blob: eb178ececba50be3366933fae226c9f40d089222 [file] [log] [blame]
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001/*
2 *
Craig Tiller06059952015-02-18 08:34:56 -08003 * Copyright 2015, Google Inc.
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08004 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are
8 * met:
9 *
10 * * Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * * Redistributions in binary form must reproduce the above
13 * copyright notice, this list of conditions and the following disclaimer
14 * in the documentation and/or other materials provided with the
15 * distribution.
16 * * Neither the name of Google Inc. nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
24 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
30 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 *
32 */
33
34#include "src/core/security/credentials.h"
35
Julien Boeuff47a5cb2015-02-18 12:24:08 -080036#include <string.h>
37#include <stdio.h>
38
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -070039#include "src/core/channel/channel_args.h"
40#include "src/core/channel/http_client_filter.h"
Julien Boeuff47a5cb2015-02-18 12:24:08 -080041#include "src/core/json/json.h"
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080042#include "src/core/httpcli/httpcli.h"
ctiller18b49ab2014-12-09 14:39:16 -080043#include "src/core/iomgr/iomgr.h"
Craig Tiller485d7762015-01-23 12:54:05 -080044#include "src/core/support/string.h"
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -070045
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080046#include <grpc/support/alloc.h>
47#include <grpc/support/log.h>
Masood Malekghassemi701af602015-06-03 15:01:17 -070048#include <grpc/support/string_util.h>
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080049#include <grpc/support/sync.h>
50#include <grpc/support/time.h>
51
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080052/* -- Common. -- */
53
Julien Boeufb037bb62015-07-08 14:58:14 -070054struct grpc_credentials_metadata_request {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080055 grpc_credentials *creds;
56 grpc_credentials_metadata_cb cb;
David Garcia Quintas69ba8712015-06-01 11:29:42 -070057 grpc_iomgr_closure *on_simulated_token_fetch_done_closure;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080058 void *user_data;
Julien Boeufb037bb62015-07-08 14:58:14 -070059};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080060
61static grpc_credentials_metadata_request *
62grpc_credentials_metadata_request_create(grpc_credentials *creds,
63 grpc_credentials_metadata_cb cb,
64 void *user_data) {
65 grpc_credentials_metadata_request *r =
66 gpr_malloc(sizeof(grpc_credentials_metadata_request));
67 r->creds = grpc_credentials_ref(creds);
68 r->cb = cb;
David Garcia Quintas69ba8712015-06-01 11:29:42 -070069 r->on_simulated_token_fetch_done_closure =
70 gpr_malloc(sizeof(grpc_iomgr_closure));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080071 r->user_data = user_data;
72 return r;
73}
74
75static void grpc_credentials_metadata_request_destroy(
76 grpc_credentials_metadata_request *r) {
77 grpc_credentials_unref(r->creds);
David Garcia Quintas69ba8712015-06-01 11:29:42 -070078 gpr_free(r->on_simulated_token_fetch_done_closure);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080079 gpr_free(r);
80}
81
82grpc_credentials *grpc_credentials_ref(grpc_credentials *creds) {
83 if (creds == NULL) return NULL;
84 gpr_ref(&creds->refcount);
85 return creds;
86}
87
88void grpc_credentials_unref(grpc_credentials *creds) {
89 if (creds == NULL) return;
90 if (gpr_unref(&creds->refcount)) creds->vtable->destroy(creds);
91}
92
93void grpc_credentials_release(grpc_credentials *creds) {
94 grpc_credentials_unref(creds);
95}
96
97int grpc_credentials_has_request_metadata(grpc_credentials *creds) {
98 if (creds == NULL) return 0;
99 return creds->vtable->has_request_metadata(creds);
100}
101
102int grpc_credentials_has_request_metadata_only(grpc_credentials *creds) {
103 if (creds == NULL) return 0;
104 return creds->vtable->has_request_metadata_only(creds);
105}
106
107void grpc_credentials_get_request_metadata(grpc_credentials *creds,
Craig Tiller06bac342015-06-01 12:55:57 -0700108 grpc_pollset *pollset,
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800109 const char *service_url,
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800110 grpc_credentials_metadata_cb cb,
111 void *user_data) {
nnoble0c475f02014-12-05 15:37:39 -0800112 if (creds == NULL || !grpc_credentials_has_request_metadata(creds) ||
113 creds->vtable->get_request_metadata == NULL) {
114 if (cb != NULL) {
115 cb(user_data, NULL, 0, GRPC_CREDENTIALS_OK);
116 }
117 return;
118 }
Craig Tiller06bac342015-06-01 12:55:57 -0700119 creds->vtable->get_request_metadata(creds, pollset, service_url, cb,
120 user_data);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800121}
122
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700123grpc_security_status grpc_credentials_create_security_connector(
124 grpc_credentials *creds, const char *target, const grpc_channel_args *args,
125 grpc_credentials *request_metadata_creds,
126 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
127 *new_args = NULL;
128 if (creds == NULL || creds->vtable->create_security_connector == NULL ||
129 grpc_credentials_has_request_metadata_only(creds)) {
130 gpr_log(GPR_ERROR,
131 "Invalid credentials for creating a security connector.");
132 return GRPC_SECURITY_ERROR;
133 }
134 return creds->vtable->create_security_connector(
135 creds, target, args, request_metadata_creds, sc, new_args);
Craig Tillerc4885ed2015-04-14 09:51:28 -0700136}
137
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800138void grpc_server_credentials_release(grpc_server_credentials *creds) {
139 if (creds == NULL) return;
140 creds->vtable->destroy(creds);
141}
142
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700143grpc_security_status grpc_server_credentials_create_security_connector(
144 grpc_server_credentials *creds, grpc_security_connector **sc) {
145 if (creds == NULL || creds->vtable->create_security_connector == NULL) {
146 gpr_log(GPR_ERROR, "Server credentials cannot create security context.");
147 return GRPC_SECURITY_ERROR;
148 }
149 return creds->vtable->create_security_connector(creds, sc);
150}
151
Julien Boeuf6bdc9b42015-07-19 21:56:02 -0700152void grpc_server_credentials_set_auth_metadata_processor(
153 grpc_server_credentials *creds, grpc_auth_metadata_processor processor) {
154 if (creds == NULL) return;
155 creds->processor = processor;
156}
157
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800158/* -- Ssl credentials. -- */
159
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800160static void ssl_destroy(grpc_credentials *creds) {
161 grpc_ssl_credentials *c = (grpc_ssl_credentials *)creds;
162 if (c->config.pem_root_certs != NULL) gpr_free(c->config.pem_root_certs);
163 if (c->config.pem_private_key != NULL) gpr_free(c->config.pem_private_key);
164 if (c->config.pem_cert_chain != NULL) gpr_free(c->config.pem_cert_chain);
165 gpr_free(creds);
166}
167
168static void ssl_server_destroy(grpc_server_credentials *creds) {
169 grpc_ssl_server_credentials *c = (grpc_ssl_server_credentials *)creds;
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800170 size_t i;
171 for (i = 0; i < c->config.num_key_cert_pairs; i++) {
172 if (c->config.pem_private_keys[i] != NULL) {
173 gpr_free(c->config.pem_private_keys[i]);
174 }
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800175 if (c->config.pem_cert_chains[i] != NULL) {
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800176 gpr_free(c->config.pem_cert_chains[i]);
177 }
178 }
