blob: a4d998a4290ccc7f3ca2c07a8a27fef03aa65082 [file] [log] [blame]
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001/*
2 *
Craig Tiller06059952015-02-18 08:34:56 -08003 * Copyright 2015, Google Inc.
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08004 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are
8 * met:
9 *
10 * * Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * * Redistributions in binary form must reproduce the above
13 * copyright notice, this list of conditions and the following disclaimer
14 * in the documentation and/or other materials provided with the
15 * distribution.
16 * * Neither the name of Google Inc. nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
24 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
30 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 *
32 */
33
34#include "src/core/security/credentials.h"
35
Julien Boeuff47a5cb2015-02-18 12:24:08 -080036#include <string.h>
37#include <stdio.h>
38
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -070039#include "src/core/channel/channel_args.h"
40#include "src/core/channel/http_client_filter.h"
Julien Boeuff47a5cb2015-02-18 12:24:08 -080041#include "src/core/json/json.h"
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080042#include "src/core/httpcli/httpcli.h"
ctiller18b49ab2014-12-09 14:39:16 -080043#include "src/core/iomgr/iomgr.h"
Craig Tiller485d7762015-01-23 12:54:05 -080044#include "src/core/support/string.h"
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -070045
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080046#include <grpc/support/alloc.h>
47#include <grpc/support/log.h>
Masood Malekghassemi701af602015-06-03 15:01:17 -070048#include <grpc/support/string_util.h>
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080049#include <grpc/support/sync.h>
50#include <grpc/support/time.h>
51
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080052/* -- Common. -- */
53
Julien Boeufb037bb62015-07-08 14:58:14 -070054struct grpc_credentials_metadata_request {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080055 grpc_credentials *creds;
56 grpc_credentials_metadata_cb cb;
David Garcia Quintas69ba8712015-06-01 11:29:42 -070057 grpc_iomgr_closure *on_simulated_token_fetch_done_closure;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080058 void *user_data;
Julien Boeufb037bb62015-07-08 14:58:14 -070059};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080060
61static grpc_credentials_metadata_request *
62grpc_credentials_metadata_request_create(grpc_credentials *creds,
63 grpc_credentials_metadata_cb cb,
64 void *user_data) {
65 grpc_credentials_metadata_request *r =
66 gpr_malloc(sizeof(grpc_credentials_metadata_request));
67 r->creds = grpc_credentials_ref(creds);
68 r->cb = cb;
David Garcia Quintas69ba8712015-06-01 11:29:42 -070069 r->on_simulated_token_fetch_done_closure =
70 gpr_malloc(sizeof(grpc_iomgr_closure));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080071 r->user_data = user_data;
72 return r;
73}
74
75static void grpc_credentials_metadata_request_destroy(
76 grpc_credentials_metadata_request *r) {
77 grpc_credentials_unref(r->creds);
David Garcia Quintas69ba8712015-06-01 11:29:42 -070078 gpr_free(r->on_simulated_token_fetch_done_closure);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080079 gpr_free(r);
80}
81
82grpc_credentials *grpc_credentials_ref(grpc_credentials *creds) {
83 if (creds == NULL) return NULL;
84 gpr_ref(&creds->refcount);
85 return creds;
86}
87
88void grpc_credentials_unref(grpc_credentials *creds) {
89 if (creds == NULL) return;
90 if (gpr_unref(&creds->refcount)) creds->vtable->destroy(creds);
91}
92
93void grpc_credentials_release(grpc_credentials *creds) {
94 grpc_credentials_unref(creds);
95}
96
97int grpc_credentials_has_request_metadata(grpc_credentials *creds) {
98 if (creds == NULL) return 0;
99 return creds->vtable->has_request_metadata(creds);
100}
101
102int grpc_credentials_has_request_metadata_only(grpc_credentials *creds) {
103 if (creds == NULL) return 0;
104 return creds->vtable->has_request_metadata_only(creds);
105}
106
107void grpc_credentials_get_request_metadata(grpc_credentials *creds,
Craig Tiller06bac342015-06-01 12:55:57 -0700108 grpc_pollset *pollset,
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800109 const char *service_url,
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800110 grpc_credentials_metadata_cb cb,
111 void *user_data) {
nnoble0c475f02014-12-05 15:37:39 -0800112 if (creds == NULL || !grpc_credentials_has_request_metadata(creds) ||
113 creds->vtable->get_request_metadata == NULL) {
114 if (cb != NULL) {
115 cb(user_data, NULL, 0, GRPC_CREDENTIALS_OK);
116 }
117 return;
118 }
Craig Tiller06bac342015-06-01 12:55:57 -0700119 creds->vtable->get_request_metadata(creds, pollset, service_url, cb,
120 user_data);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800121}
122
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700123grpc_security_status grpc_credentials_create_security_connector(
124 grpc_credentials *creds, const char *target, const grpc_channel_args *args,
125 grpc_credentials *request_metadata_creds,
126 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
127 *new_args = NULL;
128 if (creds == NULL || creds->vtable->create_security_connector == NULL ||
129 grpc_credentials_has_request_metadata_only(creds)) {
130 gpr_log(GPR_ERROR,
131 "Invalid credentials for creating a security connector.");
132 return GRPC_SECURITY_ERROR;
133 }
134 return creds->vtable->create_security_connector(
135 creds, target, args, request_metadata_creds, sc, new_args);
Craig Tillerc4885ed2015-04-14 09:51:28 -0700136}
137
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800138void grpc_server_credentials_release(grpc_server_credentials *creds) {
139 if (creds == NULL) return;
140 creds->vtable->destroy(creds);
141}
142
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700143grpc_security_status grpc_server_credentials_create_security_connector(
144 grpc_server_credentials *creds, grpc_security_connector **sc) {
145 if (creds == NULL || creds->vtable->create_security_connector == NULL) {
146 gpr_log(GPR_ERROR, "Server credentials cannot create security context.");
147 return GRPC_SECURITY_ERROR;
148 }
149 return creds->vtable->create_security_connector(creds, sc);
150}
151
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800152/* -- Ssl credentials. -- */
153
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800154static void ssl_destroy(grpc_credentials *creds) {
155 grpc_ssl_credentials *c = (grpc_ssl_credentials *)creds;
156 if (c->config.pem_root_certs != NULL) gpr_free(c->config.pem_root_certs);
157 if (c->config.pem_private_key != NULL) gpr_free(c->config.pem_private_key);
158 if (c->config.pem_cert_chain != NULL) gpr_free(c->config.pem_cert_chain);
159 gpr_free(creds);
160}
161
162static void ssl_server_destroy(grpc_server_credentials *creds) {
163 grpc_ssl_server_credentials *c = (grpc_ssl_server_credentials *)creds;
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800164 size_t i;
165 for (i = 0; i < c->config.num_key_cert_pairs; i++) {
166 if (c->config.pem_private_keys[i] != NULL) {
167 gpr_free(c->config.pem_private_keys[i]);
168 }
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800169 if (c->config.pem_cert_chains[i] != NULL) {
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800170 gpr_free(c->config.pem_cert_chains[i]);
171 }
172 }
173 if (c->config.pem_private_keys != NULL) gpr_free(c->config.pem_private_keys);
174 if (c->config.pem_private_keys_sizes != NULL) {
175 gpr_free(c->config.pem_private_keys_sizes);
176 }
177 if (c->config.pem_cert_chains != NULL) gpr_free(c->config.pem_cert_chains);
