blob: ff67b5d30a8cd0f9d27ffec6072b0755795080b4 [file] [log] [blame]
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001/*
2 *
Craig Tiller06059952015-02-18 08:34:56 -08003 * Copyright 2015, Google Inc.
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08004 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are
8 * met:
9 *
10 * * Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * * Redistributions in binary form must reproduce the above
13 * copyright notice, this list of conditions and the following disclaimer
14 * in the documentation and/or other materials provided with the
15 * distribution.
16 * * Neither the name of Google Inc. nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
24 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
30 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 *
32 */
33
34#include "src/core/security/credentials.h"
35
Julien Boeuff47a5cb2015-02-18 12:24:08 -080036#include <string.h>
37#include <stdio.h>
38
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -070039#include "src/core/channel/channel_args.h"
40#include "src/core/channel/http_client_filter.h"
Julien Boeuff47a5cb2015-02-18 12:24:08 -080041#include "src/core/json/json.h"
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080042#include "src/core/httpcli/httpcli.h"
ctiller18b49ab2014-12-09 14:39:16 -080043#include "src/core/iomgr/iomgr.h"
Masood Malekghassemi76c3d742015-08-19 18:22:53 -070044#include "src/core/surface/api_trace.h"
Craig Tiller485d7762015-01-23 12:54:05 -080045#include "src/core/support/string.h"
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -070046
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080047#include <grpc/support/alloc.h>
48#include <grpc/support/log.h>
Masood Malekghassemi701af602015-06-03 15:01:17 -070049#include <grpc/support/string_util.h>
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080050#include <grpc/support/sync.h>
Craig Tiller8664ca62015-09-09 12:30:59 -070051#include <grpc/support/thd.h>
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080052#include <grpc/support/time.h>
53
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080054/* -- Common. -- */
55
Craig Tillera82950e2015-09-22 12:33:20 -070056struct grpc_credentials_metadata_request {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080057 grpc_credentials *creds;
58 grpc_credentials_metadata_cb cb;
59 void *user_data;
Julien Boeufb037bb62015-07-08 14:58:14 -070060};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080061
62static grpc_credentials_metadata_request *
Craig Tillera82950e2015-09-22 12:33:20 -070063grpc_credentials_metadata_request_create(grpc_credentials *creds,
64 grpc_credentials_metadata_cb cb,
65 void *user_data) {
66 grpc_credentials_metadata_request *r =
67 gpr_malloc(sizeof(grpc_credentials_metadata_request));
68 r->creds = grpc_credentials_ref(creds);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080069 r->cb = cb;
70 r->user_data = user_data;
71 return r;
72}
73
Craig Tillera82950e2015-09-22 12:33:20 -070074static void grpc_credentials_metadata_request_destroy(
75 grpc_credentials_metadata_request *r) {
76 grpc_credentials_unref(r->creds);
77 gpr_free(r);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080078}
79
Craig Tillera82950e2015-09-22 12:33:20 -070080grpc_credentials *grpc_credentials_ref(grpc_credentials *creds) {
81 if (creds == NULL) return NULL;
82 gpr_ref(&creds->refcount);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080083 return creds;
84}
85
Craig Tillera82950e2015-09-22 12:33:20 -070086void grpc_credentials_unref(grpc_credentials *creds) {
87 if (creds == NULL) return;
88 if (gpr_unref(&creds->refcount)) {
89 creds->vtable->destruct(creds);
90 gpr_free(creds);
91 }
92}
93
94void grpc_credentials_release(grpc_credentials *creds) {
Masood Malekghassemi76c3d742015-08-19 18:22:53 -070095 GRPC_API_TRACE("grpc_credentials_release(creds=%p)", 1, (creds));
Craig Tillera82950e2015-09-22 12:33:20 -070096 grpc_credentials_unref(creds);
97}
98
99int grpc_credentials_has_request_metadata(grpc_credentials *creds) {
100 if (creds == NULL) return 0;
101 return creds->vtable->has_request_metadata(creds);
102}
103
104int grpc_credentials_has_request_metadata_only(grpc_credentials *creds) {
105 if (creds == NULL) return 0;
106 return creds->vtable->has_request_metadata_only(creds);
107}
108
109void grpc_credentials_get_request_metadata(
110 grpc_exec_ctx *exec_ctx, grpc_credentials *creds, grpc_pollset *pollset,
111 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
112 if (creds == NULL || !grpc_credentials_has_request_metadata(creds) ||
113 creds->vtable->get_request_metadata == NULL) {
114 if (cb != NULL) {
115 cb(exec_ctx, user_data, NULL, 0, GRPC_CREDENTIALS_OK);
116 }
nnoble0c475f02014-12-05 15:37:39 -0800117 return;
Craig Tillera82950e2015-09-22 12:33:20 -0700118 }
119 creds->vtable->get_request_metadata(exec_ctx, creds, pollset, service_url, cb,
120 user_data);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800121}
122
Craig Tillera82950e2015-09-22 12:33:20 -0700123grpc_security_status grpc_credentials_create_security_connector(
124 grpc_credentials *creds, const char *target, const grpc_channel_args *args,
125 grpc_credentials *request_metadata_creds,
126 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700127 *new_args = NULL;
Craig Tillera82950e2015-09-22 12:33:20 -0700128 if (creds == NULL || creds->vtable->create_security_connector == NULL ||
129 grpc_credentials_has_request_metadata_only(creds)) {
130 gpr_log(GPR_ERROR,
131 "Invalid credentials for creating a security connector.");
132 return GRPC_SECURITY_ERROR;
133 }
134 return creds->vtable->create_security_connector(
135 creds, target, args, request_metadata_creds, sc, new_args);
Craig Tillerc4885ed2015-04-14 09:51:28 -0700136}
137
Craig Tillera82950e2015-09-22 12:33:20 -0700138grpc_server_credentials *grpc_server_credentials_ref(
139 grpc_server_credentials *creds) {
140 if (creds == NULL) return NULL;
141 gpr_ref(&creds->refcount);
Julien Boeuffe1478f2015-08-30 21:57:38 -0700142 return creds;
143}
144
Craig Tillera82950e2015-09-22 12:33:20 -0700145void grpc_server_credentials_unref(grpc_server_credentials *creds) {
146 if (creds == NULL) return;
147 if (gpr_unref(&creds->refcount)) {
148 creds->vtable->destruct(creds);
149 if (creds->processor.destroy != NULL && creds->processor.state != NULL) {
150 creds->processor.destroy(creds->processor.state);
Julien Boeuffe1478f2015-08-30 21:57:38 -0700151 }
Craig Tillera82950e2015-09-22 12:33:20 -0700152 gpr_free(creds);
153 }
Julien Boeuffe1478f2015-08-30 21:57:38 -0700154}
155
Craig Tillera82950e2015-09-22 12:33:20 -0700156void grpc_server_credentials_release(grpc_server_credentials *creds) {
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700157 GRPC_API_TRACE("grpc_server_credentials_release(creds=%p)", 1, (creds));
Craig Tillera82950e2015-09-22 12:33:20 -0700158 grpc_server_credentials_unref(creds);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800159}
160
Craig Tillera82950e2015-09-22 12:33:20 -0700161grpc_security_status grpc_server_credentials_create_security_connector(
162 grpc_server_credentials *creds, grpc_security_connector **sc) {
163 if (creds == NULL || creds->vtable->create_security_connector == NULL) {
164 gpr_log(GPR_ERROR, "Server credentials cannot create security context.");
165 return GRPC_SECURITY_ERROR;
166 }
167 return creds->vtable->create_security_connector(creds, sc);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700168}
169
Craig Tillera82950e2015-09-22 12:33:20 -0700170void grpc_server_credentials_set_auth_metadata_processor(
171 grpc_server_credentials *creds, grpc_auth_metadata_processor processor) {
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700172 GRPC_API_TRACE(
173 "grpc_server_credentials_set_auth_metadata_processor("
174 "creds=%p, "
175 "processor=grpc_auth_metadata_processor { process: %lx, state: %p })",
176 3, (creds, (unsigned long)processor.process, processor.state));
Craig Tillera82950e2015-09-22 12:33:20 -0700177 if (creds == NULL) return;
178 if (creds->processor.destroy != NULL && creds->processor.state != NULL) {
179 creds->processor.destroy(creds->processor.state);
180 }
Julien Boeuf6bdc9b42015-07-19 21:56:02 -0700181 creds->processor = processor;
182}
183
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800184/* -- Ssl credentials. -- */
185
Craig Tillera82950e2015-09-22 12:33:20 -0700186static void ssl_destruct(grpc_credentials *creds) {