179 if (c->config.pem_private_keys != NULL) gpr_free(c->config.pem_private_keys);
180 if (c->config.pem_private_keys_sizes != NULL) {
181 gpr_free(c->config.pem_private_keys_sizes);
182 }
183 if (c->config.pem_cert_chains != NULL) gpr_free(c->config.pem_cert_chains);
184 if (c->config.pem_cert_chains_sizes != NULL) {
185 gpr_free(c->config.pem_cert_chains_sizes);
186 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800187 if (c->config.pem_root_certs != NULL) gpr_free(c->config.pem_root_certs);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800188 gpr_free(creds);
189}
190
Craig Tiller83b826a2015-05-13 13:43:01 -0700191static int ssl_has_request_metadata(const grpc_credentials *creds) { return 0; }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800192
193static int ssl_has_request_metadata_only(const grpc_credentials *creds) {
194 return 0;
195}
196
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700197static grpc_security_status ssl_create_security_connector(
198 grpc_credentials *creds, const char *target, const grpc_channel_args *args,
199 grpc_credentials *request_metadata_creds,
200 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
201 grpc_ssl_credentials *c = (grpc_ssl_credentials *)creds;
202 grpc_security_status status = GRPC_SECURITY_OK;
203 size_t i = 0;
204 const char *overridden_target_name = NULL;
205 grpc_arg arg;
206
207 for (i = 0; args && i < args->num_args; i++) {
208 grpc_arg *arg = &args->args[i];
209 if (strcmp(arg->key, GRPC_SSL_TARGET_NAME_OVERRIDE_ARG) == 0 &&
210 arg->type == GRPC_ARG_STRING) {
211 overridden_target_name = arg->value.string;
212 break;
213 }
214 }
215 status = grpc_ssl_channel_security_connector_create(
216 request_metadata_creds, &c->config, target, overridden_target_name, sc);
217 if (status != GRPC_SECURITY_OK) {
218 return status;
219 }
220 arg.type = GRPC_ARG_STRING;
221 arg.key = GRPC_ARG_HTTP2_SCHEME;
222 arg.value.string = "https";
Craig Tillerd9a50882015-06-29 15:57:36 -0700223 *new_args = grpc_channel_args_copy_and_add(args, &arg, 1);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700224 return status;
225}
226
227static grpc_security_status ssl_server_create_security_connector(
228 grpc_server_credentials *creds, grpc_security_connector **sc) {
229 grpc_ssl_server_credentials *c = (grpc_ssl_server_credentials *)creds;
230 return grpc_ssl_server_security_connector_create(&c->config, sc);
231}
232
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800233static grpc_credentials_vtable ssl_vtable = {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700234 ssl_destroy, ssl_has_request_metadata, ssl_has_request_metadata_only, NULL,
235 ssl_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800236
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700237static grpc_server_credentials_vtable ssl_server_vtable = {
238 ssl_server_destroy, ssl_server_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800239
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800240static void ssl_copy_key_material(const char *input, unsigned char **output,
241 size_t *output_size) {
242 *output_size = strlen(input);
243 *output = gpr_malloc(*output_size);
244 memcpy(*output, input, *output_size);
245}
246
247static void ssl_build_config(const char *pem_root_certs,
248 grpc_ssl_pem_key_cert_pair *pem_key_cert_pair,
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800249 grpc_ssl_config *config) {
Julien Boeuf026a4172015-02-02 18:36:37 -0800250 if (pem_root_certs != NULL) {
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800251 ssl_copy_key_material(pem_root_certs, &config->pem_root_certs,
252 &config->pem_root_certs_size);
253 }
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800254 if (pem_key_cert_pair != NULL) {
255 GPR_ASSERT(pem_key_cert_pair->private_key != NULL);
256 GPR_ASSERT(pem_key_cert_pair->cert_chain != NULL);
257 ssl_copy_key_material(pem_key_cert_pair->private_key,
258 &config->pem_private_key,
259 &config->pem_private_key_size);
260 ssl_copy_key_material(pem_key_cert_pair->cert_chain,
261 &config->pem_cert_chain,
262 &config->pem_cert_chain_size);
263 }
264}
265
266static void ssl_build_server_config(
267 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs,
268 size_t num_key_cert_pairs, grpc_ssl_server_config *config) {
269 size_t i;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800270 if (pem_root_certs != NULL) {
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800271 ssl_copy_key_material(pem_root_certs, &config->pem_root_certs,
272 &config->pem_root_certs_size);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800273 }
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800274 if (num_key_cert_pairs > 0) {
275 GPR_ASSERT(pem_key_cert_pairs != NULL);
276 config->pem_private_keys =
277 gpr_malloc(num_key_cert_pairs * sizeof(unsigned char *));
278 config->pem_cert_chains =
279 gpr_malloc(num_key_cert_pairs * sizeof(unsigned char *));
280 config->pem_private_keys_sizes =
281 gpr_malloc(num_key_cert_pairs * sizeof(size_t));
282 config->pem_cert_chains_sizes =
283 gpr_malloc(num_key_cert_pairs * sizeof(size_t));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800284 }
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800285 config->num_key_cert_pairs = num_key_cert_pairs;
286 for (i = 0; i < num_key_cert_pairs; i++) {
287 GPR_ASSERT(pem_key_cert_pairs[i].private_key != NULL);
288 GPR_ASSERT(pem_key_cert_pairs[i].cert_chain != NULL);
289 ssl_copy_key_material(pem_key_cert_pairs[i].private_key,
290 &config->pem_private_keys[i],
291 &config->pem_private_keys_sizes[i]);
292 ssl_copy_key_material(pem_key_cert_pairs[i].cert_chain,
293 &config->pem_cert_chains[i],
294 &config->pem_cert_chains_sizes[i]);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800295 }
296}
297
298grpc_credentials *grpc_ssl_credentials_create(
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800299 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pair) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800300 grpc_ssl_credentials *c = gpr_malloc(sizeof(grpc_ssl_credentials));
301 memset(c, 0, sizeof(grpc_ssl_credentials));
302 c->base.type = GRPC_CREDENTIALS_TYPE_SSL;
303 c->base.vtable = &ssl_vtable;
304 gpr_ref_init(&c->base.refcount, 1);
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800305 ssl_build_config(pem_root_certs, pem_key_cert_pair, &c->config);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800306 return &c->base;
307}
308
309grpc_server_credentials *grpc_ssl_server_credentials_create(
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800310 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs,
311 size_t num_key_cert_pairs) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800312 grpc_ssl_server_credentials *c =
313 gpr_malloc(sizeof(grpc_ssl_server_credentials));
314 memset(c, 0, sizeof(grpc_ssl_server_credentials));
315 c->base.type = GRPC_CREDENTIALS_TYPE_SSL;
316 c->base.vtable = &ssl_server_vtable;
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800317 ssl_build_server_config(pem_root_certs, pem_key_cert_pairs,
318 num_key_cert_pairs, &c->config);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800319 return &c->base;
320}
321
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800322/* -- Jwt credentials -- */
323
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800324static void jwt_reset_cache(grpc_jwt_credentials *c) {
325 if (c->cached.jwt_md != NULL) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700326 grpc_credentials_md_store_unref(c->cached.jwt_md);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800327 c->cached.jwt_md = NULL;
328 }
329 if (c->cached.service_url != NULL) {
330 gpr_free(c->cached.service_url);