178 if (c->config.pem_cert_chains_sizes != NULL) {
179 gpr_free(c->config.pem_cert_chains_sizes);
180 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800181 if (c->config.pem_root_certs != NULL) gpr_free(c->config.pem_root_certs);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800182 gpr_free(creds);
183}
184
Craig Tiller83b826a2015-05-13 13:43:01 -0700185static int ssl_has_request_metadata(const grpc_credentials *creds) { return 0; }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800186
187static int ssl_has_request_metadata_only(const grpc_credentials *creds) {
188 return 0;
189}
190
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700191static grpc_security_status ssl_create_security_connector(
192 grpc_credentials *creds, const char *target, const grpc_channel_args *args,
193 grpc_credentials *request_metadata_creds,
194 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
195 grpc_ssl_credentials *c = (grpc_ssl_credentials *)creds;
196 grpc_security_status status = GRPC_SECURITY_OK;
197 size_t i = 0;
198 const char *overridden_target_name = NULL;
199 grpc_arg arg;
200
201 for (i = 0; args && i < args->num_args; i++) {
202 grpc_arg *arg = &args->args[i];
203 if (strcmp(arg->key, GRPC_SSL_TARGET_NAME_OVERRIDE_ARG) == 0 &&
204 arg->type == GRPC_ARG_STRING) {
205 overridden_target_name = arg->value.string;
206 break;
207 }
208 }
209 status = grpc_ssl_channel_security_connector_create(
210 request_metadata_creds, &c->config, target, overridden_target_name, sc);
211 if (status != GRPC_SECURITY_OK) {
212 return status;
213 }
214 arg.type = GRPC_ARG_STRING;
215 arg.key = GRPC_ARG_HTTP2_SCHEME;
216 arg.value.string = "https";
Craig Tillerd9a50882015-06-29 15:57:36 -0700217 *new_args = grpc_channel_args_copy_and_add(args, &arg, 1);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700218 return status;
219}
220
221static grpc_security_status ssl_server_create_security_connector(
222 grpc_server_credentials *creds, grpc_security_connector **sc) {
223 grpc_ssl_server_credentials *c = (grpc_ssl_server_credentials *)creds;
224 return grpc_ssl_server_security_connector_create(&c->config, sc);
225}
226
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800227static grpc_credentials_vtable ssl_vtable = {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700228 ssl_destroy, ssl_has_request_metadata, ssl_has_request_metadata_only, NULL,
229 ssl_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800230
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700231static grpc_server_credentials_vtable ssl_server_vtable = {
232 ssl_server_destroy, ssl_server_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800233
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800234static void ssl_copy_key_material(const char *input, unsigned char **output,
235 size_t *output_size) {
236 *output_size = strlen(input);
237 *output = gpr_malloc(*output_size);
238 memcpy(*output, input, *output_size);
239}
240
241static void ssl_build_config(const char *pem_root_certs,
242 grpc_ssl_pem_key_cert_pair *pem_key_cert_pair,
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800243 grpc_ssl_config *config) {
Julien Boeuf026a4172015-02-02 18:36:37 -0800244 if (pem_root_certs != NULL) {
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800245 ssl_copy_key_material(pem_root_certs, &config->pem_root_certs,
246 &config->pem_root_certs_size);
247 }
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800248 if (pem_key_cert_pair != NULL) {
249 GPR_ASSERT(pem_key_cert_pair->private_key != NULL);
250 GPR_ASSERT(pem_key_cert_pair->cert_chain != NULL);
251 ssl_copy_key_material(pem_key_cert_pair->private_key,
252 &config->pem_private_key,
253 &config->pem_private_key_size);
254 ssl_copy_key_material(pem_key_cert_pair->cert_chain,
255 &config->pem_cert_chain,
256 &config->pem_cert_chain_size);
257 }
258}
259
260static void ssl_build_server_config(
261 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs,
Julien Boeuf5029b302015-07-21 23:02:16 -0700262 size_t num_key_cert_pairs, int force_client_auth,
263 grpc_ssl_server_config *config) {
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800264 size_t i;
Julien Boeuf5029b302015-07-21 23:02:16 -0700265 config->force_client_auth = force_client_auth;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800266 if (pem_root_certs != NULL) {
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800267 ssl_copy_key_material(pem_root_certs, &config->pem_root_certs,
268 &config->pem_root_certs_size);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800269 }
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800270 if (num_key_cert_pairs > 0) {
271 GPR_ASSERT(pem_key_cert_pairs != NULL);
272 config->pem_private_keys =
273 gpr_malloc(num_key_cert_pairs * sizeof(unsigned char *));
274 config->pem_cert_chains =
275 gpr_malloc(num_key_cert_pairs * sizeof(unsigned char *));
276 config->pem_private_keys_sizes =
277 gpr_malloc(num_key_cert_pairs * sizeof(size_t));
278 config->pem_cert_chains_sizes =
279 gpr_malloc(num_key_cert_pairs * sizeof(size_t));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800280 }
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800281 config->num_key_cert_pairs = num_key_cert_pairs;
282 for (i = 0; i < num_key_cert_pairs; i++) {
283 GPR_ASSERT(pem_key_cert_pairs[i].private_key != NULL);
284 GPR_ASSERT(pem_key_cert_pairs[i].cert_chain != NULL);
285 ssl_copy_key_material(pem_key_cert_pairs[i].private_key,
286 &config->pem_private_keys[i],
287 &config->pem_private_keys_sizes[i]);
288 ssl_copy_key_material(pem_key_cert_pairs[i].cert_chain,
289 &config->pem_cert_chains[i],
290 &config->pem_cert_chains_sizes[i]);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800291 }
292}
293
294grpc_credentials *grpc_ssl_credentials_create(
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800295 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pair) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800296 grpc_ssl_credentials *c = gpr_malloc(sizeof(grpc_ssl_credentials));
297 memset(c, 0, sizeof(grpc_ssl_credentials));
298 c->base.type = GRPC_CREDENTIALS_TYPE_SSL;
299 c->base.vtable = &ssl_vtable;
300 gpr_ref_init(&c->base.refcount, 1);
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800301 ssl_build_config(pem_root_certs, pem_key_cert_pair, &c->config);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800302 return &c->base;
303}
304
305grpc_server_credentials *grpc_ssl_server_credentials_create(
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800306 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs,
Julien Boeuf5029b302015-07-21 23:02:16 -0700307 size_t num_key_cert_pairs, int force_client_auth) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800308 grpc_ssl_server_credentials *c =
309 gpr_malloc(sizeof(grpc_ssl_server_credentials));
310 memset(c, 0, sizeof(grpc_ssl_server_credentials));
311 c->base.type = GRPC_CREDENTIALS_TYPE_SSL;
312 c->base.vtable = &ssl_server_vtable;
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800313 ssl_build_server_config(pem_root_certs, pem_key_cert_pairs,
Julien Boeuf5029b302015-07-21 23:02:16 -0700314 num_key_cert_pairs, force_client_auth, &c->config);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800315 return &c->base;
316}
317
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800318/* -- Jwt credentials -- */
319
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800320static void jwt_reset_cache(grpc_jwt_credentials *c) {
321 if (c->cached.jwt_md != NULL) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700322 grpc_credentials_md_store_unref(c->cached.jwt_md);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800323 c->cached.jwt_md = NULL;
