blob: 4c94e29e30bca811588942c26bdb67c1359d838b [file] [log] [blame]
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001/*
2 *
Craig Tiller06059952015-02-18 08:34:56 -08003 * Copyright 2015, Google Inc.
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08004 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are
8 * met:
9 *
10 * * Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * * Redistributions in binary form must reproduce the above
13 * copyright notice, this list of conditions and the following disclaimer
14 * in the documentation and/or other materials provided with the
15 * distribution.
16 * * Neither the name of Google Inc. nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
24 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
30 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 *
32 */
33
Nicolas "Pixel" Nobled5a99852015-01-24 01:27:48 -080034#include "src/core/iomgr/sockaddr.h"
35
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080036#include <grpc/grpc.h>
37
38#include <stdlib.h>
39#include <string.h>
40
41#include "src/core/channel/census_filter.h"
42#include "src/core/channel/channel_args.h"
43#include "src/core/channel/client_channel.h"
44#include "src/core/channel/client_setup.h"
David Garcia Quintas5927aec2015-06-18 17:24:44 -070045#include "src/core/channel/compress_filter.h"
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080046#include "src/core/channel/connected_channel.h"
47#include "src/core/channel/http_client_filter.h"
ctiller18b49ab2014-12-09 14:39:16 -080048#include "src/core/iomgr/resolve_address.h"
49#include "src/core/iomgr/tcp_client.h"
Julien Boeufc6f8d0a2015-05-11 22:40:02 -070050#include "src/core/security/auth_filters.h"
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -070051#include "src/core/security/credentials.h"
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080052#include "src/core/security/secure_transport_setup.h"
Craig Tiller485d7762015-01-23 12:54:05 -080053#include "src/core/support/string.h"
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080054#include "src/core/surface/channel.h"
55#include "src/core/surface/client.h"
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080056#include "src/core/transport/chttp2_transport.h"
57#include <grpc/grpc_security.h>
58#include <grpc/support/alloc.h>
59#include <grpc/support/log.h>
Masood Malekghassemi701af602015-06-03 15:01:17 -070060#include <grpc/support/string_util.h>
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080061#include <grpc/support/sync.h>
62#include <grpc/support/useful.h>
63#include "src/core/tsi/transport_security_interface.h"
64
65typedef struct setup setup;
66
67/* A single setup request (started via initiate) */
68typedef struct {
69 grpc_client_setup_request *cs_request;
70 setup *setup;
71 /* Resolved addresses, or null if resolution not yet completed. */
72 grpc_resolved_addresses *resolved;
73 /* which address in resolved should we pick for the next connection attempt */
74 size_t resolved_index;
75} request;
76
77struct setup {
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -070078 grpc_channel_security_connector *security_connector;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080079 const char *target;
80 grpc_transport_setup_callback setup_callback;
81 void *setup_user_data;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080082};
83
84static int maybe_try_next_resolved(request *r);
85
86static void done(request *r, int was_successful) {
87 grpc_client_setup_request_finish(r->cs_request, was_successful);
88 if (r->resolved) {
89 grpc_resolved_addresses_destroy(r->resolved);
90 }
91 gpr_free(r);
92}
93
94static void on_secure_transport_setup_done(void *rp,
95 grpc_security_status status,
96 grpc_endpoint *secure_endpoint) {
97 request *r = rp;
98 if (status != GRPC_SECURITY_OK) {
99 gpr_log(GPR_ERROR, "Secure transport setup failed with error %d.", status);
100 done(r, 0);
Craig Tiller43a2b172015-02-18 17:17:51 -0800101 } else if (grpc_client_setup_cb_begin(r->cs_request)) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800102 grpc_create_chttp2_transport(
103 r->setup->setup_callback, r->setup->setup_user_data,
104 grpc_client_setup_get_channel_args(r->cs_request), secure_endpoint,
105 NULL, 0, grpc_client_setup_get_mdctx(r->cs_request), 1);
Craig Tiller43a2b172015-02-18 17:17:51 -0800106 grpc_client_setup_cb_end(r->cs_request);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800107 done(r, 1);
Craig Tiller43a2b172015-02-18 17:17:51 -0800108 } else {
109 done(r, 0);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800110 }
111}
112
113/* connection callback: tcp is either valid, or null on error */
114static void on_connect(void *rp, grpc_endpoint *tcp) {
115 request *r = rp;
116
117 if (!grpc_client_setup_request_should_continue(r->cs_request)) {
118 if (tcp) {
119 grpc_endpoint_shutdown(tcp);
120 grpc_endpoint_destroy(tcp);
121 }
122 done(r, 0);
123 return;
124 }
125
126 if (!tcp) {
127 if (!maybe_try_next_resolved(r)) {
128 done(r, 0);
129 return;
130 } else {
131 return;
132 }
133 } else {
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700134 grpc_setup_secure_transport(&r->setup->security_connector->base, tcp,
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800135 on_secure_transport_setup_done, r);
136 }
137}
138
139/* attempt to connect to the next available resolved address */
140static int maybe_try_next_resolved(request *r) {
141 grpc_resolved_address *addr;
142 if (!r->resolved) return 0;
143 if (r->resolved_index == r->resolved->naddrs) return 0;
144 addr = &r->resolved->addrs[r->resolved_index++];
ctiller18b49ab2014-12-09 14:39:16 -0800145 grpc_tcp_client_connect(on_connect, r, (struct sockaddr *)&addr->addr,
146 addr->len,
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800147 grpc_client_setup_request_deadline(r->cs_request));