187 grpc_ssl_credentials *c = (grpc_ssl_credentials *)creds;
188 if (c->config.pem_root_certs != NULL) gpr_free(c->config.pem_root_certs);
189 if (c->config.pem_private_key != NULL) gpr_free(c->config.pem_private_key);
190 if (c->config.pem_cert_chain != NULL) gpr_free(c->config.pem_cert_chain);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800191}
192
Craig Tillera82950e2015-09-22 12:33:20 -0700193static void ssl_server_destruct(grpc_server_credentials *creds) {
194 grpc_ssl_server_credentials *c = (grpc_ssl_server_credentials *)creds;
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800195 size_t i;
Craig Tillera82950e2015-09-22 12:33:20 -0700196 for (i = 0; i < c->config.num_key_cert_pairs; i++) {
197 if (c->config.pem_private_keys[i] != NULL) {
198 gpr_free(c->config.pem_private_keys[i]);
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800199 }
Craig Tillera82950e2015-09-22 12:33:20 -0700200 if (c->config.pem_cert_chains[i] != NULL) {
201 gpr_free(c->config.pem_cert_chains[i]);
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800202 }
Craig Tillera82950e2015-09-22 12:33:20 -0700203 }
204 if (c->config.pem_private_keys != NULL) gpr_free(c->config.pem_private_keys);
205 if (c->config.pem_private_keys_sizes != NULL) {
206 gpr_free(c->config.pem_private_keys_sizes);
207 }
208 if (c->config.pem_cert_chains != NULL) gpr_free(c->config.pem_cert_chains);
209 if (c->config.pem_cert_chains_sizes != NULL) {
210 gpr_free(c->config.pem_cert_chains_sizes);
211 }
212 if (c->config.pem_root_certs != NULL) gpr_free(c->config.pem_root_certs);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800213}
214
Craig Tillera82950e2015-09-22 12:33:20 -0700215static int ssl_has_request_metadata(const grpc_credentials *creds) { return 0; }
216
217static int ssl_has_request_metadata_only(const grpc_credentials *creds) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800218 return 0;
219}
220
Craig Tillera82950e2015-09-22 12:33:20 -0700221static grpc_security_status ssl_create_security_connector(
222 grpc_credentials *creds, const char *target, const grpc_channel_args *args,
223 grpc_credentials *request_metadata_creds,
224 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
225 grpc_ssl_credentials *c = (grpc_ssl_credentials *)creds;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700226 grpc_security_status status = GRPC_SECURITY_OK;
227 size_t i = 0;
228 const char *overridden_target_name = NULL;
Craig Tillerb9d35962015-09-11 13:31:16 -0700229 grpc_arg new_arg;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700230
Craig Tillera82950e2015-09-22 12:33:20 -0700231 for (i = 0; args && i < args->num_args; i++) {
232 grpc_arg *arg = &args->args[i];
233 if (strcmp(arg->key, GRPC_SSL_TARGET_NAME_OVERRIDE_ARG) == 0 &&
234 arg->type == GRPC_ARG_STRING) {
235 overridden_target_name = arg->value.string;
236 break;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700237 }
Craig Tillera82950e2015-09-22 12:33:20 -0700238 }
239 status = grpc_ssl_channel_security_connector_create(
240 request_metadata_creds, &c->config, target, overridden_target_name, sc);
241 if (status != GRPC_SECURITY_OK) {
242 return status;
243 }
Craig Tillerb9d35962015-09-11 13:31:16 -0700244 new_arg.type = GRPC_ARG_STRING;
245 new_arg.key = GRPC_ARG_HTTP2_SCHEME;
246 new_arg.value.string = "https";
247 *new_args = grpc_channel_args_copy_and_add(args, &new_arg, 1);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700248 return status;
249}
250
Craig Tillera82950e2015-09-22 12:33:20 -0700251static grpc_security_status ssl_server_create_security_connector(
252 grpc_server_credentials *creds, grpc_security_connector **sc) {
253 grpc_ssl_server_credentials *c = (grpc_ssl_server_credentials *)creds;
254 return grpc_ssl_server_security_connector_create(&c->config, sc);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700255}
256
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800257static grpc_credentials_vtable ssl_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700258 ssl_destruct, ssl_has_request_metadata, ssl_has_request_metadata_only, NULL,
259 ssl_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800260
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700261static grpc_server_credentials_vtable ssl_server_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700262 ssl_server_destruct, ssl_server_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800263
Craig Tillera82950e2015-09-22 12:33:20 -0700264static void ssl_copy_key_material(const char *input, unsigned char **output,
265 size_t *output_size) {
266 *output_size = strlen(input);
267 *output = gpr_malloc(*output_size);
268 memcpy(*output, input, *output_size);
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800269}
270
Craig Tillera82950e2015-09-22 12:33:20 -0700271static void ssl_build_config(const char *pem_root_certs,
272 grpc_ssl_pem_key_cert_pair *pem_key_cert_pair,
273 grpc_ssl_config *config) {
274 if (pem_root_certs != NULL) {
275 ssl_copy_key_material(pem_root_certs, &config->pem_root_certs,
276 &config->pem_root_certs_size);
277 }
278 if (pem_key_cert_pair != NULL) {
279 GPR_ASSERT(pem_key_cert_pair->private_key != NULL);
280 GPR_ASSERT(pem_key_cert_pair->cert_chain != NULL);
281 ssl_copy_key_material(pem_key_cert_pair->private_key,
282 &config->pem_private_key,
283 &config->pem_private_key_size);
284 ssl_copy_key_material(pem_key_cert_pair->cert_chain,
285 &config->pem_cert_chain,
286 &config->pem_cert_chain_size);
287 }
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800288}
289
Craig Tillera82950e2015-09-22 12:33:20 -0700290static void ssl_build_server_config(
291 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs,
292 size_t num_key_cert_pairs, int force_client_auth,
293 grpc_ssl_server_config *config) {
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800294 size_t i;
Julien Boeuf5029b302015-07-21 23:02:16 -0700295 config->force_client_auth = force_client_auth;
Craig Tillera82950e2015-09-22 12:33:20 -0700296 if (pem_root_certs != NULL) {
297 ssl_copy_key_material(pem_root_certs, &config->pem_root_certs,
298 &config->pem_root_certs_size);
299 }
300 if (num_key_cert_pairs > 0) {
301 GPR_ASSERT(pem_key_cert_pairs != NULL);
302 config->pem_private_keys =
303 gpr_malloc(num_key_cert_pairs * sizeof(unsigned char *));
304 config->pem_cert_chains =
305 gpr_malloc(num_key_cert_pairs * sizeof(unsigned char *));
306 config->pem_private_keys_sizes =
307 gpr_malloc(num_key_cert_pairs * sizeof(size_t));
308 config->pem_cert_chains_sizes =
309 gpr_malloc(num_key_cert_pairs * sizeof(size_t));
310 }
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800311 config->num_key_cert_pairs = num_key_cert_pairs;
Craig Tillera82950e2015-09-22 12:33:20 -0700312 for (i = 0; i < num_key_cert_pairs; i++) {
313 GPR_ASSERT(pem_key_cert_pairs[i].private_key != NULL);
314 GPR_ASSERT(pem_key_cert_pairs[i].cert_chain != NULL);
315 ssl_copy_key_material(pem_key_cert_pairs[i].private_key,
316 &config->pem_private_keys[i],
317 &config->pem_private_keys_sizes[i]);
318 ssl_copy_key_material(pem_key_cert_pairs[i].cert_chain,
319 &config->pem_cert_chains[i],
320 &config->pem_cert_chains_sizes[i]);
321 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800322}
323
Craig Tillera82950e2015-09-22 12:33:20 -0700324grpc_credentials *grpc_ssl_credentials_create(
325 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pair,
326 void *reserved) {
327 grpc_ssl_credentials *c = gpr_malloc(sizeof(grpc_ssl_credentials));
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700328 GRPC_API_TRACE("grpc_ssl_credentials_create(pem_root_certs=%s, "
329 "pem_key_cert_pair=%p, "
330 "reserved=%p)",
331 3, (pem_root_certs, pem_key_cert_pair, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700332 GPR_ASSERT(reserved == NULL);
333 memset(c, 0, sizeof(grpc_ssl_credentials));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800334 c->base.type = GRPC_CREDENTIALS_TYPE_SSL;
335 c->base.vtable = &ssl_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700336 gpr_ref_init(&c->base.refcount, 1);
337 ssl_build_config(pem_root_certs, pem_key_cert_pair, &c->config);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800338 return &c->base;
339}
340
Craig Tillera82950e2015-09-22 12:33:20 -0700341grpc_server_credentials *grpc_ssl_server_credentials_create(
342 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs,
343 size_t num_key_cert_pairs, int force_client_auth, void *reserved) {
