blob: 5e155d83b9cf9ec6c7d7caf8ba6f02297a649231 [file] [log] [blame]
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001/*
2 *
Craig Tiller06059952015-02-18 08:34:56 -08003 * Copyright 2015, Google Inc.
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08004 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are
8 * met:
9 *
10 * * Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * * Redistributions in binary form must reproduce the above
13 * copyright notice, this list of conditions and the following disclaimer
14 * in the documentation and/or other materials provided with the
15 * distribution.
16 * * Neither the name of Google Inc. nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
24 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
30 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 *
32 */
33
34#include "src/core/security/credentials.h"
35
Julien Boeuff47a5cb2015-02-18 12:24:08 -080036#include <string.h>
37#include <stdio.h>
38
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -070039#include "src/core/channel/channel_args.h"
40#include "src/core/channel/http_client_filter.h"
Julien Boeuff47a5cb2015-02-18 12:24:08 -080041#include "src/core/json/json.h"
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080042#include "src/core/httpcli/httpcli.h"
ctiller18b49ab2014-12-09 14:39:16 -080043#include "src/core/iomgr/iomgr.h"
Masood Malekghassemi76c3d742015-08-19 18:22:53 -070044#include "src/core/surface/api_trace.h"
Craig Tiller485d7762015-01-23 12:54:05 -080045#include "src/core/support/string.h"
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -070046
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080047#include <grpc/support/alloc.h>
48#include <grpc/support/log.h>
Masood Malekghassemi701af602015-06-03 15:01:17 -070049#include <grpc/support/string_util.h>
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080050#include <grpc/support/sync.h>
Craig Tiller8664ca62015-09-09 12:30:59 -070051#include <grpc/support/thd.h>
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080052#include <grpc/support/time.h>
53
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080054/* -- Common. -- */
55
Craig Tillera82950e2015-09-22 12:33:20 -070056struct grpc_credentials_metadata_request {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080057 grpc_credentials *creds;
58 grpc_credentials_metadata_cb cb;
59 void *user_data;
Julien Boeufb037bb62015-07-08 14:58:14 -070060};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080061
62static grpc_credentials_metadata_request *
Craig Tillera82950e2015-09-22 12:33:20 -070063grpc_credentials_metadata_request_create(grpc_credentials *creds,
64 grpc_credentials_metadata_cb cb,
65 void *user_data) {
66 grpc_credentials_metadata_request *r =
67 gpr_malloc(sizeof(grpc_credentials_metadata_request));
68 r->creds = grpc_credentials_ref(creds);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080069 r->cb = cb;
70 r->user_data = user_data;
71 return r;
72}
73
Craig Tillera82950e2015-09-22 12:33:20 -070074static void grpc_credentials_metadata_request_destroy(
75 grpc_credentials_metadata_request *r) {
76 grpc_credentials_unref(r->creds);
77 gpr_free(r);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080078}
79
Craig Tillera82950e2015-09-22 12:33:20 -070080grpc_credentials *grpc_credentials_ref(grpc_credentials *creds) {
81 if (creds == NULL) return NULL;
82 gpr_ref(&creds->refcount);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080083 return creds;
84}
85
Craig Tillera82950e2015-09-22 12:33:20 -070086void grpc_credentials_unref(grpc_credentials *creds) {
87 if (creds == NULL) return;
88 if (gpr_unref(&creds->refcount)) {
89 creds->vtable->destruct(creds);
90 gpr_free(creds);
91 }
92}
93
94void grpc_credentials_release(grpc_credentials *creds) {
Masood Malekghassemi76c3d742015-08-19 18:22:53 -070095 GRPC_API_TRACE("grpc_credentials_release(creds=%p)", 1, (creds));
Craig Tillera82950e2015-09-22 12:33:20 -070096 grpc_credentials_unref(creds);
97}
98
99int grpc_credentials_has_request_metadata(grpc_credentials *creds) {
100 if (creds == NULL) return 0;
101 return creds->vtable->has_request_metadata(creds);
102}
103
104int grpc_credentials_has_request_metadata_only(grpc_credentials *creds) {
105 if (creds == NULL) return 0;
106 return creds->vtable->has_request_metadata_only(creds);
107}
108
109void grpc_credentials_get_request_metadata(
110 grpc_exec_ctx *exec_ctx, grpc_credentials *creds, grpc_pollset *pollset,
111 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
112 if (creds == NULL || !grpc_credentials_has_request_metadata(creds) ||
113 creds->vtable->get_request_metadata == NULL) {
114 if (cb != NULL) {
115 cb(exec_ctx, user_data, NULL, 0, GRPC_CREDENTIALS_OK);
116 }
nnoble0c475f02014-12-05 15:37:39 -0800117 return;
Craig Tillera82950e2015-09-22 12:33:20 -0700118 }
119 creds->vtable->get_request_metadata(exec_ctx, creds, pollset, service_url, cb,
120 user_data);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800121}
122
Craig Tillera82950e2015-09-22 12:33:20 -0700123grpc_security_status grpc_credentials_create_security_connector(
124 grpc_credentials *creds, const char *target, const grpc_channel_args *args,
125 grpc_credentials *request_metadata_creds,
126 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700127 *new_args = NULL;
Craig Tillera82950e2015-09-22 12:33:20 -0700128 if (creds == NULL || creds->vtable->create_security_connector == NULL ||
129 grpc_credentials_has_request_metadata_only(creds)) {
130 gpr_log(GPR_ERROR,
131 "Invalid credentials for creating a security connector.");
132 return GRPC_SECURITY_ERROR;
133 }
134 return creds->vtable->create_security_connector(
135 creds, target, args, request_metadata_creds, sc, new_args);
Craig Tillerc4885ed2015-04-14 09:51:28 -0700136}
137
Craig Tillera82950e2015-09-22 12:33:20 -0700138grpc_server_credentials *grpc_server_credentials_ref(
139 grpc_server_credentials *creds) {
140 if (creds == NULL) return NULL;
141 gpr_ref(&creds->refcount);
Julien Boeuffe1478f2015-08-30 21:57:38 -0700142 return creds;
143}
144
Craig Tillera82950e2015-09-22 12:33:20 -0700145void grpc_server_credentials_unref(grpc_server_credentials *creds) {
146 if (creds == NULL) return;
147 if (gpr_unref(&creds->refcount)) {
148 creds->vtable->destruct(creds);
149 if (creds->processor.destroy != NULL && creds->processor.state != NULL) {
150 creds->processor.destroy(creds->processor.state);
Julien Boeuffe1478f2015-08-30 21:57:38 -0700151 }
Craig Tillera82950e2015-09-22 12:33:20 -0700152 gpr_free(creds);
153 }
Julien Boeuffe1478f2015-08-30 21:57:38 -0700154}
155
Craig Tillera82950e2015-09-22 12:33:20 -0700156void grpc_server_credentials_release(grpc_server_credentials *creds) {
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700157 GRPC_API_TRACE("grpc_server_credentials_release(creds=%p)", 1, (creds));
Craig Tillera82950e2015-09-22 12:33:20 -0700158 grpc_server_credentials_unref(creds);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800159}
160
Craig Tillera82950e2015-09-22 12:33:20 -0700161grpc_security_status grpc_server_credentials_create_security_connector(
162 grpc_server_credentials *creds, grpc_security_connector **sc) {
163 if (creds == NULL || creds->vtable->create_security_connector == NULL) {
164 gpr_log(GPR_ERROR, "Server credentials cannot create security context.");
165 return GRPC_SECURITY_ERROR;
166 }
167 return creds->vtable->create_security_connector(creds, sc);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700168}
169
Craig Tillera82950e2015-09-22 12:33:20 -0700170void grpc_server_credentials_set_auth_metadata_processor(
171 grpc_server_credentials *creds, grpc_auth_metadata_processor processor) {
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700172 GRPC_API_TRACE(
173 "grpc_server_credentials_set_auth_metadata_processor("
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700174 "creds=%p, "
175 "processor=grpc_auth_metadata_processor { process: %lx, state: %p })",
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700176 3, (creds, (unsigned long)processor.process, processor.state));
Craig Tillera82950e2015-09-22 12:33:20 -0700177 if (creds == NULL) return;
178 if (creds->processor.destroy != NULL && creds->processor.state != NULL) {
179 creds->processor.destroy(creds->processor.state);
180 }
Julien Boeuf6bdc9b42015-07-19 21:56:02 -0700181 creds->processor = processor;
182}
183
Julien Boeuf9a529082015-10-08 13:12:14 -0700184static void server_credentials_pointer_arg_destroy(void *p) {
185 grpc_server_credentials_unref(p);
186}
187
188static void *server_credentials_pointer_arg_copy(void *p) {
189 return grpc_server_credentials_ref(p);
190}
191
