mirror of https://github.com/grpc/grpc.git
[e2e] c++-ify core e2e test fixtures (#32550)
A step toward #14016. --------- Co-authored-by: ctiller <ctiller@users.noreply.github.com>pull/32605/head
parent
0003c320f4
commit
62bb99d163
169 changed files with 5565 additions and 12212 deletions
@ -0,0 +1,181 @@ |
||||
// Copyright 2023 gRPC authors.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
#ifndef GRPC_TEST_CORE_END2END_FIXTURES_H2_OAUTH2_COMMON_H |
||||
#define GRPC_TEST_CORE_END2END_FIXTURES_H2_OAUTH2_COMMON_H |
||||
|
||||
#include <string.h> |
||||
|
||||
#include <grpc/grpc.h> |
||||
#include <grpc/grpc_security.h> |
||||
#include <grpc/grpc_security_constants.h> |
||||
#include <grpc/slice.h> |
||||
#include <grpc/status.h> |
||||
#include <grpc/support/log.h> |
||||
|
||||
#include "src/core/lib/channel/channel_args.h" |
||||
#include "src/core/lib/iomgr/error.h" |
||||
#include "src/core/lib/iomgr/load_file.h" |
||||
#include "src/core/lib/security/credentials/credentials.h" |
||||
#include "src/core/lib/security/credentials/ssl/ssl_credentials.h" |
||||
#include "test/core/end2end/end2end_tests.h" |
||||
#include "test/core/end2end/fixtures/secure_fixture.h" |
||||
|
||||
class Oauth2Fixture : public SecureFixture { |
||||
public: |
||||
explicit Oauth2Fixture(grpc_tls_version tls_version) |
||||
: tls_version_(tls_version) {} |
||||
|
||||
static const char* CaCertPath() { return "src/core/tsi/test_creds/ca.pem"; } |
||||
static const char* ServerCertPath() { |
||||
return "src/core/tsi/test_creds/server1.pem"; |
||||
} |
||||
static const char* ServerKeyPath() { |
||||
return "src/core/tsi/test_creds/server1.key"; |
||||
} |
||||
|
||||
private: |
||||
struct TestProcessorState {}; |
||||
|
||||
static const char* oauth2_md() { return "Bearer aaslkfjs424535asdf"; } |
||||
static const char* client_identity_property_name() { return "smurf_name"; } |
||||
static const char* client_identity() { return "Brainy Smurf"; } |
||||
|
||||
static const grpc_metadata* find_metadata(const grpc_metadata* md, |
||||
size_t md_count, const char* key, |
||||
const char* value) { |
||||
size_t i; |
||||
for (i = 0; i < md_count; i++) { |
||||
if (grpc_slice_str_cmp(md[i].key, key) == 0 && |
||||
grpc_slice_str_cmp(md[i].value, value) == 0) { |
||||
return &md[i]; |
||||
} |
||||
} |
||||
return nullptr; |
||||
} |
||||
|
||||
static void process_oauth2_success(void*, grpc_auth_context* ctx, |
||||
const grpc_metadata* md, size_t md_count, |
||||
grpc_process_auth_metadata_done_cb cb, |
||||
void* user_data) { |
||||
const grpc_metadata* oauth2 = |
||||
find_metadata(md, md_count, "authorization", oauth2_md()); |
||||
GPR_ASSERT(oauth2 != nullptr); |
||||
grpc_auth_context_add_cstring_property(ctx, client_identity_property_name(), |
||||
client_identity()); |
||||
GPR_ASSERT(grpc_auth_context_set_peer_identity_property_name( |
||||
ctx, client_identity_property_name()) == 1); |
||||
cb(user_data, oauth2, 1, nullptr, 0, GRPC_STATUS_OK, nullptr); |
||||
} |
||||
|
||||
static void process_oauth2_failure(void* state, grpc_auth_context* /*ctx*/, |
||||
const grpc_metadata* md, size_t md_count, |
||||
grpc_process_auth_metadata_done_cb cb, |
||||
void* user_data) { |
||||
const grpc_metadata* oauth2 = |
||||
find_metadata(md, md_count, "authorization", oauth2_md()); |
||||
GPR_ASSERT(state != nullptr); |
||||
GPR_ASSERT(oauth2 != nullptr); |
||||
cb(user_data, oauth2, 1, nullptr, 0, GRPC_STATUS_UNAUTHENTICATED, nullptr); |
||||
} |
||||
|
||||
static grpc_auth_metadata_processor test_processor_create(bool failing) { |
||||
auto* s = new TestProcessorState; |
||||
grpc_auth_metadata_processor result; |
||||
result.state = s; |
||||
result.destroy = [](void* p) { |
||||
delete static_cast<TestProcessorState*>(p); |
||||
}; |
||||
if (failing) { |
||||
result.process = process_oauth2_failure; |
||||
} else { |
||||
result.process = process_oauth2_success; |
||||
} |
||||
return result; |
||||
} |
||||
|
||||
grpc_core::ChannelArgs MutateClientArgs( |
||||
grpc_core::ChannelArgs args) override { |
||||
return args.Set(GRPC_SSL_TARGET_NAME_OVERRIDE_ARG, "foo.test.google.fr"); |
||||
} |
||||
|
||||
grpc_channel_credentials* MakeClientCreds( |
||||
const grpc_core::ChannelArgs&) override { |
||||
grpc_slice ca_slice; |
||||
GPR_ASSERT(GRPC_LOG_IF_ERROR("load_file", |
||||
grpc_load_file(CaCertPath(), 1, &ca_slice))); |
||||
const char* test_root_cert = |
||||
reinterpret_cast<const char*> GRPC_SLICE_START_PTR(ca_slice); |
||||
grpc_channel_credentials* ssl_creds = |
||||
grpc_ssl_credentials_create(test_root_cert, nullptr, nullptr, nullptr); |
||||
if (ssl_creds != nullptr) { |
||||
// Set the min and max TLS version.
