The C based gRPC (C++, Python, Ruby, Objective-C, PHP, C#) https://grpc.io/
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

219 lines
9.7 KiB

/*
*
* Copyright 2019 gRPC authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
*/
#include <gtest/gtest.h>
#include "upb/upb.hpp"
#include <grpcpp/security/alts_context.h>
#include <grpcpp/security/alts_util.h>
#include <grpcpp/security/auth_context.h>
#include "src/core/tsi/alts/handshaker/alts_tsi_handshaker.h"
#include "src/cpp/common/secure_auth_context.h"
#include "src/proto/grpc/gcp/altscontext.upb.h"
#include "test/core/util/test_config.h"
#include "test/cpp/util/string_ref_helper.h"
namespace grpc {
namespace {
TEST(AltsUtilTest, NullAuthContext) {
std::unique_ptr<experimental::AltsContext> alts_context =
experimental::GetAltsContextFromAuthContext(nullptr);
EXPECT_EQ(alts_context, nullptr);
}
TEST(AltsUtilTest, EmptyAuthContext) {
grpc_core::RefCountedPtr<grpc_auth_context> ctx =
grpc_core::MakeRefCounted<grpc_auth_context>(nullptr);
const std::shared_ptr<AuthContext> auth_context(
new SecureAuthContext(ctx.get()));
std::unique_ptr<experimental::AltsContext> alts_context =
experimental::GetAltsContextFromAuthContext(auth_context);
EXPECT_EQ(alts_context, nullptr);
}
TEST(AltsUtilTest, AuthContextWithMoreThanOneAltsContext) {
grpc_core::RefCountedPtr<grpc_auth_context> ctx =
grpc_core::MakeRefCounted<grpc_auth_context>(nullptr);
const std::shared_ptr<AuthContext> auth_context(
new SecureAuthContext(ctx.get()));
ctx.reset();
auth_context->AddProperty(TSI_ALTS_CONTEXT, "context1");
auth_context->AddProperty(TSI_ALTS_CONTEXT, "context2");
std::unique_ptr<experimental::AltsContext> alts_context =
experimental::GetAltsContextFromAuthContext(auth_context);
EXPECT_EQ(alts_context, nullptr);
}
TEST(AltsUtilTest, AuthContextWithBadAltsContext) {
grpc_core::RefCountedPtr<grpc_auth_context> ctx =
grpc_core::MakeRefCounted<grpc_auth_context>(nullptr);
const std::shared_ptr<AuthContext> auth_context(
new SecureAuthContext(ctx.get()));
ctx.reset();
auth_context->AddProperty(TSI_ALTS_CONTEXT,
"bad context string serialization");
std::unique_ptr<experimental::AltsContext> alts_context =
experimental::GetAltsContextFromAuthContext(auth_context);
EXPECT_EQ(alts_context, nullptr);
}
TEST(AltsUtilTest, AuthContextWithGoodAltsContextWithoutRpcVersions) {
grpc_core::RefCountedPtr<grpc_auth_context> ctx =
grpc_core::MakeRefCounted<grpc_auth_context>(nullptr);
const std::shared_ptr<AuthContext> auth_context(
new SecureAuthContext(ctx.get()));
ctx.reset();
std::string expected_ap("application protocol");
std::string expected_rp("record protocol");
std::string expected_peer("peer");
std::string expected_local("local");
std::string expected_peer_atrributes_key("peer");
std::string expected_peer_atrributes_value("attributes");
grpc_security_level expected_sl = GRPC_INTEGRITY_ONLY;
upb::Arena context_arena;
grpc_gcp_AltsContext* context = grpc_gcp_AltsContext_new(context_arena.ptr());
grpc_gcp_AltsContext_set_application_protocol(
context, upb_strview_make(expected_ap.data(), expected_ap.length()));
grpc_gcp_AltsContext_set_record_protocol(
context, upb_strview_make(expected_rp.data(), expected_rp.length()));
grpc_gcp_AltsContext_set_security_level(context, expected_sl);
grpc_gcp_AltsContext_set_peer_service_account(
context, upb_strview_make(expected_peer.data(), expected_peer.length()));
grpc_gcp_AltsContext_set_local_service_account(
context,
upb_strview_make(expected_local.data(), expected_local.length()));
grpc_gcp_AltsContext_peer_attributes_set(
context,
upb_strview_make(expected_peer_atrributes_key.data(),
expected_peer_atrributes_key.length()),
upb_strview_make(expected_peer_atrributes_value.data(),
expected_peer_atrributes_value.length()),
context_arena.ptr());
size_t serialized_ctx_length;
char* serialized_ctx = grpc_gcp_AltsContext_serialize(
context, context_arena.ptr(), &serialized_ctx_length);
EXPECT_NE(serialized_ctx, nullptr);
auth_context->AddProperty(TSI_ALTS_CONTEXT,
string(serialized_ctx, serialized_ctx_length));
std::unique_ptr<experimental::AltsContext> alts_context =
experimental::GetAltsContextFromAuthContext(auth_context);
EXPECT_NE(alts_context, nullptr);
EXPECT_EQ(expected_ap, alts_context->application_protocol());
EXPECT_EQ(expected_rp, alts_context->record_protocol());
EXPECT_EQ(expected_peer, alts_context->peer_service_account());
EXPECT_EQ(expected_local, alts_context->local_service_account());
