Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 1 | /* |
| 2 | * |
Craig Tiller | 6169d5f | 2016-03-31 07:46:18 -0700 | [diff] [blame] | 3 | * Copyright 2015, Google Inc. |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 4 | * All rights reserved. |
| 5 | * |
| 6 | * Redistribution and use in source and binary forms, with or without |
| 7 | * modification, are permitted provided that the following conditions are |
| 8 | * met: |
| 9 | * |
| 10 | * * Redistributions of source code must retain the above copyright |
| 11 | * notice, this list of conditions and the following disclaimer. |
| 12 | * * Redistributions in binary form must reproduce the above |
| 13 | * copyright notice, this list of conditions and the following disclaimer |
| 14 | * in the documentation and/or other materials provided with the |
| 15 | * distribution. |
| 16 | * * Neither the name of Google Inc. nor the names of its |
| 17 | * contributors may be used to endorse or promote products derived from |
| 18 | * this software without specific prior written permission. |
| 19 | * |
| 20 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
| 21 | * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
| 22 | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
| 23 | * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
| 24 | * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| 25 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
| 26 | * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 27 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 28 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 29 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| 30 | * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 31 | * |
| 32 | */ |
| 33 | |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 34 | #include <string.h> |
| 35 | |
Julien Boeuf | 8ca294e | 2016-05-02 14:56:30 -0700 | [diff] [blame] | 36 | #include "src/core/lib/security/context/security_context.h" |
| 37 | #include "src/core/lib/security/credentials/credentials.h" |
| 38 | #include "src/core/lib/security/transport/auth_filters.h" |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 39 | |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 40 | #include <grpc/support/alloc.h> |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 41 | #include <grpc/support/log.h> |
| 42 | |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 43 | typedef struct call_data { |
Craig Tiller | 0581d12 | 2015-11-02 14:09:40 -0800 | [diff] [blame] | 44 | grpc_metadata_batch *recv_initial_metadata; |
Julien Boeuf | a87d6c2 | 2015-07-17 15:51:46 -0700 | [diff] [blame] | 45 | /* Closure to call when finished with the auth_on_recv hook. */ |
Craig Tiller | 3382511 | 2015-09-18 07:44:19 -0700 | [diff] [blame] | 46 | grpc_closure *on_done_recv; |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 47 | /* Receive closures are chained: we inject this closure as the on_done_recv |
| 48 | up-call on transport_op, and remember to call our on_done_recv member after |
| 49 | handling it. */ |
Craig Tiller | 3382511 | 2015-09-18 07:44:19 -0700 | [diff] [blame] | 50 | grpc_closure auth_on_recv; |
Julien Boeuf | a87d6c2 | 2015-07-17 15:51:46 -0700 | [diff] [blame] | 51 | grpc_transport_stream_op transport_op; |
Julien Boeuf | bf25bb0 | 2015-08-14 12:36:11 -0700 | [diff] [blame] | 52 | grpc_metadata_array md; |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 53 | const grpc_metadata *consumed_md; |
| 54 | size_t num_consumed_md; |
Julien Boeuf | 77a7b87 | 2015-08-05 20:11:02 -0700 | [diff] [blame] | 55 | grpc_auth_context *auth_context; |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 56 | } call_data; |
| 57 | |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 58 | typedef struct channel_data { |
