blob: ad11c3954be190815da3cfffdeba440dbb8d1c93 [file] [log] [blame]
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001/*
2 *
Craig Tiller06059952015-02-18 08:34:56 -08003 * Copyright 2015, Google Inc.
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08004 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are
8 * met:
9 *
10 * * Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * * Redistributions in binary form must reproduce the above
13 * copyright notice, this list of conditions and the following disclaimer
14 * in the documentation and/or other materials provided with the
15 * distribution.
16 * * Neither the name of Google Inc. nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
24 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
30 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 *
32 */
33
34#include <grpc/grpc.h>
35
36#include <stdlib.h>
37#include <string.h>
38
Craig Tilleracf0f072015-06-29 08:24:16 -070039#include <grpc/support/alloc.h>
40
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080041#include "src/core/channel/channel_args.h"
42#include "src/core/channel/client_channel.h"
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080043#include "src/core/channel/http_client_filter.h"
Craig Tilleracf0f072015-06-29 08:24:16 -070044#include "src/core/client_config/resolver_registry.h"
ctiller18b49ab2014-12-09 14:39:16 -080045#include "src/core/iomgr/tcp_client.h"
Julien Boeufc6f8d0a2015-05-11 22:40:02 -070046#include "src/core/security/auth_filters.h"
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -070047#include "src/core/security/credentials.h"
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080048#include "src/core/security/secure_transport_setup.h"
49#include "src/core/surface/channel.h"
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080050#include "src/core/transport/chttp2_transport.h"
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080051#include "src/core/tsi/transport_security_interface.h"
52
Craig Tilleracf0f072015-06-29 08:24:16 -070053typedef struct {
54 grpc_connector base;
55 gpr_refcount refs;
56
57 grpc_channel_security_connector *security_connector;
58
59 grpc_iomgr_closure *notify;
60 grpc_connect_in_args args;
61 grpc_connect_out_args *result;
62} connector;
63
64static void connector_ref(grpc_connector *con) {
65 connector *c = (connector *)con;
66 gpr_ref(&c->refs);
67}
68
69static void connector_unref(grpc_connector *con) {
70 connector *c = (connector *)con;
71 if (gpr_unref(&c->refs)) {
72 gpr_free(c);
73 }
74}
75
76static void on_secure_transport_setup_done(void *arg,
77 grpc_security_status status,
78 grpc_endpoint *secure_endpoint) {
79 connector *c = arg;
80 grpc_iomgr_closure *notify;
81 if (status != GRPC_SECURITY_OK) {
82 gpr_log(GPR_ERROR, "Secure transport setup failed with error %d.", status);
83 memset(c->result, 0, sizeof(*c->result));
84 notify = c->notify;
85 c->notify = NULL;
86 grpc_iomgr_add_callback(notify);
87 } else {
88 c->result->transport = grpc_create_chttp2_transport(
89 c->args.channel_args, secure_endpoint,
90 NULL, 0, c->args.metadata_context, 1);
91 }
92}
93
94static void connected(void *arg, grpc_endpoint *tcp) {
95 connector *c = arg;
96 grpc_iomgr_closure *notify;
97 if (tcp != NULL) {
98 grpc_setup_secure_transport(&c->security_connector->base, tcp,
99 on_secure_transport_setup_done, c);
100 } else {
101 memset(c->result, 0, sizeof(*c->result));
102 notify = c->notify;
103 c->notify = NULL;
104 grpc_iomgr_add_callback(notify);
105 }
106}
107
108static void connector_connect(
109 grpc_connector *con, const grpc_connect_in_args *args,
110 grpc_connect_out_args *result, grpc_iomgr_closure *notify) {
111 connector *c = (connector *)con;
112 GPR_ASSERT(c->notify == NULL);
113 GPR_ASSERT(notify->cb);
114 c->notify = notify;
115 c->args = *args;
116 c->result = result;
117 grpc_tcp_client_connect(connected, c, args->interested_parties, args->addr, args->addr_len, args->deadline);
118}
119
120static const grpc_connector_vtable connector_vtable = {connector_ref, connector_unref, connector_connect};
121
122typedef struct {
123 grpc_subchannel_factory base;
124 gpr_refcount refs;
125 grpc_mdctx *mdctx;
126 grpc_channel_security_connector *security_connector;
127} subchannel_factory;
128
129static void subchannel_factory_ref(grpc_subchannel_factory *scf) {
130 subchannel_factory *f = (subchannel_factory *)scf;
131 gpr_ref(&f->refs);
132}
133
134static void subchannel_factory_unref(grpc_subchannel_factory *scf) {
135 subchannel_factory *f = (subchannel_factory *)scf;
136 if (gpr_unref(&f->refs)) {
137 grpc_mdctx_unref(f->mdctx);
138 gpr_free(f);
139 }
140}
141
142static grpc_subchannel *subchannel_factory_create_subchannel(grpc_subchannel_factory *scf, grpc_subchannel_args *args) {
143 subchannel_factory *f = (subchannel_factory *)scf;
144 connector *c = gpr_malloc(sizeof(*c));
145 grpc_subchannel *s;
146 memset(c, 0, sizeof(*c));
147 c->base.vtable = &connector_vtable;
148 c->security_connector = f->security_connector;
149 gpr_ref_init(&c->refs, 1);
150 args->mdctx = f->mdctx;
151 s = grpc_subchannel_create(&c->base, args);