324 }
325 if (c->cached.service_url != NULL) {
326 gpr_free(c->cached.service_url);
327 c->cached.service_url = NULL;
328 }
Craig Tiller143e7bf2015-07-13 08:41:49 -0700329 c->cached.jwt_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800330}
331
332static void jwt_destroy(grpc_credentials *creds) {
333 grpc_jwt_credentials *c = (grpc_jwt_credentials *)creds;
334 grpc_auth_json_key_destruct(&c->key);
335 jwt_reset_cache(c);
336 gpr_mu_destroy(&c->cache_mu);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800337 gpr_free(c);
338}
339
340static int jwt_has_request_metadata(const grpc_credentials *creds) { return 1; }
341
342static int jwt_has_request_metadata_only(const grpc_credentials *creds) {
343 return 1;
344}
345
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800346static void jwt_get_request_metadata(grpc_credentials *creds,
Craig Tiller06bac342015-06-01 12:55:57 -0700347 grpc_pollset *pollset,
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800348 const char *service_url,
349 grpc_credentials_metadata_cb cb,
350 void *user_data) {
351 grpc_jwt_credentials *c = (grpc_jwt_credentials *)creds;
Craig Tiller58bbc862015-07-13 09:51:17 -0700352 gpr_timespec refresh_threshold = gpr_time_from_seconds(
353 GRPC_SECURE_TOKEN_REFRESH_THRESHOLD_SECS, GPR_TIMESPAN);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800354
355 /* See if we can return a cached jwt. */
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700356 grpc_credentials_md_store *jwt_md = NULL;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800357 {
358 gpr_mu_lock(&c->cache_mu);
359 if (c->cached.service_url != NULL &&
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -0800360 strcmp(c->cached.service_url, service_url) == 0 &&
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800361 c->cached.jwt_md != NULL &&
Craig Tillerf1bff012015-07-06 11:20:50 -0700362 (gpr_time_cmp(gpr_time_sub(c->cached.jwt_expiration,
363 gpr_now(GPR_CLOCK_REALTIME)),
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800364 refresh_threshold) > 0)) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700365 jwt_md = grpc_credentials_md_store_ref(c->cached.jwt_md);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800366 }
367 gpr_mu_unlock(&c->cache_mu);
368 }
369
370 if (jwt_md == NULL) {
371 char *jwt = NULL;
372 /* Generate a new jwt. */
373 gpr_mu_lock(&c->cache_mu);
374 jwt_reset_cache(c);
375 jwt = grpc_jwt_encode_and_sign(&c->key, service_url, c->jwt_lifetime, NULL);
376 if (jwt != NULL) {
377 char *md_value;
378 gpr_asprintf(&md_value, "Bearer %s", jwt);
379 gpr_free(jwt);
Craig Tillerf1bff012015-07-06 11:20:50 -0700380 c->cached.jwt_expiration =
381 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), c->jwt_lifetime);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800382 c->cached.service_url = gpr_strdup(service_url);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700383 c->cached.jwt_md = grpc_credentials_md_store_create(1);
384 grpc_credentials_md_store_add_cstrings(
385 c->cached.jwt_md, GRPC_AUTHORIZATION_METADATA_KEY, md_value);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800386 gpr_free(md_value);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700387 jwt_md = grpc_credentials_md_store_ref(c->cached.jwt_md);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800388 }
389 gpr_mu_unlock(&c->cache_mu);
390 }
391
392 if (jwt_md != NULL) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700393 cb(user_data, jwt_md->entries, jwt_md->num_entries, GRPC_CREDENTIALS_OK);
394 grpc_credentials_md_store_unref(jwt_md);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800395 } else {
396 cb(user_data, NULL, 0, GRPC_CREDENTIALS_ERROR);
397 }
398}
399
400static grpc_credentials_vtable jwt_vtable = {
401 jwt_destroy, jwt_has_request_metadata, jwt_has_request_metadata_only,
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700402 jwt_get_request_metadata, NULL};
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800403
Julien Boeuf54006062015-07-07 19:13:04 -0700404grpc_credentials *grpc_jwt_credentials_create_from_auth_json_key(
405 grpc_auth_json_key key, gpr_timespec token_lifetime) {
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800406 grpc_jwt_credentials *c;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800407 if (!grpc_auth_json_key_is_valid(&key)) {
408 gpr_log(GPR_ERROR, "Invalid input for jwt credentials creation");
409 return NULL;
410 }
411 c = gpr_malloc(sizeof(grpc_jwt_credentials));
412 memset(c, 0, sizeof(grpc_jwt_credentials));
413 c->base.type = GRPC_CREDENTIALS_TYPE_JWT;
414 gpr_ref_init(&c->base.refcount, 1);
415 c->base.vtable = &jwt_vtable;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800416 c->key = key;
417 c->jwt_lifetime = token_lifetime;
418 gpr_mu_init(&c->cache_mu);
419 jwt_reset_cache(c);
420 return &c->base;
421}
422
Julien Boeuf54006062015-07-07 19:13:04 -0700423grpc_credentials *grpc_jwt_credentials_create(const char *json_key,
424 gpr_timespec token_lifetime) {
425 return grpc_jwt_credentials_create_from_auth_json_key(
426 grpc_auth_json_key_create_from_string(json_key), token_lifetime);
427}
428
jboeuf1a809c02014-12-19 15:44:30 -0800429/* -- Oauth2TokenFetcher credentials -- */
430
jboeuf1a809c02014-12-19 15:44:30 -0800431static void oauth2_token_fetcher_destroy(grpc_credentials *creds) {
432 grpc_oauth2_token_fetcher_credentials *c =
433 (grpc_oauth2_token_fetcher_credentials *)creds;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700434 grpc_credentials_md_store_unref(c->access_token_md);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800435 gpr_mu_destroy(&c->mu);
Craig Tillera0abe372015-06-01 11:31:08 -0700436 grpc_httpcli_context_destroy(&c->httpcli_context);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800437 gpr_free(c);
438}
439
jboeuf1a809c02014-12-19 15:44:30 -0800440static int oauth2_token_fetcher_has_request_metadata(
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800441 const grpc_credentials *creds) {
442 return 1;
443}
444
jboeuf1a809c02014-12-19 15:44:30 -0800445static int oauth2_token_fetcher_has_request_metadata_only(
446 const grpc_credentials *creds) {
447 return 1;
448}
449
450grpc_credentials_status
451grpc_oauth2_token_fetcher_credentials_parse_server_response(
Craig Tiller8674cb12015-06-05 07:09:25 -0700452 const grpc_httpcli_response *response, grpc_credentials_md_store **token_md,
453 gpr_timespec *token_lifetime) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800454 char *null_terminated_body = NULL;
455 char *new_access_token = NULL;
456 grpc_credentials_status status = GRPC_CREDENTIALS_OK;
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800457 grpc_json *json = NULL;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800458
Julien Boeuf90bd7c42015-02-18 18:51:16 -0800459 if (response == NULL) {
460 gpr_log(GPR_ERROR, "Received NULL response.");
461 status = GRPC_CREDENTIALS_ERROR;
462 goto end;
463 }
464
jboeuf1a809c02014-12-19 15:44:30 -0800465 if (response->body_length > 0) {
466 null_terminated_body = gpr_malloc(response->body_length + 1);
467 null_terminated_body[response->body_length] = '\0';
468 memcpy(null_terminated_body, response->body, response->body_length);
469 }
470
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800471 if (response->status != 200) {
jboeuf1a809c02014-12-19 15:44:30 -0800472 gpr_log(GPR_ERROR, "Call to http server ended with error %d [%s].",
473 response->status,
474 null_terminated_body != NULL ? null_terminated_body : "");
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800475 status = GRPC_CREDENTIALS_ERROR;
476 goto end;
477 } else {
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800478 grpc_json *access_token = NULL;