192grpc_arg grpc_server_credentials_to_arg(grpc_server_credentials *p) {
193 grpc_arg arg;
194 memset(&arg, 0, sizeof(grpc_arg));
195 arg.type = GRPC_ARG_POINTER;
196 arg.key = GRPC_SERVER_CREDENTIALS_ARG;
197 arg.value.pointer.p = p;
198 arg.value.pointer.copy = server_credentials_pointer_arg_copy;
199 arg.value.pointer.destroy = server_credentials_pointer_arg_destroy;
200 return arg;
201}
202
203grpc_server_credentials *grpc_server_credentials_from_arg(
204 const grpc_arg *arg) {
205 if (strcmp(arg->key, GRPC_SERVER_CREDENTIALS_ARG) != 0) return NULL;
206 if (arg->type != GRPC_ARG_POINTER) {
207 gpr_log(GPR_ERROR, "Invalid type %d for arg %s", arg->type,
208 GRPC_SERVER_CREDENTIALS_ARG);
209 return NULL;
210 }
211 return arg->value.pointer.p;
212}
213
214grpc_server_credentials *grpc_find_server_credentials_in_args(
215 const grpc_channel_args *args) {
216 size_t i;
217 if (args == NULL) return NULL;
218 for (i = 0; i < args->num_args; i++) {
219 grpc_server_credentials *p =
220 grpc_server_credentials_from_arg(&args->args[i]);
221 if (p != NULL) return p;
222 }
223 return NULL;
224}
225
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800226/* -- Ssl credentials. -- */
227
Craig Tillera82950e2015-09-22 12:33:20 -0700228static void ssl_destruct(grpc_credentials *creds) {
229 grpc_ssl_credentials *c = (grpc_ssl_credentials *)creds;
230 if (c->config.pem_root_certs != NULL) gpr_free(c->config.pem_root_certs);
231 if (c->config.pem_private_key != NULL) gpr_free(c->config.pem_private_key);
232 if (c->config.pem_cert_chain != NULL) gpr_free(c->config.pem_cert_chain);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800233}
234
Craig Tillera82950e2015-09-22 12:33:20 -0700235static void ssl_server_destruct(grpc_server_credentials *creds) {
236 grpc_ssl_server_credentials *c = (grpc_ssl_server_credentials *)creds;
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800237 size_t i;
Craig Tillera82950e2015-09-22 12:33:20 -0700238 for (i = 0; i < c->config.num_key_cert_pairs; i++) {
239 if (c->config.pem_private_keys[i] != NULL) {
240 gpr_free(c->config.pem_private_keys[i]);
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800241 }
Craig Tillera82950e2015-09-22 12:33:20 -0700242 if (c->config.pem_cert_chains[i] != NULL) {
243 gpr_free(c->config.pem_cert_chains[i]);
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800244 }
Craig Tillera82950e2015-09-22 12:33:20 -0700245 }
246 if (c->config.pem_private_keys != NULL) gpr_free(c->config.pem_private_keys);
247 if (c->config.pem_private_keys_sizes != NULL) {
248 gpr_free(c->config.pem_private_keys_sizes);
249 }
250 if (c->config.pem_cert_chains != NULL) gpr_free(c->config.pem_cert_chains);
251 if (c->config.pem_cert_chains_sizes != NULL) {
252 gpr_free(c->config.pem_cert_chains_sizes);
253 }
254 if (c->config.pem_root_certs != NULL) gpr_free(c->config.pem_root_certs);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800255}
256
Craig Tillera82950e2015-09-22 12:33:20 -0700257static int ssl_has_request_metadata(const grpc_credentials *creds) { return 0; }
258
259static int ssl_has_request_metadata_only(const grpc_credentials *creds) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800260 return 0;
261}
262
Craig Tillera82950e2015-09-22 12:33:20 -0700263static grpc_security_status ssl_create_security_connector(
264 grpc_credentials *creds, const char *target, const grpc_channel_args *args,
265 grpc_credentials *request_metadata_creds,
266 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
267 grpc_ssl_credentials *c = (grpc_ssl_credentials *)creds;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700268 grpc_security_status status = GRPC_SECURITY_OK;
269 size_t i = 0;
270 const char *overridden_target_name = NULL;
Craig Tillerb9d35962015-09-11 13:31:16 -0700271 grpc_arg new_arg;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700272
Craig Tillera82950e2015-09-22 12:33:20 -0700273 for (i = 0; args && i < args->num_args; i++) {
274 grpc_arg *arg = &args->args[i];
275 if (strcmp(arg->key, GRPC_SSL_TARGET_NAME_OVERRIDE_ARG) == 0 &&
276 arg->type == GRPC_ARG_STRING) {
277 overridden_target_name = arg->value.string;
278 break;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700279 }
Craig Tillera82950e2015-09-22 12:33:20 -0700280 }
281 status = grpc_ssl_channel_security_connector_create(
282 request_metadata_creds, &c->config, target, overridden_target_name, sc);
283 if (status != GRPC_SECURITY_OK) {
284 return status;
285 }
Craig Tillerb9d35962015-09-11 13:31:16 -0700286 new_arg.type = GRPC_ARG_STRING;
287 new_arg.key = GRPC_ARG_HTTP2_SCHEME;
288 new_arg.value.string = "https";
289 *new_args = grpc_channel_args_copy_and_add(args, &new_arg, 1);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700290 return status;
291}
292
Craig Tillera82950e2015-09-22 12:33:20 -0700293static grpc_security_status ssl_server_create_security_connector(
294 grpc_server_credentials *creds, grpc_security_connector **sc) {
295 grpc_ssl_server_credentials *c = (grpc_ssl_server_credentials *)creds;
296 return grpc_ssl_server_security_connector_create(&c->config, sc);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700297}
298
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800299static grpc_credentials_vtable ssl_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700300 ssl_destruct, ssl_has_request_metadata, ssl_has_request_metadata_only, NULL,
301 ssl_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800302
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700303static grpc_server_credentials_vtable ssl_server_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700304 ssl_server_destruct, ssl_server_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800305
Craig Tillera82950e2015-09-22 12:33:20 -0700306static void ssl_copy_key_material(const char *input, unsigned char **output,
307 size_t *output_size) {
308 *output_size = strlen(input);
309 *output = gpr_malloc(*output_size);
310 memcpy(*output, input, *output_size);
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800311}
312
Craig Tillera82950e2015-09-22 12:33:20 -0700313static void ssl_build_config(const char *pem_root_certs,
314 grpc_ssl_pem_key_cert_pair *pem_key_cert_pair,
315 grpc_ssl_config *config) {
316 if (pem_root_certs != NULL) {
317 ssl_copy_key_material(pem_root_certs, &config->pem_root_certs,
318 &config->pem_root_certs_size);
319 }
320 if (pem_key_cert_pair != NULL) {
321 GPR_ASSERT(pem_key_cert_pair->private_key != NULL);
322 GPR_ASSERT(pem_key_cert_pair->cert_chain != NULL);
323 ssl_copy_key_material(pem_key_cert_pair->private_key,
324 &config->pem_private_key,
325 &config->pem_private_key_size);
326 ssl_copy_key_material(pem_key_cert_pair->cert_chain,
327 &config->pem_cert_chain,
328 &config->pem_cert_chain_size);
329 }
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800330}
331
Craig Tillera82950e2015-09-22 12:33:20 -0700332static void ssl_build_server_config(
333 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs,
334 size_t num_key_cert_pairs, int force_client_auth,
335 grpc_ssl_server_config *config) {
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800336 size_t i;
Julien Boeuf5029b302015-07-21 23:02:16 -0700337 config->force_client_auth = force_client_auth;
Craig Tillera82950e2015-09-22 12:33:20 -0700338 if (pem_root_certs != NULL) {
339 ssl_copy_key_material(pem_root_certs, &config->pem_root_certs,
340 &config->pem_root_certs_size);
341 }
342 if (num_key_cert_pairs > 0) {
343 GPR_ASSERT(pem_key_cert_pairs != NULL);
344 config->pem_private_keys =
345 gpr_malloc(num_key_cert_pairs * sizeof(unsigned char *));
346 config->pem_cert_chains =
347 gpr_malloc(num_key_cert_pairs * sizeof(unsigned char *));
348 config->pem_private_keys_sizes =
349 gpr_malloc(num_key_cert_pairs * sizeof(size_t));
350 config->pem_cert_chains_sizes =
351 gpr_malloc(num_key_cert_pairs * sizeof(size_t));
352 }
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800353 config->num_key_cert_pairs = num_key_cert_pairs;
Craig Tillera82950e2015-09-22 12:33:20 -0700354 for (i = 0; i < num_key_cert_pairs; i++) {
355 GPR_ASSERT(pem_key_cert_pairs[i].private_key != NULL);
356 GPR_ASSERT(pem_key_cert_pairs[i].cert_chain != NULL);
357 ssl_copy_key_material(pem_key_cert_pairs[i].private_key,
358 &config->pem_private_keys[i],
359 &config->pem_private_keys_sizes[i]);
360 ssl_copy_key_material(pem_key_cert_pairs[i].cert_chain,
361 &config->pem_cert_chains[i],
362 &config->pem_cert_chains_sizes[i]);
363 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800364}
365
Craig Tillera82950e2015-09-22 12:33:20 -0700366grpc_credentials *grpc_ssl_credentials_create(
367 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pair,