331 c->cached.service_url = NULL;
332 }
333 c->cached.jwt_expiration = gpr_inf_past;
334}
335
336static void jwt_destroy(grpc_credentials *creds) {
337 grpc_jwt_credentials *c = (grpc_jwt_credentials *)creds;
338 grpc_auth_json_key_destruct(&c->key);
339 jwt_reset_cache(c);
340 gpr_mu_destroy(&c->cache_mu);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800341 gpr_free(c);
342}
343
344static int jwt_has_request_metadata(const grpc_credentials *creds) { return 1; }
345
346static int jwt_has_request_metadata_only(const grpc_credentials *creds) {
347 return 1;
348}
349
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800350static void jwt_get_request_metadata(grpc_credentials *creds,
Craig Tiller06bac342015-06-01 12:55:57 -0700351 grpc_pollset *pollset,
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800352 const char *service_url,
353 grpc_credentials_metadata_cb cb,
354 void *user_data) {
355 grpc_jwt_credentials *c = (grpc_jwt_credentials *)creds;
356 gpr_timespec refresh_threshold = {GRPC_SECURE_TOKEN_REFRESH_THRESHOLD_SECS,
357 0};
358
359 /* See if we can return a cached jwt. */
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700360 grpc_credentials_md_store *jwt_md = NULL;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800361 {
362 gpr_mu_lock(&c->cache_mu);
363 if (c->cached.service_url != NULL &&
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -0800364 strcmp(c->cached.service_url, service_url) == 0 &&
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800365 c->cached.jwt_md != NULL &&
Craig Tillerf1bff012015-07-06 11:20:50 -0700366 (gpr_time_cmp(gpr_time_sub(c->cached.jwt_expiration,
367 gpr_now(GPR_CLOCK_REALTIME)),
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800368 refresh_threshold) > 0)) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700369 jwt_md = grpc_credentials_md_store_ref(c->cached.jwt_md);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800370 }
371 gpr_mu_unlock(&c->cache_mu);
372 }
373
374 if (jwt_md == NULL) {
375 char *jwt = NULL;
376 /* Generate a new jwt. */
377 gpr_mu_lock(&c->cache_mu);
378 jwt_reset_cache(c);
379 jwt = grpc_jwt_encode_and_sign(&c->key, service_url, c->jwt_lifetime, NULL);
380 if (jwt != NULL) {
381 char *md_value;
382 gpr_asprintf(&md_value, "Bearer %s", jwt);
383 gpr_free(jwt);
Craig Tillerf1bff012015-07-06 11:20:50 -0700384 c->cached.jwt_expiration =
385 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), c->jwt_lifetime);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800386 c->cached.service_url = gpr_strdup(service_url);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700387 c->cached.jwt_md = grpc_credentials_md_store_create(1);
388 grpc_credentials_md_store_add_cstrings(
389 c->cached.jwt_md, GRPC_AUTHORIZATION_METADATA_KEY, md_value);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800390 gpr_free(md_value);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700391 jwt_md = grpc_credentials_md_store_ref(c->cached.jwt_md);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800392 }
393 gpr_mu_unlock(&c->cache_mu);
394 }
395
396 if (jwt_md != NULL) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700397 cb(user_data, jwt_md->entries, jwt_md->num_entries, GRPC_CREDENTIALS_OK);
398 grpc_credentials_md_store_unref(jwt_md);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800399 } else {
400 cb(user_data, NULL, 0, GRPC_CREDENTIALS_ERROR);
401 }
402}
403
404static grpc_credentials_vtable jwt_vtable = {
405 jwt_destroy, jwt_has_request_metadata, jwt_has_request_metadata_only,
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700406 jwt_get_request_metadata, NULL};
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800407
Julien Boeuf54006062015-07-07 19:13:04 -0700408grpc_credentials *grpc_jwt_credentials_create_from_auth_json_key(
409 grpc_auth_json_key key, gpr_timespec token_lifetime) {
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800410 grpc_jwt_credentials *c;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800411 if (!grpc_auth_json_key_is_valid(&key)) {
412 gpr_log(GPR_ERROR, "Invalid input for jwt credentials creation");
413 return NULL;
414 }
415 c = gpr_malloc(sizeof(grpc_jwt_credentials));
416 memset(c, 0, sizeof(grpc_jwt_credentials));
417 c->base.type = GRPC_CREDENTIALS_TYPE_JWT;
418 gpr_ref_init(&c->base.refcount, 1);
419 c->base.vtable = &jwt_vtable;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800420 c->key = key;
421 c->jwt_lifetime = token_lifetime;
422 gpr_mu_init(&c->cache_mu);
423 jwt_reset_cache(c);
424 return &c->base;
425}
426
Julien Boeuf54006062015-07-07 19:13:04 -0700427grpc_credentials *grpc_jwt_credentials_create(const char *json_key,
428 gpr_timespec token_lifetime) {
429 return grpc_jwt_credentials_create_from_auth_json_key(
430 grpc_auth_json_key_create_from_string(json_key), token_lifetime);
431}
432
jboeuf1a809c02014-12-19 15:44:30 -0800433/* -- Oauth2TokenFetcher credentials -- */
434
jboeuf1a809c02014-12-19 15:44:30 -0800435static void oauth2_token_fetcher_destroy(grpc_credentials *creds) {
436 grpc_oauth2_token_fetcher_credentials *c =
437 (grpc_oauth2_token_fetcher_credentials *)creds;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700438 grpc_credentials_md_store_unref(c->access_token_md);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800439 gpr_mu_destroy(&c->mu);
Craig Tillera0abe372015-06-01 11:31:08 -0700440 grpc_httpcli_context_destroy(&c->httpcli_context);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800441 gpr_free(c);
442}
443
jboeuf1a809c02014-12-19 15:44:30 -0800444static int oauth2_token_fetcher_has_request_metadata(
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800445 const grpc_credentials *creds) {
446 return 1;
447}
448
jboeuf1a809c02014-12-19 15:44:30 -0800449static int oauth2_token_fetcher_has_request_metadata_only(
450 const grpc_credentials *creds) {
451 return 1;
452}
453
454grpc_credentials_status
455grpc_oauth2_token_fetcher_credentials_parse_server_response(
Craig Tiller8674cb12015-06-05 07:09:25 -0700456 const grpc_httpcli_response *response, grpc_credentials_md_store **token_md,
457 gpr_timespec *token_lifetime) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800458 char *null_terminated_body = NULL;
459 char *new_access_token = NULL;
460 grpc_credentials_status status = GRPC_CREDENTIALS_OK;
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800461 grpc_json *json = NULL;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800462
Julien Boeuf90bd7c42015-02-18 18:51:16 -0800463 if (response == NULL) {
464 gpr_log(GPR_ERROR, "Received NULL response.");
465 status = GRPC_CREDENTIALS_ERROR;
466 goto end;
467 }
468
jboeuf1a809c02014-12-19 15:44:30 -0800469 if (response->body_length > 0) {
470 null_terminated_body = gpr_malloc(response->body_length + 1);
471 null_terminated_body[response->body_length] = '\0';
472 memcpy(null_terminated_body, response->body, response->body_length);
473 }
474
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800475 if (response->status != 200) {
jboeuf1a809c02014-12-19 15:44:30 -0800476 gpr_log(GPR_ERROR, "Call to http server ended with error %d [%s].",
477 response->status,
478 null_terminated_body != NULL ? null_terminated_body : "");
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800479 status = GRPC_CREDENTIALS_ERROR;
480 goto end;
481 } else {
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800482 grpc_json *access_token = NULL;
483 grpc_json *token_type = NULL;
484 grpc_json *expires_in = NULL;
485 grpc_json *ptr;
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800486 json = grpc_json_parse_string(null_terminated_body);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800487 if (json == NULL) {