344 grpc_ssl_server_credentials *c =
345 gpr_malloc(sizeof(grpc_ssl_server_credentials));
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700346 GRPC_API_TRACE(
347 "grpc_ssl_server_credentials_create("
348 "pem_root_certs=%s, pem_key_cert_pairs=%p, num_key_cert_pairs=%lu, "
349 "force_client_auth=%d, reserved=%p)", 5,
350 (pem_root_certs, pem_key_cert_pairs, (unsigned long)num_key_cert_pairs,
351 force_client_auth, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700352 GPR_ASSERT(reserved == NULL);
353 memset(c, 0, sizeof(grpc_ssl_server_credentials));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800354 c->base.type = GRPC_CREDENTIALS_TYPE_SSL;
Craig Tillera82950e2015-09-22 12:33:20 -0700355 gpr_ref_init(&c->base.refcount, 1);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800356 c->base.vtable = &ssl_server_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700357 ssl_build_server_config(pem_root_certs, pem_key_cert_pairs,
358 num_key_cert_pairs, force_client_auth, &c->config);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800359 return &c->base;
360}
361
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800362/* -- Jwt credentials -- */
363
Craig Tillera82950e2015-09-22 12:33:20 -0700364static void jwt_reset_cache(grpc_service_account_jwt_access_credentials *c) {
365 if (c->cached.jwt_md != NULL) {
366 grpc_credentials_md_store_unref(c->cached.jwt_md);
367 c->cached.jwt_md = NULL;
368 }
369 if (c->cached.service_url != NULL) {
370 gpr_free(c->cached.service_url);
371 c->cached.service_url = NULL;
372 }
373 c->cached.jwt_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800374}
375
Craig Tillera82950e2015-09-22 12:33:20 -0700376static void jwt_destruct(grpc_credentials *creds) {
377 grpc_service_account_jwt_access_credentials *c =
378 (grpc_service_account_jwt_access_credentials *)creds;
379 grpc_auth_json_key_destruct(&c->key);
380 jwt_reset_cache(c);
381 gpr_mu_destroy(&c->cache_mu);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800382}
383
Craig Tillera82950e2015-09-22 12:33:20 -0700384static int jwt_has_request_metadata(const grpc_credentials *creds) { return 1; }
385
386static int jwt_has_request_metadata_only(const grpc_credentials *creds) {
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800387 return 1;
388}
389
Craig Tillera82950e2015-09-22 12:33:20 -0700390static void jwt_get_request_metadata(
391 grpc_exec_ctx *exec_ctx, grpc_credentials *creds, grpc_pollset *pollset,
392 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
393 grpc_service_account_jwt_access_credentials *c =
394 (grpc_service_account_jwt_access_credentials *)creds;
395 gpr_timespec refresh_threshold = gpr_time_from_seconds(
396 GRPC_SECURE_TOKEN_REFRESH_THRESHOLD_SECS, GPR_TIMESPAN);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800397
398 /* See if we can return a cached jwt. */
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700399 grpc_credentials_md_store *jwt_md = NULL;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800400 {
Craig Tillera82950e2015-09-22 12:33:20 -0700401 gpr_mu_lock(&c->cache_mu);
402 if (c->cached.service_url != NULL &&
403 strcmp(c->cached.service_url, service_url) == 0 &&
404 c->cached.jwt_md != NULL &&
405 (gpr_time_cmp(gpr_time_sub(c->cached.jwt_expiration,
406 gpr_now(GPR_CLOCK_REALTIME)),
407 refresh_threshold) > 0)) {
408 jwt_md = grpc_credentials_md_store_ref(c->cached.jwt_md);
409 }
410 gpr_mu_unlock(&c->cache_mu);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800411 }
412
Craig Tillera82950e2015-09-22 12:33:20 -0700413 if (jwt_md == NULL) {
414 char *jwt = NULL;
415 /* Generate a new jwt. */
416 gpr_mu_lock(&c->cache_mu);
417 jwt_reset_cache(c);
418 jwt = grpc_jwt_encode_and_sign(&c->key, service_url, c->jwt_lifetime, NULL);
419 if (jwt != NULL) {
420 char *md_value;
421 gpr_asprintf(&md_value, "Bearer %s", jwt);
422 gpr_free(jwt);
423 c->cached.jwt_expiration =
424 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), c->jwt_lifetime);
425 c->cached.service_url = gpr_strdup(service_url);
426 c->cached.jwt_md = grpc_credentials_md_store_create(1);
427 grpc_credentials_md_store_add_cstrings(
428 c->cached.jwt_md, GRPC_AUTHORIZATION_METADATA_KEY, md_value);
429 gpr_free(md_value);
430 jwt_md = grpc_credentials_md_store_ref(c->cached.jwt_md);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800431 }
Craig Tillera82950e2015-09-22 12:33:20 -0700432 gpr_mu_unlock(&c->cache_mu);
433 }
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800434
Craig Tillera82950e2015-09-22 12:33:20 -0700435 if (jwt_md != NULL) {
436 cb(exec_ctx, user_data, jwt_md->entries, jwt_md->num_entries,
437 GRPC_CREDENTIALS_OK);
438 grpc_credentials_md_store_unref(jwt_md);
439 } else {
440 cb(exec_ctx, user_data, NULL, 0, GRPC_CREDENTIALS_ERROR);
441 }
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800442}
443
444static grpc_credentials_vtable jwt_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700445 jwt_destruct, jwt_has_request_metadata, jwt_has_request_metadata_only,
446 jwt_get_request_metadata, NULL};
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800447
Julien Boeuffe4c3f42015-07-22 16:20:13 -0700448grpc_credentials *
Craig Tillera82950e2015-09-22 12:33:20 -0700449grpc_service_account_jwt_access_credentials_create_from_auth_json_key(
450 grpc_auth_json_key key, gpr_timespec token_lifetime) {
Julien Boeuffe4c3f42015-07-22 16:20:13 -0700451 grpc_service_account_jwt_access_credentials *c;
Craig Tillera82950e2015-09-22 12:33:20 -0700452 if (!grpc_auth_json_key_is_valid(&key)) {
453 gpr_log(GPR_ERROR, "Invalid input for jwt credentials creation");
454 return NULL;
455 }
456 c = gpr_malloc(sizeof(grpc_service_account_jwt_access_credentials));
457 memset(c, 0, sizeof(grpc_service_account_jwt_access_credentials));
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800458 c->base.type = GRPC_CREDENTIALS_TYPE_JWT;
Craig Tillera82950e2015-09-22 12:33:20 -0700459 gpr_ref_init(&c->base.refcount, 1);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800460 c->base.vtable = &jwt_vtable;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800461 c->key = key;
462 c->jwt_lifetime = token_lifetime;
Craig Tillera82950e2015-09-22 12:33:20 -0700463 gpr_mu_init(&c->cache_mu);
464 jwt_reset_cache(c);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800465 return &c->base;
466}
467
Craig Tillera82950e2015-09-22 12:33:20 -0700468grpc_credentials *grpc_service_account_jwt_access_credentials_create(
469 const char *json_key, gpr_timespec token_lifetime, void *reserved) {
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700470 GRPC_API_TRACE(
471 "grpc_service_account_jwt_access_credentials_create("
472 "json_key=%s, "
473 "token_lifetime="
474 "gpr_timespec { tv_sec: %ld, tv_nsec: %d, clock_type: %d }, "
475 "reserved=%p)",
476 5, (json_key, (long)token_lifetime.tv_sec,
477 token_lifetime.tv_nsec, (int)token_lifetime.clock_type, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700478 GPR_ASSERT(reserved == NULL);
479 return grpc_service_account_jwt_access_credentials_create_from_auth_json_key(
480 grpc_auth_json_key_create_from_string(json_key), token_lifetime);
Julien Boeuf54006062015-07-07 19:13:04 -0700481}
482
jboeuf1a809c02014-12-19 15:44:30 -0800483/* -- Oauth2TokenFetcher credentials -- */
484
Craig Tillera82950e2015-09-22 12:33:20 -0700485static void oauth2_token_fetcher_destruct(grpc_credentials *creds) {
486 grpc_oauth2_token_fetcher_credentials *c =
487 (grpc_oauth2_token_fetcher_credentials *)creds;
488 grpc_credentials_md_store_unref(c->access_token_md);
489 gpr_mu_destroy(&c->mu);
490 grpc_httpcli_context_destroy(&c->httpcli_context);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800491}
492
Craig Tillera82950e2015-09-22 12:33:20 -0700493static int oauth2_token_fetcher_has_request_metadata(
494 const grpc_credentials *creds) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800495 return 1;
496}
497
Craig Tillera82950e2015-09-22 12:33:20 -0700498static int oauth2_token_fetcher_has_request_metadata_only(
499 const grpc_credentials *creds) {
jboeuf1a809c02014-12-19 15:44:30 -0800500 return 1;
501}
502
503grpc_credentials_status
Craig Tillera82950e2015-09-22 12:33:20 -0700504grpc_oauth2_token_fetcher_credentials_parse_server_response(
505 const grpc_httpcli_response *response, grpc_credentials_md_store **token_md,
506 gpr_timespec *token_lifetime) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800507 char *null_terminated_body = NULL;