368 void *reserved) {
369 grpc_ssl_credentials *c = gpr_malloc(sizeof(grpc_ssl_credentials));
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700370 GRPC_API_TRACE(
371 "grpc_ssl_credentials_create(pem_root_certs=%s, "
372 "pem_key_cert_pair=%p, "
373 "reserved=%p)",
374 3, (pem_root_certs, pem_key_cert_pair, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700375 GPR_ASSERT(reserved == NULL);
376 memset(c, 0, sizeof(grpc_ssl_credentials));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800377 c->base.type = GRPC_CREDENTIALS_TYPE_SSL;
378 c->base.vtable = &ssl_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700379 gpr_ref_init(&c->base.refcount, 1);
380 ssl_build_config(pem_root_certs, pem_key_cert_pair, &c->config);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800381 return &c->base;
382}
383
Craig Tillera82950e2015-09-22 12:33:20 -0700384grpc_server_credentials *grpc_ssl_server_credentials_create(
385 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs,
386 size_t num_key_cert_pairs, int force_client_auth, void *reserved) {
387 grpc_ssl_server_credentials *c =
388 gpr_malloc(sizeof(grpc_ssl_server_credentials));
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700389 GRPC_API_TRACE(
390 "grpc_ssl_server_credentials_create("
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700391 "pem_root_certs=%s, pem_key_cert_pairs=%p, num_key_cert_pairs=%lu, "
392 "force_client_auth=%d, reserved=%p)",
393 5, (pem_root_certs, pem_key_cert_pairs, (unsigned long)num_key_cert_pairs,
394 force_client_auth, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700395 GPR_ASSERT(reserved == NULL);
396 memset(c, 0, sizeof(grpc_ssl_server_credentials));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800397 c->base.type = GRPC_CREDENTIALS_TYPE_SSL;
Craig Tillera82950e2015-09-22 12:33:20 -0700398 gpr_ref_init(&c->base.refcount, 1);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800399 c->base.vtable = &ssl_server_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700400 ssl_build_server_config(pem_root_certs, pem_key_cert_pairs,
401 num_key_cert_pairs, force_client_auth, &c->config);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800402 return &c->base;
403}
404
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800405/* -- Jwt credentials -- */
406
Craig Tillera82950e2015-09-22 12:33:20 -0700407static void jwt_reset_cache(grpc_service_account_jwt_access_credentials *c) {
408 if (c->cached.jwt_md != NULL) {
409 grpc_credentials_md_store_unref(c->cached.jwt_md);
410 c->cached.jwt_md = NULL;
411 }
412 if (c->cached.service_url != NULL) {
413 gpr_free(c->cached.service_url);
414 c->cached.service_url = NULL;
415 }
416 c->cached.jwt_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800417}
418
Craig Tillera82950e2015-09-22 12:33:20 -0700419static void jwt_destruct(grpc_credentials *creds) {
420 grpc_service_account_jwt_access_credentials *c =
421 (grpc_service_account_jwt_access_credentials *)creds;
422 grpc_auth_json_key_destruct(&c->key);
423 jwt_reset_cache(c);
424 gpr_mu_destroy(&c->cache_mu);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800425}
426
Craig Tillera82950e2015-09-22 12:33:20 -0700427static int jwt_has_request_metadata(const grpc_credentials *creds) { return 1; }
428
429static int jwt_has_request_metadata_only(const grpc_credentials *creds) {
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800430 return 1;
431}
432
Craig Tillera82950e2015-09-22 12:33:20 -0700433static void jwt_get_request_metadata(
434 grpc_exec_ctx *exec_ctx, grpc_credentials *creds, grpc_pollset *pollset,
435 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
436 grpc_service_account_jwt_access_credentials *c =
437 (grpc_service_account_jwt_access_credentials *)creds;
438 gpr_timespec refresh_threshold = gpr_time_from_seconds(
439 GRPC_SECURE_TOKEN_REFRESH_THRESHOLD_SECS, GPR_TIMESPAN);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800440
441 /* See if we can return a cached jwt. */
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700442 grpc_credentials_md_store *jwt_md = NULL;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800443 {
Craig Tillera82950e2015-09-22 12:33:20 -0700444 gpr_mu_lock(&c->cache_mu);
445 if (c->cached.service_url != NULL &&
446 strcmp(c->cached.service_url, service_url) == 0 &&
447 c->cached.jwt_md != NULL &&
448 (gpr_time_cmp(gpr_time_sub(c->cached.jwt_expiration,
449 gpr_now(GPR_CLOCK_REALTIME)),
450 refresh_threshold) > 0)) {
451 jwt_md = grpc_credentials_md_store_ref(c->cached.jwt_md);
452 }
453 gpr_mu_unlock(&c->cache_mu);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800454 }
455
Craig Tillera82950e2015-09-22 12:33:20 -0700456 if (jwt_md == NULL) {
457 char *jwt = NULL;
458 /* Generate a new jwt. */
459 gpr_mu_lock(&c->cache_mu);
460 jwt_reset_cache(c);
461 jwt = grpc_jwt_encode_and_sign(&c->key, service_url, c->jwt_lifetime, NULL);
462 if (jwt != NULL) {
463 char *md_value;
464 gpr_asprintf(&md_value, "Bearer %s", jwt);
465 gpr_free(jwt);
466 c->cached.jwt_expiration =
467 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), c->jwt_lifetime);
468 c->cached.service_url = gpr_strdup(service_url);
469 c->cached.jwt_md = grpc_credentials_md_store_create(1);
470 grpc_credentials_md_store_add_cstrings(
471 c->cached.jwt_md, GRPC_AUTHORIZATION_METADATA_KEY, md_value);
472 gpr_free(md_value);
473 jwt_md = grpc_credentials_md_store_ref(c->cached.jwt_md);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800474 }
Craig Tillera82950e2015-09-22 12:33:20 -0700475 gpr_mu_unlock(&c->cache_mu);
476 }
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800477
Craig Tillera82950e2015-09-22 12:33:20 -0700478 if (jwt_md != NULL) {
479 cb(exec_ctx, user_data, jwt_md->entries, jwt_md->num_entries,
480 GRPC_CREDENTIALS_OK);
481 grpc_credentials_md_store_unref(jwt_md);
482 } else {
483 cb(exec_ctx, user_data, NULL, 0, GRPC_CREDENTIALS_ERROR);
484 }
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800485}
486
487static grpc_credentials_vtable jwt_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700488 jwt_destruct, jwt_has_request_metadata, jwt_has_request_metadata_only,
489 jwt_get_request_metadata, NULL};
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800490
Julien Boeuffe4c3f42015-07-22 16:20:13 -0700491grpc_credentials *
Craig Tillera82950e2015-09-22 12:33:20 -0700492grpc_service_account_jwt_access_credentials_create_from_auth_json_key(
493 grpc_auth_json_key key, gpr_timespec token_lifetime) {
Julien Boeuffe4c3f42015-07-22 16:20:13 -0700494 grpc_service_account_jwt_access_credentials *c;
Craig Tillera82950e2015-09-22 12:33:20 -0700495 if (!grpc_auth_json_key_is_valid(&key)) {
496 gpr_log(GPR_ERROR, "Invalid input for jwt credentials creation");
497 return NULL;
498 }
499 c = gpr_malloc(sizeof(grpc_service_account_jwt_access_credentials));
500 memset(c, 0, sizeof(grpc_service_account_jwt_access_credentials));
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800501 c->base.type = GRPC_CREDENTIALS_TYPE_JWT;
Craig Tillera82950e2015-09-22 12:33:20 -0700502 gpr_ref_init(&c->base.refcount, 1);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800503 c->base.vtable = &jwt_vtable;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800504 c->key = key;
505 c->jwt_lifetime = token_lifetime;
Craig Tillera82950e2015-09-22 12:33:20 -0700506 gpr_mu_init(&c->cache_mu);
507 jwt_reset_cache(c);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800508 return &c->base;
509}
510
Craig Tillera82950e2015-09-22 12:33:20 -0700511grpc_credentials *grpc_service_account_jwt_access_credentials_create(
512 const char *json_key, gpr_timespec token_lifetime, void *reserved) {
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700513 GRPC_API_TRACE(
514 "grpc_service_account_jwt_access_credentials_create("
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700515 "json_key=%s, "
516 "token_lifetime="
517 "gpr_timespec { tv_sec: %ld, tv_nsec: %d, clock_type: %d }, "
518 "reserved=%p)",
519 5, (json_key, (long)token_lifetime.tv_sec, token_lifetime.tv_nsec,
520 (int)token_lifetime.clock_type, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700521 GPR_ASSERT(reserved == NULL);
522 return grpc_service_account_jwt_access_credentials_create_from_auth_json_key(
523 grpc_auth_json_key_create_from_string(json_key), token_lifetime);
Julien Boeuf54006062015-07-07 19:13:04 -0700524}
525
jboeuf1a809c02014-12-19 15:44:30 -0800526/* -- Oauth2TokenFetcher credentials -- */
527
Craig Tillera82950e2015-09-22 12:33:20 -0700528static void oauth2_token_fetcher_destruct(grpc_credentials *creds) {
529 grpc_oauth2_token_fetcher_credentials *c =
530 (grpc_oauth2_token_fetcher_credentials *)creds;
