| /* |
| * |
| * Copyright 2015, Google Inc. |
| * All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions are |
| * met: |
| * |
| * * Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * * Redistributions in binary form must reproduce the above |
| * copyright notice, this list of conditions and the following disclaimer |
| * in the documentation and/or other materials provided with the |
| * distribution. |
| * * Neither the name of Google Inc. nor the names of its |
| * contributors may be used to endorse or promote products derived from |
| * this software without specific prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
| * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
| * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
| * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
| * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
| * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| * |
| */ |
| |
| #include "test/core/end2end/end2end_tests.h" |
| |
| #include <stdio.h> |
| #include <string.h> |
| |
| #include <grpc/support/alloc.h> |
| #include <grpc/support/host_port.h> |
| #include <grpc/support/log.h> |
| |
| #include "src/core/lib/channel/channel_args.h" |
| #include "src/core/lib/security/credentials/credentials.h" |
| #include "src/core/lib/support/env.h" |
| #include "src/core/lib/support/string.h" |
| #include "src/core/lib/support/tmpfile.h" |
| #include "test/core/end2end/cq_verifier.h" |
| #include "test/core/end2end/data/ssl_test_data.h" |
| #include "test/core/util/port.h" |
| #include "test/core/util/test_config.h" |
| |
| extern void simple_request(grpc_end2end_test_config config); |
| |
| typedef struct fullstack_secure_fixture_data { |
| char *localaddr; |
| } fullstack_secure_fixture_data; |
| |
| static grpc_end2end_test_fixture chttp2_create_fixture_secure_fullstack( |
| grpc_channel_args *client_args, grpc_channel_args *server_args) { |
| grpc_end2end_test_fixture f; |
| int port = grpc_pick_unused_port_or_die(); |
| fullstack_secure_fixture_data *ffd = |
| gpr_malloc(sizeof(fullstack_secure_fixture_data)); |
| memset(&f, 0, sizeof(f)); |
| |
| gpr_join_host_port(&ffd->localaddr, "localhost", port); |
| |
| f.fixture_data = ffd; |
| f.cq = grpc_completion_queue_create(NULL); |
| |
| return f; |
| } |
| |
| static void process_auth_failure(void *state, grpc_auth_context *ctx, |
| const grpc_metadata *md, size_t md_count, |
| grpc_process_auth_metadata_done_cb cb, |
| void *user_data) { |
| GPR_ASSERT(state == NULL); |
| cb(user_data, NULL, 0, NULL, 0, GRPC_STATUS_UNAUTHENTICATED, NULL); |
| } |
| |
| static void chttp2_init_client_secure_fullstack( |
| grpc_end2end_test_fixture *f, grpc_channel_args *client_args, |
| grpc_channel_credentials *creds) { |
| fullstack_secure_fixture_data *ffd = f->fixture_data; |
| f->client = |
| grpc_secure_channel_create(creds, ffd->localaddr, client_args, NULL); |
| GPR_ASSERT(f->client != NULL); |
| grpc_channel_credentials_release(creds); |
| } |
| |
| static void chttp2_init_server_secure_fullstack( |
| grpc_end2end_test_fixture *f, grpc_channel_args *server_args, |
| grpc_server_credentials *server_creds) { |
| fullstack_secure_fixture_data *ffd = f->fixture_data; |
| if (f->server) { |
| grpc_server_destroy(f->server); |
| } |
