential_source\":{\"file\":"
|
|
|
|
"\"credentials_file_path\"},"
|
|
|
|
"\"quota_project_id\":\"quota_"
|
|
|
|
"project_id\",\"client_id\":\"client_id\",\"client_secret\":\"client_"
|
|
|
|
"secret\"}";
|
|
|
|
|
|
|
|
const char test_external_account_credentials_multi_pattern_sts_str[] =
|
|
|
|
"{\"type\":\"external_account\",\"audience\":\"audience\",\"subject_"
|
|
|
|
"token_type\":\"subject_token_type\",\"service_account_impersonation_"
|
|
|
|
"url\":\"https://sts.test.googleapis.com:5555/"
|
|
|
|
"service_account_impersonation_url\",\"token_url\":\"https://"
|
|
|
|
"test.sts.googleapis.com:5555/token\",\"token_info_url\":\"https://"
|
|
|
|
"test-sts.googleapis.com:5555/"
|
|
|
|
"token_info\",\"credential_source\":{\"file\":\"credentials_file_path\"},"
|
|
|
|
"\"quota_project_id\":\"quota_"
|
|
|
|
"project_id\",\"client_id\":\"client_id\",\"client_secret\":\"client_"
|
|
|
|
"secret\"}";
|
|
|
|
|
|
|
|
const char test_external_account_credentials_multi_pattern_iam_str[] =
|
|
|
|
"{\"type\":\"external_account\",\"audience\":\"audience\",\"subject_"
|
|
|
|
"token_type\":\"subject_token_type\",\"service_account_impersonation_"
|
|
|
|
"url\":\"https://iamcredentials.test.googleapis.com:5555/"
|
|
|
|
"service_account_impersonation_url\",\"token_url\":\"https://"
|
|
|
|
"test.iamcredentials.googleapis.com:5555/"
|
|
|
|
"token\",\"token_info_url\":\"https://"
|
|
|
|
"test-iamcredentials.googleapis.com:5555/"
|
|
|
|
"token_info\",\"credential_source\":{\"file\":\"credentials_file_path\"},"
|
|
|
|
"\"quota_project_id\":\"quota_"
|
|
|
|
"project_id\",\"client_id\":\"client_id\",\"client_secret\":\"client_"
|
|
|
|
"secret\"}";
|
|
|
|
|
|
|
|
const char valid_oauth2_json_response[] =
|
|
|
|
"{\"access_token\":\"ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_\","
|
|
|
|
" \"expires_in\":3599, "
|
|
|
|
" \"token_type\":\"Bearer\"}";
|
|
|
|
|
|
|
|
const char valid_sts_json_response[] =
|
|
|
|
"{\"access_token\":\"ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_\","
|
|
|
|
" \"expires_in\":3599, "
|
|
|
|
" \"issued_token_type\":\"urn:ietf:params:oauth:token-type:access_token\", "
|
|
|
|
" \"token_type\":\"Bearer\"}";
|
|
|
|
|
|
|
|
const char test_scope[] = "perm1 perm2";
|
|
|
|
|
|
|
|
const char test_signed_jwt[] =
|
|
|
|
"eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImY0OTRkN2M1YWU2MGRmOTcyNmM4YW"
|
|
|
|
"U0MDcyZTViYTdmZDkwODg2YzcifQ";
|
|
|
|
const char test_signed_jwt_token_type[] =
|
|
|
|
"urn:ietf:params:oauth:token-type:id_token";
|
|
|
|
const char test_signed_jwt2[] =
|
|
|
|
"eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImY0OTRkN2M1YWU2MGRmOTcyNmM5YW"
|
|
|
|
"U2MDcyZTViYTdnZDkwODg5YzcifQ";
|
|
|
|
const char test_signed_jwt_token_type2[] =
|
|
|
|
"urn:ietf:params:oauth:token-type:jwt";
|
|
|
|
const char test_signed_jwt_path_prefix[] = "test_sign_jwt";
|
|
|
|
|
|
|
|
const char test_service_url[] = "https://foo.com/foo.v1";
|
|
|
|
const char test_service_url_no_service_name[] = "https://foo.com/";
|
|
|
|
const char other_test_service_url_no_service_name[] = "https://bar.com/";
|
|
|
|
const char test_method[] = "ThisIsNotAMethod";
|
|
|
|
|
|
|
|
const char kTestUrlScheme[] = "https";
|
|
|
|
const char kTestAuthority[] = "foo.com";
|
|
|
|
const char kTestPath[] = "/foo.v1/ThisIsNotAMethod";
|
|
|
|
const char kTestOtherAuthority[] = "bar.com";
|
|
|
|
const char kTestOtherPath[] = "/bar.v1/ThisIsNotAMethod";
|
|
|
|
|
|
|
|
const char test_sts_endpoint_url[] = "https://foo.com:5555/v1/token-exchange";
|
|
|
|
|
|
|
|
const char valid_external_account_creds_token_exchange_response[] =
|
|
|
|
"{\"access_token\":\"token_exchange_access_token\","
|
|
|
|
" \"expires_in\":3599,"
|
|
|
|
" \"token_type\":\"Bearer\"}";
|
|
|
|
|
|
|
|
const char
|
|
|
|
valid_external_account_creds_service_account_impersonation_response[] =
|
|
|
|
"{\"accessToken\":\"service_account_impersonation_access_token\","
|
|
|
|
" \"expireTime\":\"2050-01-01T00:00:00Z\"}";
|
|
|
|
|
|
|
|
const char
|
|
|
|
valid_url_external_account_creds_options_credential_source_format_text[] =
|
|
|
|
"{\"url\":\"https://foo.com:5555/generate_subject_token_format_text\","
|
|
|
|
"\"headers\":{\"Metadata-Flavor\":\"Google\"}}";
|
|
|
|
|
|
|
|
const char
|
|
|
|
valid_url_external_account_creds_options_credential_source_with_qurey_params_format_text
|
|
|
|
[] = "{\"url\":\"https://foo.com:5555/"
|
|
|
|
"path/to/url/creds?p1=v1&p2=v2\","
|
|
|
|
"\"headers\":{\"Metadata-Flavor\":\"Google\"}}";
|
|
|
|
|
|
|
|
const char
|
|
|
|
valid_url_external_account_creds_retrieve_subject_token_response_format_text
|
|
|
|
[] = "test_subject_token";
|
|
|
|
|
|
|
|
const char
|
|
|
|
valid_url_external_account_creds_options_credential_source_format_json[] =
|
|
|
|
"{\"url\":\"https://foo.com:5555/generate_subject_token_format_json\","
|
|
|
|
"\"headers\":{\"Metadata-Flavor\":\"Google\"},"
|
|
|
|
"\"format\":{\"type\":\"json\",\"subject_token_field_name\":\"access_"
|
|
|
|
"token\"}}";
|
|
|
|
|
|
|
|
const char
|
|
|
|
valid_url_external_account_creds_retrieve_subject_token_response_format_json
|
|
|
|
[] = "{\"access_token\":\"test_subject_token\"}";
|
|
|
|
|
|
|
|
const char invalid_url_external_account_creds_options_credential_source[] =
|
|
|
|
"{\"url\":\"invalid_credential_source_url\","
|
|
|
|
"\"headers\":{\"Metadata-Flavor\":\"Google\"}}";
|
|
|
|
|
|
|
|
const char valid_aws_external_account_creds_retrieve_signing_keys_response[] =
|
|
|
|
"{\"AccessKeyId\":\"test_access_key_id\",\"SecretAccessKey\":"
|
|
|
|
"\"test_secret_access_key\",\"Token\":\"test_token\"}";
|
|
|
|
|
|
|
|
const char valid_aws_external_account_creds_options_credential_source[] =
|
|
|
|
"{\"environment_id\":\"aws1\","
|
|
|
|
"\"region_url\":\"https://foo.com:5555/region_url\","
|
|
|
|
"\"url\":\"https://foo.com:5555/url\","
|
|
|
|
"\"regional_cred_verification_url\":\"https://foo.com:5555/"
|
|
|
|
"regional_cred_verification_url_{region}\"}";
|
|
|
|
|
|
|
|
const char
|
|
|
|
invalid_aws_external_account_creds_options_credential_source_unmatched_environment_id
|
|
|
|
[] = "{\"environment_id\":\"unsupported_aws_version\","
|
|
|
|
"\"region_url\":\"https://foo.com:5555/region_url\","
|
|
|
|
"\"url\":\"https://foo.com:5555/url\","
|
|
|
|
"\"regional_cred_verification_url\":\"https://foo.com:5555/"
|
|
|
|
"regional_cred_verification_url_{region}\"}";
|
|
|
|
|
|
|
|
const char
|
|
|
|
invalid_aws_external_account_creds_options_credential_source_invalid_region_url
|
|
|
|
[] = "{\"environment_id\":\"aws1\","
|
|
|
|
"\"region_url\":\"invalid_region_url\","
|
|
|
|
"\"url\":\"https://foo.com:5555/url\","
|
|
|
|
"\"regional_cred_verification_url\":\"https://foo.com:5555/"
|
|
|
|
"regional_cred_verification_url_{region}\"}";
|
|
|
|
|
|
|
|
const char
|
|
|
|
invalid_aws_external_account_creds_options_credential_source_invalid_url[] =
|
|
|
|
"{\"environment_id\":\"aws1\","
|
|
|
|
"\"region_url\":\"https://foo.com:5555/region_url\","
|
|
|
|
"\"url\":\"invalid_url\","
|
|
|
|
"\"regional_cred_verification_url\":\"https://foo.com:5555/"
|
|
|
|
"regional_cred_verification_url_{region}\"}";
|
|
|
|
|
|
|
|
const char
|
|
|
|
invalid_aws_external_account_creds_options_credential_source_missing_role_name
|
|
|
|
[] = "{\"environment_id\":\"aws1\","
|
|
|
|
"\"region_url\":\"https://foo.com:5555/region_url\","
|
|
|
|
"\"url\":\"https://foo.com:5555/url_no_role_name\","
|
|
|
|
"\"regional_cred_verification_url\":\"https://foo.com:5555/"
|
|
|
|
"regional_cred_verification_url_{region}\"}";
|
|
|
|
|
|
|
|
const char
|
|
|
|
invalid_aws_external_account_creds_options_credential_source_invalid_regional_cred_verification_url
|
|
|
|
[] = "{\"environment_id\":\"aws1\","
|
|
|
|
"\"region_url\":\"https://foo.com:5555/region_url\","
|
|
|
|
"\"url\":\"https://foo.com:5555/url_no_role_name\","
|
|
|
|
"\"regional_cred_verification_url\":\"invalid_regional_cred_"
|
|
|
|
"verification_url\"}";
|
|
|
|
|
|
|
|
/* -- Global state flags. -- */
|
|
|
|
|
|
|
|
bool g_test_is_on_gce = false;
|
|
|
|
|
|
|
|
bool g_test_gce_tenancy_checker_called = false;
|
|
|
|
|
|
|
|
/* -- Utils. -- */
|
|
|
|
|
|
|
|
char* test_json_key_str(void) {
|
|
|
|
size_t result_len = strlen(test_json_key_str_part1) +
|
|
|
|
strlen(test_json_key_str_part2) +
|
|
|
|
strlen(test_json_key_str_part3);
|
|
|
|
char* result = static_cast<char*>(gpr_malloc(result_len + 1));
|
|
|
|
char* current = result;
|
|
|
|
strcpy(result, test_json_key_str_part1);
|
|
|
|
current += strlen(test_json_key_str_part1);
|
|
|
|
strcpy(current, test_json_key_str_part2);
|
|
|
|
current += strlen(test_json_key_str_part2);
|
|
|
|
strcpy(current, test_json_key_str_part3);
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
grpc_http_response http_response(int status, const char* body) {
|
|
|
|
grpc_http_response response;
|
|
|
|
response = {};
|
|
|
|
response.status = status;
|
|
|
|
response.body = gpr_strdup(const_cast<char*>(body));
|
|
|
|
response.body_length = strlen(body);
|
|
|
|
return response;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* -- Tests. -- */
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestOauth2TokenFetcherCredsParsingOk) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
absl::optional<Slice> token_value;
|
|
|
|
Duration token_lifetime;
|
|
|
|
grpc_http_response response = http_response(200, valid_oauth2_json_response);
|
|
|
|
GPR_ASSERT(grpc_oauth2_token_fetcher_credentials_parse_server_response(
|
|
|
|
&response, &token_value, &token_lifetime) ==
|
|
|
|
GRPC_CREDENTIALS_OK);
|
|
|
|
GPR_ASSERT(token_lifetime == Duration::Seconds(3599));
|
|
|
|
GPR_ASSERT(token_value->as_string_view() ==
|
|
|
|
"Bearer ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_");
|
|
|
|
grpc_http_response_destroy(&response);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestOauth2TokenFetcherCredsParsingBadHttpStatus) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
absl::optional<Slice> token_value;
|
|
|
|
Duration token_lifetime;
|
|
|
|
grpc_http_response response = http_response(401, valid_oauth2_json_response);
|
|
|
|
GPR_ASSERT(grpc_oauth2_token_fetcher_credentials_parse_server_response(
|
|
|
|
&response, &token_value, &token_lifetime) ==
|
|
|
|
GRPC_CREDENTIALS_ERROR);
|
|
|
|
grpc_http_response_destroy(&response);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestOauth2TokenFetcherCredsParsingEmptyHttpBody) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
absl::optional<Slice> token_value;
|
|
|
|
Duration token_lifetime;
|
|
|
|
grpc_http_response response = http_response(200, "");
|
|
|
|
GPR_ASSERT(grpc_oauth2_token_fetcher_credentials_parse_server_response(
|
|
|
|
&response, &token_value, &token_lifetime) ==
|
|
|
|
GRPC_CREDENTIALS_ERROR);
|
|
|
|
grpc_http_response_destroy(&response);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestOauth2TokenFetcherCredsParsingInvalidJson) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
absl::optional<Slice> token_value;
|
|
|
|
Duration token_lifetime;
|
|
|
|
grpc_http_response response =
|
|
|
|
http_response(200,
|
|
|
|
"{\"access_token\":\"ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_\","
|
|
|
|
" \"expires_in\":3599, "
|
|
|
|
" \"token_type\":\"Bearer\"");
|
|
|
|
GPR_ASSERT(grpc_oauth2_token_fetcher_credentials_parse_server_response(
|
|
|
|
&response, &token_value, &token_lifetime) ==
|
|
|
|
GRPC_CREDENTIALS_ERROR);
|
|
|
|
grpc_http_response_destroy(&response);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestOauth2TokenFetcherCredsParsingMissingToken) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
absl::optional<Slice> token_value;
|
|
|
|
Duration token_lifetime;
|
|
|
|
grpc_http_response response = http_response(200,
|
|
|
|
"{"
|
|
|
|
" \"expires_in\":3599, "
|
|
|
|
" \"token_type\":\"Bearer\"}");
|
|
|
|
GPR_ASSERT(grpc_oauth2_token_fetcher_credentials_parse_server_response(
|
|
|
|
&response, &token_value, &token_lifetime) ==
|
|
|
|
GRPC_CREDENTIALS_ERROR);
|
|
|
|
grpc_http_response_destroy(&response);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestOauth2TokenFetcherCredsParsingMissingTokenType) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
absl::optional<Slice> token_value;
|
|
|
|
Duration token_lifetime;
|
|
|
|
grpc_http_response response =
|
|
|
|
http_response(200,
|
|
|
|
"{\"access_token\":\"ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_\","
|
|
|
|
" \"expires_in\":3599, "
|
|
|
|
"}");
|
|
|
|
GPR_ASSERT(grpc_oauth2_token_fetcher_credentials_parse_server_response(
|
|
|
|
&response, &token_value, &token_lifetime) ==
|
|
|
|
GRPC_CREDENTIALS_ERROR);
|
|
|
|
grpc_http_response_destroy(&response);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestOauth2TokenFetcherCredsParsingMissingTokenLifetime) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
absl::optional<Slice> token_value;
|
|
|
|
Duration token_lifetime;
|
|
|
|
grpc_http_response response =
|
|
|
|
http_response(200,
|
|
|
|
"{\"access_token\":\"ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_\","
|
|
|
|
" \"token_type\":\"Bearer\"}");
|
|
|
|
GPR_ASSERT(grpc_oauth2_token_fetcher_credentials_parse_server_response(
|
|
|
|
&response, &token_value, &token_lifetime) ==
|
|
|
|
GRPC_CREDENTIALS_ERROR);
|
|
|
|
grpc_http_response_destroy(&response);
|
|
|
|
}
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
|
|
|
class RequestMetadataState : public RefCounted<RequestMetadataState> {
|
|
|
|
public:
|
|
|
|
static RefCountedPtr<RequestMetadataState> NewInstance(
|
|
|
|
grpc_error_handle expected_error, std::string expected) {
|
|
|
|
return MakeRefCounted<RequestMetadataState>(
|
|
|
|
expected_error, std::move(expected),
|
|
|
|
grpc_polling_entity_create_from_pollset_set(grpc_pollset_set_create()));
|
|
|
|
}
|
|
|
|
|
|
|
|
RequestMetadataState(grpc_error_handle expected_error, std::string expected,
|
|
|
|
grpc_polling_entity pollent)
|
|
|
|
: expected_error_(expected_error),
|
|
|
|
expected_(std::move(expected)),
|
|
|
|
pollent_(pollent) {}
|
|
|
|
|
|
|
|
~RequestMetadataState() override {
|
|
|
|
grpc_pollset_set_destroy(grpc_polling_entity_pollset_set(&pollent_));
|
|
|
|
}
|
|
|
|
|
|
|
|
void RunRequestMetadataTest(grpc_call_credentials* creds,
|
|
|
|
const char* url_scheme, const char* authority,
|
|
|
|
const char* path) {
|
|
|
|
auto self = Ref();
|
|
|
|
get_request_metadata_args_.security_connector =
|
|
|
|
MakeRefCounted<BogusSecurityConnector>(url_scheme);
|
|
|
|
md_.Set(HttpAuthorityMetadata(), Slice::FromStaticString(authority));
|
|
|
|
md_.Set(HttpPathMetadata(), Slice::FromStaticString(path));
|
|
|
|
activity_ = MakeActivity(
|
|
|
|
[this, creds] {
|
|
|
|
return Seq(creds->GetRequestMetadata(
|
|
|
|
ClientMetadataHandle::TestOnlyWrap(&md_),
|
|
|
|
&get_request_metadata_args_),
|
|
|
|
[this](absl::StatusOr<ClientMetadataHandle> metadata) {
|
|
|
|
if (metadata.ok()) {
|
|
|
|
GPR_ASSERT(metadata->get() == &md_);
|
|
|
|
}
|
|
|
|
return metadata.status();
|
|
|
|
});
|
|
|
|
},
|
|
|
|
ExecCtxWakeupScheduler(),
|
|
|
|
[self](absl::Status status) mutable {
|
|
|
|
self->CheckRequestMetadata(
|
|
|
|
absl_status_to_grpc_error(std::move(status)));
|
|
|
|
self.reset();
|
|
|
|
},
|
|
|
|
arena_.get(), &pollent_);
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
// No-op security connector, exists only to inject url_scheme.
