yang-g | 7d2a3e1 | 2016-02-18 15:41:56 -0800 | [diff] [blame] | 1 | |
| 2 | /* |
| 3 | * |
| 4 | * Copyright 2016, Google Inc. |
| 5 | * All rights reserved. |
| 6 | * |
| 7 | * Redistribution and use in source and binary forms, with or without |
| 8 | * modification, are permitted provided that the following conditions are |
| 9 | * met: |
| 10 | * |
| 11 | * * Redistributions of source code must retain the above copyright |
| 12 | * notice, this list of conditions and the following disclaimer. |
| 13 | * * Redistributions in binary form must reproduce the above |
| 14 | * copyright notice, this list of conditions and the following disclaimer |
| 15 | * in the documentation and/or other materials provided with the |
| 16 | * distribution. |
| 17 | * * Neither the name of Google Inc. nor the names of its |
| 18 | * contributors may be used to endorse or promote products derived from |
| 19 | * this software without specific prior written permission. |
| 20 | * |
| 21 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
| 22 | * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
| 23 | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
| 24 | * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
| 25 | * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| 26 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
| 27 | * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 28 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 29 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 30 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| 31 | * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 32 | * |
| 33 | */ |
| 34 | |
| 35 | #include "test/cpp/util/test_credentials_provider.h" |
| 36 | |
Vijay Pai | 320ed13 | 2016-11-01 17:16:55 -0700 | [diff] [blame] | 37 | #include <mutex> |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 38 | #include <unordered_map> |
| 39 | |
David Garcia Quintas | c79b065 | 2016-07-27 21:11:58 -0700 | [diff] [blame] | 40 | #include <grpc/support/log.h> |
Craig Tiller | f40df23 | 2016-03-25 13:38:14 -0700 | [diff] [blame] | 41 | #include <grpc/support/sync.h> |
Dan Born | 53a94ef | 2016-02-24 15:44:43 -0800 | [diff] [blame] | 42 | |
yang-g | 7d2a3e1 | 2016-02-18 15:41:56 -0800 | [diff] [blame] | 43 | #include "test/core/end2end/data/ssl_test_data.h" |
| 44 | |
Vijay Pai | a63271c | 2016-06-15 12:56:38 -0700 | [diff] [blame] | 45 | namespace grpc { |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 46 | namespace { |
| 47 | |
Craig Tiller | 3b45b8d | 2016-11-29 12:31:14 -0800 | [diff] [blame^] | 48 | using grpc::testing::CredentialTypeProvider; |
| 49 | |
| 50 | // Provide test credentials. Thread-safe. |
| 51 | class CredentialsProvider { |
| 52 | public: |
| 53 | virtual ~CredentialsProvider() {} |
| 54 | |
| 55 | virtual void AddSecureType( |
| 56 | const grpc::string& type, |
| 57 | std::unique_ptr<CredentialTypeProvider> type_provider) = 0; |
| 58 | virtual std::shared_ptr<ChannelCredentials> GetChannelCredentials( |
| 59 | const grpc::string& type, ChannelArguments* args) = 0; |
| 60 | virtual std::shared_ptr<ServerCredentials> GetServerCredentials( |
| 61 | const grpc::string& type) = 0; |
| 62 | virtual std::vector<grpc::string> GetSecureCredentialsTypeList() = 0; |
| 63 | }; |
| 64 | |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 65 | class DefaultCredentialsProvider : public CredentialsProvider { |
| 66 | public: |
Vijay Pai | c0b2acb | 2016-11-01 16:31:56 -0700 | [diff] [blame] | 67 | ~DefaultCredentialsProvider() override {} |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 68 | |
Vijay Pai | 713c7b8 | 2016-11-01 16:33:18 -0700 | [diff] [blame] | 69 | void AddSecureType( |
| 70 | const grpc::string& type, |