508 char *new_access_token = NULL;
509 grpc_credentials_status status = GRPC_CREDENTIALS_OK;
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800510 grpc_json *json = NULL;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800511
Craig Tillera82950e2015-09-22 12:33:20 -0700512 if (response == NULL) {
513 gpr_log(GPR_ERROR, "Received NULL response.");
514 status = GRPC_CREDENTIALS_ERROR;
515 goto end;
516 }
517
518 if (response->body_length > 0) {
519 null_terminated_body = gpr_malloc(response->body_length + 1);
520 null_terminated_body[response->body_length] = '\0';
521 memcpy(null_terminated_body, response->body, response->body_length);
522 }
523
524 if (response->status != 200) {
525 gpr_log(GPR_ERROR, "Call to http server ended with error %d [%s].",
526 response->status,
527 null_terminated_body != NULL ? null_terminated_body : "");
528 status = GRPC_CREDENTIALS_ERROR;
529 goto end;
530 } else {
531 grpc_json *access_token = NULL;
532 grpc_json *token_type = NULL;
533 grpc_json *expires_in = NULL;
534 grpc_json *ptr;
535 json = grpc_json_parse_string(null_terminated_body);
536 if (json == NULL) {
537 gpr_log(GPR_ERROR, "Could not parse JSON from %s", null_terminated_body);
Craig Tiller45724b32015-09-22 10:42:19 -0700538 status = GRPC_CREDENTIALS_ERROR;
539 goto end;
540 }
Craig Tillera82950e2015-09-22 12:33:20 -0700541 if (json->type != GRPC_JSON_OBJECT) {
542 gpr_log(GPR_ERROR, "Response should be a JSON object");
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800543 status = GRPC_CREDENTIALS_ERROR;
544 goto end;
545 }
Craig Tillera82950e2015-09-22 12:33:20 -0700546 for (ptr = json->child; ptr; ptr = ptr->next) {
547 if (strcmp(ptr->key, "access_token") == 0) {
548 access_token = ptr;
549 } else if (strcmp(ptr->key, "token_type") == 0) {
550 token_type = ptr;
551 } else if (strcmp(ptr->key, "expires_in") == 0) {
552 expires_in = ptr;
553 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800554 }
Craig Tillera82950e2015-09-22 12:33:20 -0700555 if (access_token == NULL || access_token->type != GRPC_JSON_STRING) {
556 gpr_log(GPR_ERROR, "Missing or invalid access_token in JSON.");
557 status = GRPC_CREDENTIALS_ERROR;
558 goto end;
559 }
560 if (token_type == NULL || token_type->type != GRPC_JSON_STRING) {
561 gpr_log(GPR_ERROR, "Missing or invalid token_type in JSON.");
562 status = GRPC_CREDENTIALS_ERROR;
563 goto end;
564 }
565 if (expires_in == NULL || expires_in->type != GRPC_JSON_NUMBER) {
566 gpr_log(GPR_ERROR, "Missing or invalid expires_in in JSON.");
567 status = GRPC_CREDENTIALS_ERROR;
568 goto end;
569 }
570 gpr_asprintf(&new_access_token, "%s %s", token_type->value,
571 access_token->value);
572 token_lifetime->tv_sec = strtol(expires_in->value, NULL, 10);
573 token_lifetime->tv_nsec = 0;
574 token_lifetime->clock_type = GPR_TIMESPAN;
575 if (*token_md != NULL) grpc_credentials_md_store_unref(*token_md);
576 *token_md = grpc_credentials_md_store_create(1);
577 grpc_credentials_md_store_add_cstrings(
578 *token_md, GRPC_AUTHORIZATION_METADATA_KEY, new_access_token);
579 status = GRPC_CREDENTIALS_OK;
580 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800581
582end:
Craig Tillera82950e2015-09-22 12:33:20 -0700583 if (status != GRPC_CREDENTIALS_OK && (*token_md != NULL)) {
584 grpc_credentials_md_store_unref(*token_md);
585 *token_md = NULL;
586 }
587 if (null_terminated_body != NULL) gpr_free(null_terminated_body);
588 if (new_access_token != NULL) gpr_free(new_access_token);
589 if (json != NULL) grpc_json_destroy(json);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800590 return status;
591}
592
Craig Tillera82950e2015-09-22 12:33:20 -0700593static void on_oauth2_token_fetcher_http_response(
594 grpc_exec_ctx *exec_ctx, void *user_data,
595 const grpc_httpcli_response *response) {
596 grpc_credentials_metadata_request *r =
597 (grpc_credentials_metadata_request *)user_data;
598 grpc_oauth2_token_fetcher_credentials *c =
599 (grpc_oauth2_token_fetcher_credentials *)r->creds;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800600 gpr_timespec token_lifetime;
601 grpc_credentials_status status;
602
Craig Tillera82950e2015-09-22 12:33:20 -0700603 gpr_mu_lock(&c->mu);
604 status = grpc_oauth2_token_fetcher_credentials_parse_server_response(
605 response, &c->access_token_md, &token_lifetime);
606 if (status == GRPC_CREDENTIALS_OK) {
607 c->token_expiration =
608 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), token_lifetime);
609 r->cb(exec_ctx, r->user_data, c->access_token_md->entries,
610 c->access_token_md->num_entries, status);
611 } else {
612 c->token_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
613 r->cb(exec_ctx, r->user_data, NULL, 0, status);
614 }
615 gpr_mu_unlock(&c->mu);
616 grpc_credentials_metadata_request_destroy(r);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800617}
618
Craig Tillera82950e2015-09-22 12:33:20 -0700619static void oauth2_token_fetcher_get_request_metadata(
620 grpc_exec_ctx *exec_ctx, grpc_credentials *creds, grpc_pollset *pollset,
621 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
622 grpc_oauth2_token_fetcher_credentials *c =
623 (grpc_oauth2_token_fetcher_credentials *)creds;
624 gpr_timespec refresh_threshold = gpr_time_from_seconds(
625 GRPC_SECURE_TOKEN_REFRESH_THRESHOLD_SECS, GPR_TIMESPAN);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700626 grpc_credentials_md_store *cached_access_token_md = NULL;
jboeuf1a809c02014-12-19 15:44:30 -0800627 {
Craig Tillera82950e2015-09-22 12:33:20 -0700628 gpr_mu_lock(&c->mu);
629 if (c->access_token_md != NULL &&
630 (gpr_time_cmp(
631 gpr_time_sub(c->token_expiration, gpr_now(GPR_CLOCK_REALTIME)),
632 refresh_threshold) > 0)) {
633 cached_access_token_md =
634 grpc_credentials_md_store_ref(c->access_token_md);
635 }
636 gpr_mu_unlock(&c->mu);
Craig Tiller45724b32015-09-22 10:42:19 -0700637 }
Craig Tillera82950e2015-09-22 12:33:20 -0700638 if (cached_access_token_md != NULL) {
639 cb(exec_ctx, user_data, cached_access_token_md->entries,
640 cached_access_token_md->num_entries, GRPC_CREDENTIALS_OK);
641 grpc_credentials_md_store_unref(cached_access_token_md);
642 } else {
643 c->fetch_func(
644 exec_ctx,
645 grpc_credentials_metadata_request_create(creds, cb, user_data),
646 &c->httpcli_context, pollset, on_oauth2_token_fetcher_http_response,
647 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), refresh_threshold));
648 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800649}
650
Craig Tillera82950e2015-09-22 12:33:20 -0700651static void init_oauth2_token_fetcher(grpc_oauth2_token_fetcher_credentials *c,
652 grpc_fetch_oauth2_func fetch_func) {
653 memset(c, 0, sizeof(grpc_oauth2_token_fetcher_credentials));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800654 c->base.type = GRPC_CREDENTIALS_TYPE_OAUTH2;
Craig Tillera82950e2015-09-22 12:33:20 -0700655 gpr_ref_init(&c->base.refcount, 1);
656 gpr_mu_init(&c->mu);
657 c->token_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
jboeuf1a809c02014-12-19 15:44:30 -0800658 c->fetch_func = fetch_func;
Craig Tillera82950e2015-09-22 12:33:20 -0700659 grpc_httpcli_context_init(&c->httpcli_context);
jboeuf1a809c02014-12-19 15:44:30 -0800660}
661
Julien Boeuf510a9202015-08-25 21:51:07 -0700662/* -- GoogleComputeEngine credentials. -- */
jboeuf1a809c02014-12-19 15:44:30 -0800663
664static grpc_credentials_vtable compute_engine_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700665 oauth2_token_fetcher_destruct, oauth2_token_fetcher_has_request_metadata,
666 oauth2_token_fetcher_has_request_metadata_only,
667 oauth2_token_fetcher_get_request_metadata, NULL};
jboeuf1a809c02014-12-19 15:44:30 -0800668
Craig Tillera82950e2015-09-22 12:33:20 -0700669static void compute_engine_fetch_oauth2(
670 grpc_exec_ctx *exec_ctx, grpc_credentials_metadata_request *metadata_req,
671 grpc_httpcli_context *httpcli_context, grpc_pollset *pollset,
672 grpc_httpcli_response_cb response_cb, gpr_timespec deadline) {
673 grpc_httpcli_header header = {"Metadata-Flavor", "Google"};
jboeuf1a809c02014-12-19 15:44:30 -0800674 grpc_httpcli_request request;
Craig Tillera82950e2015-09-22 12:33:20 -0700675 memset(&request, 0, sizeof(grpc_httpcli_request));
jboeuf1a809c02014-12-19 15:44:30 -0800676 request.host = GRPC_COMPUTE_ENGINE_METADATA_HOST;
677 request.path = GRPC_COMPUTE_ENGINE_METADATA_TOKEN_PATH;
678 request.hdr_count = 1;
679 request.hdrs = &header;
Craig Tillera82950e2015-09-22 12:33:20 -0700680 grpc_httpcli_get(exec_ctx, httpcli_context, pollset, &request, deadline,