|
|
|
|
class BogusSecurityConnector : public grpc_channel_security_connector {
|
|
|
|
public:
|
|
|
|
explicit BogusSecurityConnector(absl::string_view url_scheme)
|
|
|
|
: grpc_channel_security_connector(url_scheme, nullptr, nullptr) {}
|
|
|
|
|
|
|
|
void check_peer(tsi_peer, grpc_endpoint*, RefCountedPtr<grpc_auth_context>*,
|
|
|
|
grpc_closure*) override {
|
|
|
|
GPR_ASSERT(false);
|
|
|
|
}
|
|
|
|
|
|
|
|
void cancel_check_peer(grpc_closure*, grpc_error_handle) override {
|
|
|
|
GPR_ASSERT(false);
|
|
|
|
}
|
|
|
|
|
|
|
|
int cmp(const grpc_security_connector*) const override {
|
|
|
|
GPR_UNREACHABLE_CODE(return 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
ArenaPromise<absl::Status> CheckCallHost(absl::string_view,
|
|
|
|
grpc_auth_context*) override {
|
|
|
|
GPR_UNREACHABLE_CODE(
|
|
|
|
return Immediate(absl::PermissionDeniedError("should never happen")));
|
|
|
|
}
|
|
|
|
|
|
|
|
void add_handshakers(const grpc_channel_args*, grpc_pollset_set*,
|
|
|
|
HandshakeManager*) override {
|
|
|
|
GPR_ASSERT(false);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
void CheckRequestMetadata(grpc_error_handle error) {
|
|
|
|
gpr_log(GPR_INFO, "expected_error: %s",
|
|
|
|
grpc_error_std_string(expected_error_).c_str());
|
|
|
|
gpr_log(GPR_INFO, "actual_error: %s", grpc_error_std_string(error).c_str());
|
|
|
|
if (expected_error_ == GRPC_ERROR_NONE) {
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
} else {
|
|
|
|
std::string expected_error;
|
|
|
|
GPR_ASSERT(grpc_error_get_str(expected_error_, GRPC_ERROR_STR_DESCRIPTION,
|
|
|
|
&expected_error));
|
|
|
|
std::string actual_error;
|
|
|
|
GPR_ASSERT(
|
|
|
|
grpc_error_get_str(error, GRPC_ERROR_STR_DESCRIPTION, &actual_error));
|
|
|
|
GPR_ASSERT(expected_error == actual_error);
|
|
|
|
GRPC_ERROR_UNREF(expected_error_);
|
|
|
|
}
|
|
|
|
md_.Remove(HttpAuthorityMetadata());
|
|
|
|
md_.Remove(HttpPathMetadata());
|
|
|
|
gpr_log(GPR_INFO, "expected metadata: %s", expected_.c_str());
|
|
|
|
gpr_log(GPR_INFO, "actual metadata: %s", md_.DebugString().c_str());
|
|
|
|
GPR_ASSERT(md_.DebugString() == expected_);
|
|
|
|
GRPC_ERROR_UNREF(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
grpc_error_handle expected_error_;
|
|
|
|
std::string expected_;
|
|
|
|
ScopedArenaPtr arena_ = MakeScopedArena(1024, g_memory_allocator);
|
|
|
|
grpc_metadata_batch md_{arena_.get()};
|
|
|
|
grpc_call_credentials::GetRequestMetadataArgs get_request_metadata_args_;
|
|
|
|
grpc_polling_entity pollent_;
|
|
|
|
ActivityPtr activity_;
|
|
|
|
};
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestGoogleIamCreds) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE,
|
|
|
|
absl::StrCat(GRPC_IAM_AUTHORIZATION_TOKEN_METADATA_KEY, ": ",
|
|
|
|
test_google_iam_authorization_token, ", ",
|
|
|
|
GRPC_IAM_AUTHORITY_SELECTOR_METADATA_KEY, ": ",
|
|
|
|
test_google_iam_authority_selector));
|
|
|
|
grpc_call_credentials* creds = grpc_google_iam_credentials_create(
|
|
|
|
test_google_iam_authorization_token, test_google_iam_authority_selector,
|
|
|
|
nullptr);
|
|
|
|
/* Check security level. */
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
creds->Unref();
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestAccessTokenCreds) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
auto state = RequestMetadataState::NewInstance(GRPC_ERROR_NONE,
|
|
|
|
"authorization: Bearer blah");
|
|
|
|
grpc_call_credentials* creds =
|
|
|
|
grpc_access_token_credentials_create("blah", nullptr);
|
|
|
|
GPR_ASSERT(strcmp(creds->type(), grpc_access_token_credentials::Type()) == 0);
|
|
|
|
/* Check security level. */
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
creds->Unref();
|
|
|
|
}
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
class check_channel_oauth2 final : public grpc_channel_credentials {
|
|
|
|
public:
|
|
|
|
RefCountedPtr<grpc_channel_security_connector> create_security_connector(
|
|
|
|
RefCountedPtr<grpc_call_credentials> call_creds, const char* /*target*/,
|
|
|
|
const grpc_channel_args* /*args*/,
|
|
|
|
grpc_channel_args** /*new_args*/) override {
|
|
|
|
GPR_ASSERT(strcmp(type(), "check_channel_oauth2") == 0);
|
|
|
|
GPR_ASSERT(call_creds != nullptr);
|
|
|
|
GPR_ASSERT(call_creds->type() == grpc_access_token_credentials::Type());
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
const char* type() const override { return "check_channel_oauth2"; }
|
|
|
|
|
|
|
|
private:
|
|
|
|
int cmp_impl(const grpc_channel_credentials* other) const override {
|
|
|
|
// TODO(yashykt): Check if we can do something better here
|
|
|
|
return QsortCompare(static_cast<const grpc_channel_credentials*>(this),
|
|
|
|
other);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestChannelOauth2CompositeCreds) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_channel_args* new_args;
|
|
|
|
grpc_channel_credentials* channel_creds = new check_channel_oauth2();
|
|
|
|
grpc_call_credentials* oauth2_creds =
|
|
|
|
grpc_access_token_credentials_create("blah", nullptr);
|
|
|
|
grpc_channel_credentials* channel_oauth2_creds =
|
|
|
|
grpc_composite_channel_credentials_create(channel_creds, oauth2_creds,
|
|
|
|
nullptr);
|
|
|
|
grpc_channel_credentials_release(channel_creds);
|
|
|
|
grpc_call_credentials_release(oauth2_creds);
|
|
|
|
channel_oauth2_creds->create_security_connector(nullptr, nullptr, nullptr,
|
|
|
|
&new_args);
|
|
|
|
grpc_channel_credentials_release(channel_oauth2_creds);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestOauth2GoogleIamCompositeCreds) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE,
|
|
|
|
absl::StrCat(GRPC_AUTHORIZATION_METADATA_KEY, ": ",
|
|
|
|
test_oauth2_bearer_token, ", ",
|
|
|
|
GRPC_IAM_AUTHORIZATION_TOKEN_METADATA_KEY, ": ",
|
|
|
|
test_google_iam_authorization_token, ", ",
|
|
|
|
GRPC_IAM_AUTHORITY_SELECTOR_METADATA_KEY, ": ",
|
|
|
|
test_google_iam_authority_selector));
|
|
|
|
grpc_call_credentials* oauth2_creds = grpc_md_only_test_credentials_create(
|
|
|
|
"authorization", test_oauth2_bearer_token);
|
|
|
|
|
|
|
|
/* Check security level of fake credentials. */
|
|
|
|
GPR_ASSERT(oauth2_creds->min_security_level() == GRPC_SECURITY_NONE);
|
|
|
|
|
|
|
|
grpc_call_credentials* google_iam_creds = grpc_google_iam_credentials_create(
|
|
|
|
test_google_iam_authorization_token, test_google_iam_authority_selector,
|
|
|
|
nullptr);
|
|
|
|
grpc_call_credentials* composite_creds =
|
|
|
|
grpc_composite_call_credentials_create(oauth2_creds, google_iam_creds,
|
|
|
|
nullptr);
|
|
|
|
/* Check security level of composite credentials. */
|
|
|
|
GPR_ASSERT(composite_creds->min_security_level() ==
|
|
|
|
GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
|
|
|
|
oauth2_creds->Unref();
|
|
|
|
google_iam_creds->Unref();
|
|
|
|
GPR_ASSERT(composite_creds->type() ==
|
|
|
|
grpc_composite_call_credentials::Type());
|
|
|
|
const grpc_composite_call_credentials::CallCredentialsList& creds_list =
|
|
|
|
static_cast<const grpc_composite_call_credentials*>(composite_creds)
|
|
|
|
->inner();
|
|
|
|
GPR_ASSERT(creds_list.size() == 2);
|
|
|
|
GPR_ASSERT(creds_list[0]->type() == grpc_md_only_test_credentials::Type());
|
|
|
|
GPR_ASSERT(creds_list[1]->type() == grpc_google_iam_credentials::Type());
|
|
|
|
state->RunRequestMetadataTest(composite_creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
composite_creds->Unref();
|
|
|
|
}
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
class check_channel_oauth2_google_iam final : public grpc_channel_credentials {
|
|
|
|
public:
|
|
|
|
RefCountedPtr<grpc_channel_security_connector> create_security_connector(
|
|
|
|
RefCountedPtr<grpc_call_credentials> call_creds, const char* /*target*/,
|
|
|
|
const grpc_channel_args* /*args*/,
|
|
|
|
grpc_channel_args** /*new_args*/) override {
|
|
|
|
GPR_ASSERT(strcmp(type(), "check_channel_oauth2_google_iam") == 0);
|
|
|
|
GPR_ASSERT(call_creds != nullptr);
|
|
|
|
GPR_ASSERT(call_creds->type() == grpc_composite_call_credentials::Type());
|
|
|
|
const grpc_composite_call_credentials::CallCredentialsList& creds_list =
|
|
|
|
static_cast<const grpc_composite_call_credentials*>(call_creds.get())
|
|
|
|
->inner();
|
|
|
|
GPR_ASSERT(creds_list[0]->type() == grpc_access_token_credentials::Type());
|
|
|
|
GPR_ASSERT(creds_list[1]->type() == grpc_google_iam_credentials::Type());
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
const char* type() const override {
|
|
|
|
return "check_channel_oauth2_google_iam";
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
int cmp_impl(const grpc_channel_credentials* other) const override {
|
|
|
|
// TODO(yashykt): Check if we can do something better here
|
|
|
|
return QsortCompare(static_cast<const grpc_channel_credentials*>(this),
|
|
|
|
other);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestChannelOauth2GoogleIamCompositeCreds) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_channel_args* new_args;
|
|
|
|
grpc_channel_credentials* channel_creds =
|
|
|
|
new check_channel_oauth2_google_iam();
|
|
|
|
grpc_call_credentials* oauth2_creds =
|
|
|
|
grpc_access_token_credentials_create("blah", nullptr);
|
|
|
|
grpc_channel_credentials* channel_oauth2_creds =
|
|
|
|
grpc_composite_channel_credentials_create(channel_creds, oauth2_creds,
|
|
|
|
nullptr);
|
|
|
|
grpc_call_credentials* google_iam_creds = grpc_google_iam_credentials_create(
|
|
|
|
test_google_iam_authorization_token, test_google_iam_authority_selector,
|
|
|
|
nullptr);
|
|
|
|
|
|
|
|
grpc_channel_credentials* channel_oauth2_iam_creds =
|
|
|
|
grpc_composite_channel_credentials_create(channel_oauth2_creds,
|
|
|
|
google_iam_creds, nullptr);
|
|
|
|
grpc_channel_credentials_release(channel_creds);
|
|
|
|
grpc_call_credentials_release(oauth2_creds);
|
|
|
|
grpc_channel_credentials_release(channel_oauth2_creds);
|
|
|
|
grpc_call_credentials_release(google_iam_creds);
|
|
|
|
|
|
|
|
channel_oauth2_iam_creds->create_security_connector(nullptr, nullptr, nullptr,
|
|
|
|
&new_args);
|
|
|
|
|
|
|
|
grpc_channel_credentials_release(channel_oauth2_iam_creds);
|
|
|
|
}
|
|
|
|
|
|
|
|
void validate_compute_engine_http_request(const grpc_http_request* request,
|
|
|
|
const char* host, const char* path) {
|
|
|
|
GPR_ASSERT(strcmp(host, "metadata.google.internal.") == 0);
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(path,
|
|
|
|
"/computeMetadata/v1/instance/service-accounts/default/token") ==
|
|
|
|
0);
|
|
|
|
GPR_ASSERT(request->hdr_count == 1);
|
|
|
|
GPR_ASSERT(strcmp(request->hdrs[0].key, "Metadata-Flavor") == 0);
|
|
|
|
GPR_ASSERT(strcmp(request->hdrs[0].value, "Google") == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int compute_engine_httpcli_get_success_override(
|
|
|
|
const grpc_http_request* request, const char* host, const char* path,
|
|
|
|
Timestamp /*deadline*/, grpc_closure* on_done,
|
|
|
|
grpc_http_response* response) {
|
|
|
|
validate_compute_engine_http_request(request, host, path);
|
|
|
|
*response = http_response(200, valid_oauth2_json_response);
|
|
|
|
ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int compute_engine_httpcli_get_failure_override(
|
|
|
|
const grpc_http_request* request, const char* host, const char* path,
|
|
|
|
Timestamp /*deadline*/, grpc_closure* on_done,
|
|
|
|
grpc_http_response* response) {
|
|
|
|
validate_compute_engine_http_request(request, host, path);
|
|
|
|
*response = http_response(403, "Not Authorized.");
|
|
|
|
ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int httpcli_post_should_not_be_called(
|
|
|
|
const grpc_http_request* /*request*/, const char* /*host*/,
|
|
|
|
const char* /*path*/, const char* /*body_bytes*/, size_t /*body_size*/,
|
|
|
|
Timestamp /*deadline*/, grpc_closure* /*on_done*/,
|
|
|
|
grpc_http_response* /*response*/) {
|
|
|
|
GPR_ASSERT("HTTP POST should not be called" == nullptr);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int httpcli_get_should_not_be_called(const grpc_http_request* /*request*/,
|
|
|
|
const char* /*host*/, const char* /*path*/,
|
|
|
|
Timestamp /*deadline*/,
|
|
|
|
grpc_closure* /*on_done*/,
|
|
|
|
grpc_http_response* /*response*/) {
|
|
|
|
GPR_ASSERT("HTTP GET should not be called" == nullptr);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestComputeEngineCredsSuccess) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
std::string emd = "authorization: Bearer ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_";
|
|
|
|
const char expected_creds_debug_string[] =
|
|
|
|
"GoogleComputeEngineTokenFetcherCredentials{"
|
|
|
|
"OAuth2TokenFetcherCredentials}";
|
|
|
|
grpc_call_credentials* creds =
|
|
|
|
grpc_google_compute_engine_credentials_create(nullptr);
|
|
|
|
/* Check security level. */
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
|
|
|
|
/* First request: http get should be called. */
|
|
|
|
auto state = RequestMetadataState::NewInstance(GRPC_ERROR_NONE, emd);
|
|
|
|
HttpRequest::SetOverride(compute_engine_httpcli_get_success_override,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
|
|
|
|
/* Second request: the cached token should be served directly. */
|
|
|
|
state = RequestMetadataState::NewInstance(GRPC_ERROR_NONE, emd);
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(creds->debug_string().c_str(), expected_creds_debug_string) == 0);
|
|
|
|
creds->Unref();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestComputeEngineCredsFailure) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
const char expected_creds_debug_string[] =
|
|
|
|
"GoogleComputeEngineTokenFetcherCredentials{"
|
|
|
|
"OAuth2TokenFetcherCredentials}";
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_CREATE_FROM_STATIC_STRING(
|
|
|
|
"Error occurred when fetching oauth2 token."),
|
|
|
|
{});
|
|
|
|
grpc_call_credentials* creds =
|
|
|
|
grpc_google_compute_engine_credentials_create(nullptr);
|
|
|
|
HttpRequest::SetOverride(compute_engine_httpcli_get_failure_override,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(creds->debug_string().c_str(), expected_creds_debug_string) == 0);
|
|
|
|
creds->Unref();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
void validate_refresh_token_http_request(const grpc_http_request* request,
|
|
|
|
const char* host, const char* path,
|
|
|
|
const char* body, size_t body_size) {
|
|
|
|
/* The content of the assertion is tested extensively in json_token_test. */
|
|
|
|
GPR_ASSERT(body != nullptr);
|
|
|
|
GPR_ASSERT(body_size != 0);
|
|
|
|
std::string expected_body = absl::StrFormat(
|
|
|
|
GRPC_REFRESH_TOKEN_POST_BODY_FORMAT_STRING,
|
|
|
|
"32555999999.apps.googleusercontent.com", "EmssLNjJy1332hD4KFsecret",
|
|
|
|
"1/Blahblasj424jladJDSGNf-u4Sua3HDA2ngjd42");
|
|
|
|
GPR_ASSERT(expected_body.size() == body_size);
|
|
|
|
GPR_ASSERT(memcmp(expected_body.data(), body, body_size) == 0);
|
|
|
|
GPR_ASSERT(strcmp(host, GRPC_GOOGLE_OAUTH2_SERVICE_HOST) == 0);
|
|
|
|
GPR_ASSERT(strcmp(path, GRPC_GOOGLE_OAUTH2_SERVICE_TOKEN_PATH) == 0);
|
|
|
|
GPR_ASSERT(request->hdr_count == 1);
|
|
|
|
GPR_ASSERT(strcmp(request->hdrs[0].key, "Content-Type") == 0);
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(request->hdrs[0].value, "application/x-www-form-urlencoded") == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int refresh_token_httpcli_post_success(const grpc_http_request* request,
|
|
|
|
const char* host, const char* path,
|
|
|
|
const char* body, size_t body_size,
|
|
|
|
Timestamp /*deadline*/,
|
|
|
|
grpc_closure* on_done,
|
|
|
|
grpc_http_response* response) {
|
|
|
|
validate_refresh_token_http_request(request, host, path, body, body_size);
|
|
|
|
*response = http_response(200, valid_oauth2_json_response);
|
|
|
|
ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int token_httpcli_post_failure(const grpc_http_request* /*request*/,
|
|
|
|
const char* /*host*/, const char* /*path*/,
|
|
|
|
const char* /*body*/, size_t /*body_size*/,
|
|
|
|
Timestamp /*deadline*/, grpc_closure* on_done,
|
|
|
|
grpc_http_response* response) {
|
|
|
|
*response = http_response(403, "Not Authorized.");
|
|
|
|
ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestRefreshTokenCredsSuccess) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
std::string emd = "authorization: Bearer ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_";
|
|
|
|
const char expected_creds_debug_string[] =
|
|
|
|
"GoogleRefreshToken{ClientID:32555999999.apps.googleusercontent.com,"
|
|
|
|
"OAuth2TokenFetcherCredentials}";
|
|
|
|
grpc_call_credentials* creds = grpc_google_refresh_token_credentials_create(
|
|
|
|
test_refresh_token_str, nullptr);
|
|
|
|
|
|
|
|
/* Check security level. */
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
|
|
|
|
/* First request: http put should be called. */
|
|
|
|
auto state = RequestMetadataState::NewInstance(GRPC_ERROR_NONE, emd);
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
refresh_token_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
|
|
|
|
/* Second request: the cached token should be served directly. */
|
|
|
|
state = RequestMetadataState::NewInstance(GRPC_ERROR_NONE, emd);
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(creds->debug_string().c_str(), expected_creds_debug_string) == 0);
|
|
|
|
|
|
|
|
creds->Unref();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestRefreshTokenCredsFailure) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
const char expected_creds_debug_string[] =
|
|
|
|
"GoogleRefreshToken{ClientID:32555999999.apps.googleusercontent.com,"
|
|
|
|
"OAuth2TokenFetcherCredentials}";
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_CREATE_FROM_STATIC_STRING(
|
|
|
|
"Error occurred when fetching oauth2 token."),
|
|
|
|
{});
|
|
|
|
grpc_call_credentials* creds = grpc_google_refresh_token_credentials_create(
|
|
|
|
test_refresh_token_str, nullptr);
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
token_httpcli_post_failure);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(creds->debug_string().c_str(), expected_creds_debug_string) == 0);
|
|
|
|
|
|
|
|
creds->Unref();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestValidStsCredsOptions) {
|
|
|
|
grpc_sts_credentials_options valid_options = {
|
|
|
|
test_sts_endpoint_url, // sts_endpoint_url
|
|
|
|
nullptr, // resource
|
|
|
|
nullptr, // audience
|
|
|
|
nullptr, // scope
|
|
|
|
nullptr, // requested_token_type
|
|
|
|
test_signed_jwt_path_prefix, // subject_token_path
|
|
|
|
test_signed_jwt_token_type, // subject_token_type
|
|
|
|
nullptr, // actor_token_path
|
|
|
|
nullptr // actor_token_type
|
|
|
|
};
|
|
|
|
absl::StatusOr<URI> sts_url = ValidateStsCredentialsOptions(&valid_options);
|
|
|
|
GPR_ASSERT(sts_url.ok());
|
|
|
|
absl::string_view host;
|
|
|
|
absl::string_view port;
|
|
|
|
GPR_ASSERT(SplitHostPort(sts_url->authority(), &host, &port));
|
|
|
|
GPR_ASSERT(host == "foo.com");
|
|
|
|
GPR_ASSERT(port == "5555");
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestInvalidStsCredsOptions) {
|
|
|
|
grpc_sts_credentials_options invalid_options = {
|
|
|
|
test_sts_endpoint_url, // sts_endpoint_url
|
|
|
|
nullptr, // resource
|
|
|
|
nullptr, // audience
|
|
|
|
nullptr, // scope
|
|
|
|
nullptr, // requested_token_type
|
|
|
|
nullptr, // subject_token_path (Required)
|
|
|
|
test_signed_jwt_token_type, // subject_token_type
|
|
|
|
nullptr, // actor_token_path
|
|
|
|
nullptr // actor_token_type
|
|
|
|
};
|
|
|
|
absl::StatusOr<URI> url_should_be_invalid =
|
|
|
|
ValidateStsCredentialsOptions(&invalid_options);
|
|
|
|
GPR_ASSERT(!url_should_be_invalid.ok());
|
|
|
|
|
|
|
|
invalid_options = {
|
|
|
|
test_sts_endpoint_url, // sts_endpoint_url
|
|
|
|
nullptr, // resource
|
|
|
|
nullptr, // audience
|
|
|
|
nullptr, // scope
|
|
|
|
nullptr, // requested_token_type
|
|
|
|
test_signed_jwt_path_prefix, // subject_token_path
|
|
|
|
nullptr, // subject_token_type (Required)
|
|
|
|
nullptr, // actor_token_path
|
|
|
|
nullptr // actor_token_type
|
|
|
|
};
|
|
|
|
url_should_be_invalid = ValidateStsCredentialsOptions(&invalid_options);
|
|
|
|
GPR_ASSERT(!url_should_be_invalid.ok());
|
|
|
|
|
|
|
|
invalid_options = {
|
|
|
|
nullptr, // sts_endpoint_url (Required)
|
|
|
|
nullptr, // resource
|
|
|
|
nullptr, // audience
|
|
|
|
nullptr, // scope
|
|
|
|
nullptr, // requested_token_type
|
|
|
|
test_signed_jwt_path_prefix, // subject_token_path
|
|
|
|
test_signed_jwt_token_type, // subject_token_type (Required)
|
|
|
|
nullptr, // actor_token_path
|
|
|
|
nullptr // actor_token_type
|
|
|
|
};
|
|
|
|
url_should_be_invalid = ValidateStsCredentialsOptions(&invalid_options);
|
|
|
|
GPR_ASSERT(!url_should_be_invalid.ok());
|
|
|
|
|
|
|
|
invalid_options = {
|
|
|
|
"not_a_valid_uri", // sts_endpoint_url
|
|
|
|
nullptr, // resource
|
|
|
|
nullptr, // audience
|
|
|
|
nullptr, // scope
|
|
|
|
nullptr, // requested_token_type
|
|
|
|
test_signed_jwt_path_prefix, // subject_token_path
|
|
|
|
test_signed_jwt_token_type, // subject_token_type (Required)
|
|
|
|
nullptr, // actor_token_path
|
|
|
|
nullptr // actor_token_type
|
|
|
|
};
|
|
|
|
url_should_be_invalid = ValidateStsCredentialsOptions(&invalid_options);
|
|
|
|
GPR_ASSERT(!url_should_be_invalid.ok());
|
|
|
|
|
|
|
|
invalid_options = {
|
|
|
|
"ftp://ftp.is.not.a.valid.scheme/bar", // sts_endpoint_url
|
|
|
|
nullptr, // resource
|
|
|
|
nullptr, // audience
|
|
|
|
nullptr, // scope
|
|
|
|
nullptr, // requested_token_type
|
|
|
|
test_signed_jwt_path_prefix, // subject_token_path
|
|
|
|
test_signed_jwt_token_type, // subject_token_type (Required)
|
|
|
|
nullptr, // actor_token_path
|
|
|
|
nullptr // actor_token_type
|
|
|
|
};
|
|
|
|
url_should_be_invalid = ValidateStsCredentialsOptions(&invalid_options);
|
|
|
|
GPR_ASSERT(!url_should_be_invalid.ok());
|
|
|
|
}
|
|
|
|
|
|
|
|
void assert_query_parameters(const URI& uri, absl::string_view expected_key,
|
|
|
|
absl::string_view expected_val) {
|
|
|
|
const auto it = uri.query_parameter_map().find(expected_key);
|
|
|
|
GPR_ASSERT(it != uri.query_parameter_map().end());
|
|
|
|
if (it->second != expected_val) {
|
|
|
|
gpr_log(GPR_ERROR, "%s!=%s", std::string(it->second).c_str(),
|
|
|
|
std::string(expected_val).c_str());
|
|
|
|
}
|
|
|
|
GPR_ASSERT(it->second == expected_val);
|
|
|
|
}
|
|
|
|
|
|
|
|
void validate_sts_token_http_request(const grpc_http_request* request,
|
|
|
|
const char* host, const char* path,
|
|
|
|
const char* body, size_t body_size,
|
|
|
|
bool expect_actor_token) {
|
|
|
|
// Check that the body is constructed properly.