Julien Boeuf | 9a52908 | 2015-10-08 13:12:14 -0700 | [diff] [blame] | 59 | grpc_auth_context *auth_context; |
| 60 | grpc_server_credentials *creds; |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 61 | } channel_data; |
| 62 | |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 63 | static grpc_metadata_array metadata_batch_to_md_array( |
| 64 | const grpc_metadata_batch *batch) { |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 65 | grpc_linked_mdelem *l; |
| 66 | grpc_metadata_array result; |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 67 | grpc_metadata_array_init(&result); |
| 68 | for (l = batch->list.head; l != NULL; l = l->next) { |
| 69 | grpc_metadata *usr_md = NULL; |
| 70 | grpc_mdelem *md = l->md; |
| 71 | grpc_mdstr *key = md->key; |
| 72 | grpc_mdstr *value = md->value; |
| 73 | if (result.count == result.capacity) { |
| 74 | result.capacity = GPR_MAX(result.capacity + 8, result.capacity * 2); |
| 75 | result.metadata = |
| 76 | gpr_realloc(result.metadata, result.capacity * sizeof(grpc_metadata)); |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 77 | } |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 78 | usr_md = &result.metadata[result.count++]; |
| 79 | usr_md->key = grpc_mdstr_as_c_string(key); |
| 80 | usr_md->value = grpc_mdstr_as_c_string(value); |
| 81 | usr_md->value_length = GPR_SLICE_LENGTH(value->slice); |
| 82 | } |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 83 | return result; |
| 84 | } |
| 85 | |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 86 | static grpc_mdelem *remove_consumed_md(void *user_data, grpc_mdelem *md) { |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 87 | grpc_call_element *elem = user_data; |
| 88 | call_data *calld = elem->call_data; |
| 89 | size_t i; |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 90 | for (i = 0; i < calld->num_consumed_md; i++) { |
| 91 | const grpc_metadata *consumed_md = &calld->consumed_md[i]; |
| 92 | /* Maybe we could do a pointer comparison but we do not have any guarantee |
| 93 | that the metadata processor used the same pointers for consumed_md in the |
| 94 | callback. */ |
| 95 | if (GPR_SLICE_LENGTH(md->key->slice) != strlen(consumed_md->key) || |
| 96 | GPR_SLICE_LENGTH(md->value->slice) != consumed_md->value_length) { |
| 97 | continue; |
Julien Boeuf | 0c711ad | 2015-08-28 14:10:58 -0700 | [diff] [blame] | 98 | } |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 99 | if (memcmp(GPR_SLICE_START_PTR(md->key->slice), consumed_md->key, |
| 100 | GPR_SLICE_LENGTH(md->key->slice)) == 0 && |
| 101 | memcmp(GPR_SLICE_START_PTR(md->value->slice), consumed_md->value, |
| 102 | GPR_SLICE_LENGTH(md->value->slice)) == 0) { |
| 103 | return NULL; /* Delete. */ |
| 104 | } |
| 105 | } |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 106 | return md; |
| 107 | } |
| 108 | |
Craig Tiller | d1bec03 | 2015-09-18 17:29:00 -0700 | [diff] [blame] | 109 | /* called from application code */ |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 110 | static void on_md_processing_done( |
| 111 | void *user_data, const grpc_metadata *consumed_md, size_t num_consumed_md, |
| 112 | const grpc_metadata *response_md, size_t num_response_md, |
| 113 | grpc_status_code status, const char *error_details) { |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 114 | grpc_call_element *elem = user_data; |
| 115 | call_data *calld = elem->call_data; |
Craig Tiller | f5768a6 | 2015-09-22 10:54:34 -0700 | [diff] [blame] | 116 | grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT; |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 117 | |
Julien Boeuf | ee3dbb0 | 2015-08-19 22:17:03 -0700 | [diff] [blame] | 118 | /* TODO(jboeuf): Implement support for response_md. */ |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 119 | if (response_md != NULL && num_response_md > 0) { |