681 response_cb, metadata_req);
jboeuf1a809c02014-12-19 15:44:30 -0800682}
683
Craig Tillera82950e2015-09-22 12:33:20 -0700684grpc_credentials *grpc_google_compute_engine_credentials_create(
685 void *reserved) {
686 grpc_oauth2_token_fetcher_credentials *c =
687 gpr_malloc(sizeof(grpc_oauth2_token_fetcher_credentials));
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700688 GRPC_API_TRACE("grpc_compute_engine_credentials_create(reserved=%p)", 1,
689 (reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700690 GPR_ASSERT(reserved == NULL);
691 init_oauth2_token_fetcher(c, compute_engine_fetch_oauth2);
jboeuf1a809c02014-12-19 15:44:30 -0800692 c->base.vtable = &compute_engine_vtable;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800693 return &c->base;
694}
695
Julien Boeuf510a9202015-08-25 21:51:07 -0700696/* -- GoogleRefreshToken credentials. -- */
Julien Boeuf9835cf02015-03-09 16:56:44 -0700697
Craig Tillera82950e2015-09-22 12:33:20 -0700698static void refresh_token_destruct(grpc_credentials *creds) {
699 grpc_google_refresh_token_credentials *c =
700 (grpc_google_refresh_token_credentials *)creds;
701 grpc_auth_refresh_token_destruct(&c->refresh_token);
702 oauth2_token_fetcher_destruct(&c->base.base);
Julien Boeuf9835cf02015-03-09 16:56:44 -0700703}
704
705static grpc_credentials_vtable refresh_token_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700706 refresh_token_destruct, oauth2_token_fetcher_has_request_metadata,
707 oauth2_token_fetcher_has_request_metadata_only,
708 oauth2_token_fetcher_get_request_metadata, NULL};
Julien Boeuf9835cf02015-03-09 16:56:44 -0700709
Craig Tillera82950e2015-09-22 12:33:20 -0700710static void refresh_token_fetch_oauth2(
711 grpc_exec_ctx *exec_ctx, grpc_credentials_metadata_request *metadata_req,
712 grpc_httpcli_context *httpcli_context, grpc_pollset *pollset,
713 grpc_httpcli_response_cb response_cb, gpr_timespec deadline) {
714 grpc_google_refresh_token_credentials *c =
715 (grpc_google_refresh_token_credentials *)metadata_req->creds;
716 grpc_httpcli_header header = {"Content-Type",
717 "application/x-www-form-urlencoded"};
Julien Boeuf9835cf02015-03-09 16:56:44 -0700718 grpc_httpcli_request request;
719 char *body = NULL;
Craig Tillera82950e2015-09-22 12:33:20 -0700720 gpr_asprintf(&body, GRPC_REFRESH_TOKEN_POST_BODY_FORMAT_STRING,
721 c->refresh_token.client_id, c->refresh_token.client_secret,
722 c->refresh_token.refresh_token);
723 memset(&request, 0, sizeof(grpc_httpcli_request));
Julien Boeuf9835cf02015-03-09 16:56:44 -0700724 request.host = GRPC_GOOGLE_OAUTH2_SERVICE_HOST;
725 request.path = GRPC_GOOGLE_OAUTH2_SERVICE_TOKEN_PATH;
726 request.hdr_count = 1;
727 request.hdrs = &header;
Craig Tillerf53d9c82015-08-04 14:19:43 -0700728 request.handshaker = &grpc_httpcli_ssl;
Craig Tillera82950e2015-09-22 12:33:20 -0700729 grpc_httpcli_post(exec_ctx, httpcli_context, pollset, &request, body,
730 strlen(body), deadline, response_cb, metadata_req);
731 gpr_free(body);
Julien Boeuf9835cf02015-03-09 16:56:44 -0700732}
733
Craig Tillera82950e2015-09-22 12:33:20 -0700734grpc_credentials *grpc_refresh_token_credentials_create_from_auth_refresh_token(
735 grpc_auth_refresh_token refresh_token) {
Julien Boeuf510a9202015-08-25 21:51:07 -0700736 grpc_google_refresh_token_credentials *c;
Craig Tillera82950e2015-09-22 12:33:20 -0700737 if (!grpc_auth_refresh_token_is_valid(&refresh_token)) {
738 gpr_log(GPR_ERROR, "Invalid input for refresh token credentials creation");
739 return NULL;
740 }
741 c = gpr_malloc(sizeof(grpc_google_refresh_token_credentials));
742 memset(c, 0, sizeof(grpc_google_refresh_token_credentials));
743 init_oauth2_token_fetcher(&c->base, refresh_token_fetch_oauth2);
Julien Boeuf9835cf02015-03-09 16:56:44 -0700744 c->base.base.vtable = &refresh_token_vtable;
745 c->refresh_token = refresh_token;
746 return &c->base.base;
747}
748
Craig Tillera82950e2015-09-22 12:33:20 -0700749grpc_credentials *grpc_google_refresh_token_credentials_create(
750 const char *json_refresh_token, void *reserved) {
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700751 GRPC_API_TRACE("grpc_refresh_token_credentials_create(json_refresh_token=%s, "
752 "reserved=%p)",
753 2, (json_refresh_token, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700754 GPR_ASSERT(reserved == NULL);
755 return grpc_refresh_token_credentials_create_from_auth_refresh_token(
756 grpc_auth_refresh_token_create_from_string(json_refresh_token));
Julien Boeuf54006062015-07-07 19:13:04 -0700757}
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800758
Julien Boeufea456fc2015-07-07 15:23:30 -0700759/* -- Metadata-only credentials. -- */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800760
Craig Tillera82950e2015-09-22 12:33:20 -0700761static void md_only_test_destruct(grpc_credentials *creds) {
762 grpc_md_only_test_credentials *c = (grpc_md_only_test_credentials *)creds;
763 grpc_credentials_md_store_unref(c->md_store);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800764}
765
Craig Tillera82950e2015-09-22 12:33:20 -0700766static int md_only_test_has_request_metadata(const grpc_credentials *creds) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800767 return 1;
768}
769
Craig Tillera82950e2015-09-22 12:33:20 -0700770static int md_only_test_has_request_metadata_only(
771 const grpc_credentials *creds) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800772 return 1;
773}
774
Craig Tillera82950e2015-09-22 12:33:20 -0700775static void on_simulated_token_fetch_done(void *user_data) {
776 grpc_credentials_metadata_request *r =
777 (grpc_credentials_metadata_request *)user_data;
778 grpc_md_only_test_credentials *c = (grpc_md_only_test_credentials *)r->creds;
Craig Tillerf5768a62015-09-22 10:54:34 -0700779 grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
Craig Tillera82950e2015-09-22 12:33:20 -0700780 r->cb(&exec_ctx, r->user_data, c->md_store->entries, c->md_store->num_entries,
781 GRPC_CREDENTIALS_OK);
782 grpc_credentials_metadata_request_destroy(r);
783 grpc_exec_ctx_finish(&exec_ctx);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800784}
785
Craig Tillera82950e2015-09-22 12:33:20 -0700786static void md_only_test_get_request_metadata(
787 grpc_exec_ctx *exec_ctx, grpc_credentials *creds, grpc_pollset *pollset,
788 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
789 grpc_md_only_test_credentials *c = (grpc_md_only_test_credentials *)creds;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800790
Craig Tillera82950e2015-09-22 12:33:20 -0700791 if (c->is_async) {
792 gpr_thd_id thd_id;
793 grpc_credentials_metadata_request *cb_arg =
794 grpc_credentials_metadata_request_create(creds, cb, user_data);
795 gpr_thd_new(&thd_id, on_simulated_token_fetch_done, cb_arg, NULL);
796 } else {
797 cb(exec_ctx, user_data, c->md_store->entries, 1, GRPC_CREDENTIALS_OK);
798 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800799}
800
Julien Boeufea456fc2015-07-07 15:23:30 -0700801static grpc_credentials_vtable md_only_test_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700802 md_only_test_destruct, md_only_test_has_request_metadata,
803 md_only_test_has_request_metadata_only, md_only_test_get_request_metadata,
804 NULL};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800805
Craig Tillera82950e2015-09-22 12:33:20 -0700806grpc_credentials *grpc_md_only_test_credentials_create(const char *md_key,
807 const char *md_value,
808 int is_async) {
809 grpc_md_only_test_credentials *c =
810 gpr_malloc(sizeof(grpc_md_only_test_credentials));
811 memset(c, 0, sizeof(grpc_md_only_test_credentials));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800812 c->base.type = GRPC_CREDENTIALS_TYPE_OAUTH2;
Julien Boeufea456fc2015-07-07 15:23:30 -0700813 c->base.vtable = &md_only_test_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700814 gpr_ref_init(&c->base.refcount, 1);
815 c->md_store = grpc_credentials_md_store_create(1);
816 grpc_credentials_md_store_add_cstrings(c->md_store, md_key, md_value);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800817 c->is_async = is_async;
818 return &c->base;
819}
820
Julien Boeuf2805be12015-07-01 02:47:18 -0700821/* -- Oauth2 Access Token credentials. -- */
822
Craig Tillera82950e2015-09-22 12:33:20 -0700823static void access_token_destruct(grpc_credentials *creds) {
824 grpc_access_token_credentials *c = (grpc_access_token_credentials *)creds;
825 grpc_credentials_md_store_unref(c->access_token_md);