|
|
|
|
GPR_ASSERT(body != nullptr);
|
|
|
|
GPR_ASSERT(body_size != 0);
|
|
|
|
std::string get_url_equivalent =
|
|
|
|
absl::StrFormat("%s?%s", test_sts_endpoint_url, body);
|
|
|
|
absl::StatusOr<URI> url = URI::Parse(get_url_equivalent);
|
|
|
|
if (!url.ok()) {
|
|
|
|
gpr_log(GPR_ERROR, "%s", url.status().ToString().c_str());
|
|
|
|
GPR_ASSERT(url.ok());
|
|
|
|
}
|
|
|
|
assert_query_parameters(*url, "resource", "resource");
|
|
|
|
assert_query_parameters(*url, "audience", "audience");
|
|
|
|
assert_query_parameters(*url, "scope", "scope");
|
|
|
|
assert_query_parameters(*url, "requested_token_type", "requested_token_type");
|
|
|
|
assert_query_parameters(*url, "subject_token", test_signed_jwt);
|
|
|
|
assert_query_parameters(*url, "subject_token_type",
|
|
|
|
test_signed_jwt_token_type);
|
|
|
|
if (expect_actor_token) {
|
|
|
|
assert_query_parameters(*url, "actor_token", test_signed_jwt2);
|
|
|
|
assert_query_parameters(*url, "actor_token_type",
|
|
|
|
test_signed_jwt_token_type2);
|
|
|
|
} else {
|
|
|
|
GPR_ASSERT(url->query_parameter_map().find("actor_token") ==
|
|
|
|
url->query_parameter_map().end());
|
|
|
|
GPR_ASSERT(url->query_parameter_map().find("actor_token_type") ==
|
|
|
|
url->query_parameter_map().end());
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check the rest of the request.
|
|
|
|
GPR_ASSERT(strcmp(host, "foo.com:5555") == 0);
|
|
|
|
GPR_ASSERT(strcmp(path, "/v1/token-exchange") == 0);
|
|
|
|
GPR_ASSERT(request->hdr_count == 1);
|
|
|
|
GPR_ASSERT(strcmp(request->hdrs[0].key, "Content-Type") == 0);
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(request->hdrs[0].value, "application/x-www-form-urlencoded") == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int sts_token_httpcli_post_success(const grpc_http_request* request,
|
|
|
|
const char* host, const char* path,
|
|
|
|
const char* body, size_t body_size,
|
|
|
|
Timestamp /*deadline*/,
|
|
|
|
grpc_closure* on_done,
|
|
|
|
grpc_http_response* response) {
|
|
|
|
validate_sts_token_http_request(request, host, path, body, body_size, true);
|
|
|
|
*response = http_response(200, valid_sts_json_response);
|
|
|
|
ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int sts_token_httpcli_post_success_no_actor_token(
|
|
|
|
const grpc_http_request* request, const char* host, const char* path,
|
|
|
|
const char* body, size_t body_size, Timestamp /*deadline*/,
|
|
|
|
grpc_closure* on_done, grpc_http_response* response) {
|
|
|
|
validate_sts_token_http_request(request, host, path, body, body_size, false);
|
|
|
|
*response = http_response(200, valid_sts_json_response);
|
|
|
|
ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
char* write_tmp_jwt_file(const char* jwt_contents) {
|
|
|
|
char* path;
|
|
|
|
FILE* tmp = gpr_tmpfile(test_signed_jwt_path_prefix, &path);
|
|
|
|
GPR_ASSERT(path != nullptr);
|
|
|
|
GPR_ASSERT(tmp != nullptr);
|
|
|
|
size_t jwt_length = strlen(jwt_contents);
|
|
|
|
GPR_ASSERT(fwrite(jwt_contents, 1, jwt_length, tmp) == jwt_length);
|
|
|
|
fclose(tmp);
|
|
|
|
return path;
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestStsCredsSuccess) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
std::string emd = "authorization: Bearer ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_";
|
|
|
|
const char expected_creds_debug_string[] =
|
|
|
|
"StsTokenFetcherCredentials{Path:/v1/"
|
|
|
|
"token-exchange,Authority:foo.com:5555,OAuth2TokenFetcherCredentials}";
|
|
|
|
char* subject_token_path = write_tmp_jwt_file(test_signed_jwt);
|
|
|
|
char* actor_token_path = write_tmp_jwt_file(test_signed_jwt2);
|
|
|
|
grpc_sts_credentials_options valid_options = {
|
|
|
|
test_sts_endpoint_url, // sts_endpoint_url
|
|
|
|
"resource", // resource
|
|
|
|
"audience", // audience
|
|
|
|
"scope", // scope
|
|
|
|
"requested_token_type", // requested_token_type
|
|
|
|
subject_token_path, // subject_token_path
|
|
|
|
test_signed_jwt_token_type, // subject_token_type
|
|
|
|
actor_token_path, // actor_token_path
|
|
|
|
test_signed_jwt_token_type2 // actor_token_type
|
|
|
|
};
|
|
|
|
grpc_call_credentials* creds =
|
|
|
|
grpc_sts_credentials_create(&valid_options, nullptr);
|
|
|
|
|
|
|
|
/* Check security level. */
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
|
|
|
|
/* First request: http put should be called. */
|
|
|
|
auto state = RequestMetadataState::NewInstance(GRPC_ERROR_NONE, emd);
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
sts_token_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
|
|
|
|
/* Second request: the cached token should be served directly. */
|
|
|
|
state = RequestMetadataState::NewInstance(GRPC_ERROR_NONE, emd);
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(creds->debug_string().c_str(), expected_creds_debug_string) == 0);
|
|
|
|
|
|
|
|
creds->Unref();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
gpr_free(subject_token_path);
|
|
|
|
gpr_free(actor_token_path);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestStsCredsTokenFileNotFound) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_sts_credentials_options valid_options = {
|
|
|
|
test_sts_endpoint_url, // sts_endpoint_url
|
|
|
|
"resource", // resource
|
|
|
|
"audience", // audience
|
|
|
|
"scope", // scope
|
|
|
|
"requested_token_type", // requested_token_type
|
|
|
|
"/some/completely/random/path", // subject_token_path
|
|
|
|
test_signed_jwt_token_type, // subject_token_type
|
|
|
|
"", // actor_token_path
|
|
|
|
"" // actor_token_type
|
|
|
|
};
|
|
|
|
grpc_call_credentials* creds =
|
|
|
|
grpc_sts_credentials_create(&valid_options, nullptr);
|
|
|
|
|
|
|
|
/* Check security level. */
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_CREATE_FROM_STATIC_STRING(
|
|
|
|
"Error occurred when fetching oauth2 token."),
|
|
|
|
{});
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
|
|
|
|
/* Cleanup. */
|
|
|
|
creds->Unref();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestStsCredsNoActorTokenSuccess) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
std::string emd = "authorization: Bearer ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_";
|
|
|
|
const char expected_creds_debug_string[] =
|
|
|
|
"StsTokenFetcherCredentials{Path:/v1/"
|
|
|
|
"token-exchange,Authority:foo.com:5555,OAuth2TokenFetcherCredentials}";
|
|
|
|
char* subject_token_path = write_tmp_jwt_file(test_signed_jwt);
|
|
|
|
grpc_sts_credentials_options valid_options = {
|
|
|
|
test_sts_endpoint_url, // sts_endpoint_url
|
|
|
|
"resource", // resource
|
|
|
|
"audience", // audience
|
|
|
|
"scope", // scope
|
|
|
|
"requested_token_type", // requested_token_type
|
|
|
|
subject_token_path, // subject_token_path
|
|
|
|
test_signed_jwt_token_type, // subject_token_type
|
|
|
|
"", // actor_token_path
|
|
|
|
"" // actor_token_type
|
|
|
|
};
|
|
|
|
grpc_call_credentials* creds =
|
|
|
|
grpc_sts_credentials_create(&valid_options, nullptr);
|
|
|
|
|
|
|
|
/* Check security level. */
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
|
|
|
|
/* First request: http put should be called. */
|
|
|
|
auto state = RequestMetadataState::NewInstance(GRPC_ERROR_NONE, emd);
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
sts_token_httpcli_post_success_no_actor_token);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
|
|
|
|
/* Second request: the cached token should be served directly. */
|
|
|
|
state = RequestMetadataState::NewInstance(GRPC_ERROR_NONE, emd);
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(creds->debug_string().c_str(), expected_creds_debug_string) == 0);
|
|
|
|
|
|
|
|
creds->Unref();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
gpr_free(subject_token_path);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestStsCredsLoadTokenFailure) {
|
|
|
|
const char expected_creds_debug_string[] =
|
|
|
|
"StsTokenFetcherCredentials{Path:/v1/"
|
|
|
|
"token-exchange,Authority:foo.com:5555,OAuth2TokenFetcherCredentials}";
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_CREATE_FROM_STATIC_STRING(
|
|
|
|
"Error occurred when fetching oauth2 token."),
|
|
|
|
{});
|
|
|
|
char* test_signed_jwt_path = write_tmp_jwt_file(test_signed_jwt);
|
|
|
|
grpc_sts_credentials_options options = {
|
|
|
|
test_sts_endpoint_url, // sts_endpoint_url
|
|
|
|
"resource", // resource
|
|
|
|
"audience", // audience
|
|
|
|
"scope", // scope
|
|
|
|
"requested_token_type", // requested_token_type
|
|
|
|
"invalid_path", // subject_token_path
|
|
|
|
test_signed_jwt_token_type, // subject_token_type
|
|
|
|
nullptr, // actor_token_path
|
|
|
|
nullptr // actor_token_type
|
|
|
|
};
|
|
|
|
grpc_call_credentials* creds = grpc_sts_credentials_create(&options, nullptr);
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(creds->debug_string().c_str(), expected_creds_debug_string) == 0);
|
|
|
|
|
|
|
|
creds->Unref();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
gpr_free(test_signed_jwt_path);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestStsCredsHttpFailure) {
|
|
|
|
const char expected_creds_debug_string[] =
|
|
|
|
"StsTokenFetcherCredentials{Path:/v1/"
|
|
|
|
"token-exchange,Authority:foo.com:5555,OAuth2TokenFetcherCredentials}";
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_CREATE_FROM_STATIC_STRING(
|
|
|
|
"Error occurred when fetching oauth2 token."),
|
|
|
|
{});
|
|
|
|
char* test_signed_jwt_path = write_tmp_jwt_file(test_signed_jwt);
|
|
|
|
grpc_sts_credentials_options valid_options = {
|
|
|
|
test_sts_endpoint_url, // sts_endpoint_url
|
|
|
|
"resource", // resource
|
|
|
|
"audience", // audience
|
|
|
|
"scope", // scope
|
|
|
|
"requested_token_type", // requested_token_type
|
|
|
|
test_signed_jwt_path, // subject_token_path
|
|
|
|
test_signed_jwt_token_type, // subject_token_type
|
|
|
|
nullptr, // actor_token_path
|
|
|
|
nullptr // actor_token_type
|
|
|
|
};
|
|
|
|
grpc_call_credentials* creds =
|
|
|
|
grpc_sts_credentials_create(&valid_options, nullptr);
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
token_httpcli_post_failure);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(creds->debug_string().c_str(), expected_creds_debug_string) == 0);
|
|
|
|
creds->Unref();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
gpr_free(test_signed_jwt_path);
|
|
|
|
}
|
|
|
|
|
|
|
|
void validate_jwt_encode_and_sign_params(const grpc_auth_json_key* json_key,
|
|
|
|
const char* scope,
|
|
|
|
gpr_timespec token_lifetime) {
|
|
|
|
GPR_ASSERT(grpc_auth_json_key_is_valid(json_key));
|
|
|
|
GPR_ASSERT(json_key->private_key != nullptr);
|
|
|
|
GPR_ASSERT(RSA_check_key(json_key->private_key));
|
|
|
|
GPR_ASSERT(json_key->type != nullptr &&
|
|
|
|
strcmp(json_key->type, "service_account") == 0);
|
|
|
|
GPR_ASSERT(json_key->private_key_id != nullptr &&
|
|
|
|
strcmp(json_key->private_key_id,
|
|
|
|
"e6b5137873db8d2ef81e06a47289e6434ec8a165") == 0);
|
|
|
|
GPR_ASSERT(json_key->client_id != nullptr &&
|
|
|
|
strcmp(json_key->client_id,
|
|
|
|
"777-abaslkan11hlb6nmim3bpspl31ud.apps."
|
|
|
|
"googleusercontent.com") == 0);
|
|
|
|
GPR_ASSERT(json_key->client_email != nullptr &&
|
|
|
|
strcmp(json_key->client_email,
|
|
|
|
"777-abaslkan11hlb6nmim3bpspl31ud@developer."
|
|
|
|
"gserviceaccount.com") == 0);
|
|
|
|
if (scope != nullptr) GPR_ASSERT(strcmp(scope, test_scope) == 0);
|
|
|
|
GPR_ASSERT(gpr_time_cmp(token_lifetime, grpc_max_auth_token_lifetime()) == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
char* encode_and_sign_jwt_success(const grpc_auth_json_key* json_key,
|
|
|
|
const char* audience,
|
|
|
|
gpr_timespec token_lifetime,
|
|
|
|
const char* scope) {
|
|
|
|
if (strcmp(audience, test_service_url_no_service_name) != 0 &&
|
|
|
|
strcmp(audience, other_test_service_url_no_service_name) != 0) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
validate_jwt_encode_and_sign_params(json_key, scope, token_lifetime);
|
|
|
|
return gpr_strdup(test_signed_jwt);
|
|
|
|
}
|
|
|
|
|
|
|
|
char* encode_and_sign_jwt_failure(const grpc_auth_json_key* json_key,
|
|
|
|
const char* /*audience*/,
|
|
|
|
gpr_timespec token_lifetime,
|
|
|
|
const char* scope) {
|
|
|
|
validate_jwt_encode_and_sign_params(json_key, scope, token_lifetime);
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
char* encode_and_sign_jwt_should_not_be_called(
|
|
|
|
const grpc_auth_json_key* /*json_key*/, const char* /*audience*/,
|
|
|
|
gpr_timespec /*token_lifetime*/, const char* /*scope*/) {
|
|
|
|
GPR_ASSERT("grpc_jwt_encode_and_sign should not be called" == nullptr);
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
grpc_service_account_jwt_access_credentials* creds_as_jwt(
|
|
|
|
grpc_call_credentials* creds) {
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(creds->type() ==
|
|
|
|
grpc_service_account_jwt_access_credentials::Type());
|
|
|
|
return reinterpret_cast<grpc_service_account_jwt_access_credentials*>(creds);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestJwtCredsLifetime) {
|
|
|
|
char* json_key_string = test_json_key_str();
|
|
|
|
const char expected_creds_debug_string_prefix[] =
|
|
|
|
"JWTAccessCredentials{ExpirationTime:";
|
|
|
|
// Max lifetime.