| f->server = grpc_server_create(server_args, NULL); |
| grpc_server_register_completion_queue(f->server, f->cq, NULL); |
| GPR_ASSERT(grpc_server_add_secure_http2_port(f->server, ffd->localaddr, |
| server_creds)); |
| grpc_server_credentials_release(server_creds); |
| grpc_server_start(f->server); |
| } |
| |
| void chttp2_tear_down_secure_fullstack(grpc_end2end_test_fixture *f) { |
| fullstack_secure_fixture_data *ffd = f->fixture_data; |
| gpr_free(ffd->localaddr); |
| gpr_free(ffd); |
| } |
| |
| static int fail_server_auth_check(grpc_channel_args *server_args) { |
| size_t i; |
| if (server_args == NULL) return 0; |
| for (i = 0; i < server_args->num_args; i++) { |
| if (strcmp(server_args->args[i].key, FAIL_AUTH_CHECK_SERVER_ARG_NAME) == |
| 0) { |
| return 1; |
| } |
| } |
| return 0; |
| } |
| |
| #define SERVER_INIT_NAME(REQUEST_TYPE) \ |
| chttp2_init_server_simple_ssl_secure_fullstack_##REQUEST_TYPE |
| |
| #define SERVER_INIT(REQUEST_TYPE) \ |
| static void SERVER_INIT_NAME(REQUEST_TYPE)( \ |
| grpc_end2end_test_fixture * f, grpc_channel_args * server_args) { \ |
| grpc_ssl_pem_key_cert_pair pem_cert_key_pair = {test_server1_key, \ |
| test_server1_cert}; \ |
| grpc_server_credentials *ssl_creds = \ |
| grpc_ssl_server_credentials_create_ex( \ |
| test_root_cert, &pem_cert_key_pair, 1, REQUEST_TYPE, NULL); \ |
| if (fail_server_auth_check(server_args)) { \ |
| grpc_auth_metadata_processor processor = {process_auth_failure, NULL, \ |
| NULL}; \ |
| grpc_server_credentials_set_auth_metadata_processor(ssl_creds, \ |
| processor); \ |
| } \ |
| chttp2_init_server_secure_fullstack(f, server_args, ssl_creds); \ |
| } |
| |
| SERVER_INIT(GRPC_SSL_DONT_REQUEST_CLIENT_CERTIFICATE) |
| SERVER_INIT(GRPC_SSL_REQUEST_CLIENT_CERTIFICATE_BUT_DONT_VERIFY) |
| SERVER_INIT(GRPC_SSL_REQUEST_CLIENT_CERTIFICATE_AND_VERIFY) |
| SERVER_INIT(GRPC_SSL_REQUEST_AND_REQUIRE_CLIENT_CERTIFICATE_BUT_DONT_VERIFY) |
| SERVER_INIT(GRPC_SSL_REQUEST_AND_REQUIRE_CLIENT_CERTIFICATE_AND_VERIFY) |
| |
| #define CLIENT_INIT_NAME(cert_type) \ |
| chttp2_init_client_simple_ssl_secure_fullstack_##cert_type |
| |
| typedef enum { NONE, SELF_SIGNED, SIGNED, BAD_CERT_PAIR } certtype; |
| |
| #define CLIENT_INIT(cert_type) \ |
| static void CLIENT_INIT_NAME(cert_type)(grpc_end2end_test_fixture * f, \ |
| grpc_channel_args * client_args) { \ |
| grpc_channel_credentials *ssl_creds = NULL; \ |
| grpc_ssl_pem_key_cert_pair self_signed_client_key_cert_pair = { \ |
| test_self_signed_client_key, test_self_signed_client_cert}; \ |
| grpc_ssl_pem_key_cert_pair signed_client_key_cert_pair = { \ |
| test_signed_client_key, test_signed_client_cert}; \ |
| grpc_ssl_pem_key_cert_pair bad_client_key_cert_pair = { \ |
| test_self_signed_client_key, test_signed_client_cert}; \ |
| grpc_ssl_pem_key_cert_pair *key_cert_pair = NULL; \ |
| switch (cert_type) { \ |
| case SELF_SIGNED: \ |
| key_cert_pair = &self_signed_client_key_cert_pair; \ |
| break; \ |
| case SIGNED: \ |
| key_cert_pair = &signed_client_key_cert_pair; \ |
| break; \ |
| case BAD_CERT_PAIR: \ |
| key_cert_pair = &bad_client_key_cert_pair; \ |
| break; \ |
| default: \ |
| break; \ |
| } \ |
| ssl_creds = \ |
| grpc_ssl_credentials_create(test_root_cert, key_cert_pair, NULL); \ |
| grpc_arg ssl_name_override = {GRPC_ARG_STRING, \ |