|
||||
grpc_ssl_credentials* creds = |
||||
reinterpret_cast<grpc_ssl_credentials*>(ssl_creds); |
||||
creds->set_min_tls_version(tls_version_); |
||||
creds->set_max_tls_version(tls_version_); |
||||
} |
||||
grpc_call_credentials* oauth2_creds = |
||||
grpc_md_only_test_credentials_create("authorization", oauth2_md()); |
||||
grpc_channel_credentials* ssl_oauth2_creds = |
||||
grpc_composite_channel_credentials_create(ssl_creds, oauth2_creds, |
||||
nullptr); |
||||
grpc_channel_credentials_release(ssl_creds); |
||||
grpc_call_credentials_release(oauth2_creds); |
||||
grpc_slice_unref(ca_slice); |
||||
return ssl_oauth2_creds; |
||||
} |
||||
|
||||
grpc_server_credentials* MakeServerCreds( |
||||
const grpc_core::ChannelArgs& args) override { |
||||
grpc_slice cert_slice, key_slice; |
||||
GPR_ASSERT(GRPC_LOG_IF_ERROR( |
||||
"load_file", grpc_load_file(ServerCertPath(), 1, &cert_slice))); |
||||
GPR_ASSERT(GRPC_LOG_IF_ERROR( |
||||
"load_file", grpc_load_file(ServerKeyPath(), 1, &key_slice))); |
||||
const char* server_cert = |
||||
reinterpret_cast<const char*> GRPC_SLICE_START_PTR(cert_slice); |
||||
const char* server_key = |
||||
reinterpret_cast<const char*> GRPC_SLICE_START_PTR(key_slice); |
||||
grpc_ssl_pem_key_cert_pair pem_key_cert_pair = {server_key, server_cert}; |
||||
grpc_server_credentials* ssl_creds = grpc_ssl_server_credentials_create( |
||||
nullptr, &pem_key_cert_pair, 1, 0, nullptr); |
||||
if (ssl_creds != nullptr) { |
||||
// Set the min and max TLS version.
|
||||
grpc_ssl_server_credentials* creds = |
||||
reinterpret_cast<grpc_ssl_server_credentials*>(ssl_creds); |
||||
creds->set_min_tls_version(tls_version_); |
||||
creds->set_max_tls_version(tls_version_); |
||||
} |
||||
grpc_server_credentials_set_auth_metadata_processor( |
||||
ssl_creds, |
||||
test_processor_create(args.Contains(FAIL_AUTH_CHECK_SERVER_ARG_NAME))); |
||||
grpc_slice_unref(cert_slice); |
||||
grpc_slice_unref(key_slice); |
||||
return ssl_creds; |
||||
} |
||||
|
||||
static void process_auth_failure(void* state, grpc_auth_context* /*ctx*/, |
||||
const grpc_metadata* /*md*/, |
||||
size_t /*md_count*/, |
||||
grpc_process_auth_metadata_done_cb cb, |
||||
void* user_data) { |
||||
GPR_ASSERT(state == nullptr); |
||||
cb(user_data, nullptr, 0, nullptr, 0, GRPC_STATUS_UNAUTHENTICATED, nullptr); |
||||
} |
||||
|
||||
grpc_tls_version tls_version_; |
||||
}; |
||||
|
||||
#endif // GRPC_TEST_CORE_END2END_FIXTURES_H2_OAUTH2_COMMON_H
|
@ -0,0 +1,139 @@ |
||||
// Copyright 2015 gRPC authors.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
#ifndef GRPC_TEST_CORE_END2END_FIXTURES_H2_SSL_CRED_RELOAD_FIXTURE_H |
||||
#define GRPC_TEST_CORE_END2END_FIXTURES_H2_SSL_CRED_RELOAD_FIXTURE_H |
||||
|
||||
#include <stddef.h> |
||||
|
||||
#include <grpc/grpc.h> |
||||
#include <grpc/grpc_security.h> |
||||
#include <grpc/grpc_security_constants.h> |
||||
#include <grpc/slice.h> |
||||
#include <grpc/status.h> |
||||
#include <grpc/support/log.h> |
||||
|
||||
#include "src/core/lib/channel/channel_args.h" |
||||
#include "src/core/lib/iomgr/error.h" |
||||
#include "src/core/lib/iomgr/load_file.h" |
||||
#include "src/core/lib/security/credentials/ssl/ssl_credentials.h" |
||||
#include "test/core/end2end/end2end_tests.h" |
||||
#include "test/core/end2end/fixtures/secure_fixture.h" |
||||
|
||||
class SslCredReloadFixture : public SecureFixture { |
||||
public: |
||||
explicit SslCredReloadFixture(grpc_tls_version tls_version) |
||||
: tls_version_(tls_version) {} |
||||
|
||||
static const char* CaCertPath() { return "src/core/tsi/test_creds/ca.pem"; } |
||||
static const char* CertPath() { |
||||
return "src/core/tsi/test_creds/server1.pem"; |
||||
} |
||||
static const char* KeyPath() { return "src/core/tsi/test_creds/server1.key"; } |
||||
|
||||
private: |
||||
grpc_core::ChannelArgs MutateClientArgs( |
||||
grpc_core::ChannelArgs args) override { |
||||
return args.Set(GRPC_SSL_TARGET_NAME_OVERRIDE_ARG, "foo.test.google.fr"); |
||||
} |
||||
grpc_channel_credentials* MakeClientCreds( |
||||
const grpc_core::ChannelArgs&) override { |
||||
grpc_channel_credentials* ssl_creds = |
||||
grpc_ssl_credentials_create(nullptr, nullptr, nullptr, nullptr); |
||||
if (ssl_creds != nullptr) { |
||||
// Set the min and max TLS version.
|
||||
grpc_ssl_credentials* creds = |
||||
reinterpret_cast<grpc_ssl_credentials*>(ssl_creds); |
||||
creds->set_min_tls_version(tls_version_); |
||||
creds->set_max_tls_version(tls_version_); |
||||
} |
||||
return ssl_creds; |
||||
} |
||||
grpc_server_credentials* MakeServerCreds( |
||||
const grpc_core::ChannelArgs& args) override { |
||||
server_credential_reloaded_ = false; |
||||
grpc_ssl_server_credentials_options* options = |
||||
grpc_ssl_server_credentials_create_options_using_config_fetcher( |
||||
GRPC_SSL_DONT_REQUEST_CLIENT_CERTIFICATE, |
||||
ssl_server_certificate_config_callback, this); |
||||
grpc_server_credentials* ssl_creds = |
||||
grpc_ssl_server_credentials_create_with_options(options); |
||||
if (ssl_creds != nullptr) { |
||||
// Set the min and max TLS version.