|
|
|
|
grpc_call_credentials* jwt_creds =
|
|
|
|
grpc_service_account_jwt_access_credentials_create(
|
|
|
|
json_key_string, grpc_max_auth_token_lifetime(), nullptr);
|
|
|
|
GPR_ASSERT(gpr_time_cmp(creds_as_jwt(jwt_creds)->jwt_lifetime(),
|
|
|
|
grpc_max_auth_token_lifetime()) == 0);
|
|
|
|
/* Check security level. */
|
|
|
|
GPR_ASSERT(jwt_creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
GPR_ASSERT(strncmp(expected_creds_debug_string_prefix,
|
|
|
|
jwt_creds->debug_string().c_str(),
|
|
|
|
strlen(expected_creds_debug_string_prefix)) == 0);
|
|
|
|
grpc_call_credentials_release(jwt_creds);
|
|
|
|
|
|
|
|
// Shorter lifetime.
|
|
|
|
gpr_timespec token_lifetime = {10, 0, GPR_TIMESPAN};
|
|
|
|
GPR_ASSERT(gpr_time_cmp(grpc_max_auth_token_lifetime(), token_lifetime) > 0);
|
|
|
|
jwt_creds = grpc_service_account_jwt_access_credentials_create(
|
|
|
|
json_key_string, token_lifetime, nullptr);
|
|
|
|
GPR_ASSERT(gpr_time_cmp(creds_as_jwt(jwt_creds)->jwt_lifetime(),
|
|
|
|
token_lifetime) == 0);
|
|
|
|
GPR_ASSERT(strncmp(expected_creds_debug_string_prefix,
|
|
|
|
jwt_creds->debug_string().c_str(),
|
|
|
|
strlen(expected_creds_debug_string_prefix)) == 0);
|
|
|
|
grpc_call_credentials_release(jwt_creds);
|
|
|
|
|
|
|
|
// Cropped lifetime.
|
|
|
|
gpr_timespec add_to_max = {10, 0, GPR_TIMESPAN};
|
|
|
|
token_lifetime = gpr_time_add(grpc_max_auth_token_lifetime(), add_to_max);
|
|
|
|
jwt_creds = grpc_service_account_jwt_access_credentials_create(
|
|
|
|
json_key_string, token_lifetime, nullptr);
|
|
|
|
GPR_ASSERT(gpr_time_cmp(creds_as_jwt(jwt_creds)->jwt_lifetime(),
|
|
|
|
grpc_max_auth_token_lifetime()) == 0);
|
|
|
|
GPR_ASSERT(strncmp(expected_creds_debug_string_prefix,
|
|
|
|
jwt_creds->debug_string().c_str(),
|
|
|
|
strlen(expected_creds_debug_string_prefix)) == 0);
|
|
|
|
grpc_call_credentials_release(jwt_creds);
|
|
|
|
|
|
|
|
gpr_free(json_key_string);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestRemoveServiceFromJwtUri) {
|
|
|
|
const char wrong_uri[] = "hello world";
|
|
|
|
GPR_ASSERT(!RemoveServiceNameFromJwtUri(wrong_uri).ok());
|
|
|
|
const char valid_uri[] = "https://foo.com/get/";
|
|
|
|
const char expected_uri[] = "https://foo.com/";
|
|
|
|
auto output = RemoveServiceNameFromJwtUri(valid_uri);
|
|
|
|
GPR_ASSERT(output.ok());
|
|
|
|
GPR_ASSERT(strcmp(output->c_str(), expected_uri) == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestJwtCredsSuccess) {
|
|
|
|
const char expected_creds_debug_string_prefix[] =
|
|
|
|
"JWTAccessCredentials{ExpirationTime:";
|
|
|
|
|
|
|
|
char* json_key_string = test_json_key_str();
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
std::string expected_md_value = absl::StrCat("Bearer ", test_signed_jwt);
|
|
|
|
std::string emd = absl::StrCat("authorization: ", expected_md_value);
|
|
|
|
grpc_call_credentials* creds =
|
|
|
|
grpc_service_account_jwt_access_credentials_create(
|
|
|
|
json_key_string, grpc_max_auth_token_lifetime(), nullptr);
|
|
|
|
|
|
|
|
/* First request: jwt_encode_and_sign should be called. */
|
|
|
|
auto state = RequestMetadataState::NewInstance(GRPC_ERROR_NONE, emd);
|
|
|
|
grpc_jwt_encode_and_sign_set_override(encode_and_sign_jwt_success);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
|
|
|
|
/* Second request: the cached token should be served directly. */
|
|
|
|
state = RequestMetadataState::NewInstance(GRPC_ERROR_NONE, emd);
|
|
|
|
grpc_jwt_encode_and_sign_set_override(
|
|
|
|
encode_and_sign_jwt_should_not_be_called);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
|
|
|
|
/* Third request: Different service url so jwt_encode_and_sign should be
|
|
|
|
called again (no caching). */
|
|
|
|
state = RequestMetadataState::NewInstance(GRPC_ERROR_NONE, emd);
|
|
|
|
grpc_jwt_encode_and_sign_set_override(encode_and_sign_jwt_success);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestOtherAuthority,
|
|
|
|
kTestOtherPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
GPR_ASSERT(strncmp(expected_creds_debug_string_prefix,
|
|
|
|
creds->debug_string().c_str(),
|
|
|
|
strlen(expected_creds_debug_string_prefix)) == 0);
|
|
|
|
|
|
|
|
creds->Unref();
|
|
|
|
gpr_free(json_key_string);
|
|
|
|
grpc_jwt_encode_and_sign_set_override(nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestJwtCredsSigningFailure) {
|
|
|
|
const char expected_creds_debug_string_prefix[] =
|
|
|
|
"JWTAccessCredentials{ExpirationTime:";
|
|
|
|
char* json_key_string = test_json_key_str();
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_CREATE_FROM_STATIC_STRING("Could not generate JWT."), {});
|
|
|
|
grpc_call_credentials* creds =
|
|
|
|
grpc_service_account_jwt_access_credentials_create(
|
|
|
|
json_key_string, grpc_max_auth_token_lifetime(), nullptr);
|
|
|
|
|
|
|
|
grpc_jwt_encode_and_sign_set_override(encode_and_sign_jwt_failure);
|
|
|
|
state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
|
|
|
|
gpr_free(json_key_string);
|
|
|
|
GPR_ASSERT(strncmp(expected_creds_debug_string_prefix,
|
|
|
|
creds->debug_string().c_str(),
|
|
|
|
strlen(expected_creds_debug_string_prefix)) == 0);
|
|
|
|
|
|
|
|
creds->Unref();
|
|
|
|
grpc_jwt_encode_and_sign_set_override(nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
void set_google_default_creds_env_var_with_file_contents(
|
|
|
|
const char* file_prefix, const char* contents) {
|
|
|
|
size_t contents_len = strlen(contents);
|
|
|
|
char* creds_file_name;
|
|
|
|
FILE* creds_file = gpr_tmpfile(file_prefix, &creds_file_name);
|
|
|
|
GPR_ASSERT(creds_file_name != nullptr);
|
|
|
|
GPR_ASSERT(creds_file != nullptr);
|
|
|
|
GPR_ASSERT(fwrite(contents, 1, contents_len, creds_file) == contents_len);
|
|
|
|
fclose(creds_file);
|
|
|
|
gpr_setenv(GRPC_GOOGLE_CREDENTIALS_ENV_VAR, creds_file_name);
|
|
|
|
gpr_free(creds_file_name);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool test_gce_tenancy_checker(void) {
|
|
|
|
g_test_gce_tenancy_checker_called = true;
|
|
|
|
return g_test_is_on_gce;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string null_well_known_creds_path_getter(void) { return ""; }
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestGoogleDefaultCredsAuthKey) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_composite_channel_credentials* creds;
|
|
|
|
char* json_key = test_json_key_str();
|
|
|
|
grpc_flush_cached_google_default_credentials();
|
|
|
|
set_gce_tenancy_checker_for_testing(test_gce_tenancy_checker);
|
|
|
|
g_test_gce_tenancy_checker_called = false;
|
|
|
|
g_test_is_on_gce = true;
|
|
|
|
set_google_default_creds_env_var_with_file_contents(
|
|
|
|
"json_key_google_default_creds", json_key);
|
|
|
|
grpc_override_well_known_credentials_path_getter(
|
|
|
|
null_well_known_creds_path_getter);
|
|
|
|
gpr_free(json_key);
|
|
|
|
creds = reinterpret_cast<grpc_composite_channel_credentials*>(
|
|
|
|
grpc_google_default_credentials_create(nullptr));
|
|
|
|
auto* default_creds =
|
|
|
|
reinterpret_cast<const grpc_google_default_channel_credentials*>(
|
|
|
|
creds->inner_creds());
|
|
|
|
GPR_ASSERT(default_creds->ssl_creds() != nullptr);
|
|
|
|
auto* jwt =
|
|
|
|
reinterpret_cast<const grpc_service_account_jwt_access_credentials*>(
|
|
|
|
creds->call_creds());
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(jwt->key().client_id,
|
|
|
|
"777-abaslkan11hlb6nmim3bpspl31ud.apps.googleusercontent.com") ==
|
|
|
|
0);
|
|
|
|
GPR_ASSERT(g_test_gce_tenancy_checker_called == false);
|
|
|
|
creds->Unref();
|
|
|
|
gpr_setenv(GRPC_GOOGLE_CREDENTIALS_ENV_VAR, ""); /* Reset. */
|
|
|
|
grpc_override_well_known_credentials_path_getter(nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestGoogleDefaultCredsRefreshToken) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_composite_channel_credentials* creds;
|
|
|
|
grpc_flush_cached_google_default_credentials();
|
|
|
|
set_google_default_creds_env_var_with_file_contents(
|
|
|
|
"refresh_token_google_default_creds", test_refresh_token_str);
|
|
|
|
grpc_override_well_known_credentials_path_getter(
|
|
|
|
null_well_known_creds_path_getter);
|
|
|
|
creds = reinterpret_cast<grpc_composite_channel_credentials*>(
|
|
|
|
grpc_google_default_credentials_create(nullptr));
|
|
|
|
auto* default_creds =
|
|
|
|
reinterpret_cast<const grpc_google_default_channel_credentials*>(
|
|
|
|
creds->inner_creds());
|
|
|
|
GPR_ASSERT(default_creds->ssl_creds() != nullptr);
|
|
|
|
auto* refresh =
|
|
|
|
reinterpret_cast<const grpc_google_refresh_token_credentials*>(
|
|
|
|
creds->call_creds());
|
|
|
|
GPR_ASSERT(strcmp(refresh->refresh_token().client_id,
|
|
|
|
"32555999999.apps.googleusercontent.com") == 0);
|
|
|
|
creds->Unref();
|
|
|
|
gpr_setenv(GRPC_GOOGLE_CREDENTIALS_ENV_VAR, ""); /* Reset. */
|
|
|
|
grpc_override_well_known_credentials_path_getter(nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestGoogleDefaultCredsExternalAccountCredentials) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_composite_channel_credentials* creds;
|
|
|
|
grpc_flush_cached_google_default_credentials();
|
|
|
|
set_google_default_creds_env_var_with_file_contents(
|
|
|
|
"google_default_creds_external_account_credentials",
|
|
|
|
test_external_account_credentials_str);
|
|
|
|
grpc_override_well_known_credentials_path_getter(
|
|
|
|
null_well_known_creds_path_getter);
|
|
|
|
creds = reinterpret_cast<grpc_composite_channel_credentials*>(
|
|
|
|
grpc_google_default_credentials_create(nullptr));
|
|
|
|
auto* default_creds =
|
|
|
|
reinterpret_cast<const grpc_google_default_channel_credentials*>(
|
|
|
|
creds->inner_creds());
|
|
|
|
GPR_ASSERT(default_creds->ssl_creds() != nullptr);
|
|
|
|
auto* external =
|
|
|
|
reinterpret_cast<const ExternalAccountCredentials*>(creds->call_creds());
|
|
|
|
GPR_ASSERT(external != nullptr);
|
|
|
|
creds->Unref();
|
|
|
|
gpr_setenv(GRPC_GOOGLE_CREDENTIALS_ENV_VAR, ""); /* Reset. */
|
|
|
|
grpc_override_well_known_credentials_path_getter(nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestGoogleDefaultCredsExternalAccountCredentialsMultiPatternSts) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_composite_channel_credentials* creds;
|
|
|
|
grpc_flush_cached_google_default_credentials();
|
|
|
|
set_google_default_creds_env_var_with_file_contents(
|
|
|
|
"google_default_creds_external_account_credentials_multi_pattern_sts",
|
|
|
|
test_external_account_credentials_multi_pattern_sts_str);
|
|
|
|
grpc_override_well_known_credentials_path_getter(
|
|
|
|
null_well_known_creds_path_getter);
|
|
|
|
creds = reinterpret_cast<grpc_composite_channel_credentials*>(
|
|
|
|
grpc_google_default_credentials_create(nullptr));
|
|
|
|
auto* default_creds =
|
|
|
|
reinterpret_cast<const grpc_google_default_channel_credentials*>(
|
|
|
|
creds->inner_creds());
|
|
|
|
GPR_ASSERT(default_creds->ssl_creds() != nullptr);
|
|
|
|
auto* external =
|
|
|
|
reinterpret_cast<const ExternalAccountCredentials*>(creds->call_creds());
|
|
|
|
GPR_ASSERT(external != nullptr);
|
|
|
|
creds->Unref();
|
|
|
|
gpr_setenv(GRPC_GOOGLE_CREDENTIALS_ENV_VAR, ""); /* Reset. */
|
|
|
|
grpc_override_well_known_credentials_path_getter(nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestGoogleDefaultCredsExternalAccountCredentialsMultiPatternIam) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_composite_channel_credentials* creds;
|
|
|
|
grpc_flush_cached_google_default_credentials();
|
|
|
|
set_google_default_creds_env_var_with_file_contents(
|
|
|
|
"google_default_creds_external_account_credentials_multi_pattern_iam",
|
|
|
|
test_external_account_credentials_multi_pattern_iam_str);
|
|
|
|
grpc_override_well_known_credentials_path_getter(
|
|
|
|
null_well_known_creds_path_getter);
|
|
|
|
creds = reinterpret_cast<grpc_composite_channel_credentials*>(
|
|
|
|
grpc_google_default_credentials_create(nullptr));
|
|
|
|
auto* default_creds =
|
|
|
|
reinterpret_cast<const grpc_google_default_channel_credentials*>(
|
|
|
|
creds->inner_creds());
|
|
|
|
GPR_ASSERT(default_creds->ssl_creds() != nullptr);
|
|
|
|
auto* external =
|
|
|
|
reinterpret_cast<const ExternalAccountCredentials*>(creds->call_creds());
|
|
|
|
GPR_ASSERT(external != nullptr);
|
|
|
|
creds->Unref();
|
|
|
|
gpr_setenv(GRPC_GOOGLE_CREDENTIALS_ENV_VAR, ""); /* Reset. */
|
|
|
|
grpc_override_well_known_credentials_path_getter(nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
int default_creds_metadata_server_detection_httpcli_get_success_override(
|
|
|
|
const grpc_http_request* /*request*/, const char* host, const char* path,
|
|
|
|
Timestamp /*deadline*/, grpc_closure* on_done,
|
|
|
|
grpc_http_response* response) {
|
|
|
|
*response = http_response(200, "");
|
|
|
|
grpc_http_header* headers =
|
|
|
|
static_cast<grpc_http_header*>(gpr_malloc(sizeof(*headers) * 1));
|
|
|
|
headers[0].key = gpr_strdup("Metadata-Flavor");
|
|
|
|
headers[0].value = gpr_strdup("Google");
|
|
|
|
response->hdr_count = 1;
|
|
|
|
response->hdrs = headers;
|
|
|
|
GPR_ASSERT(strcmp(path, "/") == 0);
|
|
|
|
GPR_ASSERT(strcmp(host, "metadata.google.internal.") == 0);
|
|
|
|
ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestGoogleDefaultCredsGce) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE,
|
|
|
|
"authorization: Bearer ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_");
|
|
|
|
grpc_flush_cached_google_default_credentials();
|
|
|
|
gpr_setenv(GRPC_GOOGLE_CREDENTIALS_ENV_VAR, ""); /* Reset. */
|
|
|
|
grpc_override_well_known_credentials_path_getter(
|
|
|
|
null_well_known_creds_path_getter);
|
|
|
|
set_gce_tenancy_checker_for_testing(test_gce_tenancy_checker);
|
|
|
|
g_test_gce_tenancy_checker_called = false;
|
|
|
|
g_test_is_on_gce = true;
|
|
|
|
|
|
|
|
/* Simulate a successful detection of GCE. */
|
|
|
|
grpc_composite_channel_credentials* creds =
|
|
|
|
reinterpret_cast<grpc_composite_channel_credentials*>(
|
|
|
|
grpc_google_default_credentials_create(nullptr));
|
|
|
|
|
|
|
|
/* Verify that the default creds actually embeds a GCE creds. */
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(creds->call_creds() != nullptr);
|
|
|
|
HttpRequest::SetOverride(compute_engine_httpcli_get_success_override,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
state->RunRequestMetadataTest(creds->mutable_call_creds(), kTestUrlScheme,
|
|
|
|
kTestAuthority, kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
|
|
|
|
GPR_ASSERT(g_test_gce_tenancy_checker_called == true);
|
|
|
|
|
|
|
|
/* Cleanup. */
|
|
|
|
creds->Unref();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
grpc_override_well_known_credentials_path_getter(nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestGoogleDefaultCredsNonGce) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE,
|
|
|
|
"authorization: Bearer ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_");
|
|
|
|
grpc_flush_cached_google_default_credentials();
|
|
|
|
gpr_setenv(GRPC_GOOGLE_CREDENTIALS_ENV_VAR, ""); /* Reset. */
|
|
|
|
grpc_override_well_known_credentials_path_getter(
|
|
|
|
null_well_known_creds_path_getter);
|
|
|
|
set_gce_tenancy_checker_for_testing(test_gce_tenancy_checker);
|
|
|
|
g_test_gce_tenancy_checker_called = false;
|
|
|
|
g_test_is_on_gce = false;
|
|
|
|
/* Simulate a successful detection of metadata server. */
|
|
|
|
HttpRequest::SetOverride(
|
|
|
|
default_creds_metadata_server_detection_httpcli_get_success_override,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
grpc_composite_channel_credentials* creds =
|
|
|
|
reinterpret_cast<grpc_composite_channel_credentials*>(
|
|
|
|
grpc_google_default_credentials_create(nullptr));
|
|
|
|
/* Verify that the default creds actually embeds a GCE creds. */
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(creds->call_creds() != nullptr);
|
|
|
|
HttpRequest::SetOverride(compute_engine_httpcli_get_success_override,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
state->RunRequestMetadataTest(creds->mutable_call_creds(), kTestUrlScheme,
|
|
|
|
kTestAuthority, kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
GPR_ASSERT(g_test_gce_tenancy_checker_called == true);
|
|
|
|
/* Cleanup. */
|
|
|
|
creds->Unref();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
grpc_override_well_known_credentials_path_getter(nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
int default_creds_gce_detection_httpcli_get_failure_override(
|
|
|