479 grpc_json *token_type = NULL;
480 grpc_json *expires_in = NULL;
481 grpc_json *ptr;
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800482 json = grpc_json_parse_string(null_terminated_body);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800483 if (json == NULL) {
484 gpr_log(GPR_ERROR, "Could not parse JSON from %s", null_terminated_body);
485 status = GRPC_CREDENTIALS_ERROR;
486 goto end;
487 }
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800488 if (json->type != GRPC_JSON_OBJECT) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800489 gpr_log(GPR_ERROR, "Response should be a JSON object");
490 status = GRPC_CREDENTIALS_ERROR;
491 goto end;
492 }
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800493 for (ptr = json->child; ptr; ptr = ptr->next) {
494 if (strcmp(ptr->key, "access_token") == 0) {
495 access_token = ptr;
496 } else if (strcmp(ptr->key, "token_type") == 0) {
497 token_type = ptr;
498 } else if (strcmp(ptr->key, "expires_in") == 0) {
499 expires_in = ptr;
500 }
501 }
502 if (access_token == NULL || access_token->type != GRPC_JSON_STRING) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800503 gpr_log(GPR_ERROR, "Missing or invalid access_token in JSON.");
504 status = GRPC_CREDENTIALS_ERROR;
505 goto end;
506 }
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800507 if (token_type == NULL || token_type->type != GRPC_JSON_STRING) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800508 gpr_log(GPR_ERROR, "Missing or invalid token_type in JSON.");
509 status = GRPC_CREDENTIALS_ERROR;
510 goto end;
511 }
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800512 if (expires_in == NULL || expires_in->type != GRPC_JSON_NUMBER) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800513 gpr_log(GPR_ERROR, "Missing or invalid expires_in in JSON.");
514 status = GRPC_CREDENTIALS_ERROR;
515 goto end;
516 }
Nicolas Noblefee065c2015-01-26 11:41:12 -0800517 gpr_asprintf(&new_access_token, "%s %s", token_type->value,
518 access_token->value);
Nicolas Noblee04455a2015-01-26 17:01:29 -0800519 token_lifetime->tv_sec = strtol(expires_in->value, NULL, 10);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800520 token_lifetime->tv_nsec = 0;
Craig Tiller143e7bf2015-07-13 08:41:49 -0700521 token_lifetime->clock_type = GPR_TIMESPAN;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700522 if (*token_md != NULL) grpc_credentials_md_store_unref(*token_md);
523 *token_md = grpc_credentials_md_store_create(1);
524 grpc_credentials_md_store_add_cstrings(
525 *token_md, GRPC_AUTHORIZATION_METADATA_KEY, new_access_token);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800526 status = GRPC_CREDENTIALS_OK;
527 }
528
529end:
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700530 if (status != GRPC_CREDENTIALS_OK && (*token_md != NULL)) {
531 grpc_credentials_md_store_unref(*token_md);
532 *token_md = NULL;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800533 }
534 if (null_terminated_body != NULL) gpr_free(null_terminated_body);
535 if (new_access_token != NULL) gpr_free(new_access_token);
Nicolas Noble8c2be9b2015-01-27 14:21:18 -0800536 if (json != NULL) grpc_json_destroy(json);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800537 return status;
538}
539
jboeuf1a809c02014-12-19 15:44:30 -0800540static void on_oauth2_token_fetcher_http_response(
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800541 void *user_data, const grpc_httpcli_response *response) {
542 grpc_credentials_metadata_request *r =
543 (grpc_credentials_metadata_request *)user_data;
jboeuf1a809c02014-12-19 15:44:30 -0800544 grpc_oauth2_token_fetcher_credentials *c =
545 (grpc_oauth2_token_fetcher_credentials *)r->creds;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800546 gpr_timespec token_lifetime;
547 grpc_credentials_status status;
548
549 gpr_mu_lock(&c->mu);
jboeuf1a809c02014-12-19 15:44:30 -0800550 status = grpc_oauth2_token_fetcher_credentials_parse_server_response(
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700551 response, &c->access_token_md, &token_lifetime);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800552 if (status == GRPC_CREDENTIALS_OK) {
Craig Tillerf1bff012015-07-06 11:20:50 -0700553 c->token_expiration =
554 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), token_lifetime);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700555 r->cb(r->user_data, c->access_token_md->entries,
556 c->access_token_md->num_entries, status);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800557 } else {
Craig Tiller143e7bf2015-07-13 08:41:49 -0700558 c->token_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800559 r->cb(r->user_data, NULL, 0, status);
560 }
561 gpr_mu_unlock(&c->mu);
562 grpc_credentials_metadata_request_destroy(r);
563}
564
jboeuf1a809c02014-12-19 15:44:30 -0800565static void oauth2_token_fetcher_get_request_metadata(
Craig Tiller06bac342015-06-01 12:55:57 -0700566 grpc_credentials *creds, grpc_pollset *pollset, const char *service_url,
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800567 grpc_credentials_metadata_cb cb, void *user_data) {
jboeuf1a809c02014-12-19 15:44:30 -0800568 grpc_oauth2_token_fetcher_credentials *c =
569 (grpc_oauth2_token_fetcher_credentials *)creds;
Craig Tiller58bbc862015-07-13 09:51:17 -0700570 gpr_timespec refresh_threshold = gpr_time_from_seconds(
571 GRPC_SECURE_TOKEN_REFRESH_THRESHOLD_SECS, GPR_TIMESPAN);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700572 grpc_credentials_md_store *cached_access_token_md = NULL;
jboeuf1a809c02014-12-19 15:44:30 -0800573 {
574 gpr_mu_lock(&c->mu);
575 if (c->access_token_md != NULL &&
Craig Tillerf1bff012015-07-06 11:20:50 -0700576 (gpr_time_cmp(
577 gpr_time_sub(c->token_expiration, gpr_now(GPR_CLOCK_REALTIME)),
578 refresh_threshold) > 0)) {
Craig Tiller8674cb12015-06-05 07:09:25 -0700579 cached_access_token_md =
580 grpc_credentials_md_store_ref(c->access_token_md);
jboeuf1a809c02014-12-19 15:44:30 -0800581 }
582 gpr_mu_unlock(&c->mu);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800583 }
jboeuf1a809c02014-12-19 15:44:30 -0800584 if (cached_access_token_md != NULL) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700585 cb(user_data, cached_access_token_md->entries,
586 cached_access_token_md->num_entries, GRPC_CREDENTIALS_OK);
587 grpc_credentials_md_store_unref(cached_access_token_md);
jboeuf1a809c02014-12-19 15:44:30 -0800588 } else {
589 c->fetch_func(
590 grpc_credentials_metadata_request_create(creds, cb, user_data),
Craig Tiller06bac342015-06-01 12:55:57 -0700591 &c->httpcli_context, pollset, on_oauth2_token_fetcher_http_response,
Craig Tillerf3756c12015-07-01 17:21:01 -0700592 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), refresh_threshold));
jboeuf1a809c02014-12-19 15:44:30 -0800593 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800594}
595
jboeuf1a809c02014-12-19 15:44:30 -0800596static void init_oauth2_token_fetcher(grpc_oauth2_token_fetcher_credentials *c,
597 grpc_fetch_oauth2_func fetch_func) {
598 memset(c, 0, sizeof(grpc_oauth2_token_fetcher_credentials));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800599 c->base.type = GRPC_CREDENTIALS_TYPE_OAUTH2;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800600 gpr_ref_init(&c->base.refcount, 1);
601 gpr_mu_init(&c->mu);
Craig Tiller143e7bf2015-07-13 08:41:49 -0700602 c->token_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
jboeuf1a809c02014-12-19 15:44:30 -0800603 c->fetch_func = fetch_func;
Julien Boeuffeca1bf2015-06-22 16:46:20 +0200604 grpc_httpcli_context_init(&c->httpcli_context);
jboeuf1a809c02014-12-19 15:44:30 -0800605}
606
607/* -- ComputeEngine credentials. -- */