| 71 | std::unique_ptr<CredentialTypeProvider> type_provider) override { |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 72 | // This clobbers any existing entry for type, except the defaults, which |
| 73 | // can't be clobbered. |
Vijay Pai | 320ed13 | 2016-11-01 17:16:55 -0700 | [diff] [blame] | 74 | std::unique_lock<std::mutex> lock(mu_); |
Vijay Pai | efa8430 | 2016-06-15 10:23:34 -0700 | [diff] [blame] | 75 | auto it = std::find(added_secure_type_names_.begin(), |
| 76 | added_secure_type_names_.end(), type); |
| 77 | if (it == added_secure_type_names_.end()) { |
| 78 | added_secure_type_names_.push_back(type); |
| 79 | added_secure_type_providers_.push_back(std::move(type_provider)); |
| 80 | } else { |
| 81 | added_secure_type_providers_[it - added_secure_type_names_.begin()] = |
| 82 | std::move(type_provider); |
| 83 | } |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 84 | } |
| 85 | |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 86 | std::shared_ptr<ChannelCredentials> GetChannelCredentials( |
Vijay Pai | c0b2acb | 2016-11-01 16:31:56 -0700 | [diff] [blame] | 87 | const grpc::string& type, ChannelArguments* args) override { |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 88 | if (type == grpc::testing::kInsecureCredentialsType) { |
| 89 | return InsecureChannelCredentials(); |
| 90 | } else if (type == grpc::testing::kTlsCredentialsType) { |
| 91 | SslCredentialsOptions ssl_opts = {test_root_cert, "", ""}; |
| 92 | args->SetSslTargetNameOverride("foo.test.google.fr"); |
| 93 | return SslCredentials(ssl_opts); |
| 94 | } else { |
Vijay Pai | 320ed13 | 2016-11-01 17:16:55 -0700 | [diff] [blame] | 95 | std::unique_lock<std::mutex> lock(mu_); |
Vijay Pai | efa8430 | 2016-06-15 10:23:34 -0700 | [diff] [blame] | 96 | auto it(std::find(added_secure_type_names_.begin(), |
| 97 | added_secure_type_names_.end(), type)); |
| 98 | if (it == added_secure_type_names_.end()) { |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 99 | gpr_log(GPR_ERROR, "Unsupported credentials type %s.", type.c_str()); |
Vijay Pai | 12bf380 | 2016-06-15 11:24:10 -0700 | [diff] [blame] | 100 | return nullptr; |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 101 | } |
Vijay Pai | efa8430 | 2016-06-15 10:23:34 -0700 | [diff] [blame] | 102 | return added_secure_type_providers_[it - added_secure_type_names_.begin()] |
| 103 | ->GetChannelCredentials(args); |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 104 | } |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 105 | } |
| 106 | |
| 107 | std::shared_ptr<ServerCredentials> GetServerCredentials( |
Vijay Pai | c0b2acb | 2016-11-01 16:31:56 -0700 | [diff] [blame] | 108 | const grpc::string& type) override { |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 109 | if (type == grpc::testing::kInsecureCredentialsType) { |
| 110 | return InsecureServerCredentials(); |
| 111 | } else if (type == grpc::testing::kTlsCredentialsType) { |
| 112 | SslServerCredentialsOptions::PemKeyCertPair pkcp = {test_server1_key, |
| 113 | test_server1_cert}; |
| 114 | SslServerCredentialsOptions ssl_opts; |
| 115 | ssl_opts.pem_root_certs = ""; |
| 116 | ssl_opts.pem_key_cert_pairs.push_back(pkcp); |
| 117 | return SslServerCredentials(ssl_opts); |
| 118 | } else { |
Vijay Pai | 320ed13 | 2016-11-01 17:16:55 -0700 | [diff] [blame] | 119 | std::unique_lock<std::mutex> lock(mu_); |
Vijay Pai | efa8430 | 2016-06-15 10:23:34 -0700 | [diff] [blame] | 120 | auto it(std::find(added_secure_type_names_.begin(), |
| 121 | added_secure_type_names_.end(), type)); |
| 122 | if (it == added_secure_type_names_.end()) { |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 123 | gpr_log(GPR_ERROR, "Unsupported credentials type %s.", type.c_str()); |
