yang-g | 7d2a3e1 | 2016-02-18 15:41:56 -0800 | [diff] [blame] | 1 | |
| 2 | /* |
| 3 | * |
Jan Tattermusch | 7897ae9 | 2017-06-07 22:57:36 +0200 | [diff] [blame] | 4 | * Copyright 2016 gRPC authors. |
yang-g | 7d2a3e1 | 2016-02-18 15:41:56 -0800 | [diff] [blame] | 5 | * |
Jan Tattermusch | 7897ae9 | 2017-06-07 22:57:36 +0200 | [diff] [blame] | 6 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 7 | * you may not use this file except in compliance with the License. |
| 8 | * You may obtain a copy of the License at |
yang-g | 7d2a3e1 | 2016-02-18 15:41:56 -0800 | [diff] [blame] | 9 | * |
Jan Tattermusch | 7897ae9 | 2017-06-07 22:57:36 +0200 | [diff] [blame] | 10 | * http://www.apache.org/licenses/LICENSE-2.0 |
yang-g | 7d2a3e1 | 2016-02-18 15:41:56 -0800 | [diff] [blame] | 11 | * |
Jan Tattermusch | 7897ae9 | 2017-06-07 22:57:36 +0200 | [diff] [blame] | 12 | * Unless required by applicable law or agreed to in writing, software |
| 13 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 14 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 15 | * See the License for the specific language governing permissions and |
| 16 | * limitations under the License. |
yang-g | 7d2a3e1 | 2016-02-18 15:41:56 -0800 | [diff] [blame] | 17 | * |
| 18 | */ |
| 19 | |
| 20 | #include "test/cpp/util/test_credentials_provider.h" |
| 21 | |
Vijay Pai | 320ed13 | 2016-11-01 17:16:55 -0700 | [diff] [blame] | 22 | #include <mutex> |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 23 | #include <unordered_map> |
| 24 | |
David Garcia Quintas | c79b065 | 2016-07-27 21:11:58 -0700 | [diff] [blame] | 25 | #include <grpc/support/log.h> |
Craig Tiller | f40df23 | 2016-03-25 13:38:14 -0700 | [diff] [blame] | 26 | #include <grpc/support/sync.h> |
Dan Born | 53a94ef | 2016-02-24 15:44:43 -0800 | [diff] [blame] | 27 | |
yang-g | 7d2a3e1 | 2016-02-18 15:41:56 -0800 | [diff] [blame] | 28 | #include "test/core/end2end/data/ssl_test_data.h" |
| 29 | |
Vijay Pai | a63271c | 2016-06-15 12:56:38 -0700 | [diff] [blame] | 30 | namespace grpc { |
yang-g | cc59102 | 2017-01-11 11:10:43 -0800 | [diff] [blame] | 31 | namespace testing { |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 32 | namespace { |
| 33 | |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 34 | class DefaultCredentialsProvider : public CredentialsProvider { |
| 35 | public: |
Vijay Pai | c0b2acb | 2016-11-01 16:31:56 -0700 | [diff] [blame] | 36 | ~DefaultCredentialsProvider() override {} |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 37 | |
Vijay Pai | 713c7b8 | 2016-11-01 16:33:18 -0700 | [diff] [blame] | 38 | void AddSecureType( |
| 39 | const grpc::string& type, |
| 40 | std::unique_ptr<CredentialTypeProvider> type_provider) override { |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 41 | // This clobbers any existing entry for type, except the defaults, which |
| 42 | // can't be clobbered. |
Vijay Pai | 320ed13 | 2016-11-01 17:16:55 -0700 | [diff] [blame] | 43 | std::unique_lock<std::mutex> lock(mu_); |
Vijay Pai | efa8430 | 2016-06-15 10:23:34 -0700 | [diff] [blame] | 44 | auto it = std::find(added_secure_type_names_.begin(), |
| 45 | added_secure_type_names_.end(), type); |
| 46 | if (it == added_secure_type_names_.end()) { |
| 47 | added_secure_type_names_.push_back(type); |
| 48 | added_secure_type_providers_.push_back(std::move(type_provider)); |
| 49 | } else { |
| 50 | added_secure_type_providers_[it - added_secure_type_names_.begin()] = |
| 51 | std::move(type_provider); |
| 52 | } |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 53 | } |
| 54 | |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 55 | std::shared_ptr<ChannelCredentials> GetChannelCredentials( |
Vijay Pai | c0b2acb | 2016-11-01 16:31:56 -0700 | [diff] [blame] | 56 | const grpc::string& type, ChannelArguments* args) override { |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 57 | if (type == grpc::testing::kInsecureCredentialsType) { |
| 58 | return InsecureChannelCredentials(); |
| 59 | } else if (type == grpc::testing::kTlsCredentialsType) { |
| 60 | SslCredentialsOptions ssl_opts = {test_root_cert, "", ""}; |
| 61 | args->SetSslTargetNameOverride("foo.test.google.fr"); |
| 62 | return SslCredentials(ssl_opts); |
| 63 | } else { |
Vijay Pai | 320ed13 | 2016-11-01 17:16:55 -0700 | [diff] [blame] | 64 | std::unique_lock<std::mutex> lock(mu_); |
Vijay Pai | efa8430 | 2016-06-15 10:23:34 -0700 | [diff] [blame] | 65 | auto it(std::find(added_secure_type_names_.begin(), |
| 66 | added_secure_type_names_.end(), type)); |