608
609static grpc_credentials_vtable compute_engine_vtable = {
Craig Tiller8674cb12015-06-05 07:09:25 -0700610 oauth2_token_fetcher_destroy, oauth2_token_fetcher_has_request_metadata,
jboeuf1a809c02014-12-19 15:44:30 -0800611 oauth2_token_fetcher_has_request_metadata_only,
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700612 oauth2_token_fetcher_get_request_metadata, NULL};
jboeuf1a809c02014-12-19 15:44:30 -0800613
614static void compute_engine_fetch_oauth2(
615 grpc_credentials_metadata_request *metadata_req,
Craig Tiller06bac342015-06-01 12:55:57 -0700616 grpc_httpcli_context *httpcli_context, grpc_pollset *pollset,
617 grpc_httpcli_response_cb response_cb, gpr_timespec deadline) {
jboeuf1a809c02014-12-19 15:44:30 -0800618 grpc_httpcli_header header = {"Metadata-Flavor", "Google"};
619 grpc_httpcli_request request;
620 memset(&request, 0, sizeof(grpc_httpcli_request));
621 request.host = GRPC_COMPUTE_ENGINE_METADATA_HOST;
622 request.path = GRPC_COMPUTE_ENGINE_METADATA_TOKEN_PATH;
623 request.hdr_count = 1;
624 request.hdrs = &header;
Craig Tiller06bac342015-06-01 12:55:57 -0700625 grpc_httpcli_get(httpcli_context, pollset, &request, deadline, response_cb,
Craig Tiller83b826a2015-05-13 13:43:01 -0700626 metadata_req);
jboeuf1a809c02014-12-19 15:44:30 -0800627}
628
629grpc_credentials *grpc_compute_engine_credentials_create(void) {
630 grpc_oauth2_token_fetcher_credentials *c =
631 gpr_malloc(sizeof(grpc_oauth2_token_fetcher_credentials));
632 init_oauth2_token_fetcher(c, compute_engine_fetch_oauth2);
633 c->base.vtable = &compute_engine_vtable;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800634 return &c->base;
635}
636
jboeuf1a809c02014-12-19 15:44:30 -0800637/* -- ServiceAccount credentials. -- */
638
jboeuf1a809c02014-12-19 15:44:30 -0800639static void service_account_destroy(grpc_credentials *creds) {
640 grpc_service_account_credentials *c =
641 (grpc_service_account_credentials *)creds;
642 if (c->scope != NULL) gpr_free(c->scope);
643 grpc_auth_json_key_destruct(&c->key);
644 oauth2_token_fetcher_destroy(&c->base.base);
645}
646
647static grpc_credentials_vtable service_account_vtable = {
Craig Tiller8674cb12015-06-05 07:09:25 -0700648 service_account_destroy, oauth2_token_fetcher_has_request_metadata,
jboeuf1a809c02014-12-19 15:44:30 -0800649 oauth2_token_fetcher_has_request_metadata_only,
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700650 oauth2_token_fetcher_get_request_metadata, NULL};
jboeuf1a809c02014-12-19 15:44:30 -0800651
652static void service_account_fetch_oauth2(
653 grpc_credentials_metadata_request *metadata_req,
Craig Tiller06bac342015-06-01 12:55:57 -0700654 grpc_httpcli_context *httpcli_context, grpc_pollset *pollset,
655 grpc_httpcli_response_cb response_cb, gpr_timespec deadline) {
jboeuf1a809c02014-12-19 15:44:30 -0800656 grpc_service_account_credentials *c =
657 (grpc_service_account_credentials *)metadata_req->creds;
658 grpc_httpcli_header header = {"Content-Type",
659 "application/x-www-form-urlencoded"};
660 grpc_httpcli_request request;
661 char *body = NULL;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800662 char *jwt = grpc_jwt_encode_and_sign(&c->key, GRPC_JWT_OAUTH2_AUDIENCE,
663 c->token_lifetime, c->scope);
jboeuf1a809c02014-12-19 15:44:30 -0800664 if (jwt == NULL) {
665 grpc_httpcli_response response;
666 memset(&response, 0, sizeof(grpc_httpcli_response));
667 response.status = 400; /* Invalid request. */
668 gpr_log(GPR_ERROR, "Could not create signed jwt.");
669 /* Do not even send the request, just call the response callback. */
670 response_cb(metadata_req, &response);
671 return;
672 }
Craig Tillerbe6a3552015-01-23 13:04:45 -0800673 gpr_asprintf(&body, "%s%s", GRPC_SERVICE_ACCOUNT_POST_BODY_PREFIX, jwt);
jboeuf1a809c02014-12-19 15:44:30 -0800674 memset(&request, 0, sizeof(grpc_httpcli_request));
Julien Boeuf9835cf02015-03-09 16:56:44 -0700675 request.host = GRPC_GOOGLE_OAUTH2_SERVICE_HOST;
676 request.path = GRPC_GOOGLE_OAUTH2_SERVICE_TOKEN_PATH;
jboeuf1a809c02014-12-19 15:44:30 -0800677 request.hdr_count = 1;
678 request.hdrs = &header;
679 request.use_ssl = 1;
Craig Tiller06bac342015-06-01 12:55:57 -0700680 grpc_httpcli_post(httpcli_context, pollset, &request, body, strlen(body),
681 deadline, response_cb, metadata_req);
jboeuf1a809c02014-12-19 15:44:30 -0800682 gpr_free(body);
683 gpr_free(jwt);
684}
685
686grpc_credentials *grpc_service_account_credentials_create(
687 const char *json_key, const char *scope, gpr_timespec token_lifetime) {
688 grpc_service_account_credentials *c;
689 grpc_auth_json_key key = grpc_auth_json_key_create_from_string(json_key);
690
691 if (scope == NULL || (strlen(scope) == 0) ||
692 !grpc_auth_json_key_is_valid(&key)) {
693 gpr_log(GPR_ERROR,
694 "Invalid input for service account credentials creation");
695 return NULL;
696 }
697 c = gpr_malloc(sizeof(grpc_service_account_credentials));
698 memset(c, 0, sizeof(grpc_service_account_credentials));
699 init_oauth2_token_fetcher(&c->base, service_account_fetch_oauth2);
700 c->base.base.vtable = &service_account_vtable;
701 c->scope = gpr_strdup(scope);
702 c->key = key;
703 c->token_lifetime = token_lifetime;
704 return &c->base.base;
705}
706
Julien Boeuf9835cf02015-03-09 16:56:44 -0700707/* -- RefreshToken credentials. -- */
708
Julien Boeuf9835cf02015-03-09 16:56:44 -0700709static void refresh_token_destroy(grpc_credentials *creds) {
Craig Tiller83b826a2015-05-13 13:43:01 -0700710 grpc_refresh_token_credentials *c = (grpc_refresh_token_credentials *)creds;
Julien Boeuf9835cf02015-03-09 16:56:44 -0700711 grpc_auth_refresh_token_destruct(&c->refresh_token);
712 oauth2_token_fetcher_destroy(&c->base.base);
713}
714
715static grpc_credentials_vtable refresh_token_vtable = {
Craig Tiller8674cb12015-06-05 07:09:25 -0700716 refresh_token_destroy, oauth2_token_fetcher_has_request_metadata,
Julien Boeuf9835cf02015-03-09 16:56:44 -0700717 oauth2_token_fetcher_has_request_metadata_only,
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700718 oauth2_token_fetcher_get_request_metadata, NULL};
Julien Boeuf9835cf02015-03-09 16:56:44 -0700719
720static void refresh_token_fetch_oauth2(
721 grpc_credentials_metadata_request *metadata_req,
Craig Tiller06bac342015-06-01 12:55:57 -0700722 grpc_httpcli_context *httpcli_context, grpc_pollset *pollset,
723 grpc_httpcli_response_cb response_cb, gpr_timespec deadline) {
Julien Boeuf9835cf02015-03-09 16:56:44 -0700724 grpc_refresh_token_credentials *c =
725 (grpc_refresh_token_credentials *)metadata_req->creds;
726 grpc_httpcli_header header = {"Content-Type",
727 "application/x-www-form-urlencoded"};
728 grpc_httpcli_request request;
729 char *body = NULL;
730 gpr_asprintf(&body, GRPC_REFRESH_TOKEN_POST_BODY_FORMAT_STRING,
731 c->refresh_token.client_id, c->refresh_token.client_secret,
732 c->refresh_token.refresh_token);
733 memset(&request, 0, sizeof(grpc_httpcli_request));
734 request.host = GRPC_GOOGLE_OAUTH2_SERVICE_HOST;
735 request.path = GRPC_GOOGLE_OAUTH2_SERVICE_TOKEN_PATH;
736 request.hdr_count = 1;
737 request.hdrs = &header;
738 request.use_ssl = 1;
Craig Tiller06bac342015-06-01 12:55:57 -0700739 grpc_httpcli_post(httpcli_context, pollset, &request, body, strlen(body),
740 deadline, response_cb, metadata_req);
Julien Boeuf9835cf02015-03-09 16:56:44 -0700741 gpr_free(body);
742}
743
Julien Boeuf54006062015-07-07 19:13:04 -0700744grpc_credentials *grpc_refresh_token_credentials_create_from_auth_refresh_token(
745 grpc_auth_refresh_token refresh_token) {
Julien Boeuf9835cf02015-03-09 16:56:44 -0700746 grpc_refresh_token_credentials *c;
Julien Boeuf9835cf02015-03-09 16:56:44 -0700747 if (!grpc_auth_refresh_token_is_valid(&refresh_token)) {