| 120 | gpr_log(GPR_INFO, |
| 121 | "response_md in auth metadata processing not supported for now. " |
| 122 | "Ignoring..."); |
| 123 | } |
Julien Boeuf | ee3dbb0 | 2015-08-19 22:17:03 -0700 | [diff] [blame] | 124 | |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 125 | if (status == GRPC_STATUS_OK) { |
| 126 | calld->consumed_md = consumed_md; |
| 127 | calld->num_consumed_md = num_consumed_md; |
Craig Tiller | 0581d12 | 2015-11-02 14:09:40 -0800 | [diff] [blame] | 128 | grpc_metadata_batch_filter(calld->recv_initial_metadata, remove_consumed_md, |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 129 | elem); |
| 130 | grpc_metadata_array_destroy(&calld->md); |
Craig Tiller | 332f1b3 | 2016-05-24 13:21:21 -0700 | [diff] [blame] | 131 | grpc_exec_ctx_sched(&exec_ctx, calld->on_done_recv, GRPC_ERROR_NONE, NULL); |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 132 | } else { |
| 133 | gpr_slice message; |
Craig Tiller | 0581d12 | 2015-11-02 14:09:40 -0800 | [diff] [blame] | 134 | grpc_transport_stream_op close_op; |
| 135 | memset(&close_op, 0, sizeof(close_op)); |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 136 | grpc_metadata_array_destroy(&calld->md); |
| 137 | error_details = error_details != NULL |
| 138 | ? error_details |
| 139 | : "Authentication metadata processing failed."; |
| 140 | message = gpr_slice_from_copied_string(error_details); |
Craig Tiller | 0581d12 | 2015-11-02 14:09:40 -0800 | [diff] [blame] | 141 | calld->transport_op.send_initial_metadata = NULL; |
| 142 | if (calld->transport_op.send_message != NULL) { |
Craig Tiller | c8b7013 | 2015-12-09 20:49:09 -0800 | [diff] [blame] | 143 | grpc_byte_stream_destroy(&exec_ctx, calld->transport_op.send_message); |
Craig Tiller | 0581d12 | 2015-11-02 14:09:40 -0800 | [diff] [blame] | 144 | calld->transport_op.send_message = NULL; |
| 145 | } |
| 146 | calld->transport_op.send_trailing_metadata = NULL; |
| 147 | grpc_transport_stream_op_add_close(&close_op, status, &message); |
| 148 | grpc_call_next_op(&exec_ctx, elem, &close_op); |
Craig Tiller | 332f1b3 | 2016-05-24 13:21:21 -0700 | [diff] [blame] | 149 | grpc_exec_ctx_sched(&exec_ctx, calld->on_done_recv, |
Craig Tiller | 77c983d | 2016-05-24 13:23:14 -0700 | [diff] [blame] | 150 | grpc_error_set_int(GRPC_ERROR_CREATE(error_details), |
| 151 | GRPC_ERROR_INT_GRPC_STATUS, status), |
| 152 | NULL); |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 153 | } |
Craig Tiller | d1bec03 | 2015-09-18 17:29:00 -0700 | [diff] [blame] | 154 | |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 155 | grpc_exec_ctx_finish(&exec_ctx); |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 156 | } |
| 157 | |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 158 | static void auth_on_recv(grpc_exec_ctx *exec_ctx, void *user_data, |
Craig Tiller | 804ff71 | 2016-05-05 16:25:40 -0700 | [diff] [blame] | 159 | grpc_error *error) { |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 160 | grpc_call_element *elem = user_data; |
| 161 | call_data *calld = elem->call_data; |
| 162 | channel_data *chand = elem->channel_data; |
Craig Tiller | 804ff71 | 2016-05-05 16:25:40 -0700 | [diff] [blame] | 163 | if (error == GRPC_ERROR_NONE) { |
Craig Tiller | 0581d12 | 2015-11-02 14:09:40 -0800 | [diff] [blame] | 164 | if (chand->creds->processor.process != NULL) { |
| 165 | calld->md = metadata_batch_to_md_array(calld->recv_initial_metadata); |
Julien Boeuf | 9a52908 | 2015-10-08 13:12:14 -0700 | [diff] [blame] | 166 | chand->creds->processor.process( |
| 167 | chand->creds->processor.state, calld->auth_context, |
