// // // Copyright 2023 gRPC authors. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // // #include #include #include #include "absl/synchronization/notification.h" #include #include #include #include #include #include #include "src/core/lib/iomgr/load_file.h" #include "test/core/util/port.h" #include "test/core/util/test_config.h" #include "test/cpp/end2end/test_service_impl.h" namespace grpc { namespace testing { namespace { constexpr char kCaCertPath[] = "src/core/tsi/test_creds/ca.pem"; constexpr char kServerCertPath[] = "src/core/tsi/test_creds/server1.pem"; constexpr char kServerKeyPath[] = "src/core/tsi/test_creds/server1.key"; constexpr char kClientCertPath[] = "src/core/tsi/test_creds/client.pem"; constexpr char kClientKeyPath[] = "src/core/tsi/test_creds/client.key"; constexpr char kMessage[] = "Hello"; std::string ReadFile(const std::string& file_path) { grpc_slice slice; GPR_ASSERT(GRPC_LOG_IF_ERROR("load_file", grpc_load_file(file_path.c_str(), 0, &slice))); std::string file_contents(grpc_core::StringViewFromSlice(slice)); grpc_slice_unref(slice); return file_contents; } class SslCredentialsTest : public ::testing::Test { protected: void RunServer(absl::Notification* notification) { std::string root_cert = ReadFile(kCaCertPath); grpc::SslServerCredentialsOptions::PemKeyCertPair key_cert_pair = { ReadFile(kServerKeyPath), ReadFile(kServerCertPath)}; // TODO(gtcooke94) Parametrize this test for TLS and mTLS as well grpc::SslServerCredentialsOptions ssl_options; ssl_options.pem_key_cert_pairs.push_back(key_cert_pair); ssl_options.pem_root_certs = root_cert; ssl_options.force_client_auth = true; grpc::ServerBuilder builder; TestServiceImpl service_; builder.AddListeningPort(server_addr_, grpc::SslServerCredentials(ssl_options)); builder.RegisterService("foo.test.google.fr", &service_); server_ = builder.BuildAndStart(); notification->Notify(); server_->Wait(); } void TearDown() override { if (server_ != nullptr) { server_->Shutdown(); server_thread_->join(); delete server_thread_; } } TestServiceImpl service_; std::unique_ptr server_ = nullptr; std::thread* server_thread_ = nullptr; std::string server_addr_; }; void DoRpc(const std::string& server_addr, const SslCredentialsOptions& ssl_options, grpc_ssl_session_cache* cache, bool expect_session_reuse) { ChannelArguments channel_args; channel_args.SetPointer(std::string(GRPC_SSL_SESSION_CACHE_ARG), cache); channel_args.SetSslTargetNameOverride("foo.test.google.fr"); std::shared_ptr channel = grpc::CreateCustomChannel( server_addr, grpc::SslCredentials(ssl_options), channel_args); auto stub = grpc::testing::EchoTestService::NewStub(channel); grpc::testing::EchoRequest request; grpc::testing::EchoResponse response; request.set_message(kMessage); ClientContext context; context.set_deadline(grpc_timeout_seconds_to_deadline(/*time_s=*/10)); grpc::Status result = stub->Echo(&context, request, &response); EXPECT_TRUE(result.ok()); if (!result.ok()) { gpr_log(GPR_ERROR, "%s, %s", result.error_message().c_str(), result.error_details().c_str()); } EXPECT_EQ(response.message(), kMessage); std::shared_ptr auth_context = context.auth_context(); std::vector properties = auth_context->FindPropertyValues(GRPC_SSL_SESSION_REUSED_PROPERTY); ASSERT_EQ(properties.size(), 1u); if (expect_session_reuse) { EXPECT_EQ("true", ToString(properties[0])); } else { EXPECT_EQ("false", ToString(properties[0])); } } TEST_F(SslCredentialsTest, SequentialResumption) { server_addr_ = absl::StrCat("localhost:", std::to_string(grpc_pick_unused_port_or_die())); absl::Notification notification; server_thread_ = new std::thread([&]() { RunServer(¬ification); }); notification.WaitForNotification(); std::string root_cert = ReadFile(kCaCertPath); std::string client_key = ReadFile(kClientKeyPath); std::string client_cert = ReadFile(kClientCertPath); grpc::SslCredentialsOptions ssl_options; ssl_options.pem_root_certs = root_cert; ssl_options.pem_private_key = client_key; ssl_options.pem_cert_chain = client_cert; grpc_ssl_session_cache* cache = grpc_ssl_session_cache_create_lru(16); DoRpc(server_addr_, ssl_options, cache, /*expect_session_reuse=*/false); for (int i = 0; i < 10; i++) { DoRpc(server_addr_, ssl_options, cache, /*expect_session_reuse=*/true); } grpc_ssl_session_cache_destroy(cache); } TEST_F(SslCredentialsTest, ConcurrentResumption) { server_addr_ = absl::StrCat("localhost:", std::to_string(grpc_pick_unused_port_or_die())); absl::Notification notification; server_thread_ = new std::thread([&]() { RunServer(¬ification); }); notification.WaitForNotification(); std::string root_cert = ReadFile(kCaCertPath); std::string client_key = ReadFile(kClientKeyPath); std::string client_cert = ReadFile(kClientCertPath); grpc::SslCredentialsOptions ssl_options; ssl_options.pem_root_certs = root_cert; ssl_options.pem_private_key = client_key; ssl_options.pem_cert_chain = client_cert; grpc_ssl_session_cache* cache = grpc_ssl_session_cache_create_lru(16); DoRpc(server_addr_, ssl_options, cache, /*expect_session_reuse=*/false); std::vector threads; threads.reserve(10); for (int i = 0; i < 10; i++) { threads.push_back(std::thread([&]() { DoRpc(server_addr_, ssl_options, cache, /*expect_session_reuse=*/true); })); } for (auto& t : threads) { t.join(); } grpc_ssl_session_cache_destroy(cache); } TEST_F(SslCredentialsTest, ResumptionFailsDueToNoCapacityInCache) { server_addr_ = absl::StrCat("localhost:", std::to_string(grpc_pick_unused_port_or_die())); absl::Notification notification; server_thread_ = new std::thread([&]() { RunServer(¬ification); }); notification.WaitForNotification(); std::string root_cert = ReadFile(kCaCertPath); std::string client_key = ReadFile(kClientKeyPath); std::string client_cert = ReadFile(kClientCertPath); grpc::SslCredentialsOptions ssl_options; ssl_options.pem_root_certs = root_cert; ssl_options.pem_private_key = client_key; ssl_options.pem_cert_chain = client_cert; grpc_ssl_session_cache* cache = grpc_ssl_session_cache_create_lru(0); DoRpc(server_addr_, ssl_options, cache, /*expect_session_reuse=*/false); DoRpc(server_addr_, ssl_options, cache, /*expect_session_reuse=*/false); grpc_ssl_session_cache_destroy(cache); } } // namespace } // namespace testing } // namespace grpc int main(int argc, char** argv) { grpc::testing::TestEnvironment env(&argc, argv); ::testing::InitGoogleTest(&argc, argv); int ret = RUN_ALL_TESTS(); return ret; }