|
||||
grpc_ssl_server_credentials* creds = |
||||
reinterpret_cast<grpc_ssl_server_credentials*>(ssl_creds); |
||||
creds->set_min_tls_version(tls_version_); |
||||
creds->set_max_tls_version(tls_version_); |
||||
} |
||||
if (args.Contains(FAIL_AUTH_CHECK_SERVER_ARG_NAME)) { |
||||
grpc_auth_metadata_processor processor = {process_auth_failure, nullptr, |
||||
nullptr}; |
||||
grpc_server_credentials_set_auth_metadata_processor(ssl_creds, processor); |
||||
} |
||||
return ssl_creds; |
||||
} |
||||
|
||||
static void process_auth_failure(void* state, grpc_auth_context* /*ctx*/, |
||||
const grpc_metadata* /*md*/, |
||||
size_t /*md_count*/, |
||||
grpc_process_auth_metadata_done_cb cb, |
||||
void* user_data) { |
||||
GPR_ASSERT(state == nullptr); |
||||
cb(user_data, nullptr, 0, nullptr, 0, GRPC_STATUS_UNAUTHENTICATED, nullptr); |
||||
} |
||||
|
||||
grpc_ssl_certificate_config_reload_status SslServerCertificateConfigCallback( |
||||
grpc_ssl_server_certificate_config** config) { |
||||
if (config == nullptr) { |
||||
return GRPC_SSL_CERTIFICATE_CONFIG_RELOAD_FAIL; |
||||
} |
||||
if (!server_credential_reloaded_) { |
||||
grpc_slice ca_slice, cert_slice, key_slice; |
||||
GPR_ASSERT(GRPC_LOG_IF_ERROR("load_file", |
||||
grpc_load_file(CaCertPath(), 1, &ca_slice))); |
||||
GPR_ASSERT(GRPC_LOG_IF_ERROR("load_file", |
||||
grpc_load_file(CertPath(), 1, &cert_slice))); |
||||
GPR_ASSERT(GRPC_LOG_IF_ERROR("load_file", |
||||
grpc_load_file(KeyPath(), 1, &key_slice))); |
||||
const char* ca_cert = |
||||
reinterpret_cast<const char*> GRPC_SLICE_START_PTR(ca_slice); |
||||
const char* server_cert = |
||||
reinterpret_cast<const char*> GRPC_SLICE_START_PTR(cert_slice); |
||||
const char* server_key = |
||||
reinterpret_cast<const char*> GRPC_SLICE_START_PTR(key_slice); |
||||
grpc_ssl_pem_key_cert_pair pem_key_cert_pair = {server_key, server_cert}; |
||||
*config = grpc_ssl_server_certificate_config_create( |
||||
ca_cert, &pem_key_cert_pair, 1); |
||||
grpc_slice_unref(cert_slice); |
||||
grpc_slice_unref(key_slice); |
||||
grpc_slice_unref(ca_slice); |
||||
server_credential_reloaded_ = true; |
||||
return GRPC_SSL_CERTIFICATE_CONFIG_RELOAD_NEW; |
||||
} else { |
||||
return GRPC_SSL_CERTIFICATE_CONFIG_RELOAD_UNCHANGED; |
||||
} |
||||
} |
||||
|
||||
static grpc_ssl_certificate_config_reload_status |
||||
ssl_server_certificate_config_callback( |
||||
void* user_data, grpc_ssl_server_certificate_config** config) { |
||||
return static_cast<SslCredReloadFixture*>(user_data) |
||||
->SslServerCertificateConfigCallback(config); |
||||
} |
||||
|
||||
grpc_tls_version tls_version_; |
||||
bool server_credential_reloaded_ = false; |
||||
}; |
||||
|
||||
#endif // GRPC_TEST_CORE_END2END_FIXTURES_H2_SSL_CRED_RELOAD_FIXTURE_H
|
@ -0,0 +1,110 @@ |
||||
// Copyright 2023 gRPC authors.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
#ifndef GRPC_TEST_CORE_END2END_FIXTURES_H2_SSL_TLS_COMMON_H |
||||
#define GRPC_TEST_CORE_END2END_FIXTURES_H2_SSL_TLS_COMMON_H |
||||
|
||||
#include <string.h> |
||||
|
||||
#include <grpc/grpc.h> |
||||
#include <grpc/grpc_security.h> |
||||
#include <grpc/grpc_security_constants.h> |
||||
#include <grpc/slice.h> |
||||
#include <grpc/status.h> |
||||
#include <grpc/support/log.h> |
||||
|
||||
#include "src/core/lib/channel/channel_args.h" |
||||
#include "src/core/lib/iomgr/error.h" |
||||
#include "src/core/lib/iomgr/load_file.h" |
||||
#include "src/core/lib/security/credentials/ssl/ssl_credentials.h" |
||||
#include "test/core/end2end/end2end_tests.h" |
||||
#include "test/core/end2end/fixtures/secure_fixture.h" |
||||
|
||||
class SslTlsFixture : public SecureFixture { |
||||
public: |
||||
explicit SslTlsFixture(grpc_tls_version tls_version) |
||||
: tls_version_(tls_version) {} |
||||
|
||||
static const char* CaCertPath() { return "src/core/tsi/test_creds/ca.pem"; } |
||||
static const char* ServerCertPath() { |
||||
return "src/core/tsi/test_creds/server1.pem"; |
||||
} |
||||
static const char* ServerKeyPath() { |
||||
return "src/core/tsi/test_creds/server1.key"; |
||||
} |
||||
|
||||
private: |
||||
grpc_core::ChannelArgs MutateClientArgs( |
||||
grpc_core::ChannelArgs args) override { |
||||
return args.Set(GRPC_SSL_TARGET_NAME_OVERRIDE_ARG, "foo.test.google.fr"); |
||||
} |
||||
|
||||
grpc_channel_credentials* MakeClientCreds( |
||||
const grpc_core::ChannelArgs&) override { |
||||
grpc_channel_credentials* ssl_creds = |
||||
grpc_ssl_credentials_create(nullptr, nullptr, nullptr, nullptr); |
||||
if (ssl_creds != nullptr) { |
||||
// Set the min and max TLS version.
|
||||
grpc_ssl_credentials* creds = |
||||
reinterpret_cast<grpc_ssl_credentials*>(ssl_creds); |
||||
creds->set_min_tls_version(tls_version_); |
||||
creds->set_max_tls_version(tls_version_); |
||||
} |
||||
return ssl_creds; |
||||
} |
||||
|
||||
grpc_server_credentials* MakeServerCreds( |
||||
const grpc_core::ChannelArgs& args) override { |
||||
grpc_slice cert_slice, key_slice; |
||||
GPR_ASSERT(GRPC_LOG_IF_ERROR( |
||||
"load_file", grpc_load_file(ServerCertPath(), 1, &cert_slice))); |
||||
GPR_ASSERT(GRPC_LOG_IF_ERROR( |
||||
"load_file", grpc_load_file(ServerKeyPath(), 1, &key_slice))); |
||||
const char* server_cert = |
||||
reinterpret_cast<const char*> GRPC_SLICE_START_PTR(cert_slice); |
||||
const char* server_key = |
||||
reinterpret_cast<const char*> GRPC_SLICE_START_PTR(key_slice); |
||||
grpc_ssl_pem_key_cert_pair pem_key_cert_pair = {server_key, server_cert}; |
||||
grpc_server_credentials* ssl_creds = grpc_ssl_server_credentials_create( |
||||
nullptr, &pem_key_cert_pair, 1, 0, nullptr); |
||||
if (ssl_creds != nullptr) { |
||||
// Set the min and max TLS version.