|
const grpc_http_request* /*request*/, const char* host, const char* path,
|
|
|
|
Timestamp /*deadline*/, grpc_closure* on_done,
|
|
|
|
grpc_http_response* response) {
|
|
|
|
/* No magic header. */
|
|
|
|
GPR_ASSERT(strcmp(path, "/") == 0);
|
|
|
|
GPR_ASSERT(strcmp(host, "metadata.google.internal.") == 0);
|
|
|
|
*response = http_response(200, "");
|
|
|
|
ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestNoGoogleDefaultCreds) {
|
|
|
|
grpc_flush_cached_google_default_credentials();
|
|
|
|
gpr_setenv(GRPC_GOOGLE_CREDENTIALS_ENV_VAR, ""); /* Reset. */
|
|
|
|
grpc_override_well_known_credentials_path_getter(
|
|
|
|
null_well_known_creds_path_getter);
|
|
|
|
set_gce_tenancy_checker_for_testing(test_gce_tenancy_checker);
|
|
|
|
g_test_gce_tenancy_checker_called = false;
|
|
|
|
g_test_is_on_gce = false;
|
|
|
|
HttpRequest::SetOverride(
|
|
|
|
default_creds_gce_detection_httpcli_get_failure_override,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
/* Simulate a successful detection of GCE. */
|
|
|
|
GPR_ASSERT(grpc_google_default_credentials_create(nullptr) == nullptr);
|
|
|
|
/* Try a second one. GCE detection should occur again. */
|
|
|
|
g_test_gce_tenancy_checker_called = false;
|
|
|
|
GPR_ASSERT(grpc_google_default_credentials_create(nullptr) == nullptr);
|
|
|
|
GPR_ASSERT(g_test_gce_tenancy_checker_called == true);
|
|
|
|
/* Cleanup. */
|
|
|
|
grpc_override_well_known_credentials_path_getter(nullptr);
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestGoogleDefaultCredsCallCredsSpecified) {
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE,
|
|
|
|
"authorization: Bearer ya29.AHES6ZRN3-HlhAPya30GnW_bHSb_");
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_flush_cached_google_default_credentials();
|
|
|
|
grpc_call_credentials* call_creds =
|
|
|
|
grpc_google_compute_engine_credentials_create(nullptr);
|
|
|
|
set_gce_tenancy_checker_for_testing(test_gce_tenancy_checker);
|
|
|
|
g_test_gce_tenancy_checker_called = false;
|
|
|
|
g_test_is_on_gce = true;
|
|
|
|
HttpRequest::SetOverride(
|
|
|
|
default_creds_metadata_server_detection_httpcli_get_success_override,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
grpc_composite_channel_credentials* channel_creds =
|
|
|
|
reinterpret_cast<grpc_composite_channel_credentials*>(
|
|
|
|
grpc_google_default_credentials_create(call_creds));
|
|
|
|
GPR_ASSERT(g_test_gce_tenancy_checker_called == false);
|
|
|
|
GPR_ASSERT(channel_creds != nullptr);
|
|
|
|
GPR_ASSERT(channel_creds->call_creds() != nullptr);
|
|
|
|
HttpRequest::SetOverride(compute_engine_httpcli_get_success_override,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
state->RunRequestMetadataTest(channel_creds->mutable_call_creds(),
|
|
|
|
kTestUrlScheme, kTestAuthority, kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
channel_creds->Unref();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct fake_call_creds : public grpc_call_credentials {
|
|
|
|
public:
|
|
|
|
ArenaPromise<absl::StatusOr<ClientMetadataHandle>> GetRequestMetadata(
|
|
|
|
ClientMetadataHandle initial_metadata,
|
|
|
|
const grpc_call_credentials::GetRequestMetadataArgs*) override {
|
|
|
|
initial_metadata->Append("foo", Slice::FromStaticString("oof"),
|
|
|
|
[](absl::string_view, const Slice&) { abort(); });
|
|
|
|
return Immediate(std::move(initial_metadata));
|
|
|
|
}
|
|
|
|
|
|
|
|
const char* type() const override { return "fake"; }
|
|
|
|
|
|
|
|
private:
|
|
|
|
int cmp_impl(const grpc_call_credentials* other) const override {
|
|
|
|
// TODO(yashykt): Check if we can do something better here
|
|
|
|
return QsortCompare(static_cast<const grpc_call_credentials*>(this), other);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestGoogleDefaultCredsNotDefault) {
|
|
|
|
auto state = RequestMetadataState::NewInstance(GRPC_ERROR_NONE, "foo: oof");
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_flush_cached_google_default_credentials();
|
|
|
|
RefCountedPtr<grpc_call_credentials> call_creds =
|
|
|
|
MakeRefCounted<fake_call_creds>();
|
|
|
|
set_gce_tenancy_checker_for_testing(test_gce_tenancy_checker);
|
|
|
|
g_test_gce_tenancy_checker_called = false;
|
|
|
|
g_test_is_on_gce = true;
|
|
|
|
HttpRequest::SetOverride(
|
|
|
|
default_creds_metadata_server_detection_httpcli_get_success_override,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
grpc_composite_channel_credentials* channel_creds =
|
|
|
|
reinterpret_cast<grpc_composite_channel_credentials*>(
|
|
|
|
grpc_google_default_credentials_create(call_creds.release()));
|
|
|
|
GPR_ASSERT(g_test_gce_tenancy_checker_called == false);
|
|
|
|
GPR_ASSERT(channel_creds != nullptr);
|
|
|
|
GPR_ASSERT(channel_creds->call_creds() != nullptr);
|
|
|
|
state->RunRequestMetadataTest(channel_creds->mutable_call_creds(),
|
|
|
|
kTestUrlScheme, kTestAuthority, kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
channel_creds->Unref();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
typedef enum {
|
|
|
|
PLUGIN_INITIAL_STATE,
|
|
|
|
PLUGIN_GET_METADATA_CALLED_STATE,
|
|
|
|
PLUGIN_DESTROY_CALLED_STATE
|
|
|
|
} plugin_state;
|
|
|
|
|
|
|
|
const std::map<std::string, std::string> plugin_md = {{"foo", "bar"},
|
|
|
|
{"hi", "there"}};
|
|
|
|
|
|
|
|
int plugin_get_metadata_success(
|
|
|
|
void* state, grpc_auth_metadata_context context,
|
|
|
|
grpc_credentials_plugin_metadata_cb /*cb*/, void* /*user_data*/,
|
|
|
|
grpc_metadata creds_md[GRPC_METADATA_CREDENTIALS_PLUGIN_SYNC_MAX],
|
|
|
|
size_t* num_creds_md, grpc_status_code* /*status*/,
|
|
|
|
const char** /*error_details*/) {
|
|
|
|
GPR_ASSERT(strcmp(context.service_url, test_service_url) == 0);
|
|
|
|
GPR_ASSERT(strcmp(context.method_name, test_method) == 0);
|
|
|
|
GPR_ASSERT(context.channel_auth_context == nullptr);
|
|
|
|
GPR_ASSERT(context.reserved == nullptr);
|
|
|
|
GPR_ASSERT(plugin_md.size() < GRPC_METADATA_CREDENTIALS_PLUGIN_SYNC_MAX);
|
|
|
|
plugin_state* s = static_cast<plugin_state*>(state);
|
|
|
|
*s = PLUGIN_GET_METADATA_CALLED_STATE;
|
|
|
|
size_t i = 0;
|
|
|
|
for (auto const& md : plugin_md) {
|
|
|
|
memset(&creds_md[i], 0, sizeof(grpc_metadata));
|
|
|
|
creds_md[i].key = grpc_slice_from_copied_string(md.first.c_str());
|
|
|
|
creds_md[i].value = grpc_slice_from_copied_string(md.second.c_str());
|
|
|
|
i += 1;
|
|
|
|
}
|
|
|
|
*num_creds_md = plugin_md.size();
|
|
|
|
return true; // Synchronous return.
|
|
|
|
}
|
|
|
|
|
|
|
|
const char* plugin_error_details = "Could not get metadata for plugin.";
|
|
|
|
|
|
|
|
int plugin_get_metadata_failure(
|
|
|
|
void* state, grpc_auth_metadata_context context,
|
|
|
|
grpc_credentials_plugin_metadata_cb /*cb*/, void* /*user_data*/,
|
|
|
|
grpc_metadata /*creds_md*/[GRPC_METADATA_CREDENTIALS_PLUGIN_SYNC_MAX],
|
|
|
|
size_t* /*num_creds_md*/, grpc_status_code* status,
|
|
|
|
const char** error_details) {
|
|
|
|
GPR_ASSERT(strcmp(context.service_url, test_service_url) == 0);
|
|
|
|
GPR_ASSERT(strcmp(context.method_name, test_method) == 0);
|
|
|
|
GPR_ASSERT(context.channel_auth_context == nullptr);
|
|
|
|
GPR_ASSERT(context.reserved == nullptr);
|
|
|
|
plugin_state* s = static_cast<plugin_state*>(state);
|
|
|
|
*s = PLUGIN_GET_METADATA_CALLED_STATE;
|
|
|
|
*status = GRPC_STATUS_UNAUTHENTICATED;
|
|
|
|
*error_details = gpr_strdup(plugin_error_details);
|
|
|
|
return true; // Synchronous return.
|
|
|
|
}
|
|
|
|
|
|
|
|
void plugin_destroy(void* state) {
|
|
|
|
plugin_state* s = static_cast<plugin_state*>(state);
|
|
|
|
*s = PLUGIN_DESTROY_CALLED_STATE;
|
|
|
|
}
|
|
|
|
|
|
|
|
char* plugin_debug_string(void* state) {
|
|
|
|
plugin_state* s = static_cast<plugin_state*>(state);
|
|
|
|
char* ret = nullptr;
|
|
|
|
switch (*s) {
|
|
|
|
case PLUGIN_INITIAL_STATE:
|
|
|
|
gpr_asprintf(&ret, "TestPluginCredentials{state:INITIAL}");
|
|
|
|
break;
|
|
|
|
case PLUGIN_GET_METADATA_CALLED_STATE:
|
|
|
|
gpr_asprintf(&ret, "TestPluginCredentials{state:GET_METADATA_CALLED}");
|
|
|
|
break;
|
|
|
|
case PLUGIN_DESTROY_CALLED_STATE:
|
|
|
|
gpr_asprintf(&ret, "TestPluginCredentials{state:DESTROY}");
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
gpr_asprintf(&ret, "TestPluginCredentials{state:UNKNOWN}");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestMetadataPluginSuccess) {
|
|
|
|
const char expected_creds_debug_string[] =
|
|
|
|
"TestPluginCredentials{state:GET_METADATA_CALLED}";
|
|
|
|
plugin_state state = PLUGIN_INITIAL_STATE;
|
|
|
|
grpc_metadata_credentials_plugin plugin;
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
auto md_state =
|
|
|
|
RequestMetadataState::NewInstance(GRPC_ERROR_NONE, "foo: bar, hi: there");
|
|
|
|
|
|
|
|
plugin.state = &state;
|
|
|
|
plugin.get_metadata = plugin_get_metadata_success;
|
|
|
|
plugin.destroy = plugin_destroy;
|
|
|
|
plugin.debug_string = plugin_debug_string;
|
|
|
|
|
|
|
|
grpc_call_credentials* creds = grpc_metadata_credentials_create_from_plugin(
|
|
|
|
plugin, GRPC_PRIVACY_AND_INTEGRITY, nullptr);
|
|
|
|
/* Check security level. */
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
GPR_ASSERT(state == PLUGIN_INITIAL_STATE);
|
|
|
|
md_state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
GPR_ASSERT(state == PLUGIN_GET_METADATA_CALLED_STATE);
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(creds->debug_string().c_str(), expected_creds_debug_string) == 0);
|
|
|
|
creds->Unref();
|
|
|
|
|
|
|
|
GPR_ASSERT(state == PLUGIN_DESTROY_CALLED_STATE);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestMetadataPluginFailure) {
|
|
|
|
const char expected_creds_debug_string[] =
|
|
|
|
"TestPluginCredentials{state:GET_METADATA_CALLED}";
|
|
|
|
|
|
|
|
plugin_state state = PLUGIN_INITIAL_STATE;
|
|
|
|
grpc_metadata_credentials_plugin plugin;
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
auto md_state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_CREATE_FROM_CPP_STRING(
|
|
|
|
absl::StrCat("Getting metadata from plugin failed with error: ",
|
|
|
|
plugin_error_details)),
|
|
|
|
{});
|
|
|
|
|
|
|
|
plugin.state = &state;
|
|
|
|
plugin.get_metadata = plugin_get_metadata_failure;
|
|
|
|
plugin.destroy = plugin_destroy;
|
|
|
|
plugin.debug_string = plugin_debug_string;
|
|
|
|
|
|
|
|
grpc_call_credentials* creds = grpc_metadata_credentials_create_from_plugin(
|
|
|
|
plugin, GRPC_PRIVACY_AND_INTEGRITY, nullptr);
|
|
|
|
GPR_ASSERT(state == PLUGIN_INITIAL_STATE);
|
|
|
|
md_state->RunRequestMetadataTest(creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
GPR_ASSERT(state == PLUGIN_GET_METADATA_CALLED_STATE);
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(creds->debug_string().c_str(), expected_creds_debug_string) == 0);
|
|
|
|
creds->Unref();
|
|
|
|
|
|
|
|
GPR_ASSERT(state == PLUGIN_DESTROY_CALLED_STATE);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestGetWellKnownGoogleCredentialsFilePath) {
|
|
|
|
char* home = gpr_getenv("HOME");
|
|
|
|
bool restore_home_env = false;
|
|
|
|
#if defined(GRPC_BAZEL_BUILD) && \
|
|
|
|
(defined(GPR_POSIX_ENV) || defined(GPR_LINUX_ENV))
|
|
|
|
// when running under bazel locally, the HOME variable is not set
|
|
|
|
// so we set it to some fake value
|
|
|
|
restore_home_env = true;
|
|
|
|
gpr_setenv("HOME", "/fake/home/for/bazel");
|
|
|
|
#endif /* defined(GRPC_BAZEL_BUILD) && (defined(GPR_POSIX_ENV) || \
|
|
|
|
defined(GPR_LINUX_ENV)) */
|
|
|
|
std::string path = grpc_get_well_known_google_credentials_file_path();
|
|
|
|
GPR_ASSERT(!path.empty());
|
|
|
|
#if defined(GPR_POSIX_ENV) || defined(GPR_LINUX_ENV)
|
|
|
|
restore_home_env = true;
|
|
|
|
gpr_unsetenv("HOME");
|
|
|
|
path = grpc_get_well_known_google_credentials_file_path();
|
|
|
|
GPR_ASSERT(path.empty());
|
|
|
|
#endif /* GPR_POSIX_ENV || GPR_LINUX_ENV */
|
|
|
|
if (restore_home_env) {
|
|
|
|
if (home) {
|
|
|
|
gpr_setenv("HOME", home);
|
|
|
|
} else {
|
|
|
|
gpr_unsetenv("HOME");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
gpr_free(home);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestChannelCredsDuplicateWithoutCallCreds) {
|
|
|
|
const char expected_creds_debug_string[] =
|
|
|
|
"AccessTokenCredentials{Token:present}";
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
|
|
|
|
grpc_channel_credentials* channel_creds =
|
|
|
|
grpc_fake_transport_security_credentials_create();
|
|
|
|
|
|
|
|
RefCountedPtr<grpc_channel_credentials> dup =
|
|
|
|
channel_creds->duplicate_without_call_credentials();
|
|
|
|
GPR_ASSERT(dup == channel_creds);
|
|
|
|
dup.reset();
|
|
|
|
|
|
|
|
grpc_call_credentials* call_creds =
|
|
|
|
grpc_access_token_credentials_create("blah", nullptr);
|
|
|
|
grpc_channel_credentials* composite_creds =
|
|
|
|
grpc_composite_channel_credentials_create(channel_creds, call_creds,
|
|
|
|
nullptr);
|
|
|
|
GPR_ASSERT(strcmp(call_creds->debug_string().c_str(),
|
|
|
|
expected_creds_debug_string) == 0);
|
|
|
|
|
|
|
|
call_creds->Unref();
|
|
|
|
dup = composite_creds->duplicate_without_call_credentials();
|
|
|
|
GPR_ASSERT(dup == channel_creds);
|
|
|
|
dup.reset();
|
|
|
|
|
|
|
|
channel_creds->Unref();
|
|
|
|
composite_creds->Unref();
|
|
|
|
}
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
const char* url_scheme;
|
|
|
|
const char* call_host;
|
|
|
|
const char* call_method;
|
|
|
|
const char* desired_service_url;
|
|
|
|
const char* desired_method_name;
|
|
|
|
} auth_metadata_context_test_case;
|
|
|
|
|
|
|
|
void auth_metadata_context_build(const char* url_scheme,
|
|
|
|
const grpc_slice& call_host,
|
|
|
|
const grpc_slice& call_method,
|
|
|
|
grpc_auth_context* auth_context,
|
|
|
|
grpc_auth_metadata_context* auth_md_context) {
|
|
|
|
char* service = grpc_slice_to_c_string(call_method);
|
|
|
|
char* last_slash = strrchr(service, '/');
|
|
|
|
char* method_name = nullptr;
|
|
|
|
char* service_url = nullptr;
|
|
|
|
grpc_auth_metadata_context_reset(auth_md_context);
|
|
|
|
if (last_slash == nullptr) {
|
|
|
|
gpr_log(GPR_ERROR, "No '/' found in fully qualified method name");
|
|
|
|
service[0] = '\0';
|
|
|
|
method_name = gpr_strdup("");
|
|
|
|
} else if (last_slash == service) {
|
|
|
|
method_name = gpr_strdup("");
|
|
|
|
} else {
|
|
|
|
*last_slash = '\0';
|
|
|
|
method_name = gpr_strdup(last_slash + 1);
|
|
|
|
}
|
|
|
|
char* host_and_port = grpc_slice_to_c_string(call_host);
|
|
|
|
if (url_scheme != nullptr && strcmp(url_scheme, GRPC_SSL_URL_SCHEME) == 0) {
|
|
|
|
/* Remove the port if it is 443. */
|
|
|
|
char* port_delimiter = strrchr(host_and_port, ':');
|
|
|
|
if (port_delimiter != nullptr && strcmp(port_delimiter + 1, "443") == 0) {
|
|
|
|
*port_delimiter = '\0';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
gpr_asprintf(&service_url, "%s://%s%s",
|
|
|
|
url_scheme == nullptr ? "" : url_scheme, host_and_port, service);
|
|
|
|
auth_md_context->service_url = service_url;
|
|
|
|
auth_md_context->method_name = method_name;
|
|
|
|
auth_md_context->channel_auth_context =
|
|
|
|
auth_context == nullptr
|
|
|
|
? nullptr
|
|
|
|
: auth_context->Ref(DEBUG_LOCATION, "grpc_auth_metadata_context")
|
|
|
|
.release();
|
|
|
|
gpr_free(service);
|
|
|
|
gpr_free(host_and_port);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestAuthMetadataContext) {
|
|
|
|
auth_metadata_context_test_case test_cases[] = {
|
|
|
|
// No service nor method.
|
|
|
|
{"https", "www.foo.com", "", "https://www.foo.com", ""},
|
|
|
|
// No method.
|
|
|
|
{"https", "www.foo.com", "/Service", "https://www.foo.com/Service", ""},
|
|
|
|
// Empty service and method.
|
|
|
|
{"https", "www.foo.com", "//", "https://www.foo.com/", ""},
|
|
|
|
// Empty method.
|
|
|
|
{"https", "www.foo.com", "/Service/", "https://www.foo.com/Service", ""},
|
|
|
|
// Malformed url.
|
|
|
|
{"https", "www.foo.com:", "/Service/", "https://www.foo.com:/Service",
|
|
|
|
""},
|
|
|
|
// https, default explicit port.
|
|
|
|
{"https", "www.foo.com:443", "/Service/FooMethod",
|
|
|
|
"https://www.foo.com/Service", "FooMethod"},
|
|
|
|
// https, default implicit port.
|
|
|
|
{"https", "www.foo.com", "/Service/FooMethod",
|
|
|
|
"https://www.foo.com/Service", "FooMethod"},
|
|
|
|
// https with ipv6 literal, default explicit port.
|
|
|
|
{"https", "[1080:0:0:0:8:800:200C:417A]:443", "/Service/FooMethod",
|
|
|
|
"https://[1080:0:0:0:8:800:200C:417A]/Service", "FooMethod"},
|
|
|
|
// https with ipv6 literal, default implicit port.