| 168 | calld->md.metadata, calld->md.count, on_md_processing_done, elem); |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 169 | return; |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 170 | } |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 171 | } |
Craig Tiller | 332f1b3 | 2016-05-24 13:21:21 -0700 | [diff] [blame] | 172 | grpc_exec_ctx_sched(exec_ctx, calld->on_done_recv, GRPC_ERROR_REF(error), |
Craig Tiller | 77c983d | 2016-05-24 13:23:14 -0700 | [diff] [blame] | 173 | NULL); |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 174 | } |
| 175 | |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 176 | static void set_recv_ops_md_callbacks(grpc_call_element *elem, |
| 177 | grpc_transport_stream_op *op) { |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 178 | call_data *calld = elem->call_data; |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 179 | |
Craig Tiller | 0581d12 | 2015-11-02 14:09:40 -0800 | [diff] [blame] | 180 | if (op->recv_initial_metadata != NULL) { |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 181 | /* substitute our callback for the higher callback */ |
Craig Tiller | 0581d12 | 2015-11-02 14:09:40 -0800 | [diff] [blame] | 182 | calld->recv_initial_metadata = op->recv_initial_metadata; |
Craig Tiller | a44cbfc | 2016-02-03 16:02:49 -0800 | [diff] [blame] | 183 | calld->on_done_recv = op->recv_initial_metadata_ready; |
| 184 | op->recv_initial_metadata_ready = &calld->auth_on_recv; |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 185 | calld->transport_op = *op; |
| 186 | } |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 187 | } |
| 188 | |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 189 | /* Called either: |
| 190 | - in response to an API call (or similar) from above, to send something |
| 191 | - a network event (or similar) from below, to receive something |
| 192 | op contains type and call direction information, in addition to the data |
| 193 | that is being sent or received. */ |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 194 | static void auth_start_transport_op(grpc_exec_ctx *exec_ctx, |
| 195 | grpc_call_element *elem, |
| 196 | grpc_transport_stream_op *op) { |
| 197 | set_recv_ops_md_callbacks(elem, op); |
| 198 | grpc_call_next_op(exec_ctx, elem, op); |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 199 | } |
| 200 | |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 201 | /* Constructor for call_data */ |
Mark D. Roth | 76d2442 | 2016-06-23 13:22:10 -0700 | [diff] [blame] | 202 | static grpc_error *init_call_elem(grpc_exec_ctx *exec_ctx, |
Mark D. Roth | 0badbe8 | 2016-06-23 10:15:12 -0700 | [diff] [blame] | 203 | grpc_call_element *elem, |
| 204 | grpc_call_element_args *args) { |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 205 | /* grab pointers to our data from the call element */ |
| 206 | call_data *calld = elem->call_data; |
Julien Boeuf | 84d964a | 2015-04-29 11:31:06 -0700 | [diff] [blame] | 207 | channel_data *chand = elem->channel_data; |
| 208 | grpc_server_security_context *server_ctx = NULL; |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 209 | |
| 210 | /* initialize members */ |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 211 | memset(calld, 0, sizeof(*calld)); |
| 212 | grpc_closure_init(&calld->auth_on_recv, auth_on_recv, elem); |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 213 | |
Craig Tiller | 0581d12 | 2015-11-02 14:09:40 -0800 | [diff] [blame] | 214 | if (args->context[GRPC_CONTEXT_SECURITY].value != NULL) { |
| 215 | args->context[GRPC_CONTEXT_SECURITY].destroy( |
| 216 | args->context[GRPC_CONTEXT_SECURITY].value); |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 217 | } |
Craig Tiller | 0581d12 | 2015-11-02 14:09:40 -0800 | [diff] [blame] | 218 | |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 219 | server_ctx = grpc_server_security_context_create(); |