| GRPC_SSL_TARGET_NAME_OVERRIDE_ARG, \ |
| {"foo.test.google.fr"}}; \ |
| grpc_channel_args *new_client_args = \ |
| grpc_channel_args_copy_and_add(client_args, &ssl_name_override, 1); \ |
| chttp2_init_client_secure_fullstack(f, new_client_args, ssl_creds); \ |
| grpc_channel_args_destroy(new_client_args); \ |
| } |
| |
| CLIENT_INIT(NONE) |
| CLIENT_INIT(SELF_SIGNED) |
| CLIENT_INIT(SIGNED) |
| CLIENT_INIT(BAD_CERT_PAIR) |
| |
| #define TEST_NAME(enum_name, cert_type, result) \ |
| "chttp2/ssl_" #enum_name "_" #cert_type "_" #result "_" |
| |
| typedef enum { SUCCESS, FAIL } test_result; |
| |
| #define SSL_TEST(request_type, cert_type, result) \ |
| { \ |
| {TEST_NAME(request_type, cert_type, result), \ |
| FEATURE_MASK_SUPPORTS_DELAYED_CONNECTION | \ |
| FEATURE_MASK_SUPPORTS_PER_CALL_CREDENTIALS, \ |
| chttp2_create_fixture_secure_fullstack, CLIENT_INIT_NAME(cert_type), \ |
| SERVER_INIT_NAME(request_type), chttp2_tear_down_secure_fullstack}, \ |
| result \ |
| } |
| |
| /* All test configurations */ |
| typedef struct grpc_end2end_test_config_wrapper { |
| grpc_end2end_test_config config; |
| test_result result; |
| } grpc_end2end_test_config_wrapper; |
| |
| static grpc_end2end_test_config_wrapper configs[] = { |
| SSL_TEST(GRPC_SSL_DONT_REQUEST_CLIENT_CERTIFICATE, NONE, SUCCESS), |
| SSL_TEST(GRPC_SSL_DONT_REQUEST_CLIENT_CERTIFICATE, SELF_SIGNED, SUCCESS), |
| SSL_TEST(GRPC_SSL_DONT_REQUEST_CLIENT_CERTIFICATE, SIGNED, SUCCESS), |
| SSL_TEST(GRPC_SSL_DONT_REQUEST_CLIENT_CERTIFICATE, BAD_CERT_PAIR, FAIL), |
| |
| SSL_TEST(GRPC_SSL_REQUEST_CLIENT_CERTIFICATE_BUT_DONT_VERIFY, NONE, |
| SUCCESS), |
| SSL_TEST(GRPC_SSL_REQUEST_CLIENT_CERTIFICATE_BUT_DONT_VERIFY, SELF_SIGNED, |
| SUCCESS), |
| SSL_TEST(GRPC_SSL_REQUEST_CLIENT_CERTIFICATE_BUT_DONT_VERIFY, SIGNED, |
| SUCCESS), |
| SSL_TEST(GRPC_SSL_REQUEST_CLIENT_CERTIFICATE_BUT_DONT_VERIFY, BAD_CERT_PAIR, |
| FAIL), |
| |
| SSL_TEST(GRPC_SSL_REQUEST_CLIENT_CERTIFICATE_AND_VERIFY, NONE, SUCCESS), |
| SSL_TEST(GRPC_SSL_REQUEST_CLIENT_CERTIFICATE_AND_VERIFY, SELF_SIGNED, FAIL), |
| SSL_TEST(GRPC_SSL_REQUEST_CLIENT_CERTIFICATE_AND_VERIFY, SIGNED, SUCCESS), |
| SSL_TEST(GRPC_SSL_REQUEST_CLIENT_CERTIFICATE_AND_VERIFY, BAD_CERT_PAIR, |
| FAIL), |
| |
| SSL_TEST(GRPC_SSL_REQUEST_AND_REQUIRE_CLIENT_CERTIFICATE_BUT_DONT_VERIFY, |
| NONE, FAIL), |
| SSL_TEST(GRPC_SSL_REQUEST_AND_REQUIRE_CLIENT_CERTIFICATE_BUT_DONT_VERIFY, |
| SELF_SIGNED, SUCCESS), |
| SSL_TEST(GRPC_SSL_REQUEST_AND_REQUIRE_CLIENT_CERTIFICATE_BUT_DONT_VERIFY, |
| SIGNED, SUCCESS), |
| SSL_TEST(GRPC_SSL_REQUEST_AND_REQUIRE_CLIENT_CERTIFICATE_BUT_DONT_VERIFY, |
| BAD_CERT_PAIR, FAIL), |
| |
| SSL_TEST(GRPC_SSL_REQUEST_AND_REQUIRE_CLIENT_CERTIFICATE_AND_VERIFY, NONE, |
| FAIL), |
| SSL_TEST(GRPC_SSL_REQUEST_AND_REQUIRE_CLIENT_CERTIFICATE_AND_VERIFY, |
| SELF_SIGNED, FAIL), |
| SSL_TEST(GRPC_SSL_REQUEST_AND_REQUIRE_CLIENT_CERTIFICATE_AND_VERIFY, SIGNED, |
| SUCCESS), |
| SSL_TEST(GRPC_SSL_REQUEST_AND_REQUIRE_CLIENT_CERTIFICATE_AND_VERIFY, |
| BAD_CERT_PAIR, FAIL), |
| }; |
| |
| static void *tag(intptr_t t) { return (void *)t; } |
| |
| static grpc_end2end_test_fixture begin_test(grpc_end2end_test_config config, |
| const char *test_name, |
| grpc_channel_args *client_args, |
| grpc_channel_args *server_args) { |
| grpc_end2end_test_fixture f; |