|
||||
grpc_ssl_server_credentials* creds = |
||||
reinterpret_cast<grpc_ssl_server_credentials*>(ssl_creds); |
||||
creds->set_min_tls_version(tls_version_); |
||||
creds->set_max_tls_version(tls_version_); |
||||
} |
||||
grpc_slice_unref(cert_slice); |
||||
grpc_slice_unref(key_slice); |
||||
if (args.Contains(FAIL_AUTH_CHECK_SERVER_ARG_NAME)) { |
||||
grpc_auth_metadata_processor processor = {process_auth_failure, nullptr, |
||||
nullptr}; |
||||
grpc_server_credentials_set_auth_metadata_processor(ssl_creds, processor); |
||||
} |
||||
return ssl_creds; |
||||
} |
||||
|
||||
static void process_auth_failure(void* state, grpc_auth_context* /*ctx*/, |
||||
const grpc_metadata* /*md*/, |
||||
size_t /*md_count*/, |
||||
grpc_process_auth_metadata_done_cb cb, |
||||
void* user_data) { |
||||
GPR_ASSERT(state == nullptr); |
||||
cb(user_data, nullptr, 0, nullptr, 0, GRPC_STATUS_UNAUTHENTICATED, nullptr); |
||||
} |
||||
|
||||
grpc_tls_version tls_version_; |
||||
}; |
||||
|
||||
#endif // GRPC_TEST_CORE_END2END_FIXTURES_H2_SSL_TLS_COMMON_H
|
@ -0,0 +1,37 @@ |
||||
// Copyright 2023 gRPC authors.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
#ifndef GRPC_TEST_CORE_END2END_FIXTURES_INPROC_FIXTURE_H |
||||
#define GRPC_TEST_CORE_END2END_FIXTURES_INPROC_FIXTURE_H |
||||
|
||||
#include <grpc/grpc.h> |
||||
|
||||
#include "src/core/ext/transport/inproc/inproc_transport.h" |
||||
#include "src/core/lib/channel/channel_args.h" |
||||
#include "test/core/end2end/end2end_tests.h" |
||||
|
||||
class InprocFixture : public CoreTestFixture { |
||||
private: |
||||
grpc_server* MakeServer(const grpc_core::ChannelArgs& args) override { |
||||
auto* server = grpc_server_create(args.ToC().get(), nullptr); |
||||
grpc_server_register_completion_queue(server, cq(), nullptr); |
||||
grpc_server_start(server); |
||||
return server; |
||||
} |
||||
grpc_channel* MakeClient(const grpc_core::ChannelArgs& args) override { |
||||
return grpc_inproc_channel_create(server(), args.ToC().get(), nullptr); |
||||
} |
||||
}; |
||||
|
||||
#endif // GRPC_TEST_CORE_END2END_FIXTURES_INPROC_FIXTURE_H
|
@ -0,0 +1,91 @@ |
||||
// Copyright 2023 gRPC authors.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
#ifndef GRPC_TEST_CORE_END2END_FIXTURES_SECURE_FIXTURE_H |
||||
#define GRPC_TEST_CORE_END2END_FIXTURES_SECURE_FIXTURE_H |
||||
|
||||
#include <string> |
||||
#include <utility> |
||||
|
||||
#include <grpc/grpc.h> |
||||
#include <grpc/grpc_security.h> |
||||
#include <grpc/support/log.h> |
||||
|
||||
#include "src/core/lib/channel/channel_args.h" |
||||
#include "src/core/lib/gprpp/host_port.h" |
||||
#include "test/core/end2end/end2end_tests.h" |
||||
#include "test/core/util/port.h" |
||||
|
||||
// Base class for a fixture that just needs to select cred types (or mutate
|
||||
// client/server channel args).
|
||||
class SecureFixture : public CoreTestFixture { |
||||
public: |
||||
explicit SecureFixture(std::string localaddr = grpc_core::JoinHostPort( |
||||
"localhost", grpc_pick_unused_port_or_die())) |
||||
: localaddr_(std::move(localaddr)) {} |
||||
|
||||
protected: |
||||
const std::string& localaddr() const { return localaddr_; } |
||||
|
||||
private: |
||||
virtual grpc_channel_credentials* MakeClientCreds( |
||||
const grpc_core::ChannelArgs& args) = 0; |
||||
virtual grpc_server_credentials* MakeServerCreds( |
||||
const grpc_core::ChannelArgs& args) = 0; |
||||
virtual grpc_core::ChannelArgs MutateClientArgs(grpc_core::ChannelArgs args) { |
||||
return args; |
||||
} |
||||
virtual grpc_core::ChannelArgs MutateServerArgs(grpc_core::ChannelArgs args) { |
||||
return args; |
||||
} |
||||
grpc_server* MakeServer(const grpc_core::ChannelArgs& in_args) override { |
||||
auto args = MutateServerArgs(in_args); |
||||
auto* creds = MakeServerCreds(args); |
||||
auto* server = grpc_server_create(args.ToC().get(), nullptr); |
||||
grpc_server_register_completion_queue(server, cq(), nullptr); |
||||
GPR_ASSERT(grpc_server_add_http2_port(server, localaddr_.c_str(), creds)); |
||||
grpc_server_credentials_release(creds); |
||||
grpc_server_start(server); |
||||
return server; |
||||
} |
||||
grpc_channel* MakeClient(const grpc_core::ChannelArgs& in_args) override { |
||||
auto args = MutateClientArgs(in_args); |
||||
auto* creds = MakeClientCreds(args); |
||||
auto* client = |
||||
grpc_channel_create(localaddr_.c_str(), creds, args.ToC().get()); |
||||
GPR_ASSERT(client != nullptr); |
||||
grpc_channel_credentials_release(creds); |
||||
return client; |
||||
} |
||||
|
||||
std::string localaddr_; |
||||
}; |
||||
|
||||
// Fixture that uses insecure credentials.