531 grpc_credentials_md_store_unref(c->access_token_md);
532 gpr_mu_destroy(&c->mu);
533 grpc_httpcli_context_destroy(&c->httpcli_context);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800534}
535
Craig Tillera82950e2015-09-22 12:33:20 -0700536static int oauth2_token_fetcher_has_request_metadata(
537 const grpc_credentials *creds) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800538 return 1;
539}
540
Craig Tillera82950e2015-09-22 12:33:20 -0700541static int oauth2_token_fetcher_has_request_metadata_only(
542 const grpc_credentials *creds) {
jboeuf1a809c02014-12-19 15:44:30 -0800543 return 1;
544}
545
546grpc_credentials_status
Craig Tillera82950e2015-09-22 12:33:20 -0700547grpc_oauth2_token_fetcher_credentials_parse_server_response(
548 const grpc_httpcli_response *response, grpc_credentials_md_store **token_md,
549 gpr_timespec *token_lifetime) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800550 char *null_terminated_body = NULL;
551 char *new_access_token = NULL;
552 grpc_credentials_status status = GRPC_CREDENTIALS_OK;
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800553 grpc_json *json = NULL;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800554
Craig Tillera82950e2015-09-22 12:33:20 -0700555 if (response == NULL) {
556 gpr_log(GPR_ERROR, "Received NULL response.");
557 status = GRPC_CREDENTIALS_ERROR;
558 goto end;
559 }
560
561 if (response->body_length > 0) {
562 null_terminated_body = gpr_malloc(response->body_length + 1);
563 null_terminated_body[response->body_length] = '\0';
564 memcpy(null_terminated_body, response->body, response->body_length);
565 }
566
567 if (response->status != 200) {
568 gpr_log(GPR_ERROR, "Call to http server ended with error %d [%s].",
569 response->status,
570 null_terminated_body != NULL ? null_terminated_body : "");
571 status = GRPC_CREDENTIALS_ERROR;
572 goto end;
573 } else {
574 grpc_json *access_token = NULL;
575 grpc_json *token_type = NULL;
576 grpc_json *expires_in = NULL;
577 grpc_json *ptr;
578 json = grpc_json_parse_string(null_terminated_body);
579 if (json == NULL) {
580 gpr_log(GPR_ERROR, "Could not parse JSON from %s", null_terminated_body);
Craig Tiller45724b32015-09-22 10:42:19 -0700581 status = GRPC_CREDENTIALS_ERROR;
582 goto end;
583 }
Craig Tillera82950e2015-09-22 12:33:20 -0700584 if (json->type != GRPC_JSON_OBJECT) {
585 gpr_log(GPR_ERROR, "Response should be a JSON object");
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800586 status = GRPC_CREDENTIALS_ERROR;
587 goto end;
588 }
Craig Tillera82950e2015-09-22 12:33:20 -0700589 for (ptr = json->child; ptr; ptr = ptr->next) {
590 if (strcmp(ptr->key, "access_token") == 0) {
591 access_token = ptr;
592 } else if (strcmp(ptr->key, "token_type") == 0) {
593 token_type = ptr;
594 } else if (strcmp(ptr->key, "expires_in") == 0) {
595 expires_in = ptr;
596 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800597 }
Craig Tillera82950e2015-09-22 12:33:20 -0700598 if (access_token == NULL || access_token->type != GRPC_JSON_STRING) {
599 gpr_log(GPR_ERROR, "Missing or invalid access_token in JSON.");
600 status = GRPC_CREDENTIALS_ERROR;
601 goto end;
602 }
603 if (token_type == NULL || token_type->type != GRPC_JSON_STRING) {
604 gpr_log(GPR_ERROR, "Missing or invalid token_type in JSON.");
605 status = GRPC_CREDENTIALS_ERROR;
606 goto end;
607 }
608 if (expires_in == NULL || expires_in->type != GRPC_JSON_NUMBER) {
609 gpr_log(GPR_ERROR, "Missing or invalid expires_in in JSON.");
610 status = GRPC_CREDENTIALS_ERROR;
611 goto end;
612 }
613 gpr_asprintf(&new_access_token, "%s %s", token_type->value,
614 access_token->value);
615 token_lifetime->tv_sec = strtol(expires_in->value, NULL, 10);
616 token_lifetime->tv_nsec = 0;
617 token_lifetime->clock_type = GPR_TIMESPAN;
618 if (*token_md != NULL) grpc_credentials_md_store_unref(*token_md);
619 *token_md = grpc_credentials_md_store_create(1);
620 grpc_credentials_md_store_add_cstrings(
621 *token_md, GRPC_AUTHORIZATION_METADATA_KEY, new_access_token);
622 status = GRPC_CREDENTIALS_OK;
623 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800624
625end:
Craig Tillera82950e2015-09-22 12:33:20 -0700626 if (status != GRPC_CREDENTIALS_OK && (*token_md != NULL)) {
627 grpc_credentials_md_store_unref(*token_md);
628 *token_md = NULL;
629 }
630 if (null_terminated_body != NULL) gpr_free(null_terminated_body);
631 if (new_access_token != NULL) gpr_free(new_access_token);
632 if (json != NULL) grpc_json_destroy(json);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800633 return status;
634}
635
Craig Tillera82950e2015-09-22 12:33:20 -0700636static void on_oauth2_token_fetcher_http_response(
637 grpc_exec_ctx *exec_ctx, void *user_data,
638 const grpc_httpcli_response *response) {
639 grpc_credentials_metadata_request *r =
640 (grpc_credentials_metadata_request *)user_data;
641 grpc_oauth2_token_fetcher_credentials *c =
642 (grpc_oauth2_token_fetcher_credentials *)r->creds;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800643 gpr_timespec token_lifetime;
644 grpc_credentials_status status;
645
Craig Tillera82950e2015-09-22 12:33:20 -0700646 gpr_mu_lock(&c->mu);
647 status = grpc_oauth2_token_fetcher_credentials_parse_server_response(
648 response, &c->access_token_md, &token_lifetime);
649 if (status == GRPC_CREDENTIALS_OK) {
650 c->token_expiration =
651 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), token_lifetime);
652 r->cb(exec_ctx, r->user_data, c->access_token_md->entries,
653 c->access_token_md->num_entries, status);
654 } else {
655 c->token_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
656 r->cb(exec_ctx, r->user_data, NULL, 0, status);
657 }
658 gpr_mu_unlock(&c->mu);
659 grpc_credentials_metadata_request_destroy(r);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800660}
661
Craig Tillera82950e2015-09-22 12:33:20 -0700662static void oauth2_token_fetcher_get_request_metadata(
663 grpc_exec_ctx *exec_ctx, grpc_credentials *creds, grpc_pollset *pollset,
664 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
665 grpc_oauth2_token_fetcher_credentials *c =
666 (grpc_oauth2_token_fetcher_credentials *)creds;
667 gpr_timespec refresh_threshold = gpr_time_from_seconds(
668 GRPC_SECURE_TOKEN_REFRESH_THRESHOLD_SECS, GPR_TIMESPAN);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700669 grpc_credentials_md_store *cached_access_token_md = NULL;
jboeuf1a809c02014-12-19 15:44:30 -0800670 {
Craig Tillera82950e2015-09-22 12:33:20 -0700671 gpr_mu_lock(&c->mu);
672 if (c->access_token_md != NULL &&
673 (gpr_time_cmp(
674 gpr_time_sub(c->token_expiration, gpr_now(GPR_CLOCK_REALTIME)),
675 refresh_threshold) > 0)) {
676 cached_access_token_md =
677 grpc_credentials_md_store_ref(c->access_token_md);
678 }
679 gpr_mu_unlock(&c->mu);
Craig Tiller45724b32015-09-22 10:42:19 -0700680 }
Craig Tillera82950e2015-09-22 12:33:20 -0700681 if (cached_access_token_md != NULL) {
682 cb(exec_ctx, user_data, cached_access_token_md->entries,
683 cached_access_token_md->num_entries, GRPC_CREDENTIALS_OK);
684 grpc_credentials_md_store_unref(cached_access_token_md);
685 } else {
686 c->fetch_func(
687 exec_ctx,
688 grpc_credentials_metadata_request_create(creds, cb, user_data),
689 &c->httpcli_context, pollset, on_oauth2_token_fetcher_http_response,
690 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), refresh_threshold));
691 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800692}
693
Craig Tillera82950e2015-09-22 12:33:20 -0700694static void init_oauth2_token_fetcher(grpc_oauth2_token_fetcher_credentials *c,
695 grpc_fetch_oauth2_func fetch_func) {
696 memset(c, 0, sizeof(grpc_oauth2_token_fetcher_credentials));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800697 c->base.type = GRPC_CREDENTIALS_TYPE_OAUTH2;
Craig Tillera82950e2015-09-22 12:33:20 -0700698 gpr_ref_init(&c->base.refcount, 1);
699 gpr_mu_init(&c->mu);
700 c->token_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
jboeuf1a809c02014-12-19 15:44:30 -0800701 c->fetch_func = fetch_func;
Craig Tillera82950e2015-09-22 12:33:20 -0700702 grpc_httpcli_context_init(&c->httpcli_context);
jboeuf1a809c02014-12-19 15:44:30 -0800703}
704
Julien Boeuf510a9202015-08-25 21:51:07 -0700705/* -- GoogleComputeEngine credentials. -- */
jboeuf1a809c02014-12-19 15:44:30 -0800706
707static grpc_credentials_vtable compute_engine_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700708 oauth2_token_fetcher_destruct, oauth2_token_fetcher_has_request_metadata,
709 oauth2_token_fetcher_has_request_metadata_only,
710 oauth2_token_fetcher_get_request_metadata, NULL};
jboeuf1a809c02014-12-19 15:44:30 -0800711
Craig Tillera82950e2015-09-22 12:33:20 -0700712static void compute_engine_fetch_oauth2(