148 return 1;
149}
150
151/* callback for when our target address has been resolved */
152static void on_resolved(void *rp, grpc_resolved_addresses *resolved) {
153 request *r = rp;
154
155 /* if we're not still the active request, abort */
156 if (!grpc_client_setup_request_should_continue(r->cs_request)) {
157 if (resolved) {
158 grpc_resolved_addresses_destroy(resolved);
159 }
160 done(r, 0);
161 return;
162 }
163
164 if (!resolved) {
165 done(r, 0);
166 return;
167 } else {
168 r->resolved = resolved;
169 r->resolved_index = 0;
170 if (!maybe_try_next_resolved(r)) {
171 done(r, 0);
172 }
173 }
174}
175
176static void initiate_setup(void *sp, grpc_client_setup_request *cs_request) {
177 request *r = gpr_malloc(sizeof(request));
178 r->setup = sp;
179 r->cs_request = cs_request;
180 r->resolved = NULL;
181 r->resolved_index = 0;
182 /* TODO(klempner): Make grpc_resolve_address respect deadline */
183 grpc_resolve_address(r->setup->target, "https", on_resolved, r);
184}
185
186static void done_setup(void *sp) {
187 setup *s = sp;
188 gpr_free((void *)s->target);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700189 grpc_security_connector_unref(&s->security_connector->base);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800190 gpr_free(s);
191}
192
193static grpc_transport_setup_result complete_setup(void *channel_stack,
194 grpc_transport *transport,
195 grpc_mdctx *mdctx) {
Julien Boeuf54b21922015-02-04 16:39:35 -0800196 static grpc_channel_filter const *extra_filters[] = {
Craig Tiller6e84aba2015-04-23 15:08:17 -0700197 &grpc_client_auth_filter, &grpc_http_client_filter};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800198 return grpc_client_channel_transport_setup_complete(
199 channel_stack, transport, extra_filters, GPR_ARRAY_SIZE(extra_filters),
200 mdctx);
201}
202
203/* Create a secure client channel:
204 Asynchronously: - resolve target
205 - connect to it (trying alternatives as presented)
206 - perform handshakes */
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700207grpc_channel *grpc_secure_channel_create(grpc_credentials *creds,
208 const char *target,
209 const grpc_channel_args *args) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800210 setup *s;
211 grpc_channel *channel;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700212 grpc_arg connector_arg;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800213 grpc_channel_args *args_copy;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700214 grpc_channel_args *new_args_from_connector;
Craig Tiller1a727fd2015-04-24 13:21:22 -0700215 grpc_channel_security_connector *connector;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700216 grpc_mdctx *mdctx;
Julien Boeuf54b21922015-02-04 16:39:35 -0800217#define MAX_FILTERS 3
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800218 const grpc_channel_filter *filters[MAX_FILTERS];
219 int n = 0;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700220
221 if (grpc_find_security_connector_in_args(args) != NULL) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800222 gpr_log(GPR_ERROR, "Cannot set security context in channel args.");
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700223 return grpc_lame_client_channel_create();
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800224 }
225
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700226 if (grpc_credentials_create_security_connector(
227 creds, target, args, NULL, &connector, &new_args_from_connector) !=
228 GRPC_SECURITY_OK) {
229 return grpc_lame_client_channel_create();
230 }
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700231 mdctx = grpc_mdctx_create();
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700232
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800233 s = gpr_malloc(sizeof(setup));
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700234 connector_arg = grpc_security_connector_to_arg(&connector->base);
235 args_copy = grpc_channel_args_copy_and_add(
236 new_args_from_connector != NULL ? new_args_from_connector : args,
237 &connector_arg);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800238 filters[n++] = &grpc_client_surface_filter;
Alistair Veitch9686dab2015-05-26 14:26:47 -0700239 /* TODO(census)
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800240 if (grpc_channel_args_is_census_enabled(args)) {
241 filters[n++] = &grpc_client_census_filter;
Alistair Veitch9686dab2015-05-26 14:26:47 -0700242 } */
David Garcia Quintas5927aec2015-06-18 17:24:44 -0700243 if (grpc_channel_args_get_compression_level(args) >
244 GRPC_COMPRESS_LEVEL_NONE) {
245 filters[n++] = &grpc_compress_filter;
246 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800247 filters[n++] = &grpc_client_channel_filter;
248 GPR_ASSERT(n <= MAX_FILTERS);
249 channel = grpc_channel_create_from_filters(filters, n, args_copy, mdctx, 1);
250 grpc_channel_args_destroy(args_copy);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700251 if (new_args_from_connector != NULL) {
252 grpc_channel_args_destroy(new_args_from_connector);
253 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800254
255 s->target = gpr_strdup(target);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800256 s->setup_callback = complete_setup;
257 s->setup_user_data = grpc_channel_get_channel_stack(channel);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700258 s->security_connector = connector;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800259 grpc_client_setup_create_and_attach(grpc_channel_get_channel_stack(channel),
260 args, mdctx, initiate_setup, done_setup,
ctiller18b49ab2014-12-09 14:39:16 -0800261 s);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800262 return channel;
Craig Tiller190d3602015-02-18 09:23:38 -0800263}