|
||||
class InsecureFixture : public SecureFixture { |
||||
public: |
||||
using SecureFixture::SecureFixture; |
||||
|
||||
private: |
||||
grpc_channel_credentials* MakeClientCreds( |
||||
const grpc_core::ChannelArgs&) override { |
||||
return grpc_insecure_credentials_create(); |
||||
} |
||||
grpc_server_credentials* MakeServerCreds( |
||||
const grpc_core::ChannelArgs&) override { |
||||
return grpc_insecure_server_credentials_create(); |
||||
} |
||||
}; |
||||
|
||||
#endif // GRPC_TEST_CORE_END2END_FIXTURES_SECURE_FIXTURE_H
|
@ -0,0 +1,108 @@ |
||||
// Copyright 2023 gRPC authors.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
#ifndef GRPC_TEST_CORE_END2END_FIXTURES_SOCKPAIR_FIXTURE_H |
||||
#define GRPC_TEST_CORE_END2END_FIXTURES_SOCKPAIR_FIXTURE_H |
||||
|
||||
#include "absl/status/status.h" |
||||
#include "absl/status/statusor.h" |
||||
|
||||
#include <grpc/grpc.h> |
||||
#include <grpc/status.h> |
||||
#include <grpc/support/log.h> |
||||
|
||||
#include "src/core/ext/transport/chttp2/transport/chttp2_transport.h" |
||||
#include "src/core/lib/channel/channel_args.h" |
||||
#include "src/core/lib/channel/channel_args_preconditioning.h" |
||||
#include "src/core/lib/channel/channelz.h" |
||||
#include "src/core/lib/config/core_configuration.h" |
||||
#include "src/core/lib/gprpp/ref_counted_ptr.h" |
||||
#include "src/core/lib/iomgr/endpoint.h" |
||||
#include "src/core/lib/iomgr/endpoint_pair.h" |
||||
#include "src/core/lib/iomgr/error.h" |
||||
#include "src/core/lib/iomgr/exec_ctx.h" |
||||
#include "src/core/lib/surface/channel.h" |
||||
#include "src/core/lib/surface/channel_stack_type.h" |
||||
#include "src/core/lib/surface/completion_queue.h" |
||||
#include "src/core/lib/surface/server.h" |
||||
#include "src/core/lib/transport/transport.h" |
||||
#include "src/core/lib/transport/transport_fwd.h" |
||||
#include "test/core/end2end/end2end_tests.h" |
||||
|
||||
class SockpairFixture : public CoreTestFixture { |
||||
public: |
||||
explicit SockpairFixture(const grpc_core::ChannelArgs& ep_args) |
||||
: ep_(grpc_iomgr_create_endpoint_pair("fixture", ep_args.ToC().get())) {} |
||||
|
||||
private: |
||||
virtual grpc_core::ChannelArgs MutateClientArgs(grpc_core::ChannelArgs args) { |
||||
return args; |
||||
} |
||||
virtual grpc_core::ChannelArgs MutateServerArgs(grpc_core::ChannelArgs args) { |
||||
return args; |
||||
} |
||||
grpc_server* MakeServer(const grpc_core::ChannelArgs& in_args) override { |
||||
auto args = MutateServerArgs(in_args); |
||||
grpc_core::ExecCtx exec_ctx; |
||||
grpc_transport* transport; |
||||
auto* server = grpc_server_create(args.ToC().get(), nullptr); |
||||
grpc_server_register_completion_queue(server, cq(), nullptr); |
||||
grpc_server_start(server); |
||||
auto server_channel_args = grpc_core::CoreConfiguration::Get() |
||||
.channel_args_preconditioning() |
||||
.PreconditionChannelArgs(args.ToC().get()); |
||||
transport = |
||||
grpc_create_chttp2_transport(server_channel_args, ep_.server, false); |
||||
grpc_endpoint_add_to_pollset(ep_.server, grpc_cq_pollset(cq())); |
||||
grpc_core::Server* core_server = grpc_core::Server::FromC(server); |
||||
grpc_error_handle error = core_server->SetupTransport( |
||||
transport, nullptr, core_server->channel_args(), nullptr); |
||||
if (error.ok()) { |
||||
grpc_chttp2_transport_start_reading(transport, nullptr, nullptr, nullptr); |
||||
} else { |
||||
grpc_transport_destroy(transport); |
||||
} |
||||
return server; |
||||
} |
||||
grpc_channel* MakeClient(const grpc_core::ChannelArgs& in_args) override { |
||||
grpc_core::ExecCtx exec_ctx; |
||||
auto args = grpc_core::CoreConfiguration::Get() |
||||
.channel_args_preconditioning() |
||||
.PreconditionChannelArgs( |
||||
MutateClientArgs(in_args) |
||||
.Set(GRPC_ARG_DEFAULT_AUTHORITY, "test-authority") |
||||
.ToC() |
||||
.get()); |
||||
grpc_transport* transport; |
||||
transport = grpc_create_chttp2_transport(args, ep_.client, true); |
||||
auto channel = grpc_core::Channel::Create( |
||||
"socketpair-target", args, GRPC_CLIENT_DIRECT_CHANNEL, transport); |
||||
grpc_channel* client; |
||||
if (channel.ok()) { |
||||
client = channel->release()->c_ptr(); |
||||
grpc_chttp2_transport_start_reading(transport, nullptr, nullptr, nullptr); |
||||
} else { |
||||
client = grpc_lame_client_channel_create( |
||||
nullptr, static_cast<grpc_status_code>(channel.status().code()), |
||||
"lame channel"); |
||||
grpc_transport_destroy(transport); |
||||
} |
||||
GPR_ASSERT(client); |
||||
return client; |
||||
} |
||||
|
||||
grpc_endpoint_pair ep_; |
||||
}; |
||||
|
||||
#endif // GRPC_TEST_CORE_END2END_FIXTURES_SOCKPAIR_FIXTURE_H
|
@ -1,505 +0,0 @@ |
||||
//
|
||||
//
|
||||
// Copyright 2018 gRPC authors.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
//
|
||||
//
|
||||
|
||||
#include <inttypes.h> |
||||
#include <string.h> |
||||
|
||||
#include <initializer_list> |
||||
|
||||
#include "absl/strings/str_format.h" |
||||
|
||||
#include <grpc/grpc.h> |
||||
#include <grpc/impl/propagation_bits.h> |
||||
#include <grpc/slice.h> |
||||
#include <grpc/status.h> |
||||
#include <grpc/support/alloc.h> |
||||
#include <grpc/support/log.h> |
||||
#include <grpc/support/sync.h> |
||||
#include <grpc/support/time.h> |
||||
|
||||
#include "src/core/ext/transport/inproc/inproc_transport.h" |
||||
#include "src/core/lib/gprpp/crash.h" |
||||
#include "test/core/end2end/end2end_tests.h" |
||||
#include "test/core/util/test_config.h" |
||||
|
||||
typedef struct inproc_fixture_data { |
||||
bool phony; // reserved for future expansion. Struct can't be empty
|
||||
} inproc_fixture_data; |
||||
|
||||
namespace { |
||||
template <typename F> |
||||
class CQDeletingCallback : public grpc_completion_queue_functor { |
||||
public: |
||||
explicit CQDeletingCallback(F f) : func_(f) { |
||||
functor_run = &CQDeletingCallback::Run; |
||||
inlineable = false; |
||||
} |
||||
~CQDeletingCallback() {} |
||||
static void Run(grpc_completion_queue_functor* cb, int ok) { |
||||
auto* callback = static_cast<CQDeletingCallback*>(cb); |
||||
callback->func_(static_cast<bool>(ok)); |
||||
delete callback; |
||||
} |
||||
|
||||
private: |
||||
F func_; |
||||
}; |
||||
|
||||
template <typename F> |
||||
grpc_completion_queue_functor* NewDeletingCallback(F f) { |
||||
return new CQDeletingCallback<F>(f); |
||||
} |
||||
|
||||
class ShutdownCallback : public grpc_completion_queue_functor { |
||||
public: |
||||
ShutdownCallback() : done_(false) { |
||||
functor_run = &ShutdownCallback::StaticRun; |
||||
inlineable = false; |
||||
gpr_mu_init(&mu_); |
||||
gpr_cv_init(&cv_); |
||||
} |
||||
~ShutdownCallback() { |
||||
gpr_mu_destroy(&mu_); |
||||
gpr_cv_destroy(&cv_); |
||||
} |
||||
static void StaticRun(grpc_completion_queue_functor* cb, int ok) { |
||||
auto* callback = static_cast<ShutdownCallback*>(cb); |
||||
callback->Run(static_cast<bool>(ok)); |
||||
} |
||||
void Run(bool /*ok*/) { |
||||
gpr_log(GPR_DEBUG, "CQ shutdown notification invoked"); |
||||
gpr_mu_lock(&mu_); |
||||
done_ = true; |
||||
gpr_cv_broadcast(&cv_); |
||||
gpr_mu_unlock(&mu_); |
||||
} |
||||
// The Wait function waits for a specified amount of
|
||||
// time for the completion of the shutdown and returns
|
||||
// whether it was successfully shut down
|
||||
bool Wait(gpr_timespec deadline) { |
||||
gpr_mu_lock(&mu_); |
||||
while (!done_ && !gpr_cv_wait(&cv_, &mu_, deadline)) { |
||||
} |
||||
bool ret = done_; |
||||
gpr_mu_unlock(&mu_); |
||||
return ret; |
||||
} |
||||
|
||||
private: |
||||
bool done_; |
||||
gpr_mu mu_; |
||||
gpr_cv cv_; |
||||
}; |
||||
|
||||
ShutdownCallback* g_shutdown_callback; |
||||
} // namespace
|
||||
|
||||
// The following global structure is the tag collection. It holds
|
||||
// all information related to tags expected and tags received
|
||||
// during the execution, with each callback setting a tag.