488 gpr_log(GPR_ERROR, "Could not parse JSON from %s", null_terminated_body);
489 status = GRPC_CREDENTIALS_ERROR;
490 goto end;
491 }
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800492 if (json->type != GRPC_JSON_OBJECT) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800493 gpr_log(GPR_ERROR, "Response should be a JSON object");
494 status = GRPC_CREDENTIALS_ERROR;
495 goto end;
496 }
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800497 for (ptr = json->child; ptr; ptr = ptr->next) {
498 if (strcmp(ptr->key, "access_token") == 0) {
499 access_token = ptr;
500 } else if (strcmp(ptr->key, "token_type") == 0) {
501 token_type = ptr;
502 } else if (strcmp(ptr->key, "expires_in") == 0) {
503 expires_in = ptr;
504 }
505 }
506 if (access_token == NULL || access_token->type != GRPC_JSON_STRING) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800507 gpr_log(GPR_ERROR, "Missing or invalid access_token in JSON.");
508 status = GRPC_CREDENTIALS_ERROR;
509 goto end;
510 }
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800511 if (token_type == NULL || token_type->type != GRPC_JSON_STRING) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800512 gpr_log(GPR_ERROR, "Missing or invalid token_type in JSON.");
513 status = GRPC_CREDENTIALS_ERROR;
514 goto end;
515 }
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800516 if (expires_in == NULL || expires_in->type != GRPC_JSON_NUMBER) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800517 gpr_log(GPR_ERROR, "Missing or invalid expires_in in JSON.");
518 status = GRPC_CREDENTIALS_ERROR;
519 goto end;
520 }
Nicolas Noblefee065c2015-01-26 11:41:12 -0800521 gpr_asprintf(&new_access_token, "%s %s", token_type->value,
522 access_token->value);
Nicolas Noblee04455a2015-01-26 17:01:29 -0800523 token_lifetime->tv_sec = strtol(expires_in->value, NULL, 10);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800524 token_lifetime->tv_nsec = 0;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700525 if (*token_md != NULL) grpc_credentials_md_store_unref(*token_md);
526 *token_md = grpc_credentials_md_store_create(1);
527 grpc_credentials_md_store_add_cstrings(
528 *token_md, GRPC_AUTHORIZATION_METADATA_KEY, new_access_token);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800529 status = GRPC_CREDENTIALS_OK;
530 }
531
532end:
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700533 if (status != GRPC_CREDENTIALS_OK && (*token_md != NULL)) {
534 grpc_credentials_md_store_unref(*token_md);
535 *token_md = NULL;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800536 }
537 if (null_terminated_body != NULL) gpr_free(null_terminated_body);
538 if (new_access_token != NULL) gpr_free(new_access_token);
Nicolas Noble8c2be9b2015-01-27 14:21:18 -0800539 if (json != NULL) grpc_json_destroy(json);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800540 return status;
541}
542
jboeuf1a809c02014-12-19 15:44:30 -0800543static void on_oauth2_token_fetcher_http_response(
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800544 void *user_data, const grpc_httpcli_response *response) {
545 grpc_credentials_metadata_request *r =
546 (grpc_credentials_metadata_request *)user_data;
jboeuf1a809c02014-12-19 15:44:30 -0800547 grpc_oauth2_token_fetcher_credentials *c =
548 (grpc_oauth2_token_fetcher_credentials *)r->creds;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800549 gpr_timespec token_lifetime;
550 grpc_credentials_status status;
551
552 gpr_mu_lock(&c->mu);
jboeuf1a809c02014-12-19 15:44:30 -0800553 status = grpc_oauth2_token_fetcher_credentials_parse_server_response(
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700554 response, &c->access_token_md, &token_lifetime);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800555 if (status == GRPC_CREDENTIALS_OK) {
Craig Tillerf1bff012015-07-06 11:20:50 -0700556 c->token_expiration =
557 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), token_lifetime);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700558 r->cb(r->user_data, c->access_token_md->entries,
559 c->access_token_md->num_entries, status);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800560 } else {
561 c->token_expiration = gpr_inf_past;
562 r->cb(r->user_data, NULL, 0, status);
563 }
564 gpr_mu_unlock(&c->mu);
565 grpc_credentials_metadata_request_destroy(r);
566}
567
jboeuf1a809c02014-12-19 15:44:30 -0800568static void oauth2_token_fetcher_get_request_metadata(
Craig Tiller06bac342015-06-01 12:55:57 -0700569 grpc_credentials *creds, grpc_pollset *pollset, const char *service_url,
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800570 grpc_credentials_metadata_cb cb, void *user_data) {
jboeuf1a809c02014-12-19 15:44:30 -0800571 grpc_oauth2_token_fetcher_credentials *c =
572 (grpc_oauth2_token_fetcher_credentials *)creds;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800573 gpr_timespec refresh_threshold = {GRPC_SECURE_TOKEN_REFRESH_THRESHOLD_SECS,
jboeuf1a809c02014-12-19 15:44:30 -0800574 0};
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700575 grpc_credentials_md_store *cached_access_token_md = NULL;
jboeuf1a809c02014-12-19 15:44:30 -0800576 {
577 gpr_mu_lock(&c->mu);
578 if (c->access_token_md != NULL &&
Craig Tillerf1bff012015-07-06 11:20:50 -0700579 (gpr_time_cmp(
580 gpr_time_sub(c->token_expiration, gpr_now(GPR_CLOCK_REALTIME)),
581 refresh_threshold) > 0)) {
Craig Tiller8674cb12015-06-05 07:09:25 -0700582 cached_access_token_md =
583 grpc_credentials_md_store_ref(c->access_token_md);
jboeuf1a809c02014-12-19 15:44:30 -0800584 }
585 gpr_mu_unlock(&c->mu);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800586 }
jboeuf1a809c02014-12-19 15:44:30 -0800587 if (cached_access_token_md != NULL) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700588 cb(user_data, cached_access_token_md->entries,
589 cached_access_token_md->num_entries, GRPC_CREDENTIALS_OK);
590 grpc_credentials_md_store_unref(cached_access_token_md);
jboeuf1a809c02014-12-19 15:44:30 -0800591 } else {
592 c->fetch_func(
593 grpc_credentials_metadata_request_create(creds, cb, user_data),
Craig Tiller06bac342015-06-01 12:55:57 -0700594 &c->httpcli_context, pollset, on_oauth2_token_fetcher_http_response,
Craig Tillerf3756c12015-07-01 17:21:01 -0700595 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), refresh_threshold));
jboeuf1a809c02014-12-19 15:44:30 -0800596 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800597}
598
jboeuf1a809c02014-12-19 15:44:30 -0800599static void init_oauth2_token_fetcher(grpc_oauth2_token_fetcher_credentials *c,
600 grpc_fetch_oauth2_func fetch_func) {
601 memset(c, 0, sizeof(grpc_oauth2_token_fetcher_credentials));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800602 c->base.type = GRPC_CREDENTIALS_TYPE_OAUTH2;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800603 gpr_ref_init(&c->base.refcount, 1);
604 gpr_mu_init(&c->mu);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800605 c->token_expiration = gpr_inf_past;
jboeuf1a809c02014-12-19 15:44:30 -0800606 c->fetch_func = fetch_func;
Julien Boeuffeca1bf2015-06-22 16:46:20 +0200607 grpc_httpcli_context_init(&c->httpcli_context);
jboeuf1a809c02014-12-19 15:44:30 -0800608}
609
610/* -- ComputeEngine credentials. -- */
611
612static grpc_credentials_vtable compute_engine_vtable = {
Craig Tiller8674cb12015-06-05 07:09:25 -0700613 oauth2_token_fetcher_destroy, oauth2_token_fetcher_has_request_metadata,
jboeuf1a809c02014-12-19 15:44:30 -0800614 oauth2_token_fetcher_has_request_metadata_only,
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700615 oauth2_token_fetcher_get_request_metadata, NULL};
jboeuf1a809c02014-12-19 15:44:30 -0800616
617static void compute_engine_fetch_oauth2(