Craig Tiller83b826a2015-05-13 13:43:01 -0700748 gpr_log(GPR_ERROR, "Invalid input for refresh token credentials creation");
Julien Boeuf9835cf02015-03-09 16:56:44 -0700749 return NULL;
750 }
751 c = gpr_malloc(sizeof(grpc_refresh_token_credentials));
752 memset(c, 0, sizeof(grpc_refresh_token_credentials));
753 init_oauth2_token_fetcher(&c->base, refresh_token_fetch_oauth2);
754 c->base.base.vtable = &refresh_token_vtable;
755 c->refresh_token = refresh_token;
756 return &c->base.base;
757}
758
Julien Boeuf54006062015-07-07 19:13:04 -0700759grpc_credentials *grpc_refresh_token_credentials_create(
760 const char *json_refresh_token) {
761 return grpc_refresh_token_credentials_create_from_auth_refresh_token(
762 grpc_auth_refresh_token_create_from_string(json_refresh_token));
763}
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800764
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800765/* -- Fake Oauth2 credentials. -- */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800766
767static void fake_oauth2_destroy(grpc_credentials *creds) {
768 grpc_fake_oauth2_credentials *c = (grpc_fake_oauth2_credentials *)creds;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700769 grpc_credentials_md_store_unref(c->access_token_md);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800770 gpr_free(c);
771}
772
773static int fake_oauth2_has_request_metadata(const grpc_credentials *creds) {
774 return 1;
775}
776
777static int fake_oauth2_has_request_metadata_only(
778 const grpc_credentials *creds) {
779 return 1;
780}
781
ctiller58393c22015-01-07 14:03:30 -0800782void on_simulated_token_fetch_done(void *user_data, int success) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800783 grpc_credentials_metadata_request *r =
784 (grpc_credentials_metadata_request *)user_data;
785 grpc_fake_oauth2_credentials *c = (grpc_fake_oauth2_credentials *)r->creds;
ctiller58393c22015-01-07 14:03:30 -0800786 GPR_ASSERT(success);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700787 r->cb(r->user_data, c->access_token_md->entries,
788 c->access_token_md->num_entries, GRPC_CREDENTIALS_OK);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800789 grpc_credentials_metadata_request_destroy(r);
790}
791
792static void fake_oauth2_get_request_metadata(grpc_credentials *creds,
Craig Tiller06bac342015-06-01 12:55:57 -0700793 grpc_pollset *pollset,
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800794 const char *service_url,
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800795 grpc_credentials_metadata_cb cb,
796 void *user_data) {
797 grpc_fake_oauth2_credentials *c = (grpc_fake_oauth2_credentials *)creds;
798
799 if (c->is_async) {
David Garcia Quintas69ba8712015-06-01 11:29:42 -0700800 grpc_credentials_metadata_request *cb_arg =
David Garcia Quintas8b8cce02015-05-31 12:39:40 -0700801 grpc_credentials_metadata_request_create(creds, cb, user_data);
David Garcia Quintas69ba8712015-06-01 11:29:42 -0700802 grpc_iomgr_closure_init(cb_arg->on_simulated_token_fetch_done_closure,
803 on_simulated_token_fetch_done, cb_arg);
804 grpc_iomgr_add_callback(cb_arg->on_simulated_token_fetch_done_closure);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800805 } else {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700806 cb(user_data, c->access_token_md->entries, 1, GRPC_CREDENTIALS_OK);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800807 }
808}
809
810static grpc_credentials_vtable fake_oauth2_vtable = {
811 fake_oauth2_destroy, fake_oauth2_has_request_metadata,
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700812 fake_oauth2_has_request_metadata_only, fake_oauth2_get_request_metadata,
Craig Tiller83b826a2015-05-13 13:43:01 -0700813 NULL};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800814
815grpc_credentials *grpc_fake_oauth2_credentials_create(
816 const char *token_md_value, int is_async) {
817 grpc_fake_oauth2_credentials *c =
818 gpr_malloc(sizeof(grpc_fake_oauth2_credentials));
819 memset(c, 0, sizeof(grpc_fake_oauth2_credentials));
820 c->base.type = GRPC_CREDENTIALS_TYPE_OAUTH2;
821 c->base.vtable = &fake_oauth2_vtable;
822 gpr_ref_init(&c->base.refcount, 1);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700823 c->access_token_md = grpc_credentials_md_store_create(1);
824 grpc_credentials_md_store_add_cstrings(
825 c->access_token_md, GRPC_AUTHORIZATION_METADATA_KEY, token_md_value);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800826 c->is_async = is_async;
827 return &c->base;
828}
829
Julien Boeuf2805be12015-07-01 02:47:18 -0700830/* -- Oauth2 Access Token credentials. -- */
831
Julien Boeuf2805be12015-07-01 02:47:18 -0700832static void access_token_destroy(grpc_credentials *creds) {
833 grpc_access_token_credentials *c = (grpc_access_token_credentials *)creds;
834 grpc_credentials_md_store_unref(c->access_token_md);
835 gpr_free(c);
836}
837
838static int access_token_has_request_metadata(const grpc_credentials *creds) {
839 return 1;
840}
841
842static int access_token_has_request_metadata_only(
843 const grpc_credentials *creds) {
844 return 1;
845}
846
847static void access_token_get_request_metadata(grpc_credentials *creds,
848 grpc_pollset *pollset,
849 const char *service_url,
850 grpc_credentials_metadata_cb cb,
851 void *user_data) {
852 grpc_access_token_credentials *c = (grpc_access_token_credentials *)creds;
853 cb(user_data, c->access_token_md->entries, 1, GRPC_CREDENTIALS_OK);
854}
855
856static grpc_credentials_vtable access_token_vtable = {
857 access_token_destroy, access_token_has_request_metadata,
858 access_token_has_request_metadata_only, access_token_get_request_metadata,
859 NULL};
860
861grpc_credentials *grpc_access_token_credentials_create(
862 const char *access_token) {
863 grpc_access_token_credentials *c =
864 gpr_malloc(sizeof(grpc_access_token_credentials));
865 char *token_md_value;
866 memset(c, 0, sizeof(grpc_access_token_credentials));
867 c->base.type = GRPC_CREDENTIALS_TYPE_OAUTH2;
868 c->base.vtable = &access_token_vtable;
869 gpr_ref_init(&c->base.refcount, 1);
870 c->access_token_md = grpc_credentials_md_store_create(1);
871 gpr_asprintf(&token_md_value, "Bearer %s", access_token);
872 grpc_credentials_md_store_add_cstrings(
873 c->access_token_md, GRPC_AUTHORIZATION_METADATA_KEY, token_md_value);
874 gpr_free(token_md_value);
875 return &c->base;
876}
877
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800878/* -- Fake transport security credentials. -- */
879
880static void fake_transport_security_credentials_destroy(
881 grpc_credentials *creds) {
882 gpr_free(creds);
883}
884
885static void fake_transport_security_server_credentials_destroy(
886 grpc_server_credentials *creds) {
887 gpr_free(creds);
888}
889
890static int fake_transport_security_has_request_metadata(
891 const grpc_credentials *creds) {
892 return 0;
893}
894
895static int fake_transport_security_has_request_metadata_only(
896 const grpc_credentials *creds) {
897 return 0;
898}
899
Craig Tiller8674cb12015-06-05 07:09:25 -0700900static grpc_security_status fake_transport_security_create_security_connector(
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700901 grpc_credentials *c, const char *target, const grpc_channel_args *args,
902 grpc_credentials *request_metadata_creds,
903 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
904 *sc = grpc_fake_channel_security_connector_create(request_metadata_creds, 1);
905 return GRPC_SECURITY_OK;
906}
907
908static grpc_security_status
909fake_transport_security_server_create_security_connector(
910 grpc_server_credentials *c, grpc_security_connector **sc) {
911 *sc = grpc_fake_server_security_connector_create();
912 return GRPC_SECURITY_OK;
913}
914