Julien Boeuf2805be12015-07-01 02:47:18 -0700826}
827
Craig Tillera82950e2015-09-22 12:33:20 -0700828static int access_token_has_request_metadata(const grpc_credentials *creds) {
Julien Boeuf2805be12015-07-01 02:47:18 -0700829 return 1;
830}
831
Craig Tillera82950e2015-09-22 12:33:20 -0700832static int access_token_has_request_metadata_only(
833 const grpc_credentials *creds) {
Julien Boeuf2805be12015-07-01 02:47:18 -0700834 return 1;
835}
836
Craig Tillera82950e2015-09-22 12:33:20 -0700837static void access_token_get_request_metadata(
838 grpc_exec_ctx *exec_ctx, grpc_credentials *creds, grpc_pollset *pollset,
839 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
840 grpc_access_token_credentials *c = (grpc_access_token_credentials *)creds;
841 cb(exec_ctx, user_data, c->access_token_md->entries, 1, GRPC_CREDENTIALS_OK);
Julien Boeuf2805be12015-07-01 02:47:18 -0700842}
843
844static grpc_credentials_vtable access_token_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700845 access_token_destruct, access_token_has_request_metadata,
846 access_token_has_request_metadata_only, access_token_get_request_metadata,
847 NULL};
Julien Boeuf2805be12015-07-01 02:47:18 -0700848
Craig Tillera82950e2015-09-22 12:33:20 -0700849grpc_credentials *grpc_access_token_credentials_create(const char *access_token,
850 void *reserved) {
851 grpc_access_token_credentials *c =
852 gpr_malloc(sizeof(grpc_access_token_credentials));
Julien Boeuf2805be12015-07-01 02:47:18 -0700853 char *token_md_value;
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700854 GRPC_API_TRACE("grpc_access_token_credentials_create(access_token=%s, "
855 "reserved=%p)", 2,
856 (access_token, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700857 GPR_ASSERT(reserved == NULL);
858 memset(c, 0, sizeof(grpc_access_token_credentials));
Julien Boeuf2805be12015-07-01 02:47:18 -0700859 c->base.type = GRPC_CREDENTIALS_TYPE_OAUTH2;
860 c->base.vtable = &access_token_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700861 gpr_ref_init(&c->base.refcount, 1);
862 c->access_token_md = grpc_credentials_md_store_create(1);
863 gpr_asprintf(&token_md_value, "Bearer %s", access_token);
864 grpc_credentials_md_store_add_cstrings(
865 c->access_token_md, GRPC_AUTHORIZATION_METADATA_KEY, token_md_value);
866 gpr_free(token_md_value);
Julien Boeuf2805be12015-07-01 02:47:18 -0700867 return &c->base;
868}
869
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800870/* -- Fake transport security credentials. -- */
871
Craig Tillera82950e2015-09-22 12:33:20 -0700872static void fake_transport_security_credentials_destruct(
873 grpc_credentials *creds) {
Julien Boeuffe1478f2015-08-30 21:57:38 -0700874 /* Nothing to do here. */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800875}
876
Craig Tillera82950e2015-09-22 12:33:20 -0700877static void fake_transport_security_server_credentials_destruct(
878 grpc_server_credentials *creds) {
Julien Boeuffe1478f2015-08-30 21:57:38 -0700879 /* Nothing to do here. */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800880}
881
Craig Tillera82950e2015-09-22 12:33:20 -0700882static int fake_transport_security_has_request_metadata(
883 const grpc_credentials *creds) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800884 return 0;
885}
886
Craig Tillera82950e2015-09-22 12:33:20 -0700887static int fake_transport_security_has_request_metadata_only(
888 const grpc_credentials *creds) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800889 return 0;
890}
891
Craig Tillera82950e2015-09-22 12:33:20 -0700892static grpc_security_status fake_transport_security_create_security_connector(
893 grpc_credentials *c, const char *target, const grpc_channel_args *args,
894 grpc_credentials *request_metadata_creds,
895 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
896 *sc = grpc_fake_channel_security_connector_create(request_metadata_creds, 1);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700897 return GRPC_SECURITY_OK;
898}
899
900static grpc_security_status
Craig Tillera82950e2015-09-22 12:33:20 -0700901fake_transport_security_server_create_security_connector(
902 grpc_server_credentials *c, grpc_security_connector **sc) {
903 *sc = grpc_fake_server_security_connector_create();
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700904 return GRPC_SECURITY_OK;
905}
906
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800907static grpc_credentials_vtable fake_transport_security_credentials_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700908 fake_transport_security_credentials_destruct,
909 fake_transport_security_has_request_metadata,
910 fake_transport_security_has_request_metadata_only, NULL,
911 fake_transport_security_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800912
Craig Tillera82950e2015-09-22 12:33:20 -0700913static grpc_server_credentials_vtable
914 fake_transport_security_server_credentials_vtable = {
915 fake_transport_security_server_credentials_destruct,
916 fake_transport_security_server_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800917
Craig Tillera82950e2015-09-22 12:33:20 -0700918grpc_credentials *grpc_fake_transport_security_credentials_create(void) {
919 grpc_credentials *c = gpr_malloc(sizeof(grpc_credentials));
920 memset(c, 0, sizeof(grpc_credentials));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800921 c->type = GRPC_CREDENTIALS_TYPE_FAKE_TRANSPORT_SECURITY;
922 c->vtable = &fake_transport_security_credentials_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700923 gpr_ref_init(&c->refcount, 1);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800924 return c;
925}
926
Craig Tillera82950e2015-09-22 12:33:20 -0700927grpc_server_credentials *grpc_fake_transport_security_server_credentials_create(
928 void) {
929 grpc_server_credentials *c = gpr_malloc(sizeof(grpc_server_credentials));
930 memset(c, 0, sizeof(grpc_server_credentials));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800931 c->type = GRPC_CREDENTIALS_TYPE_FAKE_TRANSPORT_SECURITY;
Craig Tillera82950e2015-09-22 12:33:20 -0700932 gpr_ref_init(&c->refcount, 1);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800933 c->vtable = &fake_transport_security_server_credentials_vtable;
934 return c;
935}
936
nnoble0c475f02014-12-05 15:37:39 -0800937/* -- Composite credentials. -- */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800938
Craig Tillera82950e2015-09-22 12:33:20 -0700939typedef struct {
nnoble0c475f02014-12-05 15:37:39 -0800940 grpc_composite_credentials *composite_creds;
941 size_t creds_index;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700942 grpc_credentials_md_store *md_elems;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800943 char *service_url;
nnoble0c475f02014-12-05 15:37:39 -0800944 void *user_data;
Craig Tiller06bac342015-06-01 12:55:57 -0700945 grpc_pollset *pollset;
nnoble0c475f02014-12-05 15:37:39 -0800946 grpc_credentials_metadata_cb cb;
947} grpc_composite_credentials_metadata_context;
948
Craig Tillera82950e2015-09-22 12:33:20 -0700949static void composite_destruct(grpc_credentials *creds) {
950 grpc_composite_credentials *c = (grpc_composite_credentials *)creds;
nnoble0c475f02014-12-05 15:37:39 -0800951 size_t i;
Craig Tillera82950e2015-09-22 12:33:20 -0700952 for (i = 0; i < c->inner.num_creds; i++) {
953 grpc_credentials_unref(c->inner.creds_array[i]);
954 }
955 gpr_free(c->inner.creds_array);
nnoble0c475f02014-12-05 15:37:39 -0800956}
957
Craig Tillera82950e2015-09-22 12:33:20 -0700958static int composite_has_request_metadata(const grpc_credentials *creds) {
959 const grpc_composite_credentials *c =
960 (const grpc_composite_credentials *)creds;
nnoble0c475f02014-12-05 15:37:39 -0800961 size_t i;
Craig Tillera82950e2015-09-22 12:33:20 -0700962 for (i = 0; i < c->inner.num_creds; i++) {
963 if (grpc_credentials_has_request_metadata(c->inner.creds_array[i])) {
964 return 1;
nnoble0c475f02014-12-05 15:37:39 -0800965 }
Craig Tillera82950e2015-09-22 12:33:20 -0700966 }
nnoble0c475f02014-12-05 15:37:39 -0800967 return 0;
968}
969
Craig Tillera82950e2015-09-22 12:33:20 -0700970static int composite_has_request_metadata_only(const grpc_credentials *creds) {
971 const grpc_composite_credentials *c =
972 (const grpc_composite_credentials *)creds;
nnoble0c475f02014-12-05 15:37:39 -0800973 size_t i;
Craig Tillera82950e2015-09-22 12:33:20 -0700974 for (i = 0; i < c->inner.num_creds; i++) {
975 if (!grpc_credentials_has_request_metadata_only(c->inner.creds_array[i])) {
976 return 0;