|
|
|
|
{"https", "[1080:0:0:0:8:800:200C:443]", "/Service/FooMethod",
|
|
|
|
"https://[1080:0:0:0:8:800:200C:443]/Service", "FooMethod"},
|
|
|
|
// https, custom port.
|
|
|
|
{"https", "www.foo.com:8888", "/Service/FooMethod",
|
|
|
|
"https://www.foo.com:8888/Service", "FooMethod"},
|
|
|
|
// https with ipv6 literal, custom port.
|
|
|
|
{"https", "[1080:0:0:0:8:800:200C:417A]:8888", "/Service/FooMethod",
|
|
|
|
"https://[1080:0:0:0:8:800:200C:417A]:8888/Service", "FooMethod"},
|
|
|
|
// custom url scheme, https default port.
|
|
|
|
{"blah", "www.foo.com:443", "/Service/FooMethod",
|
|
|
|
"blah://www.foo.com:443/Service", "FooMethod"}};
|
|
|
|
for (uint32_t i = 0; i < GPR_ARRAY_SIZE(test_cases); i++) {
|
|
|
|
const char* url_scheme = test_cases[i].url_scheme;
|
|
|
|
grpc_slice call_host =
|
|
|
|
grpc_slice_from_copied_string(test_cases[i].call_host);
|
|
|
|
grpc_slice call_method =
|
|
|
|
grpc_slice_from_copied_string(test_cases[i].call_method);
|
|
|
|
grpc_auth_metadata_context auth_md_context;
|
|
|
|
memset(&auth_md_context, 0, sizeof(auth_md_context));
|
|
|
|
auth_metadata_context_build(url_scheme, call_host, call_method, nullptr,
|
|
|
|
&auth_md_context);
|
|
|
|
if (strcmp(auth_md_context.service_url,
|
|
|
|
test_cases[i].desired_service_url) != 0) {
|
|
|
|
gpr_log(GPR_ERROR, "Invalid service url, want: %s, got %s.",
|
|
|
|
test_cases[i].desired_service_url, auth_md_context.service_url);
|
|
|
|
GPR_ASSERT(false);
|
|
|
|
}
|
|
|
|
if (strcmp(auth_md_context.method_name,
|
|
|
|
test_cases[i].desired_method_name) != 0) {
|
|
|
|
gpr_log(GPR_ERROR, "Invalid method name, want: %s, got %s.",
|
|
|
|
test_cases[i].desired_method_name, auth_md_context.method_name);
|
|
|
|
GPR_ASSERT(false);
|
|
|
|
}
|
|
|
|
GPR_ASSERT(auth_md_context.channel_auth_context == nullptr);
|
|
|
|
grpc_slice_unref(call_host);
|
|
|
|
grpc_slice_unref(call_method);
|
|
|
|
grpc_auth_metadata_context_reset(&auth_md_context);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void validate_external_account_creds_token_exchage_request(
|
|
|
|
const grpc_http_request* request, const char* host, const char* path,
|
|
|
|
const char* body, size_t body_size, bool /*expect_actor_token*/) {
|
|
|
|
// Check that the body is constructed properly.
|
|
|
|
GPR_ASSERT(body != nullptr);
|
|
|
|
GPR_ASSERT(body_size != 0);
|
|
|
|
std::string get_url_equivalent =
|
|
|
|
absl::StrFormat("%s?%s", "https://foo.com:5555/token", body);
|
|
|
|
absl::StatusOr<URI> uri = URI::Parse(get_url_equivalent);
|
|
|
|
if (!uri.ok()) {
|
|
|
|
gpr_log(GPR_ERROR, "%s", uri.status().ToString().c_str());
|
|
|
|
GPR_ASSERT(uri.ok());
|
|
|
|
}
|
|
|
|
assert_query_parameters(*uri, "audience", "audience");
|
|
|
|
assert_query_parameters(*uri, "grant_type",
|
|
|
|
"urn:ietf:params:oauth:grant-type:token-exchange");
|
|
|
|
assert_query_parameters(*uri, "requested_token_type",
|
|
|
|
"urn:ietf:params:oauth:token-type:access_token");
|
|
|
|
assert_query_parameters(*uri, "subject_token", "test_subject_token");
|
|
|
|
assert_query_parameters(*uri, "subject_token_type", "subject_token_type");
|
|
|
|
assert_query_parameters(*uri, "scope",
|
|
|
|
"https://www.googleapis.com/auth/cloud-platform");
|
|
|
|
|
|
|
|
// Check the rest of the request.
|
|
|
|
GPR_ASSERT(strcmp(host, "foo.com:5555") == 0);
|
|
|
|
GPR_ASSERT(strcmp(path, "/token") == 0);
|
|
|
|
GPR_ASSERT(request->hdr_count == 2);
|
|
|
|
GPR_ASSERT(strcmp(request->hdrs[0].key, "Content-Type") == 0);
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(request->hdrs[0].value, "application/x-www-form-urlencoded") == 0);
|
|
|
|
GPR_ASSERT(strcmp(request->hdrs[1].key, "Authorization") == 0);
|
|
|
|
GPR_ASSERT(strcmp(request->hdrs[1].value,
|
|
|
|
"Basic Y2xpZW50X2lkOmNsaWVudF9zZWNyZXQ=") == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
void validate_external_account_creds_token_exchage_request_with_url_encode(
|
|
|
|
const grpc_http_request* request, const char* host, const char* path,
|
|
|
|
const char* body, size_t body_size, bool /*expect_actor_token*/) {
|
|
|
|
// Check that the body is constructed properly.
|
|
|
|
GPR_ASSERT(body != nullptr);
|
|
|
|
GPR_ASSERT(body_size != 0);
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(
|
|
|
|
std::string(body, body_size).c_str(),
|
|
|
|
"audience=audience_!%40%23%24&grant_type=urn%3Aietf%3Aparams%3Aoauth%"
|
|
|
|
"3Agrant-type%3Atoken-exchange&requested_token_type=urn%3Aietf%"
|
|
|
|
"3Aparams%3Aoauth%3Atoken-type%3Aaccess_token&subject_token_type="
|
|
|
|
"subject_token_type_!%40%23%24&subject_token=test_subject_token&"
|
|
|
|
"scope=https%3A%2F%2Fwww.googleapis.com%2Fauth%2Fcloud-platform&"
|
|
|
|
"options=%7B%7D") == 0);
|
|
|
|
|
|
|
|
// Check the rest of the request.
|
|
|
|
GPR_ASSERT(strcmp(host, "foo.com:5555") == 0);
|
|
|
|
GPR_ASSERT(strcmp(path, "/token_url_encode") == 0);
|
|
|
|
GPR_ASSERT(request->hdr_count == 2);
|
|
|
|
GPR_ASSERT(strcmp(request->hdrs[0].key, "Content-Type") == 0);
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(request->hdrs[0].value, "application/x-www-form-urlencoded") == 0);
|
|
|
|
GPR_ASSERT(strcmp(request->hdrs[1].key, "Authorization") == 0);
|
|
|
|
GPR_ASSERT(strcmp(request->hdrs[1].value,
|
|
|
|
"Basic Y2xpZW50X2lkOmNsaWVudF9zZWNyZXQ=") == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
void validate_external_account_creds_service_account_impersonation_request(
|
|
|
|
const grpc_http_request* request, const char* host, const char* path,
|
|
|
|
const char* body, size_t body_size, bool /*expect_actor_token*/) {
|
|
|
|
// Check that the body is constructed properly.
|
|
|
|
GPR_ASSERT(body != nullptr);
|
|
|
|
GPR_ASSERT(body_size != 0);
|
|
|
|
GPR_ASSERT(strcmp(body, "scope=scope_1 scope_2") == 0);
|
|
|
|
// Check the rest of the request.
|
|
|
|
GPR_ASSERT(strcmp(host, "foo.com:5555") == 0);
|
|
|
|
GPR_ASSERT(strcmp(path, "/service_account_impersonation") == 0);
|
|
|
|
GPR_ASSERT(request->hdr_count == 2);
|
|
|
|
GPR_ASSERT(strcmp(request->hdrs[0].key, "Content-Type") == 0);
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(request->hdrs[0].value, "application/x-www-form-urlencoded") == 0);
|
|
|
|
GPR_ASSERT(strcmp(request->hdrs[1].key, "Authorization") == 0);
|
|
|
|
GPR_ASSERT(strcmp(request->hdrs[1].value,
|
|
|
|
"Bearer token_exchange_access_token") == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int external_account_creds_httpcli_post_success(
|
|
|
|
const grpc_http_request* request, const char* host, const char* path,
|
|
|
|
const char* body, size_t body_size, Timestamp /*deadline*/,
|
|
|
|
grpc_closure* on_done, grpc_http_response* response) {
|
|
|
|
if (strcmp(path, "/token") == 0) {
|
|
|
|
validate_external_account_creds_token_exchage_request(
|
|
|
|
request, host, path, body, body_size, true);
|
|
|
|
*response = http_response(
|
|
|
|
200, valid_external_account_creds_token_exchange_response);
|
|
|
|
} else if (strcmp(path, "/service_account_impersonation") == 0) {
|
|
|
|
validate_external_account_creds_service_account_impersonation_request(
|
|
|
|
request, host, path, body, body_size, true);
|
|
|
|
*response = http_response(
|
|
|
|
200,
|
|
|
|
valid_external_account_creds_service_account_impersonation_response);
|
|
|
|
} else if (strcmp(path, "/token_url_encode") == 0) {
|
|
|
|
validate_external_account_creds_token_exchage_request_with_url_encode(
|
|
|
|
request, host, path, body, body_size, true);
|
|
|
|
*response = http_response(
|
|
|
|
200, valid_external_account_creds_token_exchange_response);
|
|
|
|
}
|
|
|
|
ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int external_account_creds_httpcli_post_failure_token_exchange_response_missing_access_token(
|
|
|
|
const grpc_http_request* /*request*/, const char* /*host*/,
|
|
|
|
const char* path, const char* /*body*/, size_t /*body_size*/,
|
|
|
|
Timestamp /*deadline*/, grpc_closure* on_done,
|
|
|
|
grpc_http_response* response) {
|
|
|
|
if (strcmp(path, "/token") == 0) {
|
|
|
|
*response = http_response(200,
|
|
|
|
"{\"not_access_token\":\"not_access_token\","
|
|
|
|
"\"expires_in\":3599,"
|
|
|
|
" \"token_type\":\"Bearer\"}");
|
|
|
|
} else if (strcmp(path, "/service_account_impersonation") == 0) {
|
|
|
|
*response = http_response(
|
|
|
|
200,
|
|
|
|
valid_external_account_creds_service_account_impersonation_response);
|
|
|
|
}
|
|
|
|
ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int url_external_account_creds_httpcli_get_success(
|
|
|
|
const grpc_http_request* /*request*/, const char* /*host*/,
|
|
|
|
const char* path, Timestamp /*deadline*/, grpc_closure* on_done,
|
|
|
|
grpc_http_response* response) {
|
|
|
|
if (strcmp(path, "/generate_subject_token_format_text") == 0) {
|
|
|
|
*response = http_response(
|
|
|
|
200,
|
|
|
|
valid_url_external_account_creds_retrieve_subject_token_response_format_text);
|
|
|
|
} else if (strcmp(path, "/path/to/url/creds?p1=v1&p2=v2") == 0) {
|
|
|
|
*response = http_response(
|
|
|
|
200,
|
|
|
|
valid_url_external_account_creds_retrieve_subject_token_response_format_text);
|
|
|
|
} else if (strcmp(path, "/generate_subject_token_format_json") == 0) {
|
|
|
|
*response = http_response(
|
|
|
|
200,
|
|
|
|
valid_url_external_account_creds_retrieve_subject_token_response_format_json);
|
|
|
|
}
|
|
|
|
ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
void validate_aws_external_account_creds_token_exchage_request(
|
|
|
|
const grpc_http_request* request, const char* host, const char* path,
|
|
|
|
const char* body, size_t body_size, bool /*expect_actor_token*/) {
|
|
|
|
// Check that the body is constructed properly.
|
|
|
|
GPR_ASSERT(body != nullptr);
|
|
|
|
GPR_ASSERT(body_size != 0);
|
|
|
|
// Check that the regional_cred_verification_url got constructed
|
|
|
|
// with the correct AWS Region ("test_regionz" or "test_region").
|
|
|
|
GPR_ASSERT(strstr(body, "regional_cred_verification_url_test_region"));
|
|
|
|
std::string get_url_equivalent =
|
|
|
|
absl::StrFormat("%s?%s", "https://foo.com:5555/token", body);
|
|
|
|
absl::StatusOr<URI> uri = URI::Parse(get_url_equivalent);
|
|
|
|
GPR_ASSERT(uri.ok());
|
|
|
|
assert_query_parameters(*uri, "audience", "audience");
|
|
|
|
assert_query_parameters(*uri, "grant_type",
|
|
|
|
"urn:ietf:params:oauth:grant-type:token-exchange");
|
|
|
|
assert_query_parameters(*uri, "requested_token_type",
|
|
|
|
"urn:ietf:params:oauth:token-type:access_token");
|
|
|
|
assert_query_parameters(*uri, "subject_token_type", "subject_token_type");
|
|
|
|
assert_query_parameters(*uri, "scope",
|
|
|
|
"https://www.googleapis.com/auth/cloud-platform");
|
|
|
|
// Check the rest of the request.
|
|
|
|
GPR_ASSERT(strcmp(host, "foo.com:5555") == 0);
|
|
|
|
GPR_ASSERT(strcmp(path, "/token") == 0);
|
|
|
|
GPR_ASSERT(request->hdr_count == 2);
|
|
|
|
GPR_ASSERT(strcmp(request->hdrs[0].key, "Content-Type") == 0);
|
|
|
|
GPR_ASSERT(
|
|
|
|
strcmp(request->hdrs[0].value, "application/x-www-form-urlencoded") == 0);
|
|
|
|
GPR_ASSERT(strcmp(request->hdrs[1].key, "Authorization") == 0);
|
|
|
|
GPR_ASSERT(strcmp(request->hdrs[1].value,
|
|
|
|
"Basic Y2xpZW50X2lkOmNsaWVudF9zZWNyZXQ=") == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int aws_external_account_creds_httpcli_get_success(
|
|
|
|
const grpc_http_request* /*request*/, const char* /*host*/,
|
|
|
|
const char* path, Timestamp /*deadline*/, grpc_closure* on_done,
|
|
|
|
grpc_http_response* response) {
|
|
|
|
if (strcmp(path, "/region_url") == 0) {
|
|
|
|
*response = http_response(200, "test_regionz");
|
|
|
|
} else if (strcmp(path, "/url") == 0) {
|
|
|
|
*response = http_response(200, "test_role_name");
|
|
|
|
} else if (strcmp(path, "/url_no_role_name") == 0) {
|
|
|
|
*response = http_response(200, "");
|
|
|
|
} else if (strcmp(path, "/url/test_role_name") == 0) {
|
|
|
|
*response = http_response(
|
|
|
|
200, valid_aws_external_account_creds_retrieve_signing_keys_response);
|
|
|
|
}
|
|
|
|
ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int aws_external_account_creds_httpcli_post_success(
|
|
|
|
const grpc_http_request* request, const char* host, const char* path,
|
|
|
|
const char* body, size_t body_size, Timestamp /*deadline*/,
|
|
|
|
grpc_closure* on_done, grpc_http_response* response) {
|
|
|
|
if (strcmp(path, "/token") == 0) {
|
|
|
|
validate_aws_external_account_creds_token_exchage_request(
|
|
|
|
request, host, path, body, body_size, true);
|
|
|
|
*response = http_response(
|
|
|
|
200, valid_external_account_creds_token_exchange_response);
|
|
|
|
}
|
|
|
|
ExecCtx::Run(DEBUG_LOCATION, on_done, GRPC_ERROR_NONE);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
// The subclass of ExternalAccountCredentials for testing.
|
|
|
|
// ExternalAccountCredentials is an abstract class so we can't directly test
|
|
|
|
// against it.
