forked from grpc/grpc-go
-
Notifications
You must be signed in to change notification settings - Fork 1
/
clientconn_authority_test.go
122 lines (116 loc) · 3.58 KB
/
clientconn_authority_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
/*
*
* Copyright 2021 gRPC authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
*/
package grpc
import (
"context"
"net"
"testing"
"google.golang.org/grpc/credentials"
"google.golang.org/grpc/testdata"
)
func (s) TestClientConnAuthority(t *testing.T) {
serverNameOverride := "over.write.server.name"
creds, err := credentials.NewClientTLSFromFile(testdata.Path("x509/server_ca_cert.pem"), serverNameOverride)
if err != nil {
t.Fatalf("credentials.NewClientTLSFromFile(_, %q) failed: %v", err, serverNameOverride)
}
tests := []struct {
name string
target string
opts []DialOption
wantAuthority string
}{
{
name: "default",
target: "Non-Existent.Server:8080",
opts: []DialOption{WithInsecure()},
wantAuthority: "Non-Existent.Server:8080",
},
{
name: "override-via-creds",
target: "Non-Existent.Server:8080",
opts: []DialOption{WithTransportCredentials(creds)},
wantAuthority: serverNameOverride,
},
{
name: "override-via-WithAuthority",
target: "Non-Existent.Server:8080",
opts: []DialOption{WithInsecure(), WithAuthority("authority-override")},
wantAuthority: "authority-override",
},
{
name: "override-via-creds-and-WithAuthority",
target: "Non-Existent.Server:8080",
// WithAuthority override works only for insecure creds.
opts: []DialOption{WithTransportCredentials(creds), WithAuthority("authority-override")},
wantAuthority: serverNameOverride,
},
{
name: "unix relative",
target: "unix:sock.sock",
opts: []DialOption{WithInsecure()},
wantAuthority: "localhost",
},
{
name: "unix relative with custom dialer",
target: "unix:sock.sock",
opts: []DialOption{WithInsecure(), WithContextDialer(func(ctx context.Context, addr string) (net.Conn, error) {
return (&net.Dialer{}).DialContext(ctx, "", addr)
})},
wantAuthority: "localhost",
},
{
name: "unix absolute",
target: "unix:/sock.sock",
opts: []DialOption{WithInsecure()},
wantAuthority: "localhost",
},
{
name: "unix absolute with custom dialer",
target: "unix:///sock.sock",
opts: []DialOption{WithInsecure(), WithContextDialer(func(ctx context.Context, addr string) (net.Conn, error) {
return (&net.Dialer{}).DialContext(ctx, "", addr)
})},
wantAuthority: "localhost",
},
{
name: "localhost colon port",
target: "localhost:50051",
opts: []DialOption{WithInsecure()},
wantAuthority: "localhost:50051",
},
{
name: "colon port",
target: ":50051",
opts: []DialOption{WithInsecure()},
wantAuthority: "localhost:50051",
},
}
for _, test := range tests {
t.Run(test.name, func(t *testing.T) {
cc, err := Dial(test.target, test.opts...)
if err != nil {
t.Fatalf("Dial(%q) failed: %v", test.target, err)
}
defer cc.Close()
if cc.authority != test.wantAuthority {
t.Fatalf("cc.authority = %q, want %q", cc.authority, test.wantAuthority)
}
})
}
}