Vijay Pai | 12bf380 | 2016-06-15 11:24:10 -0700 | [diff] [blame] | 124 | return nullptr; |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 125 | } |
Vijay Pai | efa8430 | 2016-06-15 10:23:34 -0700 | [diff] [blame] | 126 | return added_secure_type_providers_[it - added_secure_type_names_.begin()] |
| 127 | ->GetServerCredentials(); |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 128 | } |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 129 | } |
Vijay Pai | c0b2acb | 2016-11-01 16:31:56 -0700 | [diff] [blame] | 130 | std::vector<grpc::string> GetSecureCredentialsTypeList() override { |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 131 | std::vector<grpc::string> types; |
| 132 | types.push_back(grpc::testing::kTlsCredentialsType); |
Vijay Pai | 320ed13 | 2016-11-01 17:16:55 -0700 | [diff] [blame] | 133 | std::unique_lock<std::mutex> lock(mu_); |
Vijay Pai | efa8430 | 2016-06-15 10:23:34 -0700 | [diff] [blame] | 134 | for (auto it = added_secure_type_names_.begin(); |
| 135 | it != added_secure_type_names_.end(); it++) { |
| 136 | types.push_back(*it); |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 137 | } |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 138 | return types; |
| 139 | } |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 140 | |
| 141 | private: |
Vijay Pai | 320ed13 | 2016-11-01 17:16:55 -0700 | [diff] [blame] | 142 | std::mutex mu_; |
Vijay Pai | efa8430 | 2016-06-15 10:23:34 -0700 | [diff] [blame] | 143 | std::vector<grpc::string> added_secure_type_names_; |
| 144 | std::vector<std::unique_ptr<CredentialTypeProvider>> |
| 145 | added_secure_type_providers_; |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 146 | }; |
| 147 | |
Craig Tiller | 3b45b8d | 2016-11-29 12:31:14 -0800 | [diff] [blame^] | 148 | gpr_once g_once_init_provider = GPR_ONCE_INIT; |
Vijay Pai | 12bf380 | 2016-06-15 11:24:10 -0700 | [diff] [blame] | 149 | CredentialsProvider* g_provider = nullptr; |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 150 | |
Craig Tiller | 3b45b8d | 2016-11-29 12:31:14 -0800 | [diff] [blame^] | 151 | void CreateDefaultProvider() { g_provider = new DefaultCredentialsProvider; } |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 152 | |
Craig Tiller | 3b45b8d | 2016-11-29 12:31:14 -0800 | [diff] [blame^] | 153 | CredentialsProvider* GetProvider() { |
| 154 | gpr_once_init(&g_once_init_provider, &CreateDefaultProvider); |
yang-g | 8e9fc9b | 2016-11-22 16:49:33 -0800 | [diff] [blame] | 155 | return g_provider; |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 156 | } |
yang-g | 12a0a2c | 2016-02-19 00:22:20 -0800 | [diff] [blame] | 157 | |
Craig Tiller | 3b45b8d | 2016-11-29 12:31:14 -0800 | [diff] [blame^] | 158 | } // namespace |
| 159 | |
| 160 | namespace testing { |
| 161 | |
| 162 | void AddSecureType(const grpc::string& type, |
| 163 | std::unique_ptr<CredentialTypeProvider> type_provider) { |
| 164 | GetProvider()->AddSecureType(type, std::move(type_provider)); |
| 165 | } |
| 166 | |
| 167 | std::shared_ptr<ChannelCredentials> GetChannelCredentials( |
| 168 | const grpc::string& type, ChannelArguments* args) { |
| 169 | return GetProvider()->GetChannelCredentials(type, args); |
| 170 | } |
| 171 | |
| 172 | std::shared_ptr<ServerCredentials> GetServerCredentials( |
| 173 | const grpc::string& type) { |
| 174 | return GetProvider()->GetServerCredentials(type); |
| 175 | } |
| 176 | |
| 177 | std::vector<grpc::string> GetSecureCredentialsTypeList() { |
| 178 | return GetProvider()->GetSecureCredentialsTypeList(); |
yang-g | 4c8aed3 | 2016-02-19 00:19:39 -0800 | [diff] [blame] | 179 | } |
| 180 | |
yang-g | 7d2a3e1 | 2016-02-18 15:41:56 -0800 | [diff] [blame] | 181 | } // namespace testing |
| 182 | } // namespace grpc |