|
|
|
|
class TestExternalAccountCredentials final : public ExternalAccountCredentials {
|
|
|
|
public:
|
|
|
|
TestExternalAccountCredentials(Options options,
|
|
|
|
std::vector<std::string> scopes)
|
|
|
|
: ExternalAccountCredentials(std::move(options), std::move(scopes)) {}
|
|
|
|
|
|
|
|
protected:
|
|
|
|
void RetrieveSubjectToken(
|
|
|
|
HTTPRequestContext* /*ctx*/, const Options& /*options*/,
|
|
|
|
std::function<void(std::string, grpc_error_handle)> cb) override {
|
|
|
|
cb("test_subject_token", GRPC_ERROR_NONE);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestExternalAccountCredsSuccess) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
Json credential_source("");
|
|
|
|
TestExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
TestExternalAccountCredentials creds(options, {});
|
|
|
|
/* Check security level. */
|
|
|
|
GPR_ASSERT(creds.min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
/* First request: http put should be called. */
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE, "authorization: Bearer token_exchange_access_token");
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(&creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
/* Second request: the cached token should be served directly. */
|
|
|
|
state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE, "authorization: Bearer token_exchange_access_token");
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
state->RunRequestMetadataTest(&creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestExternalAccountCredsSuccessWithUrlEncode) {
|
|
|
|
std::map<std::string, std::string> emd = {
|
|
|
|
{"authorization", "Bearer token_exchange_access_token"}};
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
Json credential_source("");
|
|
|
|
TestExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience_!@#$", // audience;
|
|
|
|
"subject_token_type_!@#$", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token_url_encode", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
TestExternalAccountCredentials creds(options, {});
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE, "authorization: Bearer token_exchange_access_token");
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(&creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestExternalAccountCredsSuccessWithServiceAccountImpersonation) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
Json credential_source("");
|
|
|
|
TestExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"https://foo.com:5555/service_account_impersonation", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
TestExternalAccountCredentials creds(options, {"scope_1", "scope_2"});
|
|
|
|
/* Check security level. */
|
|
|
|
GPR_ASSERT(creds.min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
/* First request: http put should be called. */
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE,
|
|
|
|
"authorization: Bearer service_account_impersonation_access_token");
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(&creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestExternalAccountCredsFailureInvalidTokenUrl) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
Json credential_source("");
|
|
|
|
TestExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"https://foo.com:5555/service_account_impersonation", // service_account_impersonation_url;
|
|
|
|
"invalid_token_url", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
TestExternalAccountCredentials creds(options, {});
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
grpc_error_handle error = GRPC_ERROR_CREATE_FROM_STATIC_STRING(
|
|
|
|
"Invalid token url: invalid_token_url.");
|
|
|
|
grpc_error_handle expected_error =
|
|
|
|
GRPC_ERROR_CREATE_REFERENCING_FROM_STATIC_STRING(
|
|
|
|
"Error occurred when fetching oauth2 token.", &error, 1);
|
|
|
|
auto state = RequestMetadataState::NewInstance(expected_error, {});
|
|
|
|
state->RunRequestMetadataTest(&creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
GRPC_ERROR_UNREF(error);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestExternalAccountCredsFailureInvalidServiceAccountImpersonationUrl) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
Json credential_source("");
|
|
|
|
TestExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"invalid_service_account_impersonation_url", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
TestExternalAccountCredentials creds(options, {});
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
external_account_creds_httpcli_post_success);
|
|
|
|
grpc_error_handle error = GRPC_ERROR_CREATE_FROM_STATIC_STRING(
|
|
|
|
"Invalid service account impersonation url: "
|
|
|
|
"invalid_service_account_impersonation_url.");
|
|
|
|
grpc_error_handle expected_error =
|
|
|
|
GRPC_ERROR_CREATE_REFERENCING_FROM_STATIC_STRING(
|
|
|
|
"Error occurred when fetching oauth2 token.", &error, 1);
|
|
|
|
auto state = RequestMetadataState::NewInstance(expected_error, {});
|
|
|
|
state->RunRequestMetadataTest(&creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
GRPC_ERROR_UNREF(error);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestExternalAccountCredsFailureTokenExchangeResponseMissingAccessToken) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
Json credential_source("");
|
|
|
|
TestExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"https://foo.com:5555/service_account_impersonation", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
TestExternalAccountCredentials creds(options, {});
|
|
|
|
HttpRequest::SetOverride(
|
|
|
|
httpcli_get_should_not_be_called,
|
|
|
|
external_account_creds_httpcli_post_failure_token_exchange_response_missing_access_token);
|
|
|
|
grpc_error_handle error = GRPC_ERROR_CREATE_FROM_STATIC_STRING(
|
|
|
|
"Missing or invalid access_token in "
|
|
|
|
"{\"not_access_token\":\"not_access_token\",\"expires_in\":3599,\"token_"
|
|
|
|
"type\":\"Bearer\"}.");
|
|
|
|
grpc_error_handle expected_error =
|
|
|
|
GRPC_ERROR_CREATE_REFERENCING_FROM_STATIC_STRING(
|
|
|
|
"Error occurred when fetching oauth2 token.", &error, 1);
|
|
|
|
auto state = RequestMetadataState::NewInstance(expected_error, {});
|
|
|
|
state->RunRequestMetadataTest(&creds, kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
GRPC_ERROR_UNREF(error);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestUrlExternalAccountCredsSuccessFormatText) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
valid_url_external_account_creds_options_credential_source_format_text,
|
|
|
|
&error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = UrlExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE, "authorization: Bearer token_exchange_access_token");
|
|
|
|
HttpRequest::SetOverride(url_external_account_creds_httpcli_get_success,
|
|
|
|
external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestUrlExternalAccountCredsSuccessWithQureyParamsFormatText) {
|
|
|
|
std::map<std::string, std::string> emd = {
|
|
|
|
{"authorization", "Bearer token_exchange_access_token"}};
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
valid_url_external_account_creds_options_credential_source_with_qurey_params_format_text,
|
|
|
|
&error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = UrlExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE, "authorization: Bearer token_exchange_access_token");
|
|
|
|
HttpRequest::SetOverride(url_external_account_creds_httpcli_get_success,
|
|
|
|
external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestUrlExternalAccountCredsSuccessFormatJson) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
valid_url_external_account_creds_options_credential_source_format_json,
|
|
|
|
&error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = UrlExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE, "authorization: Bearer token_exchange_access_token");
|
|
|
|
HttpRequest::SetOverride(url_external_account_creds_httpcli_get_success,
|
|
|
|
external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestUrlExternalAccountCredsFailureInvalidCredentialSourceUrl) {
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
invalid_url_external_account_creds_options_credential_source, &error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = UrlExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds == nullptr);
|
|
|
|
std::string actual_error;
|
|
|
|
GPR_ASSERT(
|
|
|
|
grpc_error_get_str(error, GRPC_ERROR_STR_DESCRIPTION, &actual_error));
|
|
|
|
GPR_ASSERT(absl::StartsWith(actual_error, "Invalid credential source url."));
|
|
|
|
GRPC_ERROR_UNREF(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestFileExternalAccountCredsSuccessFormatText) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
char* subject_token_path = write_tmp_jwt_file("test_subject_token");
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
absl::StrFormat(
|
|
|
|
"{\"file\":\"%s\"}",
|
|
|
|
absl::StrReplaceAll(subject_token_path, {{"\\", "\\\\"}})),
|
|
|
|
&error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = FileExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE, "authorization: Bearer token_exchange_access_token");
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
GRPC_ERROR_UNREF(error);
|
|
|
|
gpr_free(subject_token_path);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestFileExternalAccountCredsSuccessFormatJson) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
char* subject_token_path =
|
|
|
|
write_tmp_jwt_file("{\"access_token\":\"test_subject_token\"}");
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
absl::StrFormat(
|
|
|
|
"{\n"
|
|
|
|
"\"file\":\"%s\",\n"
|
|
|
|
"\"format\":\n"
|
|
|
|
"{\n"
|
|
|
|
"\"type\":\"json\",\n"
|
|
|
|
"\"subject_token_field_name\":\"access_token\"\n"
|
|
|
|
"}\n"
|
|
|
|
"}",
|
|
|
|
absl::StrReplaceAll(subject_token_path, {{"\\", "\\\\"}})),
|
|
|
|
&error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = FileExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE, "authorization: Bearer token_exchange_access_token");
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
GRPC_ERROR_UNREF(error);
|
|
|
|
gpr_free(subject_token_path);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestFileExternalAccountCredsFailureFileNotFound) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source =
|
|
|
|
Json::Parse("{\"file\":\"non_exisiting_file\"}", &error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = FileExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
error = GRPC_ERROR_CREATE_FROM_STATIC_STRING("Failed to load file");
|
|
|
|
grpc_error_handle expected_error =
|
|
|
|
GRPC_ERROR_CREATE_REFERENCING_FROM_STATIC_STRING(
|
|
|
|
"Error occurred when fetching oauth2 token.", &error, 1);
|
|
|
|
auto state = RequestMetadataState::NewInstance(expected_error, {});
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
GRPC_ERROR_UNREF(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestFileExternalAccountCredsFailureInvalidJsonContent) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
char* subject_token_path = write_tmp_jwt_file("not_a_valid_json_file");
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
absl::StrFormat(
|
|
|
|
"{\n"
|
|
|
|
"\"file\":\"%s\",\n"
|
|
|
|
"\"format\":\n"
|
|
|
|
"{\n"
|
|
|
|
"\"type\":\"json\",\n"
|
|
|
|
"\"subject_token_field_name\":\"access_token\"\n"
|
|
|
|
"}\n"
|
|
|
|
"}",
|
|
|
|
absl::StrReplaceAll(subject_token_path, {{"\\", "\\\\"}})),
|
|
|
|
&error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = FileExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
HttpRequest::SetOverride(httpcli_get_should_not_be_called,
|
|
|
|
httpcli_post_should_not_be_called);
|
|
|
|
error = GRPC_ERROR_CREATE_FROM_STATIC_STRING(
|
|
|
|
"The content of the file is not a valid json object.");
|
|
|
|
grpc_error_handle expected_error =
|
|
|
|
GRPC_ERROR_CREATE_REFERENCING_FROM_STATIC_STRING(
|
|
|
|
"Error occurred when fetching oauth2 token.", &error, 1);
|
|
|
|
auto state = RequestMetadataState::NewInstance(expected_error, {});
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
GRPC_ERROR_UNREF(error);
|
|
|
|
gpr_free(subject_token_path);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestAwsExternalAccountCredsSuccess) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
valid_aws_external_account_creds_options_credential_source, &error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = AwsExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE, "authorization: Bearer token_exchange_access_token");
|
|
|
|
HttpRequest::SetOverride(aws_external_account_creds_httpcli_get_success,
|
|
|
|
aws_external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestAwsExternalAccountCredsSuccessPathRegionEnvKeysUrl) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
gpr_setenv("AWS_REGION", "test_regionz");
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
valid_aws_external_account_creds_options_credential_source, &error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = AwsExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE, "authorization: Bearer token_exchange_access_token");
|
|
|
|
HttpRequest::SetOverride(aws_external_account_creds_httpcli_get_success,
|
|
|
|
aws_external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
gpr_unsetenv("AWS_REGION");
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestAwsExternalAccountCredsSuccessPathDefaultRegionEnvKeysUrl) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
gpr_setenv("AWS_DEFAULT_REGION", "test_regionz");
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
valid_aws_external_account_creds_options_credential_source, &error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = AwsExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE, "authorization: Bearer token_exchange_access_token");
|
|
|
|
HttpRequest::SetOverride(aws_external_account_creds_httpcli_get_success,
|
|
|
|
aws_external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
gpr_unsetenv("AWS_DEFAULT_REGION");
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestAwsExternalAccountCredsSuccessPathDuplicateRegionEnvKeysUrl) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
// Make sure that AWS_REGION gets used over AWS_DEFAULT_REGION
|
|
|
|
gpr_setenv("AWS_REGION", "test_regionz");
|
|
|
|
gpr_setenv("AWS_DEFAULT_REGION", "ERROR_REGION");
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
valid_aws_external_account_creds_options_credential_source, &error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = AwsExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE, "authorization: Bearer token_exchange_access_token");
|
|
|
|
HttpRequest::SetOverride(aws_external_account_creds_httpcli_get_success,
|
|
|
|
aws_external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
gpr_unsetenv("AWS_REGION");
|
|
|
|
gpr_unsetenv("AWS_DEFAULT_REGION");
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestAwsExternalAccountCredsSuccessPathRegionUrlKeysEnv) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
gpr_setenv("AWS_ACCESS_KEY_ID", "test_access_key_id");
|
|
|
|
gpr_setenv("AWS_SECRET_ACCESS_KEY", "test_secret_access_key");
|
|
|
|
gpr_setenv("AWS_SESSION_TOKEN", "test_token");
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
valid_aws_external_account_creds_options_credential_source, &error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = AwsExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE, "authorization: Bearer token_exchange_access_token");
|
|
|
|
HttpRequest::SetOverride(aws_external_account_creds_httpcli_get_success,
|
|
|
|
aws_external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
gpr_unsetenv("AWS_ACCESS_KEY_ID");
|
|
|
|
gpr_unsetenv("AWS_SECRET_ACCESS_KEY");
|
|
|
|
gpr_unsetenv("AWS_SESSION_TOKEN");
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestAwsExternalAccountCredsSuccessPathRegionEnvKeysEnv) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
gpr_setenv("AWS_REGION", "test_regionz");
|
|
|
|
gpr_setenv("AWS_ACCESS_KEY_ID", "test_access_key_id");
|
|
|
|
gpr_setenv("AWS_SECRET_ACCESS_KEY", "test_secret_access_key");
|
|
|
|
gpr_setenv("AWS_SESSION_TOKEN", "test_token");
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
valid_aws_external_account_creds_options_credential_source, &error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = AwsExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE, "authorization: Bearer token_exchange_access_token");
|
|
|
|
HttpRequest::SetOverride(aws_external_account_creds_httpcli_get_success,
|
|
|
|
aws_external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
gpr_unsetenv("AWS_REGION");
|
|
|
|
gpr_unsetenv("AWS_ACCESS_KEY_ID");
|
|
|
|
gpr_unsetenv("AWS_SECRET_ACCESS_KEY");
|
|
|
|
gpr_unsetenv("AWS_SESSION_TOKEN");
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestAwsExternalAccountCredsSuccessPathDefaultRegionEnvKeysEnv) {
|
|
|
|
std::map<std::string, std::string> emd = {
|
|
|
|
{"authorization", "Bearer token_exchange_access_token"}};
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
gpr_setenv("AWS_DEFAULT_REGION", "test_regionz");
|
|
|
|
gpr_setenv("AWS_ACCESS_KEY_ID", "test_access_key_id");
|
|
|
|
gpr_setenv("AWS_SECRET_ACCESS_KEY", "test_secret_access_key");
|
|
|
|
gpr_setenv("AWS_SESSION_TOKEN", "test_token");
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
valid_aws_external_account_creds_options_credential_source, &error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = AwsExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE, "authorization: Bearer token_exchange_access_token");
|
|
|
|
HttpRequest::SetOverride(aws_external_account_creds_httpcli_get_success,
|
|
|
|
aws_external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
gpr_unsetenv("AWS_DEFAULT_REGION");
|
|
|
|
gpr_unsetenv("AWS_ACCESS_KEY_ID");
|
|
|
|
gpr_unsetenv("AWS_SECRET_ACCESS_KEY");
|
|
|
|
gpr_unsetenv("AWS_SESSION_TOKEN");
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestAwsExternalAccountCredsSuccessPathDuplicateRegionEnvKeysEnv) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
// Make sure that AWS_REGION gets used over AWS_DEFAULT_REGION
|
|
|
|
gpr_setenv("AWS_REGION", "test_regionz");
|
|
|
|
gpr_setenv("AWS_DEFAULT_REGION", "ERROR_REGION");
|
|
|
|
gpr_setenv("AWS_ACCESS_KEY_ID", "test_access_key_id");
|
|
|
|
gpr_setenv("AWS_SECRET_ACCESS_KEY", "test_secret_access_key");
|
|
|
|
gpr_setenv("AWS_SESSION_TOKEN", "test_token");
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
valid_aws_external_account_creds_options_credential_source, &error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = AwsExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
auto state = RequestMetadataState::NewInstance(
|
|
|
|
GRPC_ERROR_NONE, "authorization: Bearer token_exchange_access_token");
|
|
|
|
HttpRequest::SetOverride(aws_external_account_creds_httpcli_get_success,
|
|
|
|
aws_external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
gpr_unsetenv("AWS_REGION");
|
|
|
|
gpr_unsetenv("AWS_DEFAULT_REGION");
|
|
|
|
gpr_unsetenv("AWS_ACCESS_KEY_ID");
|
|
|
|
gpr_unsetenv("AWS_SECRET_ACCESS_KEY");
|
|
|
|
gpr_unsetenv("AWS_SESSION_TOKEN");
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestAwsExternalAccountCredsFailureUnmatchedEnvironmentId) {
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
invalid_aws_external_account_creds_options_credential_source_unmatched_environment_id,
|
|
|
|
&error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = AwsExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds == nullptr);
|
|
|
|
std::string expected_error = "environment_id does not match.";
|
|
|
|
std::string actual_error;
|
|
|
|
GPR_ASSERT(
|
|
|
|
grpc_error_get_str(error, GRPC_ERROR_STR_DESCRIPTION, &actual_error));
|
|
|
|
GPR_ASSERT(expected_error == actual_error);
|
|
|
|
GRPC_ERROR_UNREF(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestAwsExternalAccountCredsFailureInvalidRegionUrl) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
invalid_aws_external_account_creds_options_credential_source_invalid_region_url,
|
|
|
|
&error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = AwsExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
error = GRPC_ERROR_CREATE_FROM_STATIC_STRING(
|
|
|
|
"Invalid region url: invalid_region_url.");
|
|
|
|
grpc_error_handle expected_error =
|
|
|
|
GRPC_ERROR_CREATE_REFERENCING_FROM_STATIC_STRING(
|
|
|
|
"Error occurred when fetching oauth2 token.", &error, 1);
|
|
|
|
auto state = RequestMetadataState::NewInstance(expected_error, {});
|
|
|
|
HttpRequest::SetOverride(aws_external_account_creds_httpcli_get_success,
|
|
|
|
aws_external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