| gpr_log(GPR_INFO, "%s/%s", test_name, config.name); |
| f = config.create_fixture(client_args, server_args); |
| config.init_server(&f, server_args); |
| config.init_client(&f, client_args); |
| return f; |
| } |
| |
| static gpr_timespec n_seconds_time(int n) { |
| return GRPC_TIMEOUT_SECONDS_TO_DEADLINE(n); |
| } |
| |
| static gpr_timespec five_seconds_time(void) { return n_seconds_time(5); } |
| |
| static void drain_cq(grpc_completion_queue *cq) { |
| grpc_event ev; |
| do { |
| ev = grpc_completion_queue_next(cq, five_seconds_time(), NULL); |
| } while (ev.type != GRPC_QUEUE_SHUTDOWN); |
| } |
| |
| static void shutdown_server(grpc_end2end_test_fixture *f) { |
| if (!f->server) return; |
| grpc_server_shutdown_and_notify(f->server, f->cq, tag(1000)); |
| GPR_ASSERT(grpc_completion_queue_pluck( |
| f->cq, tag(1000), GRPC_TIMEOUT_SECONDS_TO_DEADLINE(5), NULL) |
| .type == GRPC_OP_COMPLETE); |
| grpc_server_destroy(f->server); |
| f->server = NULL; |
| } |
| |
| static void shutdown_client(grpc_end2end_test_fixture *f) { |
| if (!f->client) return; |
| grpc_channel_destroy(f->client); |
| f->client = NULL; |
| } |
| |
| static void end_test(grpc_end2end_test_fixture *f) { |
| shutdown_server(f); |
| shutdown_client(f); |
| |
| grpc_completion_queue_shutdown(f->cq); |
| drain_cq(f->cq); |
| grpc_completion_queue_destroy(f->cq); |
| } |
| |
| static void simple_request_body(grpc_end2end_test_fixture f, |
| test_result expected_result) { |
| grpc_call *c; |
| gpr_timespec deadline = five_seconds_time(); |
| cq_verifier *cqv = cq_verifier_create(f.cq); |
| grpc_op ops[6]; |
| grpc_op *op; |
| grpc_call_error error; |
| |
| c = grpc_channel_create_call(f.client, NULL, GRPC_PROPAGATE_DEFAULTS, f.cq, |
| "/foo", "foo.test.google.fr:1234", deadline, |
| NULL); |
| GPR_ASSERT(c); |
| |
| op = ops; |
| op->op = GRPC_OP_SEND_INITIAL_METADATA; |
| op->data.send_initial_metadata.count = 0; |
| op->flags = 0; |
| op->reserved = NULL; |
| op++; |
| error = grpc_call_start_batch(c, ops, (size_t)(op - ops), tag(1), NULL); |
| GPR_ASSERT(GRPC_CALL_OK == error); |
| |
| cq_expect_completion(cqv, tag(1), expected_result == SUCCESS); |
| cq_verify(cqv); |
| |
| grpc_call_destroy(c); |
| cq_verifier_destroy(cqv); |
| } |
| |
| int main(int argc, char **argv) { |
| size_t i; |
| FILE *roots_file; |
| size_t roots_size = strlen(test_root_cert); |
| char *roots_filename; |
| |
| grpc_test_init(argc, argv); |
| grpc_end2end_tests_pre_init(); |
| |
| /* Set the SSL roots env var. */ |
| roots_file = |
| gpr_tmpfile("chttp2_simple_ssl_cert_fullstack_test", &roots_filename); |
| GPR_ASSERT(roots_filename != NULL); |
| GPR_ASSERT(roots_file != NULL); |
| GPR_ASSERT(fwrite(test_root_cert, 1, roots_size, roots_file) == roots_size); |
| fclose(roots_file); |
| gpr_setenv(GRPC_DEFAULT_SSL_ROOTS_FILE_PATH_ENV_VAR, roots_filename); |
| |
| grpc_init(); |
| |
| for (i = 0; i < sizeof(configs) / sizeof(*configs); i++) { |
| grpc_end2end_test_fixture f = |
| begin_test(configs[i].config, "SSL_CERT_tests", NULL, NULL); |
| |
| simple_request_body(f, configs[i].result); |
| end_test(&f); |
| configs[i].config.tear_down_data(&f); |
| } |
| |
| grpc_shutdown(); |
| |
| /* Cleanup. */ |
| remove(roots_filename); |
| gpr_free(roots_filename); |
| |
| return 0; |
| } |