618 grpc_credentials_metadata_request *metadata_req,
Craig Tiller06bac342015-06-01 12:55:57 -0700619 grpc_httpcli_context *httpcli_context, grpc_pollset *pollset,
620 grpc_httpcli_response_cb response_cb, gpr_timespec deadline) {
jboeuf1a809c02014-12-19 15:44:30 -0800621 grpc_httpcli_header header = {"Metadata-Flavor", "Google"};
622 grpc_httpcli_request request;
623 memset(&request, 0, sizeof(grpc_httpcli_request));
624 request.host = GRPC_COMPUTE_ENGINE_METADATA_HOST;
625 request.path = GRPC_COMPUTE_ENGINE_METADATA_TOKEN_PATH;
626 request.hdr_count = 1;
627 request.hdrs = &header;
Craig Tiller06bac342015-06-01 12:55:57 -0700628 grpc_httpcli_get(httpcli_context, pollset, &request, deadline, response_cb,
Craig Tiller83b826a2015-05-13 13:43:01 -0700629 metadata_req);
jboeuf1a809c02014-12-19 15:44:30 -0800630}
631
632grpc_credentials *grpc_compute_engine_credentials_create(void) {
633 grpc_oauth2_token_fetcher_credentials *c =
634 gpr_malloc(sizeof(grpc_oauth2_token_fetcher_credentials));
635 init_oauth2_token_fetcher(c, compute_engine_fetch_oauth2);
636 c->base.vtable = &compute_engine_vtable;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800637 return &c->base;
638}
639
jboeuf1a809c02014-12-19 15:44:30 -0800640/* -- ServiceAccount credentials. -- */
641
jboeuf1a809c02014-12-19 15:44:30 -0800642static void service_account_destroy(grpc_credentials *creds) {
643 grpc_service_account_credentials *c =
644 (grpc_service_account_credentials *)creds;
645 if (c->scope != NULL) gpr_free(c->scope);
646 grpc_auth_json_key_destruct(&c->key);
647 oauth2_token_fetcher_destroy(&c->base.base);
648}
649
650static grpc_credentials_vtable service_account_vtable = {
Craig Tiller8674cb12015-06-05 07:09:25 -0700651 service_account_destroy, oauth2_token_fetcher_has_request_metadata,
jboeuf1a809c02014-12-19 15:44:30 -0800652 oauth2_token_fetcher_has_request_metadata_only,
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700653 oauth2_token_fetcher_get_request_metadata, NULL};
jboeuf1a809c02014-12-19 15:44:30 -0800654
655static void service_account_fetch_oauth2(
656 grpc_credentials_metadata_request *metadata_req,
Craig Tiller06bac342015-06-01 12:55:57 -0700657 grpc_httpcli_context *httpcli_context, grpc_pollset *pollset,
658 grpc_httpcli_response_cb response_cb, gpr_timespec deadline) {
jboeuf1a809c02014-12-19 15:44:30 -0800659 grpc_service_account_credentials *c =
660 (grpc_service_account_credentials *)metadata_req->creds;
661 grpc_httpcli_header header = {"Content-Type",
662 "application/x-www-form-urlencoded"};
663 grpc_httpcli_request request;
664 char *body = NULL;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800665 char *jwt = grpc_jwt_encode_and_sign(&c->key, GRPC_JWT_OAUTH2_AUDIENCE,
666 c->token_lifetime, c->scope);
jboeuf1a809c02014-12-19 15:44:30 -0800667 if (jwt == NULL) {
668 grpc_httpcli_response response;
669 memset(&response, 0, sizeof(grpc_httpcli_response));
670 response.status = 400; /* Invalid request. */
671 gpr_log(GPR_ERROR, "Could not create signed jwt.");
672 /* Do not even send the request, just call the response callback. */
673 response_cb(metadata_req, &response);
674 return;
675 }
Craig Tillerbe6a3552015-01-23 13:04:45 -0800676 gpr_asprintf(&body, "%s%s", GRPC_SERVICE_ACCOUNT_POST_BODY_PREFIX, jwt);
jboeuf1a809c02014-12-19 15:44:30 -0800677 memset(&request, 0, sizeof(grpc_httpcli_request));
Julien Boeuf9835cf02015-03-09 16:56:44 -0700678 request.host = GRPC_GOOGLE_OAUTH2_SERVICE_HOST;
679 request.path = GRPC_GOOGLE_OAUTH2_SERVICE_TOKEN_PATH;
jboeuf1a809c02014-12-19 15:44:30 -0800680 request.hdr_count = 1;
681 request.hdrs = &header;
682 request.use_ssl = 1;
Craig Tiller06bac342015-06-01 12:55:57 -0700683 grpc_httpcli_post(httpcli_context, pollset, &request, body, strlen(body),
684 deadline, response_cb, metadata_req);
jboeuf1a809c02014-12-19 15:44:30 -0800685 gpr_free(body);
686 gpr_free(jwt);
687}
688
689grpc_credentials *grpc_service_account_credentials_create(
690 const char *json_key, const char *scope, gpr_timespec token_lifetime) {
691 grpc_service_account_credentials *c;
692 grpc_auth_json_key key = grpc_auth_json_key_create_from_string(json_key);
693
694 if (scope == NULL || (strlen(scope) == 0) ||
695 !grpc_auth_json_key_is_valid(&key)) {
696 gpr_log(GPR_ERROR,
697 "Invalid input for service account credentials creation");
698 return NULL;
699 }
700 c = gpr_malloc(sizeof(grpc_service_account_credentials));
701 memset(c, 0, sizeof(grpc_service_account_credentials));
702 init_oauth2_token_fetcher(&c->base, service_account_fetch_oauth2);
703 c->base.base.vtable = &service_account_vtable;
704 c->scope = gpr_strdup(scope);
705 c->key = key;
706 c->token_lifetime = token_lifetime;
707 return &c->base.base;
708}
709
Julien Boeuf9835cf02015-03-09 16:56:44 -0700710/* -- RefreshToken credentials. -- */
711
Julien Boeuf9835cf02015-03-09 16:56:44 -0700712static void refresh_token_destroy(grpc_credentials *creds) {
Craig Tiller83b826a2015-05-13 13:43:01 -0700713 grpc_refresh_token_credentials *c = (grpc_refresh_token_credentials *)creds;
Julien Boeuf9835cf02015-03-09 16:56:44 -0700714 grpc_auth_refresh_token_destruct(&c->refresh_token);
715 oauth2_token_fetcher_destroy(&c->base.base);
716}
717
718static grpc_credentials_vtable refresh_token_vtable = {
Craig Tiller8674cb12015-06-05 07:09:25 -0700719 refresh_token_destroy, oauth2_token_fetcher_has_request_metadata,
Julien Boeuf9835cf02015-03-09 16:56:44 -0700720 oauth2_token_fetcher_has_request_metadata_only,
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700721 oauth2_token_fetcher_get_request_metadata, NULL};
Julien Boeuf9835cf02015-03-09 16:56:44 -0700722
723static void refresh_token_fetch_oauth2(
724 grpc_credentials_metadata_request *metadata_req,
Craig Tiller06bac342015-06-01 12:55:57 -0700725 grpc_httpcli_context *httpcli_context, grpc_pollset *pollset,
726 grpc_httpcli_response_cb response_cb, gpr_timespec deadline) {
Julien Boeuf9835cf02015-03-09 16:56:44 -0700727 grpc_refresh_token_credentials *c =
728 (grpc_refresh_token_credentials *)metadata_req->creds;
729 grpc_httpcli_header header = {"Content-Type",
730 "application/x-www-form-urlencoded"};
731 grpc_httpcli_request request;
732 char *body = NULL;
733 gpr_asprintf(&body, GRPC_REFRESH_TOKEN_POST_BODY_FORMAT_STRING,
734 c->refresh_token.client_id, c->refresh_token.client_secret,
735 c->refresh_token.refresh_token);
736 memset(&request, 0, sizeof(grpc_httpcli_request));
737 request.host = GRPC_GOOGLE_OAUTH2_SERVICE_HOST;
738 request.path = GRPC_GOOGLE_OAUTH2_SERVICE_TOKEN_PATH;
739 request.hdr_count = 1;
740 request.hdrs = &header;
741 request.use_ssl = 1;
Craig Tiller06bac342015-06-01 12:55:57 -0700742 grpc_httpcli_post(httpcli_context, pollset, &request, body, strlen(body),
743 deadline, response_cb, metadata_req);
Julien Boeuf9835cf02015-03-09 16:56:44 -0700744 gpr_free(body);
745}
746
Julien Boeuf54006062015-07-07 19:13:04 -0700747grpc_credentials *grpc_refresh_token_credentials_create_from_auth_refresh_token(
748 grpc_auth_refresh_token refresh_token) {
Julien Boeuf9835cf02015-03-09 16:56:44 -0700749 grpc_refresh_token_credentials *c;
Julien Boeuf9835cf02015-03-09 16:56:44 -0700750 if (!grpc_auth_refresh_token_is_valid(&refresh_token)) {
Craig Tiller83b826a2015-05-13 13:43:01 -0700751 gpr_log(GPR_ERROR, "Invalid input for refresh token credentials creation");
Julien Boeuf9835cf02015-03-09 16:56:44 -0700752 return NULL;
753 }
754 c = gpr_malloc(sizeof(grpc_refresh_token_credentials));
755 memset(c, 0, sizeof(grpc_refresh_token_credentials));
756 init_oauth2_token_fetcher(&c->base, refresh_token_fetch_oauth2);
757 c->base.base.vtable = &refresh_token_vtable;
758 c->refresh_token = refresh_token;
759 return &c->base.base;
760}
761