GRPC_ERROR_UNREF(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestAwsExternalAccountCredsFailureInvalidUrl) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
invalid_aws_external_account_creds_options_credential_source_invalid_url,
|
|
|
|
&error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = AwsExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
error = GRPC_ERROR_CREATE_FROM_STATIC_STRING("Invalid url: invalid_url.");
|
|
|
|
grpc_error_handle expected_error =
|
|
|
|
GRPC_ERROR_CREATE_REFERENCING_FROM_STATIC_STRING(
|
|
|
|
"Error occurred when fetching oauth2 token.", &error, 1);
|
|
|
|
auto state = RequestMetadataState::NewInstance(expected_error, {});
|
|
|
|
HttpRequest::SetOverride(aws_external_account_creds_httpcli_get_success,
|
|
|
|
aws_external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
GRPC_ERROR_UNREF(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestAwsExternalAccountCredsFailureMissingRoleName) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
invalid_aws_external_account_creds_options_credential_source_missing_role_name,
|
|
|
|
&error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = AwsExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
error = GRPC_ERROR_CREATE_FROM_STATIC_STRING(
|
|
|
|
"Missing role name when retrieving signing keys.");
|
|
|
|
grpc_error_handle expected_error =
|
|
|
|
GRPC_ERROR_CREATE_REFERENCING_FROM_STATIC_STRING(
|
|
|
|
"Error occurred when fetching oauth2 token.", &error, 1);
|
|
|
|
auto state = RequestMetadataState::NewInstance(expected_error, {});
|
|
|
|
HttpRequest::SetOverride(aws_external_account_creds_httpcli_get_success,
|
|
|
|
aws_external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
GRPC_ERROR_UNREF(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestAwsExternalAccountCredsFailureInvalidRegionalCredVerificationUrl) {
|
|
|
|
ExecCtx exec_ctx;
|
|
|
|
grpc_error_handle error = GRPC_ERROR_NONE;
|
|
|
|
Json credential_source = Json::Parse(
|
|
|
|
invalid_aws_external_account_creds_options_credential_source_invalid_regional_cred_verification_url,
|
|
|
|
&error);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
ExternalAccountCredentials::Options options = {
|
|
|
|
"external_account", // type;
|
|
|
|
"audience", // audience;
|
|
|
|
"subject_token_type", // subject_token_type;
|
|
|
|
"", // service_account_impersonation_url;
|
|
|
|
"https://foo.com:5555/token", // token_url;
|
|
|
|
"https://foo.com:5555/token_info", // token_info_url;
|
|
|
|
credential_source, // credential_source;
|
|
|
|
"quota_project_id", // quota_project_id;
|
|
|
|
"client_id", // client_id;
|
|
|
|
"client_secret", // client_secret;
|
|
|
|
"", // workforce_pool_user_project;
|
|
|
|
};
|
|
|
|
auto creds = AwsExternalAccountCredentials::Create(options, {}, &error);
|
|
|
|
GPR_ASSERT(creds != nullptr);
|
|
|
|
GPR_ASSERT(error == GRPC_ERROR_NONE);
|
|
|
|
GPR_ASSERT(creds->min_security_level() == GRPC_PRIVACY_AND_INTEGRITY);
|
|
|
|
error = GRPC_ERROR_CREATE_FROM_STATIC_STRING(
|
|
|
|
"Creating aws request signer failed.");
|
|
|
|
grpc_error_handle expected_error =
|
|
|
|
GRPC_ERROR_CREATE_REFERENCING_FROM_STATIC_STRING(
|
|
|
|
"Error occurred when fetching oauth2 token.", &error, 1);
|
|
|
|
auto state = RequestMetadataState::NewInstance(expected_error, {});
|
|
|
|
HttpRequest::SetOverride(aws_external_account_creds_httpcli_get_success,
|
|
|
|
aws_external_account_creds_httpcli_post_success);
|
|
|
|
state->RunRequestMetadataTest(creds.get(), kTestUrlScheme, kTestAuthority,
|
|
|
|
kTestPath);
|
|
|
|
ExecCtx::Get()->Flush();
|
|
|
|
HttpRequest::SetOverride(nullptr, nullptr);
|
|
|
|
GRPC_ERROR_UNREF(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestExternalAccountCredentialsCreateSuccess) {
|
|
|
|
// url credentials
|
|
|
|
const char* url_options_string =
|
|
|
|
"{\"type\":\"external_account\",\"audience\":\"audience\",\"subject_"
|
|
|
|
"token_type\":\"subject_token_type\",\"service_account_impersonation_"
|
|
|
|
"url\":\"service_account_impersonation_url\",\"token_url\":\"https://"
|
|
|
|
"foo.com:5555/token\",\"token_info_url\":\"https://foo.com:5555/"
|
|
|
|
"token_info\",\"credential_source\":{\"url\":\"https://foo.com:5555/"
|
|
|
|
"generate_subject_token_format_json\",\"headers\":{\"Metadata-Flavor\":"
|
|
|
|
"\"Google\"},\"format\":{\"type\":\"json\",\"subject_token_field_name\":"
|
|
|
|
"\"access_token\"}},\"quota_project_id\":\"quota_"
|
|
|
|
"project_id\",\"client_id\":\"client_id\",\"client_secret\":\"client_"
|
|
|
|
"secret\"}";
|
|
|
|
const char* url_scopes_string = "scope1,scope2";
|
|
|
|
grpc_call_credentials* url_creds = grpc_external_account_credentials_create(
|
|
|
|
url_options_string, url_scopes_string);
|
|
|
|
GPR_ASSERT(url_creds != nullptr);
|
|
|
|
url_creds->Unref();
|
|
|
|
// file credentials
|
|
|
|
const char* file_options_string =
|
|
|
|
"{\"type\":\"external_account\",\"audience\":\"audience\",\"subject_"
|
|
|
|
"token_type\":\"subject_token_type\",\"service_account_impersonation_"
|
|
|
|
"url\":\"service_account_impersonation_url\",\"token_url\":\"https://"
|
|
|
|
"foo.com:5555/token\",\"token_info_url\":\"https://foo.com:5555/"
|
|
|
|
"token_info\",\"credential_source\":{\"file\":\"credentials_file_path\"},"
|
|
|
|
"\"quota_project_id\":\"quota_"
|
|
|
|
"project_id\",\"client_id\":\"client_id\",\"client_secret\":\"client_"
|
|
|
|
"secret\"}";
|
|
|
|
const char* file_scopes_string = "scope1,scope2";
|
|
|
|
grpc_call_credentials* file_creds = grpc_external_account_credentials_create(
|
|
|
|
file_options_string, file_scopes_string);
|
|
|
|
GPR_ASSERT(file_creds != nullptr);
|
|
|
|
file_creds->Unref();
|
|
|
|
// aws credentials
|
|
|
|
const char* aws_options_string =
|
|
|
|
"{\"type\":\"external_account\",\"audience\":\"audience\",\"subject_"
|
|
|
|
"token_type\":\"subject_token_type\",\"service_account_impersonation_"
|
|
|
|
"url\":\"service_account_impersonation_url\",\"token_url\":\"https://"
|
|
|
|
"foo.com:5555/token\",\"token_info_url\":\"https://foo.com:5555/"
|
|
|
|
"token_info\",\"credential_source\":{\"environment_id\":\"aws1\","
|
|
|
|
"\"region_url\":\"https://foo.com:5555/region_url\",\"url\":\"https://"
|
|
|
|
"foo.com:5555/url\",\"regional_cred_verification_url\":\"https://"
|
|
|
|
"foo.com:5555/regional_cred_verification_url_{region}\"},"
|
|
|
|
"\"quota_project_id\":\"quota_"
|
|
|
|
"project_id\",\"client_id\":\"client_id\",\"client_secret\":\"client_"
|
|
|
|
"secret\"}";
|
|
|
|
const char* aws_scopes_string = "scope1,scope2";
|
|
|
|
grpc_call_credentials* aws_creds = grpc_external_account_credentials_create(
|
|
|
|
aws_options_string, aws_scopes_string);
|
|
|
|
GPR_ASSERT(aws_creds != nullptr);
|
|
|
|
aws_creds->Unref();
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestExternalAccountCredentialsCreateFailureInvalidJsonFormat) {
|
|
|
|
const char* options_string = "invalid_json";
|
|
|
|
grpc_call_credentials* creds =
|
|
|
|
grpc_external_account_credentials_create(options_string, "");
|
|
|
|
GPR_ASSERT(creds == nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestExternalAccountCredentialsCreateFailureInvalidOptionsFormat) {
|
|
|
|
const char* options_string = "{\"random_key\":\"random_value\"}";
|
|
|
|
grpc_call_credentials* creds =
|
|
|
|
grpc_external_account_credentials_create(options_string, "");
|
|
|
|
GPR_ASSERT(creds == nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(
|
|
|
|
CredentialsTest,
|
|
|
|
TestExternalAccountCredentialsCreateFailureInvalidOptionsCredentialSource) {
|
|
|
|
const char* options_string =
|
|
|
|
"{\"type\":\"external_account\",\"audience\":\"audience\",\"subject_"
|
|
|
|
"token_type\":\"subject_token_type\",\"service_account_impersonation_"
|
|
|
|
"url\":\"service_account_impersonation_url\",\"token_url\":\"https://"
|
|
|
|
"foo.com:5555/token\",\"token_info_url\":\"https://foo.com:5555/"
|
|
|
|
"token_info\",\"credential_source\":{\"random_key\":\"random_value\"},"
|
|
|
|
"\"quota_project_id\":\"quota_"
|
|
|
|
"project_id\",\"client_id\":\"client_id\",\"client_secret\":\"client_"
|
|
|
|
"secret\"}";
|
|
|
|
grpc_call_credentials* creds =
|
|
|
|
grpc_external_account_credentials_create(options_string, "");
|
|
|
|
GPR_ASSERT(creds == nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestExternalAccountCredentialsCreateSuccessWorkforcePool) {
|
|
|
|
const char* url_options_string =
|
|
|
|
"{\"type\":\"external_account\",\"audience\":\"//iam.googleapis.com/"
|
|
|
|
"locations/location/workforcePools/pool/providers/provider\",\"subject_"
|
|
|
|
"token_type\":\"subject_token_type\",\"service_account_impersonation_"
|
|
|
|
"url\":\"service_account_impersonation_url\",\"token_url\":\"https://"
|
|
|
|
"foo.com:5555/token\",\"token_info_url\":\"https://foo.com:5555/"
|
|
|
|
"token_info\",\"credential_source\":{\"url\":\"https://foo.com:5555/"
|
|
|
|
"generate_subject_token_format_json\",\"headers\":{\"Metadata-Flavor\":"
|
|
|
|
"\"Google\"},\"format\":{\"type\":\"json\",\"subject_token_field_name\":"
|
|
|
|
"\"access_token\"}},\"quota_project_id\":\"quota_"
|
|
|
|
"project_id\",\"client_id\":\"client_id\",\"client_secret\":\"client_"
|
|
|
|
"secret\",\"workforce_pool_user_project\":\"workforce_pool_user_"
|
|
|
|
"project\"}";
|
|
|
|
const char* url_scopes_string = "scope1,scope2";
|
|
|
|
grpc_call_credentials* url_creds = grpc_external_account_credentials_create(
|
|
|
|
url_options_string, url_scopes_string);
|
|
|
|
GPR_ASSERT(url_creds != nullptr);
|
|
|
|
url_creds->Unref();
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestExternalAccountCredentialsCreateFailureInvalidWorkforcePoolAudience) {
|
|
|
|
const char* url_options_string =
|
|
|
|
"{\"type\":\"external_account\",\"audience\":\"invalid_workforce_pool_"
|
|
|
|
"audience\",\"subject_"
|
|
|
|
"token_type\":\"subject_token_type\",\"service_account_impersonation_"
|
|
|
|
"url\":\"service_account_impersonation_url\",\"token_url\":\"https://"
|
|
|
|
"foo.com:5555/token\",\"token_info_url\":\"https://foo.com:5555/"
|
|
|
|
"token_info\",\"credential_source\":{\"url\":\"https://foo.com:5555/"
|
|
|
|
"generate_subject_token_format_json\",\"headers\":{\"Metadata-Flavor\":"
|
|
|
|
"\"Google\"},\"format\":{\"type\":\"json\",\"subject_token_field_name\":"
|
|
|
|
"\"access_token\"}},\"quota_project_id\":\"quota_"
|
|
|
|
"project_id\",\"client_id\":\"client_id\",\"client_secret\":\"client_"
|
|
|
|
"secret\",\"workforce_pool_user_project\":\"workforce_pool_user_"
|
|
|
|
"project\"}";
|
|
|
|
const char* url_scopes_string = "scope1,scope2";
|
|
|
|
grpc_call_credentials* url_creds = grpc_external_account_credentials_create(
|
|
|
|
url_options_string, url_scopes_string);
|
|
|
|
GPR_ASSERT(url_creds == nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestInsecureCredentialsCompareSuccess) {
|
|
|
|
auto insecure_creds_1 = grpc_insecure_credentials_create();
|
|
|
|
auto insecure_creds_2 = grpc_insecure_credentials_create();
|
|
|
|
ASSERT_EQ(insecure_creds_1->cmp(insecure_creds_2), 0);
|
|
|
|
grpc_arg arg_1 = grpc_channel_credentials_to_arg(insecure_creds_1);
|
|
|
|
grpc_channel_args args_1 = {1, &arg_1};
|
|
|
|
grpc_arg arg_2 = grpc_channel_credentials_to_arg(insecure_creds_2);
|
|
|
|
grpc_channel_args args_2 = {1, &arg_2};
|
|
|
|
EXPECT_EQ(grpc_channel_args_compare(&args_1, &args_2), 0);
|
|
|
|
grpc_channel_credentials_release(insecure_creds_1);
|
|
|
|
grpc_channel_credentials_release(insecure_creds_2);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestInsecureCredentialsCompareFailure) {
|
|
|
|
auto* insecure_creds = grpc_insecure_credentials_create();
|
|
|
|
auto* fake_creds = grpc_fake_transport_security_credentials_create();
|
|
|
|
ASSERT_NE(insecure_creds->cmp(fake_creds), 0);
|
|
|
|
ASSERT_NE(fake_creds->cmp(insecure_creds), 0);
|
|
|
|
grpc_arg arg_1 = grpc_channel_credentials_to_arg(insecure_creds);
|
|
|
|
grpc_channel_args args_1 = {1, &arg_1};
|
|
|
|
grpc_arg arg_2 = grpc_channel_credentials_to_arg(fake_creds);
|
|
|
|
grpc_channel_args args_2 = {1, &arg_2};
|
|
|
|
EXPECT_NE(grpc_channel_args_compare(&args_1, &args_2), 0);
|
|
|
|
grpc_channel_credentials_release(fake_creds);
|
|
|
|
grpc_channel_credentials_release(insecure_creds);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestInsecureCredentialsSingletonCreate) {
|
|
|
|
auto* insecure_creds_1 = grpc_insecure_credentials_create();
|
|
|
|
auto* insecure_creds_2 = grpc_insecure_credentials_create();
|
|
|
|
EXPECT_EQ(insecure_creds_1, insecure_creds_2);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestFakeCallCredentialsCompareSuccess) {
|
|
|
|
auto call_creds = MakeRefCounted<fake_call_creds>();
|
|
|
|
GPR_ASSERT(call_creds->cmp(call_creds.get()) == 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestFakeCallCredentialsCompareFailure) {
|
|
|
|
auto fake_creds = MakeRefCounted<fake_call_creds>();
|
|
|
|
auto* md_creds = grpc_md_only_test_credentials_create("key", "value");
|
|
|
|
GPR_ASSERT(fake_creds->cmp(md_creds) != 0);
|
|
|
|
GPR_ASSERT(md_creds->cmp(fake_creds.get()) != 0);
|
|
|
|
grpc_call_credentials_release(md_creds);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestHttpRequestSSLCredentialsCompare) {
|
|
|
|
auto creds_1 = CreateHttpRequestSSLCredentials();
|
|
|
|
auto creds_2 = CreateHttpRequestSSLCredentials();
|
|
|
|
EXPECT_EQ(creds_1->cmp(creds_2.get()), 0);
|
|
|
|
EXPECT_EQ(creds_2->cmp(creds_1.get()), 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestHttpRequestSSLCredentialsSingleton) {
|
|
|
|
auto creds_1 = CreateHttpRequestSSLCredentials();
|
|
|
|
auto creds_2 = CreateHttpRequestSSLCredentials();
|
|
|
|
EXPECT_EQ(creds_1, creds_2);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestCompositeChannelCredsCompareSuccess) {
|
|
|
|
auto* insecure_creds = grpc_insecure_credentials_create();
|
|
|
|
auto fake_creds = MakeRefCounted<fake_call_creds>();
|
|
|
|
auto* composite_creds_1 = grpc_composite_channel_credentials_create(
|
|
|
|
insecure_creds, fake_creds.get(), nullptr);
|
|
|
|
auto* composite_creds_2 = grpc_composite_channel_credentials_create(
|
|
|
|
insecure_creds, fake_creds.get(), nullptr);
|
|
|
|
EXPECT_EQ(composite_creds_1->cmp(composite_creds_2), 0);
|
|
|
|
EXPECT_EQ(composite_creds_2->cmp(composite_creds_1), 0);
|
|
|
|
grpc_channel_credentials_release(insecure_creds);
|
|
|
|
grpc_channel_credentials_release(composite_creds_1);
|
|
|
|
grpc_channel_credentials_release(composite_creds_2);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestCompositeChannelCredsCompareFailureDifferentChannelCreds) {
|
|
|
|
auto* insecure_creds = grpc_insecure_credentials_create();
|
|
|
|
auto* fake_channel_creds = grpc_fake_transport_security_credentials_create();
|
|
|
|
auto fake_creds = MakeRefCounted<fake_call_creds>();
|
|
|
|
auto* composite_creds_1 = grpc_composite_channel_credentials_create(
|
|
|
|
insecure_creds, fake_creds.get(), nullptr);
|
|
|
|
auto* composite_creds_2 = grpc_composite_channel_credentials_create(
|
|
|
|
fake_channel_creds, fake_creds.get(), nullptr);
|
|
|
|
EXPECT_NE(composite_creds_1->cmp(composite_creds_2), 0);
|
|
|
|
EXPECT_NE(composite_creds_2->cmp(composite_creds_1), 0);
|
|
|
|
grpc_channel_credentials_release(insecure_creds);
|
|
|
|
grpc_channel_credentials_release(fake_channel_creds);
|
|
|
|
grpc_channel_credentials_release(composite_creds_1);
|
|
|
|
grpc_channel_credentials_release(composite_creds_2);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest,
|
|
|
|
TestCompositeChannelCredsCompareFailureDifferentCallCreds) {
|
|
|
|
auto* insecure_creds = grpc_insecure_credentials_create();
|
|
|
|
auto fake_creds = MakeRefCounted<fake_call_creds>();
|
|
|
|
auto* md_creds = grpc_md_only_test_credentials_create("key", "value");
|
|
|
|
auto* composite_creds_1 = grpc_composite_channel_credentials_create(
|
|
|
|
insecure_creds, fake_creds.get(), nullptr);
|
|
|
|
auto* composite_creds_2 = grpc_composite_channel_credentials_create(
|
|
|
|
insecure_creds, md_creds, nullptr);
|
|
|
|
EXPECT_NE(composite_creds_1->cmp(composite_creds_2), 0);
|
|
|
|
EXPECT_NE(composite_creds_2->cmp(composite_creds_1), 0);
|
|
|
|
grpc_channel_credentials_release(insecure_creds);
|
|
|
|
grpc_call_credentials_release(md_creds);
|
|
|
|
grpc_channel_credentials_release(composite_creds_1);
|
|
|
|
grpc_channel_credentials_release(composite_creds_2);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestTlsCredentialsCompareSuccess) {
|
|
|
|
auto* tls_creds_1 =
|
|
|
|
grpc_tls_credentials_create(grpc_tls_credentials_options_create());
|
|
|
|
auto* tls_creds_2 =
|
|
|
|
grpc_tls_credentials_create(grpc_tls_credentials_options_create());
|
|
|
|
EXPECT_EQ(tls_creds_1->cmp(tls_creds_2), 0);
|
|
|
|
EXPECT_EQ(tls_creds_2->cmp(tls_creds_1), 0);
|
|
|
|
grpc_channel_credentials_release(tls_creds_1);
|
|
|
|
grpc_channel_credentials_release(tls_creds_2);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestTlsCredentialsWithVerifierCompareSuccess) {
|
|
|
|
auto* options_1 = grpc_tls_credentials_options_create();
|
|
|
|
options_1->set_certificate_verifier(
|
|
|
|
MakeRefCounted<HostNameCertificateVerifier>());
|
|
|
|
auto* tls_creds_1 = grpc_tls_credentials_create(options_1);
|
|
|
|
auto* options_2 = grpc_tls_credentials_options_create();
|
|
|
|
options_2->set_certificate_verifier(
|
|
|
|
MakeRefCounted<HostNameCertificateVerifier>());
|
|
|
|
auto* tls_creds_2 = grpc_tls_credentials_create(options_2);
|
|
|
|
EXPECT_EQ(tls_creds_1->cmp(tls_creds_2), 0);
|
|
|
|
EXPECT_EQ(tls_creds_2->cmp(tls_creds_1), 0);
|
|
|
|
grpc_channel_credentials_release(tls_creds_1);
|
|
|
|
grpc_channel_credentials_release(tls_creds_2);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestTlsCredentialsCompareFailure) {
|
|
|
|
auto* options_1 = grpc_tls_credentials_options_create();
|
|
|
|
options_1->set_check_call_host(true);
|
|
|
|
auto* tls_creds_1 = grpc_tls_credentials_create(options_1);
|
|
|
|
auto* options_2 = grpc_tls_credentials_options_create();
|
|
|
|
options_2->set_check_call_host(false);
|
|
|
|
auto* tls_creds_2 = grpc_tls_credentials_create(options_2);
|
|
|
|
EXPECT_NE(tls_creds_1->cmp(tls_creds_2), 0);
|
|
|
|
EXPECT_NE(tls_creds_2->cmp(tls_creds_1), 0);
|
|
|
|
grpc_channel_credentials_release(tls_creds_1);
|
|
|
|
grpc_channel_credentials_release(tls_creds_2);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestTlsCredentialsWithVerifierCompareFailure) {
|
|
|
|
auto* options_1 = grpc_tls_credentials_options_create();
|
|
|
|
options_1->set_certificate_verifier(
|
|
|
|
MakeRefCounted<HostNameCertificateVerifier>());
|
|
|
|
auto* tls_creds_1 = grpc_tls_credentials_create(options_1);
|
|
|
|
auto* options_2 = grpc_tls_credentials_options_create();
|
|
|
|
grpc_tls_certificate_verifier_external verifier = {nullptr, nullptr, nullptr,
|
|
|
|
nullptr};
|
|
|
|
options_2->set_certificate_verifier(
|
|
|
|
MakeRefCounted<ExternalCertificateVerifier>(&verifier));
|
|
|
|
auto* tls_creds_2 = grpc_tls_credentials_create(options_2);
|
|
|
|
EXPECT_NE(tls_creds_1->cmp(tls_creds_2), 0);
|
|
|
|
EXPECT_NE(tls_creds_2->cmp(tls_creds_1), 0);
|
|
|
|
grpc_channel_credentials_release(tls_creds_1);
|
|
|
|
grpc_channel_credentials_release(tls_creds_2);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestXdsCredentialsCompareSucces) {
|
|
|
|
auto* insecure_creds = grpc_insecure_credentials_create();
|
|
|
|
auto* xds_creds_1 = grpc_xds_credentials_create(insecure_creds);
|
|
|
|
auto* xds_creds_2 = grpc_xds_credentials_create(insecure_creds);
|
|
|
|
EXPECT_EQ(xds_creds_1->cmp(xds_creds_2), 0);
|
|
|
|
EXPECT_EQ(xds_creds_2->cmp(xds_creds_1), 0);
|
|
|
|
grpc_channel_credentials_release(insecure_creds);
|
|
|
|
grpc_channel_credentials_release(xds_creds_1);
|
|
|
|
grpc_channel_credentials_release(xds_creds_2);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(CredentialsTest, TestXdsCredentialsCompareFailure) {
|
|
|
|
auto* insecure_creds = grpc_insecure_credentials_create();
|
|
|
|
auto* fake_creds = grpc_fake_transport_security_credentials_create();
|
|
|
|
auto* xds_creds_1 = grpc_xds_credentials_create(insecure_creds);
|
|
|
|
auto* xds_creds_2 = grpc_xds_credentials_create(fake_creds);
|
|
|
|
EXPECT_NE(xds_creds_1->cmp(xds_creds_2), 0);
|
|
|
|
EXPECT_NE(xds_creds_2->cmp(xds_creds_1), 0);
|
|
|
|
grpc_channel_credentials_release(insecure_creds);
|
|
|
|
grpc_channel_credentials_release(fake_creds);
|
|
|
|
grpc_channel_credentials_release(xds_creds_1);
|
|
|
|
grpc_channel_credentials_release(xds_creds_2);
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
} // namespace grpc_core
|
|
|
|
|
|
|
|
int main(int argc, char** argv) {
|
|
|
|
testing::InitGoogleTest(&argc, argv);
|
|
|
|
grpc::testing::TestEnvironment env(argc, argv);
|
|
|
|
grpc_init();
|
|
|
|
auto result = RUN_ALL_TESTS();
|
|
|
|
grpc_shutdown();
|
|
|
|
return result;
|
|
|
|
}
|