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800915static grpc_credentials_vtable fake_transport_security_credentials_vtable = {
916 fake_transport_security_credentials_destroy,
917 fake_transport_security_has_request_metadata,
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700918 fake_transport_security_has_request_metadata_only, NULL,
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700919 fake_transport_security_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800920
921static grpc_server_credentials_vtable
922 fake_transport_security_server_credentials_vtable = {
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700923 fake_transport_security_server_credentials_destroy,
924 fake_transport_security_server_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800925
926grpc_credentials *grpc_fake_transport_security_credentials_create(void) {
927 grpc_credentials *c = gpr_malloc(sizeof(grpc_credentials));
928 memset(c, 0, sizeof(grpc_credentials));
929 c->type = GRPC_CREDENTIALS_TYPE_FAKE_TRANSPORT_SECURITY;
930 c->vtable = &fake_transport_security_credentials_vtable;
931 gpr_ref_init(&c->refcount, 1);
932 return c;
933}
934
Craig Tiller3eef2c42015-01-15 11:37:54 -0800935grpc_server_credentials *grpc_fake_transport_security_server_credentials_create(
936 void) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800937 grpc_server_credentials *c = gpr_malloc(sizeof(grpc_server_credentials));
938 memset(c, 0, sizeof(grpc_server_credentials));
939 c->type = GRPC_CREDENTIALS_TYPE_FAKE_TRANSPORT_SECURITY;
940 c->vtable = &fake_transport_security_server_credentials_vtable;
941 return c;
942}
943
nnoble0c475f02014-12-05 15:37:39 -0800944/* -- Composite credentials. -- */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800945
nnoble0c475f02014-12-05 15:37:39 -0800946typedef struct {
nnoble0c475f02014-12-05 15:37:39 -0800947 grpc_composite_credentials *composite_creds;
948 size_t creds_index;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700949 grpc_credentials_md_store *md_elems;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800950 char *service_url;
nnoble0c475f02014-12-05 15:37:39 -0800951 void *user_data;
Craig Tiller06bac342015-06-01 12:55:57 -0700952 grpc_pollset *pollset;
nnoble0c475f02014-12-05 15:37:39 -0800953 grpc_credentials_metadata_cb cb;
954} grpc_composite_credentials_metadata_context;
955
956static void composite_destroy(grpc_credentials *creds) {
957 grpc_composite_credentials *c = (grpc_composite_credentials *)creds;
958 size_t i;
959 for (i = 0; i < c->inner.num_creds; i++) {
960 grpc_credentials_unref(c->inner.creds_array[i]);
961 }
962 gpr_free(c->inner.creds_array);
963 gpr_free(creds);
964}
965
966static int composite_has_request_metadata(const grpc_credentials *creds) {
967 const grpc_composite_credentials *c =
968 (const grpc_composite_credentials *)creds;
969 size_t i;
970 for (i = 0; i < c->inner.num_creds; i++) {
971 if (grpc_credentials_has_request_metadata(c->inner.creds_array[i])) {
972 return 1;
973 }
974 }
975 return 0;
976}
977
978static int composite_has_request_metadata_only(const grpc_credentials *creds) {
979 const grpc_composite_credentials *c =
980 (const grpc_composite_credentials *)creds;
981 size_t i;
982 for (i = 0; i < c->inner.num_creds; i++) {
983 if (!grpc_credentials_has_request_metadata_only(c->inner.creds_array[i])) {
984 return 0;
985 }
986 }
987 return 1;
988}
989
990static void composite_md_context_destroy(
991 grpc_composite_credentials_metadata_context *ctx) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700992 grpc_credentials_md_store_unref(ctx->md_elems);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800993 if (ctx->service_url != NULL) gpr_free(ctx->service_url);
nnoble0c475f02014-12-05 15:37:39 -0800994 gpr_free(ctx);
995}
996
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700997static void composite_metadata_cb(void *user_data,
998 grpc_credentials_md *md_elems, size_t num_md,
nnoble0c475f02014-12-05 15:37:39 -0800999 grpc_credentials_status status) {
1000 grpc_composite_credentials_metadata_context *ctx =
1001 (grpc_composite_credentials_metadata_context *)user_data;
nnoble0c475f02014-12-05 15:37:39 -08001002 if (status != GRPC_CREDENTIALS_OK) {
1003 ctx->cb(ctx->user_data, NULL, 0, status);
1004 return;
1005 }
1006
1007 /* Copy the metadata in the context. */
1008 if (num_md > 0) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001009 size_t i;
nnoble0c475f02014-12-05 15:37:39 -08001010 for (i = 0; i < num_md; i++) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001011 grpc_credentials_md_store_add(ctx->md_elems, md_elems[i].key,
1012 md_elems[i].value);
nnoble0c475f02014-12-05 15:37:39 -08001013 }
nnoble0c475f02014-12-05 15:37:39 -08001014 }
1015
1016 /* See if we need to get some more metadata. */
1017 while (ctx->creds_index < ctx->composite_creds->inner.num_creds) {
1018 grpc_credentials *inner_creds =
1019 ctx->composite_creds->inner.creds_array[ctx->creds_index++];
1020 if (grpc_credentials_has_request_metadata(inner_creds)) {
Craig Tiller06bac342015-06-01 12:55:57 -07001021 grpc_credentials_get_request_metadata(inner_creds, ctx->pollset,
1022 ctx->service_url,
Julien Boeuff47a5cb2015-02-18 12:24:08 -08001023 composite_metadata_cb, ctx);
nnoble0c475f02014-12-05 15:37:39 -08001024 return;
1025 }
1026 }
1027
1028 /* We're done!. */
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001029 ctx->cb(ctx->user_data, ctx->md_elems->entries, ctx->md_elems->num_entries,
1030 GRPC_CREDENTIALS_OK);
nnoble0c475f02014-12-05 15:37:39 -08001031 composite_md_context_destroy(ctx);
1032}
1033
1034static void composite_get_request_metadata(grpc_credentials *creds,
Craig Tiller06bac342015-06-01 12:55:57 -07001035 grpc_pollset *pollset,
Julien Boeuff47a5cb2015-02-18 12:24:08 -08001036 const char *service_url,
nnoble0c475f02014-12-05 15:37:39 -08001037 grpc_credentials_metadata_cb cb,
1038 void *user_data) {
1039 grpc_composite_credentials *c = (grpc_composite_credentials *)creds;
1040 grpc_composite_credentials_metadata_context *ctx;
1041 if (!grpc_credentials_has_request_metadata(creds)) {
1042 cb(user_data, NULL, 0, GRPC_CREDENTIALS_OK);
1043 return;
1044 }
1045 ctx = gpr_malloc(sizeof(grpc_composite_credentials_metadata_context));
1046 memset(ctx, 0, sizeof(grpc_composite_credentials_metadata_context));
Julien Boeuff47a5cb2015-02-18 12:24:08 -08001047 ctx->service_url = gpr_strdup(service_url);
nnoble0c475f02014-12-05 15:37:39 -08001048 ctx->user_data = user_data;
1049 ctx->cb = cb;
1050 ctx->composite_creds = c;
Craig Tiller06bac342015-06-01 12:55:57 -07001051 ctx->pollset = pollset;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001052 ctx->md_elems = grpc_credentials_md_store_create(c->inner.num_creds);
nnoble0c475f02014-12-05 15:37:39 -08001053 while (ctx->creds_index < c->inner.num_creds) {
1054 grpc_credentials *inner_creds = c->inner.creds_array[ctx->creds_index++];
1055 if (grpc_credentials_has_request_metadata(inner_creds)) {
Craig Tiller06bac342015-06-01 12:55:57 -07001056 grpc_credentials_get_request_metadata(inner_creds, pollset, service_url,
Julien Boeuff47a5cb2015-02-18 12:24:08 -08001057 composite_metadata_cb, ctx);
nnoble0c475f02014-12-05 15:37:39 -08001058 return;
1059 }
1060 }
1061 GPR_ASSERT(0); /* Should have exited before. */
1062}
1063
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001064static grpc_security_status composite_create_security_connector(
1065 grpc_credentials *creds, const char *target, const grpc_channel_args *args,
1066 grpc_credentials *request_metadata_creds,
1067 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
1068 grpc_composite_credentials *c = (grpc_composite_credentials *)creds;
1069 if (c->connector_creds == NULL) {
1070 gpr_log(GPR_ERROR,