713 grpc_exec_ctx *exec_ctx, grpc_credentials_metadata_request *metadata_req,
714 grpc_httpcli_context *httpcli_context, grpc_pollset *pollset,
715 grpc_httpcli_response_cb response_cb, gpr_timespec deadline) {
716 grpc_httpcli_header header = {"Metadata-Flavor", "Google"};
jboeuf1a809c02014-12-19 15:44:30 -0800717 grpc_httpcli_request request;
Craig Tillera82950e2015-09-22 12:33:20 -0700718 memset(&request, 0, sizeof(grpc_httpcli_request));
jboeuf1a809c02014-12-19 15:44:30 -0800719 request.host = GRPC_COMPUTE_ENGINE_METADATA_HOST;
720 request.path = GRPC_COMPUTE_ENGINE_METADATA_TOKEN_PATH;
721 request.hdr_count = 1;
722 request.hdrs = &header;
Craig Tillera82950e2015-09-22 12:33:20 -0700723 grpc_httpcli_get(exec_ctx, httpcli_context, pollset, &request, deadline,
724 response_cb, metadata_req);
jboeuf1a809c02014-12-19 15:44:30 -0800725}
726
Craig Tillera82950e2015-09-22 12:33:20 -0700727grpc_credentials *grpc_google_compute_engine_credentials_create(
728 void *reserved) {
729 grpc_oauth2_token_fetcher_credentials *c =
730 gpr_malloc(sizeof(grpc_oauth2_token_fetcher_credentials));
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700731 GRPC_API_TRACE("grpc_compute_engine_credentials_create(reserved=%p)", 1,
732 (reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700733 GPR_ASSERT(reserved == NULL);
734 init_oauth2_token_fetcher(c, compute_engine_fetch_oauth2);
jboeuf1a809c02014-12-19 15:44:30 -0800735 c->base.vtable = &compute_engine_vtable;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800736 return &c->base;
737}
738
Julien Boeuf510a9202015-08-25 21:51:07 -0700739/* -- GoogleRefreshToken credentials. -- */
Julien Boeuf9835cf02015-03-09 16:56:44 -0700740
Craig Tillera82950e2015-09-22 12:33:20 -0700741static void refresh_token_destruct(grpc_credentials *creds) {
742 grpc_google_refresh_token_credentials *c =
743 (grpc_google_refresh_token_credentials *)creds;
744 grpc_auth_refresh_token_destruct(&c->refresh_token);
745 oauth2_token_fetcher_destruct(&c->base.base);
Julien Boeuf9835cf02015-03-09 16:56:44 -0700746}
747
748static grpc_credentials_vtable refresh_token_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700749 refresh_token_destruct, oauth2_token_fetcher_has_request_metadata,
750 oauth2_token_fetcher_has_request_metadata_only,
751 oauth2_token_fetcher_get_request_metadata, NULL};
Julien Boeuf9835cf02015-03-09 16:56:44 -0700752
Craig Tillera82950e2015-09-22 12:33:20 -0700753static void refresh_token_fetch_oauth2(
754 grpc_exec_ctx *exec_ctx, grpc_credentials_metadata_request *metadata_req,
755 grpc_httpcli_context *httpcli_context, grpc_pollset *pollset,
756 grpc_httpcli_response_cb response_cb, gpr_timespec deadline) {
757 grpc_google_refresh_token_credentials *c =
758 (grpc_google_refresh_token_credentials *)metadata_req->creds;
759 grpc_httpcli_header header = {"Content-Type",
760 "application/x-www-form-urlencoded"};
Julien Boeuf9835cf02015-03-09 16:56:44 -0700761 grpc_httpcli_request request;
762 char *body = NULL;
Craig Tillera82950e2015-09-22 12:33:20 -0700763 gpr_asprintf(&body, GRPC_REFRESH_TOKEN_POST_BODY_FORMAT_STRING,
764 c->refresh_token.client_id, c->refresh_token.client_secret,
765 c->refresh_token.refresh_token);
766 memset(&request, 0, sizeof(grpc_httpcli_request));
Julien Boeuf9835cf02015-03-09 16:56:44 -0700767 request.host = GRPC_GOOGLE_OAUTH2_SERVICE_HOST;
768 request.path = GRPC_GOOGLE_OAUTH2_SERVICE_TOKEN_PATH;
769 request.hdr_count = 1;
770 request.hdrs = &header;
Craig Tillerf53d9c82015-08-04 14:19:43 -0700771 request.handshaker = &grpc_httpcli_ssl;
Craig Tillera82950e2015-09-22 12:33:20 -0700772 grpc_httpcli_post(exec_ctx, httpcli_context, pollset, &request, body,
773 strlen(body), deadline, response_cb, metadata_req);
774 gpr_free(body);
Julien Boeuf9835cf02015-03-09 16:56:44 -0700775}
776
Craig Tillera82950e2015-09-22 12:33:20 -0700777grpc_credentials *grpc_refresh_token_credentials_create_from_auth_refresh_token(
778 grpc_auth_refresh_token refresh_token) {
Julien Boeuf510a9202015-08-25 21:51:07 -0700779 grpc_google_refresh_token_credentials *c;
Craig Tillera82950e2015-09-22 12:33:20 -0700780 if (!grpc_auth_refresh_token_is_valid(&refresh_token)) {
781 gpr_log(GPR_ERROR, "Invalid input for refresh token credentials creation");
782 return NULL;
783 }
784 c = gpr_malloc(sizeof(grpc_google_refresh_token_credentials));
785 memset(c, 0, sizeof(grpc_google_refresh_token_credentials));
786 init_oauth2_token_fetcher(&c->base, refresh_token_fetch_oauth2);
Julien Boeuf9835cf02015-03-09 16:56:44 -0700787 c->base.base.vtable = &refresh_token_vtable;
788 c->refresh_token = refresh_token;
789 return &c->base.base;
790}
791
Craig Tillera82950e2015-09-22 12:33:20 -0700792grpc_credentials *grpc_google_refresh_token_credentials_create(
793 const char *json_refresh_token, void *reserved) {
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700794 GRPC_API_TRACE(
795 "grpc_refresh_token_credentials_create(json_refresh_token=%s, "
796 "reserved=%p)",
797 2, (json_refresh_token, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700798 GPR_ASSERT(reserved == NULL);
799 return grpc_refresh_token_credentials_create_from_auth_refresh_token(
800 grpc_auth_refresh_token_create_from_string(json_refresh_token));
Julien Boeuf54006062015-07-07 19:13:04 -0700801}
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800802
Julien Boeufea456fc2015-07-07 15:23:30 -0700803/* -- Metadata-only credentials. -- */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800804
Craig Tillera82950e2015-09-22 12:33:20 -0700805static void md_only_test_destruct(grpc_credentials *creds) {
806 grpc_md_only_test_credentials *c = (grpc_md_only_test_credentials *)creds;
807 grpc_credentials_md_store_unref(c->md_store);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800808}
809
Craig Tillera82950e2015-09-22 12:33:20 -0700810static int md_only_test_has_request_metadata(const grpc_credentials *creds) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800811 return 1;
812}
813
Craig Tillera82950e2015-09-22 12:33:20 -0700814static int md_only_test_has_request_metadata_only(
815 const grpc_credentials *creds) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800816 return 1;
817}
818
Craig Tillera82950e2015-09-22 12:33:20 -0700819static void on_simulated_token_fetch_done(void *user_data) {
820 grpc_credentials_metadata_request *r =
821 (grpc_credentials_metadata_request *)user_data;
822 grpc_md_only_test_credentials *c = (grpc_md_only_test_credentials *)r->creds;
Craig Tillerf5768a62015-09-22 10:54:34 -0700823 grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
Craig Tillera82950e2015-09-22 12:33:20 -0700824 r->cb(&exec_ctx, r->user_data, c->md_store->entries, c->md_store->num_entries,
825 GRPC_CREDENTIALS_OK);
826 grpc_credentials_metadata_request_destroy(r);
827 grpc_exec_ctx_finish(&exec_ctx);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800828}
829
Craig Tillera82950e2015-09-22 12:33:20 -0700830static void md_only_test_get_request_metadata(
831 grpc_exec_ctx *exec_ctx, grpc_credentials *creds, grpc_pollset *pollset,
832 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
833 grpc_md_only_test_credentials *c = (grpc_md_only_test_credentials *)creds;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800834
Craig Tillera82950e2015-09-22 12:33:20 -0700835 if (c->is_async) {
836 gpr_thd_id thd_id;
837 grpc_credentials_metadata_request *cb_arg =
838 grpc_credentials_metadata_request_create(creds, cb, user_data);
839 gpr_thd_new(&thd_id, on_simulated_token_fetch_done, cb_arg, NULL);
840 } else {
841 cb(exec_ctx, user_data, c->md_store->entries, 1, GRPC_CREDENTIALS_OK);
842 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800843}
844
Julien Boeufea456fc2015-07-07 15:23:30 -0700845static grpc_credentials_vtable md_only_test_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700846 md_only_test_destruct, md_only_test_has_request_metadata,
847 md_only_test_has_request_metadata_only, md_only_test_get_request_metadata,
848 NULL};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800849
Craig Tillera82950e2015-09-22 12:33:20 -0700850grpc_credentials *grpc_md_only_test_credentials_create(const char *md_key,
851 const char *md_value,
852 int is_async) {
853 grpc_md_only_test_credentials *c =
854 gpr_malloc(sizeof(grpc_md_only_test_credentials));
855 memset(c, 0, sizeof(grpc_md_only_test_credentials));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800856 c->base.type = GRPC_CREDENTIALS_TYPE_OAUTH2;
Julien Boeufea456fc2015-07-07 15:23:30 -0700857 c->base.vtable = &md_only_test_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700858 gpr_ref_init(&c->base.refcount, 1);