nnoble0c475f02014-12-05 15:37:39 -0800977 }
Craig Tillera82950e2015-09-22 12:33:20 -0700978 }
nnoble0c475f02014-12-05 15:37:39 -0800979 return 1;
980}
981
Craig Tillera82950e2015-09-22 12:33:20 -0700982static void composite_md_context_destroy(
983 grpc_composite_credentials_metadata_context *ctx) {
984 grpc_credentials_md_store_unref(ctx->md_elems);
985 if (ctx->service_url != NULL) gpr_free(ctx->service_url);
986 gpr_free(ctx);
nnoble0c475f02014-12-05 15:37:39 -0800987}
988
Craig Tillera82950e2015-09-22 12:33:20 -0700989static void composite_metadata_cb(grpc_exec_ctx *exec_ctx, void *user_data,
990 grpc_credentials_md *md_elems, size_t num_md,
991 grpc_credentials_status status) {
992 grpc_composite_credentials_metadata_context *ctx =
993 (grpc_composite_credentials_metadata_context *)user_data;
994 if (status != GRPC_CREDENTIALS_OK) {
995 ctx->cb(exec_ctx, ctx->user_data, NULL, 0, status);
996 return;
997 }
Craig Tiller45724b32015-09-22 10:42:19 -0700998
999 /* Copy the metadata in the context. */
Craig Tillera82950e2015-09-22 12:33:20 -07001000 if (num_md > 0) {
1001 size_t i;
1002 for (i = 0; i < num_md; i++) {
1003 grpc_credentials_md_store_add(ctx->md_elems, md_elems[i].key,
1004 md_elems[i].value);
Craig Tiller45724b32015-09-22 10:42:19 -07001005 }
Craig Tillera82950e2015-09-22 12:33:20 -07001006 }
Craig Tiller45724b32015-09-22 10:42:19 -07001007
1008 /* See if we need to get some more metadata. */
Craig Tillera82950e2015-09-22 12:33:20 -07001009 while (ctx->creds_index < ctx->composite_creds->inner.num_creds) {
1010 grpc_credentials *inner_creds =
1011 ctx->composite_creds->inner.creds_array[ctx->creds_index++];
1012 if (grpc_credentials_has_request_metadata(inner_creds)) {
1013 grpc_credentials_get_request_metadata(exec_ctx, inner_creds, ctx->pollset,
1014 ctx->service_url,
1015 composite_metadata_cb, ctx);
Craig Tiller45724b32015-09-22 10:42:19 -07001016 return;
1017 }
Craig Tillera82950e2015-09-22 12:33:20 -07001018 }
1019
1020 /* We're done!. */
1021 ctx->cb(exec_ctx, ctx->user_data, ctx->md_elems->entries,
1022 ctx->md_elems->num_entries, GRPC_CREDENTIALS_OK);
1023 composite_md_context_destroy(ctx);
1024}
1025
1026static void composite_get_request_metadata(
1027 grpc_exec_ctx *exec_ctx, grpc_credentials *creds, grpc_pollset *pollset,
1028 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
1029 grpc_composite_credentials *c = (grpc_composite_credentials *)creds;
1030 grpc_composite_credentials_metadata_context *ctx;
1031 if (!grpc_credentials_has_request_metadata(creds)) {
1032 cb(exec_ctx, user_data, NULL, 0, GRPC_CREDENTIALS_OK);
1033 return;
1034 }
1035 ctx = gpr_malloc(sizeof(grpc_composite_credentials_metadata_context));
1036 memset(ctx, 0, sizeof(grpc_composite_credentials_metadata_context));
1037 ctx->service_url = gpr_strdup(service_url);
nnoble0c475f02014-12-05 15:37:39 -08001038 ctx->user_data = user_data;
1039 ctx->cb = cb;
1040 ctx->composite_creds = c;
Craig Tiller06bac342015-06-01 12:55:57 -07001041 ctx->pollset = pollset;
Craig Tillera82950e2015-09-22 12:33:20 -07001042 ctx->md_elems = grpc_credentials_md_store_create(c->inner.num_creds);
1043 while (ctx->creds_index < c->inner.num_creds) {
1044 grpc_credentials *inner_creds = c->inner.creds_array[ctx->creds_index++];
1045 if (grpc_credentials_has_request_metadata(inner_creds)) {
1046 grpc_credentials_get_request_metadata(exec_ctx, inner_creds, pollset,
1047 service_url, composite_metadata_cb,
1048 ctx);
1049 return;
nnoble0c475f02014-12-05 15:37:39 -08001050 }
Craig Tillera82950e2015-09-22 12:33:20 -07001051 }
1052 GPR_ASSERT(0); /* Should have exited before. */
nnoble0c475f02014-12-05 15:37:39 -08001053}
1054
Craig Tillera82950e2015-09-22 12:33:20 -07001055static grpc_security_status composite_create_security_connector(
1056 grpc_credentials *creds, const char *target, const grpc_channel_args *args,
1057 grpc_credentials *request_metadata_creds,
1058 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
1059 grpc_composite_credentials *c = (grpc_composite_credentials *)creds;
1060 if (c->connector_creds == NULL) {
1061 gpr_log(GPR_ERROR,
1062 "Cannot create security connector, missing connector credentials.");
1063 return GRPC_SECURITY_ERROR;
1064 }
1065 return grpc_credentials_create_security_connector(c->connector_creds, target,
1066 args, creds, sc, new_args);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001067}
1068
nnoble0c475f02014-12-05 15:37:39 -08001069static grpc_credentials_vtable composite_credentials_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -07001070 composite_destruct, composite_has_request_metadata,
1071 composite_has_request_metadata_only, composite_get_request_metadata,
1072 composite_create_security_connector};
nnoble0c475f02014-12-05 15:37:39 -08001073
Craig Tillera82950e2015-09-22 12:33:20 -07001074static grpc_credentials_array get_creds_array(grpc_credentials **creds_addr) {
nnoble0c475f02014-12-05 15:37:39 -08001075 grpc_credentials_array result;
1076 grpc_credentials *creds = *creds_addr;
1077 result.creds_array = creds_addr;
1078 result.num_creds = 1;
Craig Tillera82950e2015-09-22 12:33:20 -07001079 if (strcmp(creds->type, GRPC_CREDENTIALS_TYPE_COMPOSITE) == 0) {
1080 result = *grpc_composite_credentials_get_credentials(creds);
1081 }
nnoble0c475f02014-12-05 15:37:39 -08001082 return result;
1083}
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001084
Craig Tillera82950e2015-09-22 12:33:20 -07001085grpc_credentials *grpc_composite_credentials_create(grpc_credentials *creds1,
1086 grpc_credentials *creds2,
1087 void *reserved) {
nnoble0c475f02014-12-05 15:37:39 -08001088 size_t i;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001089 size_t creds_array_byte_size;
nnoble0c475f02014-12-05 15:37:39 -08001090 grpc_credentials_array creds1_array;
1091 grpc_credentials_array creds2_array;
1092 grpc_composite_credentials *c;
Masood Malekghassemi76c3d742015-08-19 18:22:53 -07001093 GRPC_API_TRACE("grpc_composite_credentials_create(creds1=%p, creds2=%p, "
1094 "reserved=%p)", 3,
1095 (creds1, creds2, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -07001096 GPR_ASSERT(reserved == NULL);
1097 GPR_ASSERT(creds1 != NULL);
1098 GPR_ASSERT(creds2 != NULL);
1099 c = gpr_malloc(sizeof(grpc_composite_credentials));
1100 memset(c, 0, sizeof(grpc_composite_credentials));
nnoble0c475f02014-12-05 15:37:39 -08001101 c->base.type = GRPC_CREDENTIALS_TYPE_COMPOSITE;
1102 c->base.vtable = &composite_credentials_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -07001103 gpr_ref_init(&c->base.refcount, 1);
1104 creds1_array = get_creds_array(&creds1);
1105 creds2_array = get_creds_array(&creds2);
nnoble0c475f02014-12-05 15:37:39 -08001106 c->inner.num_creds = creds1_array.num_creds + creds2_array.num_creds;
Craig Tillera82950e2015-09-22 12:33:20 -07001107 creds_array_byte_size = c->inner.num_creds * sizeof(grpc_credentials *);
1108 c->inner.creds_array = gpr_malloc(creds_array_byte_size);
1109 memset(c->inner.creds_array, 0, creds_array_byte_size);
1110 for (i = 0; i < creds1_array.num_creds; i++) {
1111 grpc_credentials *cur_creds = creds1_array.creds_array[i];
1112 if (!grpc_credentials_has_request_metadata_only(cur_creds)) {
1113 if (c->connector_creds == NULL) {
1114 c->connector_creds = cur_creds;
1115 } else {
1116 gpr_log(GPR_ERROR, "Cannot compose multiple connector credentials.");
1117 goto fail;
1118 }
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001119 }
Craig Tillera82950e2015-09-22 12:33:20 -07001120 c->inner.creds_array[i] = grpc_credentials_ref(cur_creds);
1121 }
1122 for (i = 0; i < creds2_array.num_creds; i++) {
1123 grpc_credentials *cur_creds = creds2_array.creds_array[i];
1124 if (!grpc_credentials_has_request_metadata_only(cur_creds)) {
1125 if (c->connector_creds == NULL) {
1126 c->connector_creds = cur_creds;
1127 } else {
1128 gpr_log(GPR_ERROR, "Cannot compose multiple connector credentials.");
1129 goto fail;
1130 }
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001131 }
Craig Tillera82950e2015-09-22 12:33:20 -07001132 c->inner.creds_array[i + creds1_array.num_creds] =
1133 grpc_credentials_ref(cur_creds);
1134 }
nnoble0c475f02014-12-05 15:37:39 -08001135 return &c->base;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001136
1137fail:
Craig Tillera82950e2015-09-22 12:33:20 -07001138 grpc_credentials_unref(&c->base);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001139 return NULL;
nnoble0c475f02014-12-05 15:37:39 -08001140}
1141