|
||||
// The tag sets are implemented and checked using arrays and
|
||||
// linear lookups (rather than maps) so that this test doesn't
|
||||
// need the C++ standard library.
|
||||
static gpr_mu tags_mu; |
||||
static gpr_cv tags_cv; |
||||
const size_t kAvailableTags = 4; |
||||
bool tags[kAvailableTags]; |
||||
bool tags_valid[kAvailableTags]; |
||||
bool tags_expected[kAvailableTags]; |
||||
bool tags_needed[kAvailableTags]; |
||||
|
||||
// Mark that a tag is expected; this function must be executed in the
|
||||
// main thread only while there are no other threads altering the
|
||||
// expectation set (e.g., by calling expect_tag or verify_tags)
|
||||
static void expect_tag(intptr_t tag, bool ok) { |
||||
size_t idx = static_cast<size_t>(tag); |
||||
GPR_ASSERT(idx < kAvailableTags); |
||||
tags_needed[idx] = true; |
||||
tags_expected[idx] = ok; |
||||
} |
||||
|
||||
// Check that the expected tags have reached, within a certain
|
||||
// deadline. This must also be executed only on the main thread while
|
||||
// there are no other threads altering the expectation set (e.g., by
|
||||
// calling expect_tag or verify_tags). The tag verifier doesn't have
|
||||
// to drive the CQ at all (unlike the next-based end2end tests)
|
||||
// because the tags will get set when the callbacks are executed,
|
||||
// which happens when a particular batch related to a callback is
|
||||
// complete.
|
||||
static void verify_tags(gpr_timespec deadline) { |
||||
bool done = false; |
||||
|
||||
gpr_mu_lock(&tags_mu); |
||||
while (!done) { |
||||
done = gpr_time_cmp(gpr_now(GPR_CLOCK_MONOTONIC), deadline) > 0; |
||||
for (size_t i = 0; i < kAvailableTags; i++) { |
||||
if (tags_needed[i]) { |
||||
if (tags_valid[i]) { |
||||
gpr_log(GPR_DEBUG, "Verifying tag %d", static_cast<int>(i)); |
||||
if (tags[i] != tags_expected[i]) { |
||||
grpc_core::Crash(absl::StrFormat( |
||||
"Got wrong result (%d instead of %d) for tag %d", tags[i], |
||||
tags_expected[i], static_cast<int>(i))); |
||||
} |
||||
tags_valid[i] = false; |
||||
tags_needed[i] = false; |
||||
} else if (done) { |
||||
grpc_core::Crash( |
||||
absl::StrFormat("Didn't get tag %d", static_cast<int>(i))); |
||||
} |
||||
} |
||||
} |
||||
bool empty = true; |
||||
for (size_t i = 0; i < kAvailableTags; i++) { |
||||
if (tags_needed[i]) { |
||||
empty = false; |
||||
} |
||||
} |
||||
done = done || empty; |
||||
if (done) { |
||||
for (size_t i = 0; i < kAvailableTags; i++) { |
||||
if (tags_valid[i]) { |
||||
grpc_core::Crash( |
||||
absl::StrFormat("Got unexpected tag %d and result %d", |
||||
static_cast<int>(i), tags[i])); |
||||
} |
||||
tags_valid[i] = false; |
||||
} |
||||
} else { |
||||
gpr_cv_wait(&tags_cv, &tags_mu, deadline); |
||||
} |
||||
} |
||||
gpr_mu_unlock(&tags_mu); |
||||
} |
||||
|
||||
// This function creates a callback functor that emits the
|
||||
// desired tag into the global tag set
|
||||
static grpc_completion_queue_functor* tag(intptr_t t) { |
||||
auto func = [t](bool ok) { |
||||
gpr_mu_lock(&tags_mu); |
||||
gpr_log(GPR_DEBUG, "Completing operation %" PRIdPTR, t); |
||||
bool was_empty = true; |
||||
for (size_t i = 0; i < kAvailableTags; i++) { |
||||
if (tags_valid[i]) { |
||||
was_empty = false; |
||||
} |
||||
} |
||||
size_t idx = static_cast<size_t>(t); |
||||
tags[idx] = ok; |
||||
tags_valid[idx] = true; |
||||
if (was_empty) { |
||||
gpr_cv_signal(&tags_cv); |
||||
} |
||||
gpr_mu_unlock(&tags_mu); |
||||
}; |
||||
auto cb = NewDeletingCallback(func); |
||||
return cb; |
||||
} |
||||
|
||||
static grpc_end2end_test_fixture inproc_create_fixture( |
||||
const grpc_channel_args* /*client_args*/, |
||||
const grpc_channel_args* /*server_args*/) { |
||||
grpc_end2end_test_fixture f; |
||||
inproc_fixture_data* ffd = static_cast<inproc_fixture_data*>( |
||||
gpr_malloc(sizeof(inproc_fixture_data))); |
||||
memset(&f, 0, sizeof(f)); |
||||
|
||||
f.fixture_data = ffd; |
||||
g_shutdown_callback = new ShutdownCallback(); |
||||
f.cq = |
||||
grpc_completion_queue_create_for_callback(g_shutdown_callback, nullptr); |
||||
|
||||
return f; |
||||
} |
||||
|
||||
void inproc_init_client(grpc_end2end_test_fixture* f, |
||||
const grpc_channel_args* client_args) { |
||||
f->client = grpc_inproc_channel_create(f->server, client_args, nullptr); |
||||
GPR_ASSERT(f->client); |
||||
} |
||||
|
||||
void inproc_init_server(grpc_end2end_test_fixture* f, |
||||
const grpc_channel_args* server_args) { |
||||
if (f->server) { |
||||
grpc_server_destroy(f->server); |
||||
} |
||||
f->server = grpc_server_create(server_args, nullptr); |
||||
grpc_server_register_completion_queue(f->server, f->cq, nullptr); |
||||
grpc_server_start(f->server); |