859 c->md_store = grpc_credentials_md_store_create(1);
860 grpc_credentials_md_store_add_cstrings(c->md_store, md_key, md_value);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800861 c->is_async = is_async;
862 return &c->base;
863}
864
Julien Boeuf2805be12015-07-01 02:47:18 -0700865/* -- Oauth2 Access Token credentials. -- */
866
Craig Tillera82950e2015-09-22 12:33:20 -0700867static void access_token_destruct(grpc_credentials *creds) {
868 grpc_access_token_credentials *c = (grpc_access_token_credentials *)creds;
869 grpc_credentials_md_store_unref(c->access_token_md);
Julien Boeuf2805be12015-07-01 02:47:18 -0700870}
871
Craig Tillera82950e2015-09-22 12:33:20 -0700872static int access_token_has_request_metadata(const grpc_credentials *creds) {
Julien Boeuf2805be12015-07-01 02:47:18 -0700873 return 1;
874}
875
Craig Tillera82950e2015-09-22 12:33:20 -0700876static int access_token_has_request_metadata_only(
877 const grpc_credentials *creds) {
Julien Boeuf2805be12015-07-01 02:47:18 -0700878 return 1;
879}
880
Craig Tillera82950e2015-09-22 12:33:20 -0700881static void access_token_get_request_metadata(
882 grpc_exec_ctx *exec_ctx, grpc_credentials *creds, grpc_pollset *pollset,
883 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
884 grpc_access_token_credentials *c = (grpc_access_token_credentials *)creds;
885 cb(exec_ctx, user_data, c->access_token_md->entries, 1, GRPC_CREDENTIALS_OK);
Julien Boeuf2805be12015-07-01 02:47:18 -0700886}
887
888static grpc_credentials_vtable access_token_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700889 access_token_destruct, access_token_has_request_metadata,
890 access_token_has_request_metadata_only, access_token_get_request_metadata,
891 NULL};
Julien Boeuf2805be12015-07-01 02:47:18 -0700892
Craig Tillera82950e2015-09-22 12:33:20 -0700893grpc_credentials *grpc_access_token_credentials_create(const char *access_token,
894 void *reserved) {
895 grpc_access_token_credentials *c =
896 gpr_malloc(sizeof(grpc_access_token_credentials));
Julien Boeuf2805be12015-07-01 02:47:18 -0700897 char *token_md_value;
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700898 GRPC_API_TRACE(
899 "grpc_access_token_credentials_create(access_token=%s, "
900 "reserved=%p)",
901 2, (access_token, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700902 GPR_ASSERT(reserved == NULL);
903 memset(c, 0, sizeof(grpc_access_token_credentials));
Julien Boeuf2805be12015-07-01 02:47:18 -0700904 c->base.type = GRPC_CREDENTIALS_TYPE_OAUTH2;
905 c->base.vtable = &access_token_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700906 gpr_ref_init(&c->base.refcount, 1);
907 c->access_token_md = grpc_credentials_md_store_create(1);
908 gpr_asprintf(&token_md_value, "Bearer %s", access_token);
909 grpc_credentials_md_store_add_cstrings(
910 c->access_token_md, GRPC_AUTHORIZATION_METADATA_KEY, token_md_value);
911 gpr_free(token_md_value);
Julien Boeuf2805be12015-07-01 02:47:18 -0700912 return &c->base;
913}
914
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800915/* -- Fake transport security credentials. -- */
916
Craig Tillera82950e2015-09-22 12:33:20 -0700917static void fake_transport_security_credentials_destruct(
918 grpc_credentials *creds) {
Julien Boeuffe1478f2015-08-30 21:57:38 -0700919 /* Nothing to do here. */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800920}
921
Craig Tillera82950e2015-09-22 12:33:20 -0700922static void fake_transport_security_server_credentials_destruct(
923 grpc_server_credentials *creds) {
Julien Boeuffe1478f2015-08-30 21:57:38 -0700924 /* Nothing to do here. */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800925}
926
Craig Tillera82950e2015-09-22 12:33:20 -0700927static int fake_transport_security_has_request_metadata(
928 const grpc_credentials *creds) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800929 return 0;
930}
931
Craig Tillera82950e2015-09-22 12:33:20 -0700932static int fake_transport_security_has_request_metadata_only(
933 const grpc_credentials *creds) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800934 return 0;
935}
936
Craig Tillera82950e2015-09-22 12:33:20 -0700937static grpc_security_status fake_transport_security_create_security_connector(
938 grpc_credentials *c, const char *target, const grpc_channel_args *args,
939 grpc_credentials *request_metadata_creds,
940 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
941 *sc = grpc_fake_channel_security_connector_create(request_metadata_creds, 1);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700942 return GRPC_SECURITY_OK;
943}
944
945static grpc_security_status
Craig Tillera82950e2015-09-22 12:33:20 -0700946fake_transport_security_server_create_security_connector(
947 grpc_server_credentials *c, grpc_security_connector **sc) {
948 *sc = grpc_fake_server_security_connector_create();
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700949 return GRPC_SECURITY_OK;
950}
951
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800952static grpc_credentials_vtable fake_transport_security_credentials_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700953 fake_transport_security_credentials_destruct,
954 fake_transport_security_has_request_metadata,
955 fake_transport_security_has_request_metadata_only, NULL,
956 fake_transport_security_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800957
Craig Tillera82950e2015-09-22 12:33:20 -0700958static grpc_server_credentials_vtable
959 fake_transport_security_server_credentials_vtable = {
960 fake_transport_security_server_credentials_destruct,
961 fake_transport_security_server_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800962
Craig Tillera82950e2015-09-22 12:33:20 -0700963grpc_credentials *grpc_fake_transport_security_credentials_create(void) {
964 grpc_credentials *c = gpr_malloc(sizeof(grpc_credentials));
965 memset(c, 0, sizeof(grpc_credentials));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800966 c->type = GRPC_CREDENTIALS_TYPE_FAKE_TRANSPORT_SECURITY;
967 c->vtable = &fake_transport_security_credentials_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700968 gpr_ref_init(&c->refcount, 1);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800969 return c;
970}
971
Craig Tillera82950e2015-09-22 12:33:20 -0700972grpc_server_credentials *grpc_fake_transport_security_server_credentials_create(
973 void) {
974 grpc_server_credentials *c = gpr_malloc(sizeof(grpc_server_credentials));
975 memset(c, 0, sizeof(grpc_server_credentials));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800976 c->type = GRPC_CREDENTIALS_TYPE_FAKE_TRANSPORT_SECURITY;
Craig Tillera82950e2015-09-22 12:33:20 -0700977 gpr_ref_init(&c->refcount, 1);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800978 c->vtable = &fake_transport_security_server_credentials_vtable;
979 return c;
980}
981
nnoble0c475f02014-12-05 15:37:39 -0800982/* -- Composite credentials. -- */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800983
Craig Tillera82950e2015-09-22 12:33:20 -0700984typedef struct {
nnoble0c475f02014-12-05 15:37:39 -0800985 grpc_composite_credentials *composite_creds;
986 size_t creds_index;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700987 grpc_credentials_md_store *md_elems;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800988 char *service_url;
nnoble0c475f02014-12-05 15:37:39 -0800989 void *user_data;
Craig Tiller06bac342015-06-01 12:55:57 -0700990 grpc_pollset *pollset;
nnoble0c475f02014-12-05 15:37:39 -0800991 grpc_credentials_metadata_cb cb;
992} grpc_composite_credentials_metadata_context;
993
Craig Tillera82950e2015-09-22 12:33:20 -0700994static void composite_destruct(grpc_credentials *creds) {
995 grpc_composite_credentials *c = (grpc_composite_credentials *)creds;
nnoble0c475f02014-12-05 15:37:39 -0800996 size_t i;
Craig Tillera82950e2015-09-22 12:33:20 -0700997 for (i = 0; i < c->inner.num_creds; i++) {
998 grpc_credentials_unref(c->inner.creds_array[i]);
999 }
1000 gpr_free(c->inner.creds_array);
nnoble0c475f02014-12-05 15:37:39 -08001001}
1002
Craig Tillera82950e2015-09-22 12:33:20 -07001003static int composite_has_request_metadata(const grpc_credentials *creds) {
1004 const grpc_composite_credentials *c =
1005 (const grpc_composite_credentials *)creds;
nnoble0c475f02014-12-05 15:37:39 -08001006 size_t i;
Craig Tillera82950e2015-09-22 12:33:20 -07001007 for (i = 0; i < c->inner.num_creds; i++) {
1008 if (grpc_credentials_has_request_metadata(c->inner.creds_array[i])) {
1009 return 1;
nnoble0c475f02014-12-05 15:37:39 -08001010 }
Craig Tillera82950e2015-09-22 12:33:20 -07001011 }
nnoble0c475f02014-12-05 15:37:39 -08001012 return 0;
1013}
1014