152 grpc_connector_unref(&c->base);
153 return s;
154}
155
156static const grpc_subchannel_factory_vtable subchannel_factory_vtable = {subchannel_factory_ref, subchannel_factory_unref, subchannel_factory_create_subchannel};
157
158#if 0
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800159typedef struct setup setup;
160
161/* A single setup request (started via initiate) */
162typedef struct {
163 grpc_client_setup_request *cs_request;
164 setup *setup;
165 /* Resolved addresses, or null if resolution not yet completed. */
166 grpc_resolved_addresses *resolved;
167 /* which address in resolved should we pick for the next connection attempt */
168 size_t resolved_index;
169} request;
170
171struct setup {
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700172 grpc_channel_security_connector *security_connector;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800173 const char *target;
174 grpc_transport_setup_callback setup_callback;
175 void *setup_user_data;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800176};
177
178static int maybe_try_next_resolved(request *r);
179
180static void done(request *r, int was_successful) {
181 grpc_client_setup_request_finish(r->cs_request, was_successful);
182 if (r->resolved) {
183 grpc_resolved_addresses_destroy(r->resolved);
184 }
185 gpr_free(r);
186}
187
188static void on_secure_transport_setup_done(void *rp,
189 grpc_security_status status,
190 grpc_endpoint *secure_endpoint) {
191 request *r = rp;
192 if (status != GRPC_SECURITY_OK) {
193 gpr_log(GPR_ERROR, "Secure transport setup failed with error %d.", status);
194 done(r, 0);
Craig Tiller8674cb12015-06-05 07:09:25 -0700195 } else if (grpc_client_setup_cb_begin(r->cs_request,
196 "on_secure_transport_setup_done")) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800197 grpc_create_chttp2_transport(
198 r->setup->setup_callback, r->setup->setup_user_data,
199 grpc_client_setup_get_channel_args(r->cs_request), secure_endpoint,
200 NULL, 0, grpc_client_setup_get_mdctx(r->cs_request), 1);
Craig Tillercb36e9f2015-05-29 11:20:21 -0700201 grpc_client_setup_cb_end(r->cs_request, "on_secure_transport_setup_done");
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800202 done(r, 1);
Craig Tiller43a2b172015-02-18 17:17:51 -0800203 } else {
204 done(r, 0);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800205 }
206}
207
208/* connection callback: tcp is either valid, or null on error */
209static void on_connect(void *rp, grpc_endpoint *tcp) {
210 request *r = rp;
211
Craig Tiller8674cb12015-06-05 07:09:25 -0700212 if (!grpc_client_setup_request_should_continue(r->cs_request,
213 "on_connect.secure")) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800214 if (tcp) {
215 grpc_endpoint_shutdown(tcp);
216 grpc_endpoint_destroy(tcp);
217 }
218 done(r, 0);
219 return;
220 }
221
222 if (!tcp) {
223 if (!maybe_try_next_resolved(r)) {
224 done(r, 0);
225 return;
226 } else {
227 return;
228 }
229 } else {
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700230 grpc_setup_secure_transport(&r->setup->security_connector->base, tcp,
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800231 on_secure_transport_setup_done, r);
232 }
233}
234
235/* attempt to connect to the next available resolved address */
236static int maybe_try_next_resolved(request *r) {
237 grpc_resolved_address *addr;
238 if (!r->resolved) return 0;
239 if (r->resolved_index == r->resolved->naddrs) return 0;
240 addr = &r->resolved->addrs[r->resolved_index++];
Craig Tiller8ed24e22015-05-08 09:59:51 -0700241 grpc_tcp_client_connect(
242 on_connect, r, grpc_client_setup_get_interested_parties(r->cs_request),
243 (struct sockaddr *)&addr->addr, addr->len,
244 grpc_client_setup_request_deadline(r->cs_request));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800245 return 1;
246}
247
248/* callback for when our target address has been resolved */
249static void on_resolved(void *rp, grpc_resolved_addresses *resolved) {
250 request *r = rp;
251
252 /* if we're not still the active request, abort */
Craig Tiller8674cb12015-06-05 07:09:25 -0700253 if (!grpc_client_setup_request_should_continue(r->cs_request,
254 "on_resolved.secure")) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800255 if (resolved) {
256 grpc_resolved_addresses_destroy(resolved);
257 }
258 done(r, 0);
259 return;
260 }
261
262 if (!resolved) {
263 done(r, 0);
264 return;
265 } else {
266 r->resolved = resolved;
267 r->resolved_index = 0;
268 if (!maybe_try_next_resolved(r)) {
269 done(r, 0);
270 }
271 }
272}
273
274static void initiate_setup(void *sp, grpc_client_setup_request *cs_request) {
275 request *r = gpr_malloc(sizeof(request));
276 r->setup = sp;
277 r->cs_request = cs_request;
278 r->resolved = NULL;
279 r->resolved_index = 0;
280 /* TODO(klempner): Make grpc_resolve_address respect deadline */
281 grpc_resolve_address(r->setup->target, "https", on_resolved, r);
282}
283
284static void done_setup(void *sp) {
285 setup *s = sp;
286 gpr_free((void *)s->target);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700287 grpc_security_connector_unref(&s->security_connector->base);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800288 gpr_free(s);
