123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163 |
- /*
- *
- * Copyright 2021 gRPC authors.
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- *
- */
- package google
- import (
- "context"
- "net"
- "testing"
- "google.golang.org/grpc/credentials"
- "google.golang.org/grpc/internal"
- icredentials "google.golang.org/grpc/internal/credentials"
- "google.golang.org/grpc/internal/grpctest"
- "google.golang.org/grpc/resolver"
- )
- type s struct {
- grpctest.Tester
- }
- func Test(t *testing.T) {
- grpctest.RunSubTests(t, s{})
- }
- type testCreds struct {
- credentials.TransportCredentials
- typ string
- }
- func (c *testCreds) ClientHandshake(ctx context.Context, authority string, rawConn net.Conn) (net.Conn, credentials.AuthInfo, error) {
- return nil, &testAuthInfo{typ: c.typ}, nil
- }
- func (c *testCreds) ServerHandshake(conn net.Conn) (net.Conn, credentials.AuthInfo, error) {
- return nil, &testAuthInfo{typ: c.typ}, nil
- }
- type testAuthInfo struct {
- typ string
- }
- func (t *testAuthInfo) AuthType() string {
- return t.typ
- }
- var (
- testTLS = &testCreds{typ: "tls"}
- testALTS = &testCreds{typ: "alts"}
- )
- func overrideNewCredsFuncs() func() {
- origNewTLS := newTLS
- newTLS = func() credentials.TransportCredentials {
- return testTLS
- }
- origNewALTS := newALTS
- newALTS = func() credentials.TransportCredentials {
- return testALTS
- }
- origNewADC := newADC
- newADC = func(context.Context) (credentials.PerRPCCredentials, error) {
- // We do not use perRPC creds in this test. It is safe to return nil here.
- return nil, nil
- }
- return func() {
- newTLS = origNewTLS
- newALTS = origNewALTS
- newADC = origNewADC
- }
- }
- // TestClientHandshakeBasedOnClusterName that by default (without switching
- // modes), ClientHandshake does either tls or alts base on the cluster name in
- // attributes.
- func (s) TestClientHandshakeBasedOnClusterName(t *testing.T) {
- defer overrideNewCredsFuncs()()
- for bundleTyp, tc := range map[string]credentials.Bundle{
- "defaultCredsWithOptions": NewDefaultCredentialsWithOptions(DefaultCredentialsOptions{}),
- "defaultCreds": NewDefaultCredentials(),
- "computeCreds": NewComputeEngineCredentials(),
- } {
- tests := []struct {
- name string
- ctx context.Context
- wantTyp string
- }{
- {
- name: "no cluster name",
- ctx: context.Background(),
- wantTyp: "tls",
- },
- {
- name: "with non-CFE cluster name",
- ctx: icredentials.NewClientHandshakeInfoContext(context.Background(), credentials.ClientHandshakeInfo{
- Attributes: internal.SetXDSHandshakeClusterName(resolver.Address{}, "lalala").Attributes,
- }),
- // non-CFE backends should use alts.
- wantTyp: "alts",
- },
- {
- name: "with CFE cluster name",
- ctx: icredentials.NewClientHandshakeInfoContext(context.Background(), credentials.ClientHandshakeInfo{
- Attributes: internal.SetXDSHandshakeClusterName(resolver.Address{}, "google_cfe_bigtable.googleapis.com").Attributes,
- }),
- // CFE should use tls.
- wantTyp: "tls",
- },
- {
- name: "with xdstp CFE cluster name",
- ctx: icredentials.NewClientHandshakeInfoContext(context.Background(), credentials.ClientHandshakeInfo{
- Attributes: internal.SetXDSHandshakeClusterName(resolver.Address{}, "xdstp://traffic-director-c2p.xds.googleapis.com/envoy.config.cluster.v3.Cluster/google_cfe_bigtable.googleapis.com").Attributes,
- }),
- // CFE should use tls.
- wantTyp: "tls",
- },
- {
- name: "with xdstp non-CFE cluster name",
- ctx: icredentials.NewClientHandshakeInfoContext(context.Background(), credentials.ClientHandshakeInfo{
- Attributes: internal.SetXDSHandshakeClusterName(resolver.Address{}, "xdstp://other.com/envoy.config.cluster.v3.Cluster/google_cfe_bigtable.googleapis.com").Attributes,
- }),
- // non-CFE should use atls.
- wantTyp: "alts",
- },
- }
- for _, tt := range tests {
- t.Run(bundleTyp+" "+tt.name, func(t *testing.T) {
- _, info, err := tc.TransportCredentials().ClientHandshake(tt.ctx, "", nil)
- if err != nil {
- t.Fatalf("ClientHandshake failed: %v", err)
- }
- if gotType := info.AuthType(); gotType != tt.wantTyp {
- t.Fatalf("unexpected authtype: %v, want: %v", gotType, tt.wantTyp)
- }
- _, infoServer, err := tc.TransportCredentials().ServerHandshake(nil)
- if err != nil {
- t.Fatalf("ClientHandshake failed: %v", err)
- }
- // ServerHandshake should always do TLS.
- if gotType := infoServer.AuthType(); gotType != "tls" {
- t.Fatalf("unexpected server authtype: %v, want: %v", gotType, "tls")
- }
- })
- }
- }
- }
|