Merge branch 'transport-refs-6' into transport-refs-7

pull/36732/head
Craig Tiller 11 months ago
commit f12a1da146
  1. 5
      include/grpcpp/security/tls_credentials_options.h
  2. 2
      src/core/lib/transport/interception_chain.h
  3. 4
      src/core/server/server.cc
  4. 2
      test/core/tsi/BUILD
  5. 1496
      test/core/tsi/ssl_transport_security_test.cc

@ -103,6 +103,8 @@ class TlsCredentialsOptions {
// call is covered by the cert that the peer presented.
// We will perform such checks by default. This should be disabled if
// verifiers other than the host name verifier is used.
// Deprecated: This function will be removed in the 1.66 release. This will be
// replaced by and handled within the custom verifier settings.
void set_check_call_host(bool check_call_host);
// Deprecated in favor of set_crl_provider. The
@ -111,6 +113,8 @@ class TlsCredentialsOptions {
// If set, gRPC will read all hashed x.509 CRL files in the directory and
// enforce the CRL files on all TLS handshakes. Only supported for OpenSSL
// version > 1.1.
// Deprecated: This function will be removed in the 1.66 release. Use the
// set_crl_provider function instead.
void set_crl_directory(const std::string& path);
void set_crl_provider(std::shared_ptr<CrlProvider> crl_provider);
@ -184,6 +188,7 @@ class TlsServerCredentialsOptions final : public TlsCredentialsOptions {
// WARNING: This API is extremely dangerous and should not be used. If the
// server's trust bundle is too large, then the TLS server will be unable to
// form a ServerHello, and hence will be unusable.
// Deprecated: This function will be removed in the 1.66 release.
void set_send_client_ca_list(bool send_client_ca_list);
private:

@ -188,7 +188,7 @@ class InterceptionChainBuilder final {
}
void Fail(absl::Status status) {
GPR_ASSERT(!status.ok());
CHECK(!status.ok()) << status;
if (status_.ok()) status_ = std::move(status);
}

@ -978,7 +978,7 @@ grpc_error_handle Server::SetupTransport(
connections_.emplace(std::move(t));
++connections_open_;
} else {
GPR_ASSERT(transport->filter_stack_transport() != nullptr);
CHECK(transport->filter_stack_transport() != nullptr);
absl::StatusOr<OrphanablePtr<Channel>> channel = LegacyChannel::Create(
"", args.SetObject(transport), GRPC_SERVER_CHANNEL);
if (!channel.ok()) {
@ -1387,7 +1387,7 @@ void Server::ChannelData::InitTransport(RefCountedPtr<Server> server,
}
// Start accept_stream transport op.
grpc_transport_op* op = grpc_make_transport_op(nullptr);
GPR_ASSERT(transport->filter_stack_transport() != nullptr);
CHECK(transport->filter_stack_transport() != nullptr);
op->set_accept_stream = true;
op->set_accept_stream_fn = AcceptStream;
op->set_registered_method_matcher_fn = [](void* arg,

@ -91,7 +91,7 @@ grpc_cc_test(
grpc_cc_test(
name = "ssl_transport_security_test",
timeout = "long",
timeout = "eternal",
srcs = ["ssl_transport_security_test.cc"],
data = [
"//src/core/tsi/test_creds:badclient.key",

File diff suppressed because it is too large Load Diff
Loading…
Cancel
Save