Craig Tiller | 0581d12 | 2015-11-02 14:09:40 -0800 | [diff] [blame] | 220 | server_ctx->auth_context = grpc_auth_context_create(chand->auth_context); |
Julien Boeuf | 77a7b87 | 2015-08-05 20:11:02 -0700 | [diff] [blame] | 221 | calld->auth_context = server_ctx->auth_context; |
Julien Boeuf | ea456fc | 2015-07-07 15:23:30 -0700 | [diff] [blame] | 222 | |
Craig Tiller | 0581d12 | 2015-11-02 14:09:40 -0800 | [diff] [blame] | 223 | args->context[GRPC_CONTEXT_SECURITY].value = server_ctx; |
| 224 | args->context[GRPC_CONTEXT_SECURITY].destroy = |
| 225 | grpc_server_security_context_destroy; |
Mark D. Roth | 0badbe8 | 2016-06-23 10:15:12 -0700 | [diff] [blame] | 226 | |
| 227 | return GRPC_ERROR_NONE; |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 228 | } |
| 229 | |
| 230 | /* Destructor for call_data */ |
Craig Tiller | 2c8063c | 2016-03-22 22:12:15 -0700 | [diff] [blame] | 231 | static void destroy_call_elem(grpc_exec_ctx *exec_ctx, grpc_call_element *elem, |
David Garcia Quintas | 5dde14c | 2016-07-28 17:29:27 -0700 | [diff] [blame] | 232 | const grpc_call_final_info *final_info, |
| 233 | void *ignored) {} |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 234 | |
| 235 | /* Constructor for channel_data */ |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 236 | static void init_channel_elem(grpc_exec_ctx *exec_ctx, |
Craig Tiller | 0581d12 | 2015-11-02 14:09:40 -0800 | [diff] [blame] | 237 | grpc_channel_element *elem, |
| 238 | grpc_channel_element_args *args) { |
| 239 | grpc_auth_context *auth_context = |
| 240 | grpc_find_auth_context_in_args(args->channel_args); |
| 241 | grpc_server_credentials *creds = |
| 242 | grpc_find_server_credentials_in_args(args->channel_args); |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 243 | /* grab pointers to our data from the channel element */ |
| 244 | channel_data *chand = elem->channel_data; |
| 245 | |
Craig Tiller | 0581d12 | 2015-11-02 14:09:40 -0800 | [diff] [blame] | 246 | GPR_ASSERT(!args->is_last); |
Julien Boeuf | 9a52908 | 2015-10-08 13:12:14 -0700 | [diff] [blame] | 247 | GPR_ASSERT(auth_context != NULL); |
| 248 | GPR_ASSERT(creds != NULL); |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 249 | |
| 250 | /* initialize members */ |
Julien Boeuf | 9a52908 | 2015-10-08 13:12:14 -0700 | [diff] [blame] | 251 | chand->auth_context = |
| 252 | GRPC_AUTH_CONTEXT_REF(auth_context, "server_auth_filter"); |
| 253 | chand->creds = grpc_server_credentials_ref(creds); |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 254 | } |
| 255 | |
| 256 | /* Destructor for channel data */ |
Craig Tiller | a82950e | 2015-09-22 12:33:20 -0700 | [diff] [blame] | 257 | static void destroy_channel_elem(grpc_exec_ctx *exec_ctx, |
| 258 | grpc_channel_element *elem) { |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 259 | /* grab pointers to our data from the channel element */ |
| 260 | channel_data *chand = elem->channel_data; |
Julien Boeuf | 9a52908 | 2015-10-08 13:12:14 -0700 | [diff] [blame] | 261 | GRPC_AUTH_CONTEXT_UNREF(chand->auth_context, "server_auth_filter"); |
| 262 | grpc_server_credentials_unref(chand->creds); |
Julien Boeuf | c6f8d0a | 2015-05-11 22:40:02 -0700 | [diff] [blame] | 263 | } |
| 264 | |
| 265 | const grpc_channel_filter grpc_server_auth_filter = { |
David Garcia Quintas | 4afce7e | 2016-04-18 16:25:17 -0700 | [diff] [blame] | 266 | auth_start_transport_op, |
| 267 | grpc_channel_next_op, |
| 268 | sizeof(call_data), |
| 269 | init_call_elem, |
| 270 | grpc_call_stack_ignore_set_pollset_or_pollset_set, |
| 271 | destroy_call_elem, |
| 272 | sizeof(channel_data), |
| 273 | init_channel_elem, |
| 274 | destroy_channel_elem, |
| 275 | grpc_call_next_get_peer, |
| 276 | "server-auth"}; |