||||
} |
||||
|
||||
void inproc_tear_down(grpc_end2end_test_fixture* f) { |
||||
inproc_fixture_data* ffd = static_cast<inproc_fixture_data*>(f->fixture_data); |
||||
gpr_free(ffd); |
||||
} |
||||
|
||||
static grpc_end2end_test_fixture begin_test( |
||||
grpc_end2end_test_config config, const char* test_name, |
||||
const grpc_channel_args* client_args, |
||||
const grpc_channel_args* server_args) { |
||||
grpc_end2end_test_fixture f; |
||||
gpr_log(GPR_INFO, "Running test: %s/%s", test_name, config.name); |
||||
f = config.create_fixture(client_args, server_args); |
||||
config.init_server(&f, server_args); |
||||
config.init_client(&f, client_args); |
||||
return f; |
||||
} |
||||
|
||||
static gpr_timespec n_seconds_from_now(int n) { |
||||
return grpc_timeout_seconds_to_deadline(n); |
||||
} |
||||
|
||||
static gpr_timespec five_seconds_from_now() { return n_seconds_from_now(5); } |
||||
|
||||
static void drain_cq(grpc_completion_queue* /*cq*/) { |
||||
// Wait for the shutdown callback to arrive, or fail the test
|
||||
GPR_ASSERT(g_shutdown_callback->Wait(five_seconds_from_now())); |
||||
gpr_log(GPR_DEBUG, "CQ shutdown wait complete"); |
||||
delete g_shutdown_callback; |
||||
} |
||||
|
||||
static void shutdown_server(grpc_end2end_test_fixture* f) { |
||||
if (!f->server) return; |
||||
grpc_server_shutdown_and_notify(f->server, f->cq, tag(1)); |
||||
expect_tag(1, true); |
||||
verify_tags(five_seconds_from_now()); |
||||
grpc_server_destroy(f->server); |
||||
f->server = nullptr; |
||||
} |
||||
|
||||
static void shutdown_client(grpc_end2end_test_fixture* f) { |
||||
if (!f->client) return; |
||||
grpc_channel_destroy(f->client); |
||||
f->client = nullptr; |
||||
} |
||||
|
||||
static void end_test(grpc_end2end_test_fixture* f) { |
||||
shutdown_server(f); |
||||
shutdown_client(f); |
||||
|
||||
grpc_completion_queue_shutdown(f->cq); |
||||
drain_cq(f->cq); |
||||
grpc_completion_queue_destroy(f->cq); |
||||
} |
||||
|
||||
static void simple_request_body(grpc_end2end_test_config /* config */, |
||||
grpc_end2end_test_fixture f) { |
||||
grpc_call* c; |
||||
grpc_call* s; |
||||
grpc_op ops[6]; |
||||
grpc_op* op; |
||||
grpc_metadata_array initial_metadata_recv; |
||||
grpc_metadata_array trailing_metadata_recv; |
||||
grpc_metadata_array request_metadata_recv; |
||||
grpc_call_details call_details; |
||||
grpc_status_code status; |
||||
const char* error_string; |
||||
grpc_call_error error; |
||||
grpc_slice details; |
||||
int was_cancelled = 2; |
||||
char* peer; |
||||
gpr_timespec deadline = five_seconds_from_now(); |
||||
|
||||
c = grpc_channel_create_call(f.client, nullptr, GRPC_PROPAGATE_DEFAULTS, f.cq, |
||||
grpc_slice_from_static_string("/foo"), nullptr, |
||||
deadline, nullptr); |
||||
GPR_ASSERT(c); |
||||
|
||||
peer = grpc_call_get_peer(c); |
||||
GPR_ASSERT(peer != nullptr); |
||||
gpr_log(GPR_DEBUG, "client_peer_before_call=%s", peer); |
||||
gpr_free(peer); |
||||
|
||||
grpc_metadata_array_init(&initial_metadata_recv); |
||||
grpc_metadata_array_init(&trailing_metadata_recv); |
||||
grpc_metadata_array_init(&request_metadata_recv); |
||||
grpc_call_details_init(&call_details); |
||||
|
||||
// Create a basic client unary request batch (no payload)
|
||||
memset(ops, 0, sizeof(ops)); |
||||
op = ops; |
||||
op->op = GRPC_OP_SEND_INITIAL_METADATA; |
||||
op->data.send_initial_metadata.count = 0; |
||||
op->flags = 0; |
||||
op->reserved = nullptr; |
||||
op++; |
||||
op->op = GRPC_OP_SEND_CLOSE_FROM_CLIENT; |
||||
op->flags = 0; |
||||
op->reserved = nullptr; |
||||
op++; |
||||
op->op = GRPC_OP_RECV_INITIAL_METADATA; |
||||
op->data.recv_initial_metadata.recv_initial_metadata = &initial_metadata_recv; |
||||
op->flags = 0; |
||||
op->reserved = nullptr; |
||||
op++; |
||||
op->op = GRPC_OP_RECV_STATUS_ON_CLIENT; |
||||
op->data.recv_status_on_client.trailing_metadata = &trailing_metadata_recv; |
||||
op->data.recv_status_on_client.status = &status; |
||||
op->data.recv_status_on_client.status_details = &details; |
||||
op->data.recv_status_on_client.error_string = &error_string; |
||||
op->flags = 0; |
||||
op->reserved = nullptr; |
||||
op++; |
||||
error = grpc_call_start_batch(c, ops, static_cast<size_t>(op - ops), tag(1), |
||||
nullptr); |
||||
GPR_ASSERT(GRPC_CALL_OK == error); |
||||
|
||||
// Register a call at the server-side to match the incoming client call
|
||||
error = grpc_server_request_call(f.server, &s, &call_details, |
||||
&request_metadata_recv, f.cq, f.cq, tag(2)); |
||||
GPR_ASSERT(GRPC_CALL_OK == error); |
||||
|
||||
// We expect that the server call creation callback (and no others) will
|
||||
// execute now since no other batch should be complete.