Craig Tillera82950e2015-09-22 12:33:20 -07001015static int composite_has_request_metadata_only(const grpc_credentials *creds) {
1016 const grpc_composite_credentials *c =
1017 (const grpc_composite_credentials *)creds;
nnoble0c475f02014-12-05 15:37:39 -08001018 size_t i;
Craig Tillera82950e2015-09-22 12:33:20 -07001019 for (i = 0; i < c->inner.num_creds; i++) {
1020 if (!grpc_credentials_has_request_metadata_only(c->inner.creds_array[i])) {
1021 return 0;
nnoble0c475f02014-12-05 15:37:39 -08001022 }
Craig Tillera82950e2015-09-22 12:33:20 -07001023 }
nnoble0c475f02014-12-05 15:37:39 -08001024 return 1;
1025}
1026
Craig Tillera82950e2015-09-22 12:33:20 -07001027static void composite_md_context_destroy(
1028 grpc_composite_credentials_metadata_context *ctx) {
1029 grpc_credentials_md_store_unref(ctx->md_elems);
1030 if (ctx->service_url != NULL) gpr_free(ctx->service_url);
1031 gpr_free(ctx);
nnoble0c475f02014-12-05 15:37:39 -08001032}
1033
Craig Tillera82950e2015-09-22 12:33:20 -07001034static void composite_metadata_cb(grpc_exec_ctx *exec_ctx, void *user_data,
1035 grpc_credentials_md *md_elems, size_t num_md,
1036 grpc_credentials_status status) {
1037 grpc_composite_credentials_metadata_context *ctx =
1038 (grpc_composite_credentials_metadata_context *)user_data;
1039 if (status != GRPC_CREDENTIALS_OK) {
1040 ctx->cb(exec_ctx, ctx->user_data, NULL, 0, status);
1041 return;
1042 }
Craig Tiller45724b32015-09-22 10:42:19 -07001043
1044 /* Copy the metadata in the context. */
Craig Tillera82950e2015-09-22 12:33:20 -07001045 if (num_md > 0) {
1046 size_t i;
1047 for (i = 0; i < num_md; i++) {
1048 grpc_credentials_md_store_add(ctx->md_elems, md_elems[i].key,
1049 md_elems[i].value);
Craig Tiller45724b32015-09-22 10:42:19 -07001050 }
Craig Tillera82950e2015-09-22 12:33:20 -07001051 }
Craig Tiller45724b32015-09-22 10:42:19 -07001052
1053 /* See if we need to get some more metadata. */
Craig Tillera82950e2015-09-22 12:33:20 -07001054 while (ctx->creds_index < ctx->composite_creds->inner.num_creds) {
1055 grpc_credentials *inner_creds =
1056 ctx->composite_creds->inner.creds_array[ctx->creds_index++];
1057 if (grpc_credentials_has_request_metadata(inner_creds)) {
1058 grpc_credentials_get_request_metadata(exec_ctx, inner_creds, ctx->pollset,
1059 ctx->service_url,
1060 composite_metadata_cb, ctx);
Craig Tiller45724b32015-09-22 10:42:19 -07001061 return;
1062 }
Craig Tillera82950e2015-09-22 12:33:20 -07001063 }
1064
1065 /* We're done!. */
1066 ctx->cb(exec_ctx, ctx->user_data, ctx->md_elems->entries,
1067 ctx->md_elems->num_entries, GRPC_CREDENTIALS_OK);
1068 composite_md_context_destroy(ctx);
1069}
1070
1071static void composite_get_request_metadata(
1072 grpc_exec_ctx *exec_ctx, grpc_credentials *creds, grpc_pollset *pollset,
1073 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
1074 grpc_composite_credentials *c = (grpc_composite_credentials *)creds;
1075 grpc_composite_credentials_metadata_context *ctx;
1076 if (!grpc_credentials_has_request_metadata(creds)) {
1077 cb(exec_ctx, user_data, NULL, 0, GRPC_CREDENTIALS_OK);
1078 return;
1079 }
1080 ctx = gpr_malloc(sizeof(grpc_composite_credentials_metadata_context));
1081 memset(ctx, 0, sizeof(grpc_composite_credentials_metadata_context));
1082 ctx->service_url = gpr_strdup(service_url);
nnoble0c475f02014-12-05 15:37:39 -08001083 ctx->user_data = user_data;
1084 ctx->cb = cb;
1085 ctx->composite_creds = c;
Craig Tiller06bac342015-06-01 12:55:57 -07001086 ctx->pollset = pollset;
Craig Tillera82950e2015-09-22 12:33:20 -07001087 ctx->md_elems = grpc_credentials_md_store_create(c->inner.num_creds);
1088 while (ctx->creds_index < c->inner.num_creds) {
1089 grpc_credentials *inner_creds = c->inner.creds_array[ctx->creds_index++];
1090 if (grpc_credentials_has_request_metadata(inner_creds)) {
1091 grpc_credentials_get_request_metadata(exec_ctx, inner_creds, pollset,
1092 service_url, composite_metadata_cb,
1093 ctx);
1094 return;
nnoble0c475f02014-12-05 15:37:39 -08001095 }
Craig Tillera82950e2015-09-22 12:33:20 -07001096 }
1097 GPR_ASSERT(0); /* Should have exited before. */
nnoble0c475f02014-12-05 15:37:39 -08001098}
1099
Craig Tillera82950e2015-09-22 12:33:20 -07001100static grpc_security_status composite_create_security_connector(
1101 grpc_credentials *creds, const char *target, const grpc_channel_args *args,
1102 grpc_credentials *request_metadata_creds,
1103 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
1104 grpc_composite_credentials *c = (grpc_composite_credentials *)creds;
1105 if (c->connector_creds == NULL) {
1106 gpr_log(GPR_ERROR,
1107 "Cannot create security connector, missing connector credentials.");
1108 return GRPC_SECURITY_ERROR;
1109 }
1110 return grpc_credentials_create_security_connector(c->connector_creds, target,
1111 args, creds, sc, new_args);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001112}
1113
nnoble0c475f02014-12-05 15:37:39 -08001114static grpc_credentials_vtable composite_credentials_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -07001115 composite_destruct, composite_has_request_metadata,
1116 composite_has_request_metadata_only, composite_get_request_metadata,
1117 composite_create_security_connector};
nnoble0c475f02014-12-05 15:37:39 -08001118
Craig Tillera82950e2015-09-22 12:33:20 -07001119static grpc_credentials_array get_creds_array(grpc_credentials **creds_addr) {
nnoble0c475f02014-12-05 15:37:39 -08001120 grpc_credentials_array result;
1121 grpc_credentials *creds = *creds_addr;
1122 result.creds_array = creds_addr;
1123 result.num_creds = 1;
Craig Tillera82950e2015-09-22 12:33:20 -07001124 if (strcmp(creds->type, GRPC_CREDENTIALS_TYPE_COMPOSITE) == 0) {
1125 result = *grpc_composite_credentials_get_credentials(creds);
1126 }
nnoble0c475f02014-12-05 15:37:39 -08001127 return result;
1128}
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001129
Craig Tillera82950e2015-09-22 12:33:20 -07001130grpc_credentials *grpc_composite_credentials_create(grpc_credentials *creds1,
1131 grpc_credentials *creds2,
1132 void *reserved) {
nnoble0c475f02014-12-05 15:37:39 -08001133 size_t i;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001134 size_t creds_array_byte_size;
nnoble0c475f02014-12-05 15:37:39 -08001135 grpc_credentials_array creds1_array;
1136 grpc_credentials_array creds2_array;
1137 grpc_composite_credentials *c;
Craig Tiller4de3e4f2015-10-05 08:55:50 -07001138 GRPC_API_TRACE(
1139 "grpc_composite_credentials_create(creds1=%p, creds2=%p, "
1140 "reserved=%p)",
1141 3, (creds1, creds2, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -07001142 GPR_ASSERT(reserved == NULL);
1143 GPR_ASSERT(creds1 != NULL);
1144 GPR_ASSERT(creds2 != NULL);
1145 c = gpr_malloc(sizeof(grpc_composite_credentials));
1146 memset(c, 0, sizeof(grpc_composite_credentials));
nnoble0c475f02014-12-05 15:37:39 -08001147 c->base.type = GRPC_CREDENTIALS_TYPE_COMPOSITE;
1148 c->base.vtable = &composite_credentials_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -07001149 gpr_ref_init(&c->base.refcount, 1);
1150 creds1_array = get_creds_array(&creds1);
1151 creds2_array = get_creds_array(&creds2);
nnoble0c475f02014-12-05 15:37:39 -08001152 c->inner.num_creds = creds1_array.num_creds + creds2_array.num_creds;
Craig Tillera82950e2015-09-22 12:33:20 -07001153 creds_array_byte_size = c->inner.num_creds * sizeof(grpc_credentials *);
1154 c->inner.creds_array = gpr_malloc(creds_array_byte_size);
1155 memset(c->inner.creds_array, 0, creds_array_byte_size);
1156 for (i = 0; i < creds1_array.num_creds; i++) {
1157 grpc_credentials *cur_creds = creds1_array.creds_array[i];
1158 if (!grpc_credentials_has_request_metadata_only(cur_creds)) {
1159 if (c->connector_creds == NULL) {
1160 c->connector_creds = cur_creds;
1161 } else {
1162 gpr_log(GPR_ERROR, "Cannot compose multiple connector credentials.");
1163 goto fail;
1164 }
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001165 }
Craig Tillera82950e2015-09-22 12:33:20 -07001166 c->inner.creds_array[i] = grpc_credentials_ref(cur_creds);
1167 }
1168 for (i = 0; i < creds2_array.num_creds; i++) {
1169 grpc_credentials *cur_creds = creds2_array.creds_array[i];
1170 if (!grpc_credentials_has_request_metadata_only(cur_creds)) {
1171 if (c->connector_creds == NULL) {
1172 c->connector_creds = cur_creds;
1173 } else {
1174 gpr_log(GPR_ERROR, "Cannot compose multiple connector credentials.");
1175 goto fail;
1176 }
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001177 }
Craig Tillera82950e2015-09-22 12:33:20 -07001178 c->inner.creds_array[i + creds1_array.num_creds] =
1179 grpc_credentials_ref(cur_creds);
1180 }
nnoble0c475f02014-12-05 15:37:39 -08001181 return &c->base;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001182
1183fail:
Craig Tillera82950e2015-09-22 12:33:20 -07001184 grpc_credentials_unref(&c->base);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001185 return NULL;
nnoble0c475f02014-12-05 15:37:39 -08001186}
1187
Craig Tillera82950e2015-09-22 12:33:20 -07001188const grpc_credentials_array *grpc_composite_credentials_get_credentials(
1189 grpc_credentials *creds) {
1190 const grpc_composite_credentials *c =
1191 (const grpc_composite_credentials *)creds;
1192 GPR_ASSERT(strcmp(creds->type, GRPC_CREDENTIALS_TYPE_COMPOSITE) == 0);
nnoble0c475f02014-12-05 15:37:39 -08001193 return &c->inner;
1194}
1195
Craig Tillera82950e2015-09-22 12:33:20 -07001196grpc_credentials *grpc_credentials_contains_type(
1197 grpc_credentials *creds, const char *type,
1198 grpc_credentials **composite_creds) {
jboeuf6ad120e2015-01-12 17:08:15 -08001199 size_t i;
Craig Tillera82950e2015-09-22 12:33:20 -07001200 if (strcmp(creds->type, type) == 0) {
1201 if (composite_creds != NULL) *composite_creds = NULL;
1202 return creds;
1203 } else if (strcmp(creds->type, GRPC_CREDENTIALS_TYPE_COMPOSITE) == 0) {
1204 const grpc_credentials_array *inner_creds_array =
1205 grpc_composite_credentials_get_credentials(creds);
1206 for (i = 0; i < inner_creds_array->num_creds; i++) {
1207 if (strcmp(type, inner_creds_array->creds_array[i]->type) == 0) {
1208 if (composite_creds != NULL) *composite_creds = creds;
1209 return inner_creds_array->creds_array[i];
1210 }
jboeuf6ad120e2015-01-12 17:08:15 -08001211 }
Craig Tillera82950e2015-09-22 12:33:20 -07001212 }
jboeuf6ad120e2015-01-12 17:08:15 -08001213 return NULL;
1214}
1215
nnoble0c475f02014-12-05 15:37:39 -08001216/* -- IAM credentials. -- */
1217
Craig Tillera82950e2015-09-22 12:33:20 -07001218static void iam_destruct(grpc_credentials *creds) {
1219 grpc_google_iam_credentials *c = (grpc_google_iam_credentials *)creds;
1220 grpc_credentials_md_store_unref(c->iam_md);
nnoble0c475f02014-12-05 15:37:39 -08001221}
1222
Craig Tillera82950e2015-09-22 12:33:20 -07001223static int iam_has_request_metadata(const grpc_credentials *creds) { return 1; }
1224
1225static int iam_has_request_metadata_only(const grpc_credentials *creds) {
nnoble0c475f02014-12-05 15:37:39 -08001226 return 1;
1227}
1228
Craig Tillera82950e2015-09-22 12:33:20 -07001229static void iam_get_request_metadata(
1230 grpc_exec_ctx *exec_ctx, grpc_credentials *creds, grpc_pollset *pollset,
1231 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
1232 grpc_google_iam_credentials *c = (grpc_google_iam_credentials *)creds;
1233 cb(exec_ctx, user_data, c->iam_md->entries, c->iam_md->num_entries,
1234 GRPC_CREDENTIALS_OK);
nnoble0c475f02014-12-05 15:37:39 -08001235}
1236
1237static grpc_credentials_vtable iam_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -07001238 iam_destruct, iam_has_request_metadata, iam_has_request_metadata_only,
1239 iam_get_request_metadata, NULL};
nnoble0c475f02014-12-05 15:37:39 -08001240
Craig Tillera82950e2015-09-22 12:33:20 -07001241grpc_credentials *grpc_google_iam_credentials_create(
1242 const char *token, const char *authority_selector, void *reserved) {
Julien Boeuf510a9202015-08-25 21:51:07 -07001243 grpc_google_iam_credentials *c;
Craig Tiller4de3e4f2015-10-05 08:55:50 -07001244 GRPC_API_TRACE(
1245 "grpc_iam_credentials_create(token=%s, authority_selector=%s, "
1246 "reserved=%p)",
1247 3, (token, authority_selector, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -07001248 GPR_ASSERT(reserved == NULL);
1249 GPR_ASSERT(token != NULL);
1250 GPR_ASSERT(authority_selector != NULL);
1251 c = gpr_malloc(sizeof(grpc_google_iam_credentials));
1252 memset(c, 0, sizeof(grpc_google_iam_credentials));
nnoble0c475f02014-12-05 15:37:39 -08001253 c->base.type = GRPC_CREDENTIALS_TYPE_IAM;
1254 c->base.vtable = &iam_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -07001255 gpr_ref_init(&c->base.refcount, 1);
1256 c->iam_md = grpc_credentials_md_store_create(2);
1257 grpc_credentials_md_store_add_cstrings(
1258 c->iam_md, GRPC_IAM_AUTHORIZATION_TOKEN_METADATA_KEY, token);
1259 grpc_credentials_md_store_add_cstrings(
1260 c->iam_md, GRPC_IAM_AUTHORITY_SELECTOR_METADATA_KEY, authority_selector);
nnoble0c475f02014-12-05 15:37:39 -08001261 return &c->base;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001262}
Julien Boeuf2d041182015-08-31 20:30:09 -07001263
1264/* -- Plugin credentials. -- */
1265
Craig Tillera82950e2015-09-22 12:33:20 -07001266typedef struct {
Julien Boeuf2d041182015-08-31 20:30:09 -07001267 void *user_data;
1268 grpc_credentials_metadata_cb cb;
1269} grpc_metadata_plugin_request;
1270
Craig Tillera82950e2015-09-22 12:33:20 -07001271static void plugin_destruct(grpc_credentials *creds) {
1272 grpc_plugin_credentials *c = (grpc_plugin_credentials *)creds;
1273 if (c->plugin.state != NULL && c->plugin.destroy != NULL) {
1274 c->plugin.destroy(c->plugin.state);
1275 }
Julien Boeuf2d041182015-08-31 20:30:09 -07001276}
1277
Craig Tillera82950e2015-09-22 12:33:20 -07001278static int plugin_has_request_metadata(const grpc_credentials *creds) {
Julien Boeuf2d041182015-08-31 20:30:09 -07001279 return 1;
1280}
1281
Craig Tillera82950e2015-09-22 12:33:20 -07001282static int plugin_has_request_metadata_only(const grpc_credentials *creds) {
Julien Boeuf2d041182015-08-31 20:30:09 -07001283 return 1;
1284}
1285
Craig Tillera82950e2015-09-22 12:33:20 -07001286static void plugin_md_request_metadata_ready(void *request,
1287 const grpc_metadata *md,
1288 size_t num_md,
1289 grpc_status_code status,
1290 const char *error_details) {
Craig Tiller10ee2742015-09-22 09:25:57 -07001291 /* called from application code */
Craig Tillerf5768a62015-09-22 10:54:34 -07001292 grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
Craig Tillera82950e2015-09-22 12:33:20 -07001293 grpc_metadata_plugin_request *r = (grpc_metadata_plugin_request *)request;
1294 if (status != GRPC_STATUS_OK) {
1295 if (error_details != NULL) {
1296 gpr_log(GPR_ERROR, "Getting metadata from plugin failed with error: %s",
1297 error_details);
Julien Boeuf2d041182015-08-31 20:30:09 -07001298 }
Craig Tillera82950e2015-09-22 12:33:20 -07001299 r->cb(&exec_ctx, r->user_data, NULL, 0, GRPC_CREDENTIALS_ERROR);
1300 } else {
1301 size_t i;
1302 grpc_credentials_md *md_array = NULL;
1303 if (num_md > 0) {
1304 md_array = gpr_malloc(num_md * sizeof(grpc_credentials_md));
1305 for (i = 0; i < num_md; i++) {
1306 md_array[i].key = gpr_slice_from_copied_string(md[i].key);
1307 md_array[i].value =
1308 gpr_slice_from_copied_buffer(md[i].value, md[i].value_length);
1309 }
Julien Boeuf2d041182015-08-31 20:30:09 -07001310 }
Craig Tillera82950e2015-09-22 12:33:20 -07001311 r->cb(&exec_ctx, r->user_data, md_array, num_md, GRPC_CREDENTIALS_OK);
1312 if (md_array != NULL) {
1313 for (i = 0; i < num_md; i++) {
1314 gpr_slice_unref(md_array[i].key);
1315 gpr_slice_unref(md_array[i].value);
1316 }
1317 gpr_free(md_array);
1318 }
1319 }
1320 gpr_free(r);
Craig Tiller80183f32015-09-23 12:33:59 -07001321 grpc_exec_ctx_finish(&exec_ctx);
Julien Boeuf2d041182015-08-31 20:30:09 -07001322}
1323
Craig Tillera82950e2015-09-22 12:33:20 -07001324static void plugin_get_request_metadata(
1325 grpc_exec_ctx *exec_ctx, grpc_credentials *creds, grpc_pollset *pollset,
1326 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
1327 grpc_plugin_credentials *c = (grpc_plugin_credentials *)creds;
1328 if (c->plugin.get_metadata != NULL) {
1329 grpc_metadata_plugin_request *request = gpr_malloc(sizeof(*request));
1330 memset(request, 0, sizeof(*request));
1331 request->user_data = user_data;
1332 request->cb = cb;
1333 c->plugin.get_metadata(c->plugin.state, service_url,
1334 plugin_md_request_metadata_ready, request);
1335 } else {
1336 cb(exec_ctx, user_data, NULL, 0, GRPC_CREDENTIALS_OK);
1337 }
Julien Boeuf2d041182015-08-31 20:30:09 -07001338}
1339
1340static grpc_credentials_vtable plugin_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -07001341 plugin_destruct, plugin_has_request_metadata,
1342 plugin_has_request_metadata_only, plugin_get_request_metadata, NULL};
Julien Boeuf2d041182015-08-31 20:30:09 -07001343
Craig Tillera82950e2015-09-22 12:33:20 -07001344grpc_credentials *grpc_metadata_credentials_create_from_plugin(
1345 grpc_metadata_credentials_plugin plugin, void *reserved) {
1346 grpc_plugin_credentials *c = gpr_malloc(sizeof(*c));
1347 GPR_ASSERT(reserved == NULL);
1348 memset(c, 0, sizeof(*c));
Julien Boeuf2d041182015-08-31 20:30:09 -07001349 c->base.type = GRPC_CREDENTIALS_TYPE_METADATA_PLUGIN;
1350 c->base.vtable = &plugin_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -07001351 gpr_ref_init(&c->base.refcount, 1);
Julien Boeuf2d041182015-08-31 20:30:09 -07001352 c->plugin = plugin;
1353 return &c->base;
1354}