289}
290
291static grpc_transport_setup_result complete_setup(void *channel_stack,
292 grpc_transport *transport,
293 grpc_mdctx *mdctx) {
Julien Boeuf54b21922015-02-04 16:39:35 -0800294 static grpc_channel_filter const *extra_filters[] = {
Craig Tiller6e84aba2015-04-23 15:08:17 -0700295 &grpc_client_auth_filter, &grpc_http_client_filter};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800296 return grpc_client_channel_transport_setup_complete(
297 channel_stack, transport, extra_filters, GPR_ARRAY_SIZE(extra_filters),
298 mdctx);
299}
300
Craig Tilleracf0f072015-06-29 08:24:16 -0700301#endif
302
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800303/* Create a secure client channel:
304 Asynchronously: - resolve target
305 - connect to it (trying alternatives as presented)
306 - perform handshakes */
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700307grpc_channel *grpc_secure_channel_create(grpc_credentials *creds,
308 const char *target,
309 const grpc_channel_args *args) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800310 grpc_channel *channel;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700311 grpc_arg connector_arg;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800312 grpc_channel_args *args_copy;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700313 grpc_channel_args *new_args_from_connector;
Craig Tiller1a727fd2015-04-24 13:21:22 -0700314 grpc_channel_security_connector *connector;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700315 grpc_mdctx *mdctx;
Craig Tilleracf0f072015-06-29 08:24:16 -0700316 grpc_resolver *resolver;
317 subchannel_factory *f;
Julien Boeuf54b21922015-02-04 16:39:35 -0800318#define MAX_FILTERS 3
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800319 const grpc_channel_filter *filters[MAX_FILTERS];
320 int n = 0;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700321
322 if (grpc_find_security_connector_in_args(args) != NULL) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800323 gpr_log(GPR_ERROR, "Cannot set security context in channel args.");
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700324 return grpc_lame_client_channel_create();
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800325 }
326
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700327 if (grpc_credentials_create_security_connector(
328 creds, target, args, NULL, &connector, &new_args_from_connector) !=
329 GRPC_SECURITY_OK) {
330 return grpc_lame_client_channel_create();
331 }
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700332 mdctx = grpc_mdctx_create();
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700333
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700334 connector_arg = grpc_security_connector_to_arg(&connector->base);
335 args_copy = grpc_channel_args_copy_and_add(
336 new_args_from_connector != NULL ? new_args_from_connector : args,
337 &connector_arg);
Alistair Veitch9686dab2015-05-26 14:26:47 -0700338 /* TODO(census)
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800339 if (grpc_channel_args_is_census_enabled(args)) {
340 filters[n++] = &grpc_client_census_filter;
Alistair Veitch9686dab2015-05-26 14:26:47 -0700341 } */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800342 filters[n++] = &grpc_client_channel_filter;
343 GPR_ASSERT(n <= MAX_FILTERS);
Craig Tilleracf0f072015-06-29 08:24:16 -0700344
345 f = gpr_malloc(sizeof(*f));
346 f->base.vtable = &subchannel_factory_vtable;
347 gpr_ref_init(&f->refs, 1);
348 f->mdctx = mdctx;
349 f->security_connector = connector;
350 resolver = grpc_resolver_create(target, &f->base);
351 if (!resolver) {
352 return NULL;
353 }
354
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800355 channel = grpc_channel_create_from_filters(filters, n, args_copy, mdctx, 1);
Craig Tilleracf0f072015-06-29 08:24:16 -0700356 grpc_client_channel_set_resolver(grpc_channel_get_channel_stack(channel), resolver);
357 grpc_resolver_unref(resolver);
358
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800359 grpc_channel_args_destroy(args_copy);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700360 if (new_args_from_connector != NULL) {
361 grpc_channel_args_destroy(new_args_from_connector);
362 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800363
Craig Tilleracf0f072015-06-29 08:24:16 -0700364#if 0
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800365 s->target = gpr_strdup(target);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800366 s->setup_callback = complete_setup;
367 s->setup_user_data = grpc_channel_get_channel_stack(channel);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700368 s->security_connector = connector;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800369 grpc_client_setup_create_and_attach(grpc_channel_get_channel_stack(channel),
370 args, mdctx, initiate_setup, done_setup,
ctiller18b49ab2014-12-09 14:39:16 -0800371 s);
Craig Tilleracf0f072015-06-29 08:24:16 -0700372#endif
373
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800374 return channel;
Craig Tiller190d3602015-02-18 09:23:38 -0800375}