The C based gRPC (C++, Python, Ruby, Objective-C, PHP, C#)
https://grpc.io/
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
130 lines
5.1 KiB
130 lines
5.1 KiB
#region Copyright notice and license |
|
|
|
// Copyright 2015-2016 gRPC authors. |
|
// |
|
// Licensed under the Apache License, Version 2.0 (the "License"); |
|
// you may not use this file except in compliance with the License. |
|
// You may obtain a copy of the License at |
|
// |
|
// http://www.apache.org/licenses/LICENSE-2.0 |
|
// |
|
// Unless required by applicable law or agreed to in writing, software |
|
// distributed under the License is distributed on an "AS IS" BASIS, |
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
|
// See the License for the specific language governing permissions and |
|
// limitations under the License. |
|
|
|
#endregion |
|
|
|
using System; |
|
using System.Collections.Generic; |
|
using System.IO; |
|
using System.Linq; |
|
using System.Threading; |
|
using System.Threading.Tasks; |
|
using Grpc.Core; |
|
using Grpc.Core.Utils; |
|
using Grpc.Testing; |
|
using NUnit.Framework; |
|
|
|
namespace Grpc.IntegrationTesting |
|
{ |
|
public class MetadataCredentialsTest |
|
{ |
|
const string Host = "localhost"; |
|
Server server; |
|
Channel channel; |
|
TestService.TestServiceClient client; |
|
List<ChannelOption> options; |
|
AsyncAuthInterceptor asyncAuthInterceptor; |
|
|
|
[SetUp] |
|
public void Init() |
|
{ |
|
// Disable SO_REUSEPORT to prevent https://github.com/grpc/grpc/issues/10755 |
|
server = new Server(new[] { new ChannelOption(ChannelOptions.SoReuseport, 0) }) |
|
{ |
|
Services = { TestService.BindService(new FakeTestService()) }, |
|
Ports = { { Host, ServerPort.PickUnused, TestCredentials.CreateSslServerCredentials() } } |
|
}; |
|
server.Start(); |
|
|
|
options = new List<ChannelOption> |
|
{ |
|
new ChannelOption(ChannelOptions.SslTargetNameOverride, TestCredentials.DefaultHostOverride) |
|
}; |
|
|
|
asyncAuthInterceptor = new AsyncAuthInterceptor(async (context, metadata) => |
|
{ |
|
await Task.Delay(100).ConfigureAwait(false); // make sure the operation is asynchronous. |
|
metadata.Add("authorization", "SECRET_TOKEN"); |
|
}); |
|
} |
|
|
|
[TearDown] |
|
public void Cleanup() |
|
{ |
|
channel.ShutdownAsync().Wait(); |
|
server.ShutdownAsync().Wait(); |
|
} |
|
|
|
[Test] |
|
public void MetadataCredentials() |
|
{ |
|
var channelCredentials = ChannelCredentials.Create(TestCredentials.CreateSslCredentials(), |
|
CallCredentials.FromInterceptor(asyncAuthInterceptor)); |
|
channel = new Channel(Host, server.Ports.Single().BoundPort, channelCredentials, options); |
|
client = new TestService.TestServiceClient(channel); |
|
|
|
client.UnaryCall(new SimpleRequest { }); |
|
} |
|
|
|
[Test] |
|
public void MetadataCredentials_PerCall() |
|
{ |
|
channel = new Channel(Host, server.Ports.Single().BoundPort, TestCredentials.CreateSslCredentials(), options); |
|
client = new TestService.TestServiceClient(channel); |
|
|
|
var callCredentials = CallCredentials.FromInterceptor(asyncAuthInterceptor); |
|
client.UnaryCall(new SimpleRequest { }, new CallOptions(credentials: callCredentials)); |
|
} |
|
|
|
[Test] |
|
public void MetadataCredentials_InterceptorLeavesMetadataEmpty() |
|
{ |
|
var channelCredentials = ChannelCredentials.Create(TestCredentials.CreateSslCredentials(), |
|
CallCredentials.FromInterceptor(new AsyncAuthInterceptor((context, metadata) => TaskUtils.CompletedTask))); |
|
channel = new Channel(Host, server.Ports.Single().BoundPort, channelCredentials, options); |
|
client = new TestService.TestServiceClient(channel); |
|
|
|
var ex = Assert.Throws<RpcException>(() => client.UnaryCall(new SimpleRequest { })); |
|
// StatusCode.Unknown as the server-side handler throws an exception after not receiving the authorization header. |
|
Assert.AreEqual(StatusCode.Unknown, ex.Status.StatusCode); |
|
} |
|
|
|
[Test] |
|
public void MetadataCredentials_InterceptorThrows() |
|
{ |
|
var callCredentials = CallCredentials.FromInterceptor(new AsyncAuthInterceptor((context, metadata) => |
|
{ |
|
throw new Exception("Auth interceptor throws"); |
|
})); |
|
var channelCredentials = ChannelCredentials.Create(TestCredentials.CreateSslCredentials(), callCredentials); |
|
channel = new Channel(Host, server.Ports.Single().BoundPort, channelCredentials, options); |
|
client = new TestService.TestServiceClient(channel); |
|
|
|
var ex = Assert.Throws<RpcException>(() => client.UnaryCall(new SimpleRequest { })); |
|
Assert.AreEqual(StatusCode.Unauthenticated, ex.Status.StatusCode); |
|
} |
|
|
|
private class FakeTestService : TestService.TestServiceBase |
|
{ |
|
public override Task<SimpleResponse> UnaryCall(SimpleRequest request, ServerCallContext context) |
|
{ |
|
var authToken = context.RequestHeaders.First((entry) => entry.Key == "authorization").Value; |
|
Assert.AreEqual("SECRET_TOKEN", authToken); |
|
return Task.FromResult(new SimpleResponse()); |
|
} |
|
} |
|
} |
|
}
|
|
|