Julien Boeuf54006062015-07-07 19:13:04 -0700762grpc_credentials *grpc_refresh_token_credentials_create(
763 const char *json_refresh_token) {
764 return grpc_refresh_token_credentials_create_from_auth_refresh_token(
765 grpc_auth_refresh_token_create_from_string(json_refresh_token));
766}
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800767
Julien Boeufea456fc2015-07-07 15:23:30 -0700768/* -- Metadata-only credentials. -- */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800769
Julien Boeufea456fc2015-07-07 15:23:30 -0700770static void md_only_test_destroy(grpc_credentials *creds) {
771 grpc_md_only_test_credentials *c = (grpc_md_only_test_credentials *)creds;
772 grpc_credentials_md_store_unref(c->md_store);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800773 gpr_free(c);
774}
775
Julien Boeufea456fc2015-07-07 15:23:30 -0700776static int md_only_test_has_request_metadata(const grpc_credentials *creds) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800777 return 1;
778}
779
Julien Boeufea456fc2015-07-07 15:23:30 -0700780static int md_only_test_has_request_metadata_only(
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800781 const grpc_credentials *creds) {
782 return 1;
783}
784
ctiller58393c22015-01-07 14:03:30 -0800785void on_simulated_token_fetch_done(void *user_data, int success) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800786 grpc_credentials_metadata_request *r =
787 (grpc_credentials_metadata_request *)user_data;
Julien Boeufea456fc2015-07-07 15:23:30 -0700788 grpc_md_only_test_credentials *c = (grpc_md_only_test_credentials *)r->creds;
ctiller58393c22015-01-07 14:03:30 -0800789 GPR_ASSERT(success);
Julien Boeufea456fc2015-07-07 15:23:30 -0700790 r->cb(r->user_data, c->md_store->entries,
791 c->md_store->num_entries, GRPC_CREDENTIALS_OK);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800792 grpc_credentials_metadata_request_destroy(r);
793}
794
Julien Boeufea456fc2015-07-07 15:23:30 -0700795static void md_only_test_get_request_metadata(grpc_credentials *creds,
Craig Tiller06bac342015-06-01 12:55:57 -0700796 grpc_pollset *pollset,
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800797 const char *service_url,
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800798 grpc_credentials_metadata_cb cb,
799 void *user_data) {
Julien Boeufea456fc2015-07-07 15:23:30 -0700800 grpc_md_only_test_credentials *c = (grpc_md_only_test_credentials *)creds;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800801
802 if (c->is_async) {
David Garcia Quintas69ba8712015-06-01 11:29:42 -0700803 grpc_credentials_metadata_request *cb_arg =
David Garcia Quintas8b8cce02015-05-31 12:39:40 -0700804 grpc_credentials_metadata_request_create(creds, cb, user_data);
David Garcia Quintas69ba8712015-06-01 11:29:42 -0700805 grpc_iomgr_closure_init(cb_arg->on_simulated_token_fetch_done_closure,
806 on_simulated_token_fetch_done, cb_arg);
807 grpc_iomgr_add_callback(cb_arg->on_simulated_token_fetch_done_closure);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800808 } else {
Julien Boeufea456fc2015-07-07 15:23:30 -0700809 cb(user_data, c->md_store->entries, 1, GRPC_CREDENTIALS_OK);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800810 }
811}
812
Julien Boeufea456fc2015-07-07 15:23:30 -0700813static grpc_credentials_vtable md_only_test_vtable = {
814 md_only_test_destroy, md_only_test_has_request_metadata,
815 md_only_test_has_request_metadata_only, md_only_test_get_request_metadata,
Craig Tiller83b826a2015-05-13 13:43:01 -0700816 NULL};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800817
Julien Boeufea456fc2015-07-07 15:23:30 -0700818grpc_credentials *grpc_md_only_test_credentials_create(const char *md_key,
819 const char *md_value,
820 int is_async) {
821 grpc_md_only_test_credentials *c =
822 gpr_malloc(sizeof(grpc_md_only_test_credentials));
823 memset(c, 0, sizeof(grpc_md_only_test_credentials));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800824 c->base.type = GRPC_CREDENTIALS_TYPE_OAUTH2;
Julien Boeufea456fc2015-07-07 15:23:30 -0700825 c->base.vtable = &md_only_test_vtable;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800826 gpr_ref_init(&c->base.refcount, 1);
Julien Boeufea456fc2015-07-07 15:23:30 -0700827 c->md_store = grpc_credentials_md_store_create(1);
828 grpc_credentials_md_store_add_cstrings(c->md_store, md_key, md_value);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800829 c->is_async = is_async;
830 return &c->base;
831}
832
Julien Boeuf2805be12015-07-01 02:47:18 -0700833/* -- Oauth2 Access Token credentials. -- */
834
Julien Boeuf2805be12015-07-01 02:47:18 -0700835static void access_token_destroy(grpc_credentials *creds) {
836 grpc_access_token_credentials *c = (grpc_access_token_credentials *)creds;
837 grpc_credentials_md_store_unref(c->access_token_md);
838 gpr_free(c);
839}
840
841static int access_token_has_request_metadata(const grpc_credentials *creds) {
842 return 1;
843}
844
845static int access_token_has_request_metadata_only(
846 const grpc_credentials *creds) {
847 return 1;
848}
849
850static void access_token_get_request_metadata(grpc_credentials *creds,
851 grpc_pollset *pollset,
852 const char *service_url,
853 grpc_credentials_metadata_cb cb,
854 void *user_data) {
855 grpc_access_token_credentials *c = (grpc_access_token_credentials *)creds;
856 cb(user_data, c->access_token_md->entries, 1, GRPC_CREDENTIALS_OK);
857}
858
859static grpc_credentials_vtable access_token_vtable = {
860 access_token_destroy, access_token_has_request_metadata,
861 access_token_has_request_metadata_only, access_token_get_request_metadata,
862 NULL};
863
864grpc_credentials *grpc_access_token_credentials_create(
865 const char *access_token) {
866 grpc_access_token_credentials *c =
867 gpr_malloc(sizeof(grpc_access_token_credentials));
868 char *token_md_value;
869 memset(c, 0, sizeof(grpc_access_token_credentials));
870 c->base.type = GRPC_CREDENTIALS_TYPE_OAUTH2;
871 c->base.vtable = &access_token_vtable;
872 gpr_ref_init(&c->base.refcount, 1);
873 c->access_token_md = grpc_credentials_md_store_create(1);
874 gpr_asprintf(&token_md_value, "Bearer %s", access_token);
875 grpc_credentials_md_store_add_cstrings(
876 c->access_token_md, GRPC_AUTHORIZATION_METADATA_KEY, token_md_value);
877 gpr_free(token_md_value);
878 return &c->base;
879}
880
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800881/* -- Fake transport security credentials. -- */
882
883static void fake_transport_security_credentials_destroy(
884 grpc_credentials *creds) {
885 gpr_free(creds);
886}
887
888static void fake_transport_security_server_credentials_destroy(
889 grpc_server_credentials *creds) {
890 gpr_free(creds);
891}
892
893static int fake_transport_security_has_request_metadata(
894 const grpc_credentials *creds) {
895 return 0;
896}
897
898static int fake_transport_security_has_request_metadata_only(
899 const grpc_credentials *creds) {
900 return 0;
901}
902
Craig Tiller8674cb12015-06-05 07:09:25 -0700903static grpc_security_status fake_transport_security_create_security_connector(
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700904 grpc_credentials *c, const char *target, const grpc_channel_args *args,
905 grpc_credentials *request_metadata_creds,
906 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
907 *sc = grpc_fake_channel_security_connector_create(request_metadata_creds, 1);
908 return GRPC_SECURITY_OK;
909}
910
911static grpc_security_status
912fake_transport_security_server_create_security_connector(
913 grpc_server_credentials *c, grpc_security_connector **sc) {
914 *sc = grpc_fake_server_security_connector_create();
915 return GRPC_SECURITY_OK;
916}
917