|
||||
expect_tag(2, true); |
||||
verify_tags(deadline); |
||||
|
||||
peer = grpc_call_get_peer(s); |
||||
GPR_ASSERT(peer != nullptr); |
||||
gpr_log(GPR_DEBUG, "server_peer=%s", peer); |
||||
gpr_free(peer); |
||||
peer = grpc_call_get_peer(c); |
||||
GPR_ASSERT(peer != nullptr); |
||||
gpr_log(GPR_DEBUG, "client_peer=%s", peer); |
||||
gpr_free(peer); |
||||
|
||||
// Create the server response batch (no payload)
|
||||
memset(ops, 0, sizeof(ops)); |
||||
op = ops; |
||||
op->op = GRPC_OP_SEND_INITIAL_METADATA; |
||||
op->data.send_initial_metadata.count = 0; |
||||
op->flags = 0; |
||||
op->reserved = nullptr; |
||||
op++; |
||||
op->op = GRPC_OP_SEND_STATUS_FROM_SERVER; |
||||
op->data.send_status_from_server.trailing_metadata_count = 0; |
||||
op->data.send_status_from_server.status = GRPC_STATUS_UNIMPLEMENTED; |
||||
grpc_slice status_details = grpc_slice_from_static_string("xyz"); |
||||
op->data.send_status_from_server.status_details = &status_details; |
||||
op->flags = 0; |
||||
op->reserved = nullptr; |
||||
op++; |
||||
op->op = GRPC_OP_RECV_CLOSE_ON_SERVER; |
||||
op->data.recv_close_on_server.cancelled = &was_cancelled; |
||||
op->flags = 0; |
||||
op->reserved = nullptr; |
||||
op++; |
||||
error = grpc_call_start_batch(s, ops, static_cast<size_t>(op - ops), tag(3), |
||||
nullptr); |
||||
GPR_ASSERT(GRPC_CALL_OK == error); |
||||
|
||||
// Both the client request and server response batches should get complete
|
||||
// now and we should see that their callbacks have been executed
|
||||
expect_tag(3, true); |
||||
expect_tag(1, true); |
||||
verify_tags(deadline); |
||||
|
||||
GPR_ASSERT(status == GRPC_STATUS_UNIMPLEMENTED); |
||||
GPR_ASSERT(0 == grpc_slice_str_cmp(details, "xyz")); |
||||
// the following sanity check makes sure that the requested error string is
|
||||
// correctly populated by the core. It looks for certain substrings that are
|
||||
// not likely to change much. Some parts of the error, like time created,
|
||||
// obviously are not checked.
|
||||
GPR_ASSERT(nullptr != strstr(error_string, "xyz")); |
||||
GPR_ASSERT(nullptr != strstr(error_string, "Error received from peer")); |
||||
GPR_ASSERT(nullptr != strstr(error_string, "grpc_message")); |
||||
GPR_ASSERT(nullptr != strstr(error_string, "grpc_status")); |
||||
GPR_ASSERT(0 == grpc_slice_str_cmp(call_details.method, "/foo")); |
||||
GPR_ASSERT(was_cancelled == 0); |
||||
|
||||
grpc_slice_unref(details); |
||||
gpr_free(static_cast<void*>(const_cast<char*>(error_string))); |
||||
grpc_metadata_array_destroy(&initial_metadata_recv); |
||||
grpc_metadata_array_destroy(&trailing_metadata_recv); |
||||
grpc_metadata_array_destroy(&request_metadata_recv); |
||||
grpc_call_details_destroy(&call_details); |
||||
|
||||
grpc_call_unref(c); |
||||
grpc_call_unref(s); |
||||
} |
||||
|
||||
static void test_invoke_simple_request(grpc_end2end_test_config config) { |
||||
grpc_end2end_test_fixture f; |
||||
|
||||
f = begin_test(config, "test_invoke_simple_request", nullptr, nullptr); |
||||
simple_request_body(config, f); |
||||
end_test(&f); |
||||
config.tear_down_data(&f); |
||||
} |
||||
|
||||
static void test_invoke_10_simple_requests(grpc_end2end_test_config config) { |
||||
int i; |
||||
grpc_end2end_test_fixture f = |
||||
begin_test(config, "test_invoke_10_simple_requests", nullptr, nullptr); |
||||
for (i = 0; i < 10; i++) { |
||||
simple_request_body(config, f); |
||||
gpr_log(GPR_INFO, "Running test: Passed simple request %d", i); |
||||
} |
||||
end_test(&f); |
||||
config.tear_down_data(&f); |
||||
} |
||||
|
||||
static void test_invoke_many_simple_requests(grpc_end2end_test_config config) { |
||||
int i; |
||||
const int many = 1000; |
||||
grpc_end2end_test_fixture f = |
||||
begin_test(config, "test_invoke_many_simple_requests", nullptr, nullptr); |
||||
gpr_timespec t1 = gpr_now(GPR_CLOCK_MONOTONIC); |
||||
for (i = 0; i < many; i++) { |
||||
simple_request_body(config, f); |
||||
} |
||||
double us = |
||||
gpr_timespec_to_micros(gpr_time_sub(gpr_now(GPR_CLOCK_MONOTONIC), t1)) / |
||||
many; |
||||
gpr_log(GPR_INFO, "Time per ping %f us", us); |
||||
end_test(&f); |
||||
config.tear_down_data(&f); |
||||
} |
||||
|
||||
static void simple_request(grpc_end2end_test_config config) { |
||||
int i; |
||||
for (i = 0; i < 10; i++) { |
||||
test_invoke_simple_request(config); |
||||
} |
||||
test_invoke_10_simple_requests(config); |
||||
test_invoke_many_simple_requests(config); |
||||
} |
||||
|
||||
static void simple_request_pre_init() { |
||||
gpr_mu_init(&tags_mu); |
||||
gpr_cv_init(&tags_cv); |
||||
} |
||||
|
||||
// All test configurations
|
||||
static grpc_end2end_test_config configs[] = { |
||||
{"inproc-callback", FEATURE_MASK_SUPPORTS_AUTHORITY_HEADER, nullptr, |
||||
inproc_create_fixture, inproc_init_client, inproc_init_server, |
||||
inproc_tear_down}, |
||||
}; |
||||
|
||||
int main(int argc, char** argv) { |
||||
grpc::testing::TestEnvironment env(&argc, argv); |
||||
grpc_init(); |
||||
|
||||
simple_request_pre_init(); |
||||
simple_request(configs[0]); |
||||
|
||||
grpc_shutdown(); |
||||
|
||||
return 0; |
||||
} |
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in new issue