Craig Tillera82950e2015-09-22 12:33:20 -07001142const grpc_credentials_array *grpc_composite_credentials_get_credentials(
1143 grpc_credentials *creds) {
1144 const grpc_composite_credentials *c =
1145 (const grpc_composite_credentials *)creds;
1146 GPR_ASSERT(strcmp(creds->type, GRPC_CREDENTIALS_TYPE_COMPOSITE) == 0);
nnoble0c475f02014-12-05 15:37:39 -08001147 return &c->inner;
1148}
1149
Craig Tillera82950e2015-09-22 12:33:20 -07001150grpc_credentials *grpc_credentials_contains_type(
1151 grpc_credentials *creds, const char *type,
1152 grpc_credentials **composite_creds) {
jboeuf6ad120e2015-01-12 17:08:15 -08001153 size_t i;
Craig Tillera82950e2015-09-22 12:33:20 -07001154 if (strcmp(creds->type, type) == 0) {
1155 if (composite_creds != NULL) *composite_creds = NULL;
1156 return creds;
1157 } else if (strcmp(creds->type, GRPC_CREDENTIALS_TYPE_COMPOSITE) == 0) {
1158 const grpc_credentials_array *inner_creds_array =
1159 grpc_composite_credentials_get_credentials(creds);
1160 for (i = 0; i < inner_creds_array->num_creds; i++) {
1161 if (strcmp(type, inner_creds_array->creds_array[i]->type) == 0) {
1162 if (composite_creds != NULL) *composite_creds = creds;
1163 return inner_creds_array->creds_array[i];
1164 }
jboeuf6ad120e2015-01-12 17:08:15 -08001165 }
Craig Tillera82950e2015-09-22 12:33:20 -07001166 }
jboeuf6ad120e2015-01-12 17:08:15 -08001167 return NULL;
1168}
1169
nnoble0c475f02014-12-05 15:37:39 -08001170/* -- IAM credentials. -- */
1171
Craig Tillera82950e2015-09-22 12:33:20 -07001172static void iam_destruct(grpc_credentials *creds) {
1173 grpc_google_iam_credentials *c = (grpc_google_iam_credentials *)creds;
1174 grpc_credentials_md_store_unref(c->iam_md);
nnoble0c475f02014-12-05 15:37:39 -08001175}
1176
Craig Tillera82950e2015-09-22 12:33:20 -07001177static int iam_has_request_metadata(const grpc_credentials *creds) { return 1; }
1178
1179static int iam_has_request_metadata_only(const grpc_credentials *creds) {
nnoble0c475f02014-12-05 15:37:39 -08001180 return 1;
1181}
1182
Craig Tillera82950e2015-09-22 12:33:20 -07001183static void iam_get_request_metadata(
1184 grpc_exec_ctx *exec_ctx, grpc_credentials *creds, grpc_pollset *pollset,
1185 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
1186 grpc_google_iam_credentials *c = (grpc_google_iam_credentials *)creds;
1187 cb(exec_ctx, user_data, c->iam_md->entries, c->iam_md->num_entries,
1188 GRPC_CREDENTIALS_OK);
nnoble0c475f02014-12-05 15:37:39 -08001189}
1190
1191static grpc_credentials_vtable iam_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -07001192 iam_destruct, iam_has_request_metadata, iam_has_request_metadata_only,
1193 iam_get_request_metadata, NULL};
nnoble0c475f02014-12-05 15:37:39 -08001194
Craig Tillera82950e2015-09-22 12:33:20 -07001195grpc_credentials *grpc_google_iam_credentials_create(
1196 const char *token, const char *authority_selector, void *reserved) {
Julien Boeuf510a9202015-08-25 21:51:07 -07001197 grpc_google_iam_credentials *c;
Masood Malekghassemi76c3d742015-08-19 18:22:53 -07001198 GRPC_API_TRACE("grpc_iam_credentials_create(token=%s, authority_selector=%s, "
1199 "reserved=%p)",
1200 3, (token, authority_selector, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -07001201 GPR_ASSERT(reserved == NULL);
1202 GPR_ASSERT(token != NULL);
1203 GPR_ASSERT(authority_selector != NULL);
1204 c = gpr_malloc(sizeof(grpc_google_iam_credentials));
1205 memset(c, 0, sizeof(grpc_google_iam_credentials));
nnoble0c475f02014-12-05 15:37:39 -08001206 c->base.type = GRPC_CREDENTIALS_TYPE_IAM;
1207 c->base.vtable = &iam_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -07001208 gpr_ref_init(&c->base.refcount, 1);
1209 c->iam_md = grpc_credentials_md_store_create(2);
1210 grpc_credentials_md_store_add_cstrings(
1211 c->iam_md, GRPC_IAM_AUTHORIZATION_TOKEN_METADATA_KEY, token);
1212 grpc_credentials_md_store_add_cstrings(
1213 c->iam_md, GRPC_IAM_AUTHORITY_SELECTOR_METADATA_KEY, authority_selector);
nnoble0c475f02014-12-05 15:37:39 -08001214 return &c->base;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001215}
Julien Boeuf2d041182015-08-31 20:30:09 -07001216
1217/* -- Plugin credentials. -- */
1218
Craig Tillera82950e2015-09-22 12:33:20 -07001219typedef struct {
Julien Boeuf2d041182015-08-31 20:30:09 -07001220 void *user_data;
1221 grpc_credentials_metadata_cb cb;
1222} grpc_metadata_plugin_request;
1223
Craig Tillera82950e2015-09-22 12:33:20 -07001224static void plugin_destruct(grpc_credentials *creds) {
1225 grpc_plugin_credentials *c = (grpc_plugin_credentials *)creds;
1226 if (c->plugin.state != NULL && c->plugin.destroy != NULL) {
1227 c->plugin.destroy(c->plugin.state);
1228 }
Julien Boeuf2d041182015-08-31 20:30:09 -07001229}
1230
Craig Tillera82950e2015-09-22 12:33:20 -07001231static int plugin_has_request_metadata(const grpc_credentials *creds) {
Julien Boeuf2d041182015-08-31 20:30:09 -07001232 return 1;
1233}
1234
Craig Tillera82950e2015-09-22 12:33:20 -07001235static int plugin_has_request_metadata_only(const grpc_credentials *creds) {
Julien Boeuf2d041182015-08-31 20:30:09 -07001236 return 1;
1237}
1238
Craig Tillera82950e2015-09-22 12:33:20 -07001239static void plugin_md_request_metadata_ready(void *request,
1240 const grpc_metadata *md,
1241 size_t num_md,
1242 grpc_status_code status,
1243 const char *error_details) {
Craig Tiller10ee2742015-09-22 09:25:57 -07001244 /* called from application code */
Craig Tillerf5768a62015-09-22 10:54:34 -07001245 grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
Craig Tillera82950e2015-09-22 12:33:20 -07001246 grpc_metadata_plugin_request *r = (grpc_metadata_plugin_request *)request;
1247 if (status != GRPC_STATUS_OK) {
1248 if (error_details != NULL) {
1249 gpr_log(GPR_ERROR, "Getting metadata from plugin failed with error: %s",
1250 error_details);
Julien Boeuf2d041182015-08-31 20:30:09 -07001251 }
Craig Tillera82950e2015-09-22 12:33:20 -07001252 r->cb(&exec_ctx, r->user_data, NULL, 0, GRPC_CREDENTIALS_ERROR);
1253 } else {
1254 size_t i;
1255 grpc_credentials_md *md_array = NULL;
1256 if (num_md > 0) {
1257 md_array = gpr_malloc(num_md * sizeof(grpc_credentials_md));
1258 for (i = 0; i < num_md; i++) {
1259 md_array[i].key = gpr_slice_from_copied_string(md[i].key);
1260 md_array[i].value =
1261 gpr_slice_from_copied_buffer(md[i].value, md[i].value_length);
1262 }
Julien Boeuf2d041182015-08-31 20:30:09 -07001263 }
Craig Tillera82950e2015-09-22 12:33:20 -07001264 r->cb(&exec_ctx, r->user_data, md_array, num_md, GRPC_CREDENTIALS_OK);
1265 if (md_array != NULL) {
1266 for (i = 0; i < num_md; i++) {
1267 gpr_slice_unref(md_array[i].key);
1268 gpr_slice_unref(md_array[i].value);
1269 }
1270 gpr_free(md_array);
1271 }
1272 }
1273 gpr_free(r);
Craig Tiller80183f32015-09-23 12:33:59 -07001274 grpc_exec_ctx_finish(&exec_ctx);
Julien Boeuf2d041182015-08-31 20:30:09 -07001275}
1276
Craig Tillera82950e2015-09-22 12:33:20 -07001277static void plugin_get_request_metadata(
1278 grpc_exec_ctx *exec_ctx, grpc_credentials *creds, grpc_pollset *pollset,
1279 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
1280 grpc_plugin_credentials *c = (grpc_plugin_credentials *)creds;
1281 if (c->plugin.get_metadata != NULL) {
1282 grpc_metadata_plugin_request *request = gpr_malloc(sizeof(*request));
1283 memset(request, 0, sizeof(*request));
1284 request->user_data = user_data;
1285 request->cb = cb;
1286 c->plugin.get_metadata(c->plugin.state, service_url,
1287 plugin_md_request_metadata_ready, request);
1288 } else {
1289 cb(exec_ctx, user_data, NULL, 0, GRPC_CREDENTIALS_OK);
1290 }
Julien Boeuf2d041182015-08-31 20:30:09 -07001291}
1292
1293static grpc_credentials_vtable plugin_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -07001294 plugin_destruct, plugin_has_request_metadata,
1295 plugin_has_request_metadata_only, plugin_get_request_metadata, NULL};
Julien Boeuf2d041182015-08-31 20:30:09 -07001296
Craig Tillera82950e2015-09-22 12:33:20 -07001297grpc_credentials *grpc_metadata_credentials_create_from_plugin(
1298 grpc_metadata_credentials_plugin plugin, void *reserved) {
1299 grpc_plugin_credentials *c = gpr_malloc(sizeof(*c));
1300 GPR_ASSERT(reserved == NULL);
1301 memset(c, 0, sizeof(*c));
Julien Boeuf2d041182015-08-31 20:30:09 -07001302 c->base.type = GRPC_CREDENTIALS_TYPE_METADATA_PLUGIN;
1303 c->base.vtable = &plugin_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -07001304 gpr_ref_init(&c->base.refcount, 1);
Julien Boeuf2d041182015-08-31 20:30:09 -07001305 c->plugin = plugin;
1306 return &c->base;
1307}