EXPECT_EQ(expected_sl, alts_context->security_level());
// all rpc versions should be 0 if not set
experimental::AltsContext::RpcProtocolVersions rpc_protocol_versions =
alts_context->peer_rpc_versions();
EXPECT_EQ(0, rpc_protocol_versions.max_rpc_version.major_version);
EXPECT_EQ(0, rpc_protocol_versions.max_rpc_version.minor_version);
EXPECT_EQ(0, rpc_protocol_versions.min_rpc_version.major_version);
EXPECT_EQ(0, rpc_protocol_versions.min_rpc_version.minor_version);
EXPECT_EQ(expected_peer_atrributes_value,
alts_context->peer_attributes().at(expected_peer_atrributes_key));
}
TEST(AltsUtilTest, AuthContextWithGoodAltsContext) {
grpc_core::RefCountedPtr<grpc_auth_context> ctx =
grpc_core::MakeRefCounted<grpc_auth_context>(nullptr);
const std::shared_ptr<AuthContext> auth_context(
new SecureAuthContext(ctx.get()));
ctx.reset();
upb::Arena context_arena;
grpc_gcp_AltsContext* context = grpc_gcp_AltsContext_new(context_arena.ptr());
upb::Arena versions_arena;
grpc_gcp_RpcProtocolVersions* versions =
grpc_gcp_RpcProtocolVersions_new(versions_arena.ptr());
upb::Arena max_major_version_arena;
grpc_gcp_RpcProtocolVersions_Version* version =
grpc_gcp_RpcProtocolVersions_Version_new(max_major_version_arena.ptr());
grpc_gcp_RpcProtocolVersions_Version_set_major(version, 10);
grpc_gcp_RpcProtocolVersions_set_max_rpc_version(versions, version);
grpc_gcp_AltsContext_set_peer_rpc_versions(context, versions);
size_t serialized_ctx_length;
char* serialized_ctx = grpc_gcp_AltsContext_serialize(
context, context_arena.ptr(), &serialized_ctx_length);
EXPECT_NE(serialized_ctx, nullptr);
auth_context->AddProperty(TSI_ALTS_CONTEXT,
string(serialized_ctx, serialized_ctx_length));
std::unique_ptr<experimental::AltsContext> alts_context =
experimental::GetAltsContextFromAuthContext(auth_context);
EXPECT_NE(alts_context, nullptr);
EXPECT_EQ("", alts_context->application_protocol());
EXPECT_EQ("", alts_context->record_protocol());
EXPECT_EQ("", alts_context->peer_service_account());
EXPECT_EQ("", alts_context->local_service_account());
EXPECT_EQ(GRPC_SECURITY_NONE, alts_context->security_level());
experimental::AltsContext::RpcProtocolVersions rpc_protocol_versions =
alts_context->peer_rpc_versions();
EXPECT_EQ(10, rpc_protocol_versions.max_rpc_version.major_version);
EXPECT_EQ(0, rpc_protocol_versions.max_rpc_version.minor_version);
EXPECT_EQ(0, rpc_protocol_versions.min_rpc_version.major_version);
EXPECT_EQ(0, rpc_protocol_versions.min_rpc_version.minor_version);
}
TEST(AltsUtilTest, AltsClientAuthzCheck) {
// AltsClientAuthzCheck function should return a permission denied error on
// the bad_auth_context, whose internal ALTS context does not exist
const std::shared_ptr<AuthContext> bad_auth_context(
new SecureAuthContext(nullptr));
std::vector<std::string> service_accounts{"client"};
grpc::Status status =
experimental::AltsClientAuthzCheck(bad_auth_context, service_accounts);
EXPECT_EQ(grpc::StatusCode::PERMISSION_DENIED, status.error_code());
// AltsClientAuthzCheck function should function normally when the peer name
// in ALTS context is listed in service_accounts
grpc_core::RefCountedPtr<grpc_auth_context> ctx =
grpc_core::MakeRefCounted<grpc_auth_context>(nullptr);
const std::shared_ptr<AuthContext> auth_context(
new SecureAuthContext(ctx.get()));
ctx.reset();
std::string peer("good_client");
std::vector<std::string> good_service_accounts{"good_client",
"good_client_1"};
std::vector<std::string> bad_service_accounts{"bad_client", "bad_client_1"};
upb::Arena context_arena;
grpc_gcp_AltsContext* context = grpc_gcp_AltsContext_new(context_arena.ptr());
grpc_gcp_AltsContext_set_peer_service_account(
context, upb_strview_make(peer.data(), peer.length()));
size_t serialized_ctx_length;
char* serialized_ctx = grpc_gcp_AltsContext_serialize(
context, context_arena.ptr(), &serialized_ctx_length);
EXPECT_NE(serialized_ctx, nullptr);
auth_context->AddProperty(TSI_ALTS_CONTEXT,
string(serialized_ctx, serialized_ctx_length));
grpc::Status good_status =
experimental::AltsClientAuthzCheck(auth_context, good_service_accounts);
EXPECT_TRUE(good_status.ok());
grpc::Status bad_status =
experimental::AltsClientAuthzCheck(auth_context, bad_service_accounts);
EXPECT_EQ(grpc::StatusCode::PERMISSION_DENIED, bad_status.error_code());
}
} // namespace
} // namespace grpc
int main(int argc, char** argv) {
grpc::testing::TestEnvironment env(argc, argv);
::testing::InitGoogleTest(&argc, argv);
return RUN_ALL_TESTS();
}