| 67 | if (it == added_secure_type_names_.end()) { |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 68 | gpr_log(GPR_ERROR, "Unsupported credentials type %s.", type.c_str()); |
Vijay Pai | 12bf380 | 2016-06-15 11:24:10 -0700 | [diff] [blame] | 69 | return nullptr; |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 70 | } |
Vijay Pai | efa8430 | 2016-06-15 10:23:34 -0700 | [diff] [blame] | 71 | return added_secure_type_providers_[it - added_secure_type_names_.begin()] |
| 72 | ->GetChannelCredentials(args); |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 73 | } |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 74 | } |
| 75 | |
| 76 | std::shared_ptr<ServerCredentials> GetServerCredentials( |
Vijay Pai | c0b2acb | 2016-11-01 16:31:56 -0700 | [diff] [blame] | 77 | const grpc::string& type) override { |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 78 | if (type == grpc::testing::kInsecureCredentialsType) { |
| 79 | return InsecureServerCredentials(); |
| 80 | } else if (type == grpc::testing::kTlsCredentialsType) { |
| 81 | SslServerCredentialsOptions::PemKeyCertPair pkcp = {test_server1_key, |
| 82 | test_server1_cert}; |
| 83 | SslServerCredentialsOptions ssl_opts; |
| 84 | ssl_opts.pem_root_certs = ""; |
| 85 | ssl_opts.pem_key_cert_pairs.push_back(pkcp); |
| 86 | return SslServerCredentials(ssl_opts); |
| 87 | } else { |
Vijay Pai | 320ed13 | 2016-11-01 17:16:55 -0700 | [diff] [blame] | 88 | std::unique_lock<std::mutex> lock(mu_); |
Vijay Pai | efa8430 | 2016-06-15 10:23:34 -0700 | [diff] [blame] | 89 | auto it(std::find(added_secure_type_names_.begin(), |
| 90 | added_secure_type_names_.end(), type)); |
| 91 | if (it == added_secure_type_names_.end()) { |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 92 | gpr_log(GPR_ERROR, "Unsupported credentials type %s.", type.c_str()); |
Vijay Pai | 12bf380 | 2016-06-15 11:24:10 -0700 | [diff] [blame] | 93 | return nullptr; |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 94 | } |
Vijay Pai | efa8430 | 2016-06-15 10:23:34 -0700 | [diff] [blame] | 95 | return added_secure_type_providers_[it - added_secure_type_names_.begin()] |
| 96 | ->GetServerCredentials(); |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 97 | } |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 98 | } |
Vijay Pai | c0b2acb | 2016-11-01 16:31:56 -0700 | [diff] [blame] | 99 | std::vector<grpc::string> GetSecureCredentialsTypeList() override { |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 100 | std::vector<grpc::string> types; |
| 101 | types.push_back(grpc::testing::kTlsCredentialsType); |
Vijay Pai | 320ed13 | 2016-11-01 17:16:55 -0700 | [diff] [blame] | 102 | std::unique_lock<std::mutex> lock(mu_); |
Vijay Pai | efa8430 | 2016-06-15 10:23:34 -0700 | [diff] [blame] | 103 | for (auto it = added_secure_type_names_.begin(); |
| 104 | it != added_secure_type_names_.end(); it++) { |
| 105 | types.push_back(*it); |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 106 | } |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 107 | return types; |
| 108 | } |
Dan Born | 1b5a264 | 2016-02-24 18:52:39 -0800 | [diff] [blame] | 109 | |
| 110 | private: |
Vijay Pai | 320ed13 | 2016-11-01 17:16:55 -0700 | [diff] [blame] | 111 | std::mutex mu_; |
Vijay Pai | efa8430 | 2016-06-15 10:23:34 -0700 | [diff] [blame] | 112 | std::vector<grpc::string> added_secure_type_names_; |
| 113 | std::vector<std::unique_ptr<CredentialTypeProvider>> |
| 114 | added_secure_type_providers_; |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 115 | }; |
| 116 | |
Vijay Pai | 12bf380 | 2016-06-15 11:24:10 -0700 | [diff] [blame] | 117 | CredentialsProvider* g_provider = nullptr; |
Dan Born | f30941c | 2016-02-24 14:17:26 -0800 | [diff] [blame] | 118 | |
Craig Tiller | 3b45b8d | 2016-11-29 12:31:14 -0800 | [diff] [blame] | 119 | } // namespace |
| 120 | |
yang-g | cc59102 | 2017-01-11 11:10:43 -0800 | [diff] [blame] | 121 | CredentialsProvider* GetCredentialsProvider() { |
| 122 | if (g_provider == nullptr) { |
| 123 | g_provider = new DefaultCredentialsProvider; |
| 124 | } |
| 125 | return g_provider; |
Craig Tiller | 3b45b8d | 2016-11-29 12:31:14 -0800 | [diff] [blame] | 126 | } |
| 127 | |
yang-g | cc59102 | 2017-01-11 11:10:43 -0800 | [diff] [blame] | 128 | void SetCredentialsProvider(CredentialsProvider* provider) { |
| 129 | // For now, forbids overriding provider. |
| 130 | GPR_ASSERT(g_provider == nullptr); |
| 131 | g_provider = provider; |
yang-g | 4c8aed3 | 2016-02-19 00:19:39 -0800 | [diff] [blame] | 132 | } |
| 133 | |
yang-g | 7d2a3e1 | 2016-02-18 15:41:56 -0800 | [diff] [blame] | 134 | } // namespace testing |
| 135 | } // namespace grpc |