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800918static grpc_credentials_vtable fake_transport_security_credentials_vtable = {
919 fake_transport_security_credentials_destroy,
920 fake_transport_security_has_request_metadata,
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700921 fake_transport_security_has_request_metadata_only, NULL,
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700922 fake_transport_security_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800923
924static grpc_server_credentials_vtable
925 fake_transport_security_server_credentials_vtable = {
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700926 fake_transport_security_server_credentials_destroy,
927 fake_transport_security_server_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800928
929grpc_credentials *grpc_fake_transport_security_credentials_create(void) {
930 grpc_credentials *c = gpr_malloc(sizeof(grpc_credentials));
931 memset(c, 0, sizeof(grpc_credentials));
932 c->type = GRPC_CREDENTIALS_TYPE_FAKE_TRANSPORT_SECURITY;
933 c->vtable = &fake_transport_security_credentials_vtable;
934 gpr_ref_init(&c->refcount, 1);
935 return c;
936}
937
Craig Tiller3eef2c42015-01-15 11:37:54 -0800938grpc_server_credentials *grpc_fake_transport_security_server_credentials_create(
939 void) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800940 grpc_server_credentials *c = gpr_malloc(sizeof(grpc_server_credentials));
941 memset(c, 0, sizeof(grpc_server_credentials));
942 c->type = GRPC_CREDENTIALS_TYPE_FAKE_TRANSPORT_SECURITY;
943 c->vtable = &fake_transport_security_server_credentials_vtable;
944 return c;
945}
946
nnoble0c475f02014-12-05 15:37:39 -0800947/* -- Composite credentials. -- */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800948
nnoble0c475f02014-12-05 15:37:39 -0800949typedef struct {
nnoble0c475f02014-12-05 15:37:39 -0800950 grpc_composite_credentials *composite_creds;
951 size_t creds_index;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700952 grpc_credentials_md_store *md_elems;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800953 char *service_url;
nnoble0c475f02014-12-05 15:37:39 -0800954 void *user_data;
Craig Tiller06bac342015-06-01 12:55:57 -0700955 grpc_pollset *pollset;
nnoble0c475f02014-12-05 15:37:39 -0800956 grpc_credentials_metadata_cb cb;
957} grpc_composite_credentials_metadata_context;
958
959static void composite_destroy(grpc_credentials *creds) {
960 grpc_composite_credentials *c = (grpc_composite_credentials *)creds;
961 size_t i;
962 for (i = 0; i < c->inner.num_creds; i++) {
963 grpc_credentials_unref(c->inner.creds_array[i]);
964 }
965 gpr_free(c->inner.creds_array);
966 gpr_free(creds);
967}
968
969static int composite_has_request_metadata(const grpc_credentials *creds) {
970 const grpc_composite_credentials *c =
971 (const grpc_composite_credentials *)creds;
972 size_t i;
973 for (i = 0; i < c->inner.num_creds; i++) {
974 if (grpc_credentials_has_request_metadata(c->inner.creds_array[i])) {
975 return 1;
976 }
977 }
978 return 0;
979}
980
981static int composite_has_request_metadata_only(const grpc_credentials *creds) {
982 const grpc_composite_credentials *c =
983 (const grpc_composite_credentials *)creds;
984 size_t i;
985 for (i = 0; i < c->inner.num_creds; i++) {
986 if (!grpc_credentials_has_request_metadata_only(c->inner.creds_array[i])) {
987 return 0;
988 }
989 }
990 return 1;
991}
992
993static void composite_md_context_destroy(
994 grpc_composite_credentials_metadata_context *ctx) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700995 grpc_credentials_md_store_unref(ctx->md_elems);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800996 if (ctx->service_url != NULL) gpr_free(ctx->service_url);
nnoble0c475f02014-12-05 15:37:39 -0800997 gpr_free(ctx);
998}
999
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001000static void composite_metadata_cb(void *user_data,
1001 grpc_credentials_md *md_elems, size_t num_md,
nnoble0c475f02014-12-05 15:37:39 -08001002 grpc_credentials_status status) {
1003 grpc_composite_credentials_metadata_context *ctx =
1004 (grpc_composite_credentials_metadata_context *)user_data;
nnoble0c475f02014-12-05 15:37:39 -08001005 if (status != GRPC_CREDENTIALS_OK) {
1006 ctx->cb(ctx->user_data, NULL, 0, status);
1007 return;
1008 }
1009
1010 /* Copy the metadata in the context. */
1011 if (num_md > 0) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001012 size_t i;
nnoble0c475f02014-12-05 15:37:39 -08001013 for (i = 0; i < num_md; i++) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001014 grpc_credentials_md_store_add(ctx->md_elems, md_elems[i].key,
1015 md_elems[i].value);
nnoble0c475f02014-12-05 15:37:39 -08001016 }
nnoble0c475f02014-12-05 15:37:39 -08001017 }
1018
1019 /* See if we need to get some more metadata. */
1020 while (ctx->creds_index < ctx->composite_creds->inner.num_creds) {
1021 grpc_credentials *inner_creds =
1022 ctx->composite_creds->inner.creds_array[ctx->creds_index++];
1023 if (grpc_credentials_has_request_metadata(inner_creds)) {
Craig Tiller06bac342015-06-01 12:55:57 -07001024 grpc_credentials_get_request_metadata(inner_creds, ctx->pollset,
1025 ctx->service_url,
Julien Boeuff47a5cb2015-02-18 12:24:08 -08001026 composite_metadata_cb, ctx);
nnoble0c475f02014-12-05 15:37:39 -08001027 return;
1028 }
1029 }
1030
1031 /* We're done!. */
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001032 ctx->cb(ctx->user_data, ctx->md_elems->entries, ctx->md_elems->num_entries,
1033 GRPC_CREDENTIALS_OK);
nnoble0c475f02014-12-05 15:37:39 -08001034 composite_md_context_destroy(ctx);
1035}
1036
1037static void composite_get_request_metadata(grpc_credentials *creds,
Craig Tiller06bac342015-06-01 12:55:57 -07001038 grpc_pollset *pollset,
Julien Boeuff47a5cb2015-02-18 12:24:08 -08001039 const char *service_url,
nnoble0c475f02014-12-05 15:37:39 -08001040 grpc_credentials_metadata_cb cb,
1041 void *user_data) {
1042 grpc_composite_credentials *c = (grpc_composite_credentials *)creds;
1043 grpc_composite_credentials_metadata_context *ctx;
1044 if (!grpc_credentials_has_request_metadata(creds)) {
1045 cb(user_data, NULL, 0, GRPC_CREDENTIALS_OK);
1046 return;
1047 }
1048 ctx = gpr_malloc(sizeof(grpc_composite_credentials_metadata_context));
1049 memset(ctx, 0, sizeof(grpc_composite_credentials_metadata_context));
Julien Boeuff47a5cb2015-02-18 12:24:08 -08001050 ctx->service_url = gpr_strdup(service_url);
nnoble0c475f02014-12-05 15:37:39 -08001051 ctx->user_data = user_data;
1052 ctx->cb = cb;
1053 ctx->composite_creds = c;
Craig Tiller06bac342015-06-01 12:55:57 -07001054 ctx->pollset = pollset;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001055 ctx->md_elems = grpc_credentials_md_store_create(c->inner.num_creds);
nnoble0c475f02014-12-05 15:37:39 -08001056 while (ctx->creds_index < c->inner.num_creds) {
1057 grpc_credentials *inner_creds = c->inner.creds_array[ctx->creds_index++];
1058 if (grpc_credentials_has_request_metadata(inner_creds)) {
Craig Tiller06bac342015-06-01 12:55:57 -07001059 grpc_credentials_get_request_metadata(inner_creds, pollset, service_url,
Julien Boeuff47a5cb2015-02-18 12:24:08 -08001060 composite_metadata_cb, ctx);
nnoble0c475f02014-12-05 15:37:39 -08001061 return;
1062 }
1063 }
1064 GPR_ASSERT(0); /* Should have exited before. */
1065}
1066
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001067static grpc_security_status composite_create_security_connector(
1068 grpc_credentials *creds, const char *target, const grpc_channel_args *args,
1069 grpc_credentials *request_metadata_creds,
1070 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
1071 grpc_composite_credentials *c = (grpc_composite_credentials *)creds;
1072 if (c->connector_creds == NULL) {
1073 gpr_log(GPR_ERROR,