1071 "Cannot create security connector, missing connector credentials.");
1072 return GRPC_SECURITY_ERROR;
1073 }
1074 return grpc_credentials_create_security_connector(c->connector_creds, target,
1075 args, creds, sc, new_args);
1076}
1077
nnoble0c475f02014-12-05 15:37:39 -08001078static grpc_credentials_vtable composite_credentials_vtable = {
1079 composite_destroy, composite_has_request_metadata,
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001080 composite_has_request_metadata_only, composite_get_request_metadata,
Craig Tiller83b826a2015-05-13 13:43:01 -07001081 composite_create_security_connector};
nnoble0c475f02014-12-05 15:37:39 -08001082
1083static grpc_credentials_array get_creds_array(grpc_credentials **creds_addr) {
1084 grpc_credentials_array result;
1085 grpc_credentials *creds = *creds_addr;
1086 result.creds_array = creds_addr;
1087 result.num_creds = 1;
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -08001088 if (strcmp(creds->type, GRPC_CREDENTIALS_TYPE_COMPOSITE) == 0) {
nnoble0c475f02014-12-05 15:37:39 -08001089 result = *grpc_composite_credentials_get_credentials(creds);
1090 }
1091 return result;
1092}
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001093
1094grpc_credentials *grpc_composite_credentials_create(grpc_credentials *creds1,
1095 grpc_credentials *creds2) {
nnoble0c475f02014-12-05 15:37:39 -08001096 size_t i;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001097 size_t creds_array_byte_size;
nnoble0c475f02014-12-05 15:37:39 -08001098 grpc_credentials_array creds1_array;
1099 grpc_credentials_array creds2_array;
1100 grpc_composite_credentials *c;
1101 GPR_ASSERT(creds1 != NULL);
1102 GPR_ASSERT(creds2 != NULL);
1103 c = gpr_malloc(sizeof(grpc_composite_credentials));
1104 memset(c, 0, sizeof(grpc_composite_credentials));
1105 c->base.type = GRPC_CREDENTIALS_TYPE_COMPOSITE;
1106 c->base.vtable = &composite_credentials_vtable;
1107 gpr_ref_init(&c->base.refcount, 1);
1108 creds1_array = get_creds_array(&creds1);
1109 creds2_array = get_creds_array(&creds2);
1110 c->inner.num_creds = creds1_array.num_creds + creds2_array.num_creds;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001111 creds_array_byte_size = c->inner.num_creds * sizeof(grpc_credentials *);
1112 c->inner.creds_array = gpr_malloc(creds_array_byte_size);
1113 memset(c->inner.creds_array, 0, creds_array_byte_size);
nnoble0c475f02014-12-05 15:37:39 -08001114 for (i = 0; i < creds1_array.num_creds; i++) {
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001115 grpc_credentials *cur_creds = creds1_array.creds_array[i];
1116 if (!grpc_credentials_has_request_metadata_only(cur_creds)) {
1117 if (c->connector_creds == NULL) {
1118 c->connector_creds = cur_creds;
1119 } else {
1120 gpr_log(GPR_ERROR, "Cannot compose multiple connector credentials.");
1121 goto fail;
1122 }
1123 }
1124 c->inner.creds_array[i] = grpc_credentials_ref(cur_creds);
nnoble0c475f02014-12-05 15:37:39 -08001125 }
1126 for (i = 0; i < creds2_array.num_creds; i++) {
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001127 grpc_credentials *cur_creds = creds2_array.creds_array[i];
1128 if (!grpc_credentials_has_request_metadata_only(cur_creds)) {
1129 if (c->connector_creds == NULL) {
1130 c->connector_creds = cur_creds;
1131 } else {
1132 gpr_log(GPR_ERROR, "Cannot compose multiple connector credentials.");
1133 goto fail;
1134 }
1135 }
nnoble0c475f02014-12-05 15:37:39 -08001136 c->inner.creds_array[i + creds1_array.num_creds] =
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001137 grpc_credentials_ref(cur_creds);
nnoble0c475f02014-12-05 15:37:39 -08001138 }
1139 return &c->base;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001140
1141fail:
1142 grpc_credentials_unref(&c->base);
1143 return NULL;
nnoble0c475f02014-12-05 15:37:39 -08001144}
1145
1146const grpc_credentials_array *grpc_composite_credentials_get_credentials(
1147 grpc_credentials *creds) {
1148 const grpc_composite_credentials *c =
1149 (const grpc_composite_credentials *)creds;
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -08001150 GPR_ASSERT(strcmp(creds->type, GRPC_CREDENTIALS_TYPE_COMPOSITE) == 0);
nnoble0c475f02014-12-05 15:37:39 -08001151 return &c->inner;
1152}
1153
jboeuf6ad120e2015-01-12 17:08:15 -08001154grpc_credentials *grpc_credentials_contains_type(
1155 grpc_credentials *creds, const char *type,
1156 grpc_credentials **composite_creds) {
1157 size_t i;
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -08001158 if (strcmp(creds->type, type) == 0) {
jboeuf6ad120e2015-01-12 17:08:15 -08001159 if (composite_creds != NULL) *composite_creds = NULL;
1160 return creds;
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -08001161 } else if (strcmp(creds->type, GRPC_CREDENTIALS_TYPE_COMPOSITE) == 0) {
jboeuf6ad120e2015-01-12 17:08:15 -08001162 const grpc_credentials_array *inner_creds_array =
1163 grpc_composite_credentials_get_credentials(creds);
1164 for (i = 0; i < inner_creds_array->num_creds; i++) {
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -08001165 if (strcmp(type, inner_creds_array->creds_array[i]->type) == 0) {
jboeuf6ad120e2015-01-12 17:08:15 -08001166 if (composite_creds != NULL) *composite_creds = creds;
1167 return inner_creds_array->creds_array[i];
1168 }
1169 }
1170 }
1171 return NULL;
1172}
1173
nnoble0c475f02014-12-05 15:37:39 -08001174/* -- IAM credentials. -- */
1175
nnoble0c475f02014-12-05 15:37:39 -08001176static void iam_destroy(grpc_credentials *creds) {
1177 grpc_iam_credentials *c = (grpc_iam_credentials *)creds;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001178 grpc_credentials_md_store_unref(c->iam_md);
nnoble0c475f02014-12-05 15:37:39 -08001179 gpr_free(c);
1180}
1181
Craig Tiller83b826a2015-05-13 13:43:01 -07001182static int iam_has_request_metadata(const grpc_credentials *creds) { return 1; }
nnoble0c475f02014-12-05 15:37:39 -08001183
1184static int iam_has_request_metadata_only(const grpc_credentials *creds) {
1185 return 1;
1186}
1187
1188static void iam_get_request_metadata(grpc_credentials *creds,
Craig Tiller06bac342015-06-01 12:55:57 -07001189 grpc_pollset *pollset,
Julien Boeuff47a5cb2015-02-18 12:24:08 -08001190 const char *service_url,
nnoble0c475f02014-12-05 15:37:39 -08001191 grpc_credentials_metadata_cb cb,
1192 void *user_data) {
1193 grpc_iam_credentials *c = (grpc_iam_credentials *)creds;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001194 cb(user_data, c->iam_md->entries, c->iam_md->num_entries,
1195 GRPC_CREDENTIALS_OK);
nnoble0c475f02014-12-05 15:37:39 -08001196}
1197
1198static grpc_credentials_vtable iam_vtable = {
1199 iam_destroy, iam_has_request_metadata, iam_has_request_metadata_only,
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001200 iam_get_request_metadata, NULL};
nnoble0c475f02014-12-05 15:37:39 -08001201
1202grpc_credentials *grpc_iam_credentials_create(const char *token,
1203 const char *authority_selector) {
1204 grpc_iam_credentials *c;
1205 GPR_ASSERT(token != NULL);
1206 GPR_ASSERT(authority_selector != NULL);
1207 c = gpr_malloc(sizeof(grpc_iam_credentials));
1208 memset(c, 0, sizeof(grpc_iam_credentials));
1209 c->base.type = GRPC_CREDENTIALS_TYPE_IAM;
1210 c->base.vtable = &iam_vtable;
1211 gpr_ref_init(&c->base.refcount, 1);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001212 c->iam_md = grpc_credentials_md_store_create(2);
1213 grpc_credentials_md_store_add_cstrings(
1214 c->iam_md, GRPC_IAM_AUTHORIZATION_TOKEN_METADATA_KEY, token);
1215 grpc_credentials_md_store_add_cstrings(
1216 c->iam_md, GRPC_IAM_AUTHORITY_SELECTOR_METADATA_KEY, authority_selector);
nnoble0c475f02014-12-05 15:37:39 -08001217 return &c->base;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001218}