1074 "Cannot create security connector, missing connector credentials.");
1075 return GRPC_SECURITY_ERROR;
1076 }
1077 return grpc_credentials_create_security_connector(c->connector_creds, target,
1078 args, creds, sc, new_args);
1079}
1080
nnoble0c475f02014-12-05 15:37:39 -08001081static grpc_credentials_vtable composite_credentials_vtable = {
1082 composite_destroy, composite_has_request_metadata,
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001083 composite_has_request_metadata_only, composite_get_request_metadata,
Craig Tiller83b826a2015-05-13 13:43:01 -07001084 composite_create_security_connector};
nnoble0c475f02014-12-05 15:37:39 -08001085
1086static grpc_credentials_array get_creds_array(grpc_credentials **creds_addr) {
1087 grpc_credentials_array result;
1088 grpc_credentials *creds = *creds_addr;
1089 result.creds_array = creds_addr;
1090 result.num_creds = 1;
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -08001091 if (strcmp(creds->type, GRPC_CREDENTIALS_TYPE_COMPOSITE) == 0) {
nnoble0c475f02014-12-05 15:37:39 -08001092 result = *grpc_composite_credentials_get_credentials(creds);
1093 }
1094 return result;
1095}
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001096
1097grpc_credentials *grpc_composite_credentials_create(grpc_credentials *creds1,
1098 grpc_credentials *creds2) {
nnoble0c475f02014-12-05 15:37:39 -08001099 size_t i;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001100 size_t creds_array_byte_size;
nnoble0c475f02014-12-05 15:37:39 -08001101 grpc_credentials_array creds1_array;
1102 grpc_credentials_array creds2_array;
1103 grpc_composite_credentials *c;
1104 GPR_ASSERT(creds1 != NULL);
1105 GPR_ASSERT(creds2 != NULL);
1106 c = gpr_malloc(sizeof(grpc_composite_credentials));
1107 memset(c, 0, sizeof(grpc_composite_credentials));
1108 c->base.type = GRPC_CREDENTIALS_TYPE_COMPOSITE;
1109 c->base.vtable = &composite_credentials_vtable;
1110 gpr_ref_init(&c->base.refcount, 1);
1111 creds1_array = get_creds_array(&creds1);
1112 creds2_array = get_creds_array(&creds2);
1113 c->inner.num_creds = creds1_array.num_creds + creds2_array.num_creds;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001114 creds_array_byte_size = c->inner.num_creds * sizeof(grpc_credentials *);
1115 c->inner.creds_array = gpr_malloc(creds_array_byte_size);
1116 memset(c->inner.creds_array, 0, creds_array_byte_size);
nnoble0c475f02014-12-05 15:37:39 -08001117 for (i = 0; i < creds1_array.num_creds; i++) {
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001118 grpc_credentials *cur_creds = creds1_array.creds_array[i];
1119 if (!grpc_credentials_has_request_metadata_only(cur_creds)) {
1120 if (c->connector_creds == NULL) {
1121 c->connector_creds = cur_creds;
1122 } else {
1123 gpr_log(GPR_ERROR, "Cannot compose multiple connector credentials.");
1124 goto fail;
1125 }
1126 }
1127 c->inner.creds_array[i] = grpc_credentials_ref(cur_creds);
nnoble0c475f02014-12-05 15:37:39 -08001128 }
1129 for (i = 0; i < creds2_array.num_creds; i++) {
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001130 grpc_credentials *cur_creds = creds2_array.creds_array[i];
1131 if (!grpc_credentials_has_request_metadata_only(cur_creds)) {
1132 if (c->connector_creds == NULL) {
1133 c->connector_creds = cur_creds;
1134 } else {
1135 gpr_log(GPR_ERROR, "Cannot compose multiple connector credentials.");
1136 goto fail;
1137 }
1138 }
nnoble0c475f02014-12-05 15:37:39 -08001139 c->inner.creds_array[i + creds1_array.num_creds] =
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001140 grpc_credentials_ref(cur_creds);
nnoble0c475f02014-12-05 15:37:39 -08001141 }
1142 return &c->base;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001143
1144fail:
1145 grpc_credentials_unref(&c->base);
1146 return NULL;
nnoble0c475f02014-12-05 15:37:39 -08001147}
1148
1149const grpc_credentials_array *grpc_composite_credentials_get_credentials(
1150 grpc_credentials *creds) {
1151 const grpc_composite_credentials *c =
1152 (const grpc_composite_credentials *)creds;
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -08001153 GPR_ASSERT(strcmp(creds->type, GRPC_CREDENTIALS_TYPE_COMPOSITE) == 0);
nnoble0c475f02014-12-05 15:37:39 -08001154 return &c->inner;
1155}
1156
jboeuf6ad120e2015-01-12 17:08:15 -08001157grpc_credentials *grpc_credentials_contains_type(
1158 grpc_credentials *creds, const char *type,
1159 grpc_credentials **composite_creds) {
1160 size_t i;
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -08001161 if (strcmp(creds->type, type) == 0) {
jboeuf6ad120e2015-01-12 17:08:15 -08001162 if (composite_creds != NULL) *composite_creds = NULL;
1163 return creds;
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -08001164 } else if (strcmp(creds->type, GRPC_CREDENTIALS_TYPE_COMPOSITE) == 0) {
jboeuf6ad120e2015-01-12 17:08:15 -08001165 const grpc_credentials_array *inner_creds_array =
1166 grpc_composite_credentials_get_credentials(creds);
1167 for (i = 0; i < inner_creds_array->num_creds; i++) {
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -08001168 if (strcmp(type, inner_creds_array->creds_array[i]->type) == 0) {
jboeuf6ad120e2015-01-12 17:08:15 -08001169 if (composite_creds != NULL) *composite_creds = creds;
1170 return inner_creds_array->creds_array[i];
1171 }
1172 }
1173 }
1174 return NULL;
1175}
1176
nnoble0c475f02014-12-05 15:37:39 -08001177/* -- IAM credentials. -- */
1178
nnoble0c475f02014-12-05 15:37:39 -08001179static void iam_destroy(grpc_credentials *creds) {
1180 grpc_iam_credentials *c = (grpc_iam_credentials *)creds;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001181 grpc_credentials_md_store_unref(c->iam_md);
nnoble0c475f02014-12-05 15:37:39 -08001182 gpr_free(c);
1183}
1184
Craig Tiller83b826a2015-05-13 13:43:01 -07001185static int iam_has_request_metadata(const grpc_credentials *creds) { return 1; }
nnoble0c475f02014-12-05 15:37:39 -08001186
1187static int iam_has_request_metadata_only(const grpc_credentials *creds) {
1188 return 1;
1189}
1190
1191static void iam_get_request_metadata(grpc_credentials *creds,
Craig Tiller06bac342015-06-01 12:55:57 -07001192 grpc_pollset *pollset,
Julien Boeuff47a5cb2015-02-18 12:24:08 -08001193 const char *service_url,
nnoble0c475f02014-12-05 15:37:39 -08001194 grpc_credentials_metadata_cb cb,
1195 void *user_data) {
1196 grpc_iam_credentials *c = (grpc_iam_credentials *)creds;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001197 cb(user_data, c->iam_md->entries, c->iam_md->num_entries,
1198 GRPC_CREDENTIALS_OK);
nnoble0c475f02014-12-05 15:37:39 -08001199}
1200
1201static grpc_credentials_vtable iam_vtable = {
1202 iam_destroy, iam_has_request_metadata, iam_has_request_metadata_only,
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001203 iam_get_request_metadata, NULL};
nnoble0c475f02014-12-05 15:37:39 -08001204
1205grpc_credentials *grpc_iam_credentials_create(const char *token,
1206 const char *authority_selector) {
1207 grpc_iam_credentials *c;
1208 GPR_ASSERT(token != NULL);
1209 GPR_ASSERT(authority_selector != NULL);
1210 c = gpr_malloc(sizeof(grpc_iam_credentials));
1211 memset(c, 0, sizeof(grpc_iam_credentials));
1212 c->base.type = GRPC_CREDENTIALS_TYPE_IAM;
1213 c->base.vtable = &iam_vtable;
1214 gpr_ref_init(&c->base.refcount, 1);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001215 c->iam_md = grpc_credentials_md_store_create(2);
1216 grpc_credentials_md_store_add_cstrings(
1217 c->iam_md, GRPC_IAM_AUTHORIZATION_TOKEN_METADATA_KEY, token);
1218 grpc_credentials_md_store_add_cstrings(
1219 c->iam_md, GRPC_IAM_AUTHORITY_SELECTOR_METADATA_KEY, authority_selector);
nnoble0c475f02014-12-05 15:37:39 -08001220 return &c->base;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001221}