blob: 5c9d89c764683f0fc591afd643e95d42e4bc8129 [file] [log] [blame]
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001/*
2 *
Craig Tiller06059952015-02-18 08:34:56 -08003 * Copyright 2015, Google Inc.
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08004 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are
8 * met:
9 *
10 * * Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * * Redistributions in binary form must reproduce the above
13 * copyright notice, this list of conditions and the following disclaimer
14 * in the documentation and/or other materials provided with the
15 * distribution.
16 * * Neither the name of Google Inc. nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
24 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
30 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 *
32 */
33
34#include "src/core/security/credentials.h"
35
Julien Boeuff47a5cb2015-02-18 12:24:08 -080036#include <string.h>
37#include <stdio.h>
38
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -070039#include "src/core/channel/channel_args.h"
40#include "src/core/channel/http_client_filter.h"
Julien Boeuff47a5cb2015-02-18 12:24:08 -080041#include "src/core/json/json.h"
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080042#include "src/core/httpcli/httpcli.h"
ctiller18b49ab2014-12-09 14:39:16 -080043#include "src/core/iomgr/iomgr.h"
Masood Malekghassemi76c3d742015-08-19 18:22:53 -070044#include "src/core/surface/api_trace.h"
Craig Tiller485d7762015-01-23 12:54:05 -080045#include "src/core/support/string.h"
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -070046
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080047#include <grpc/support/alloc.h>
48#include <grpc/support/log.h>
Masood Malekghassemi701af602015-06-03 15:01:17 -070049#include <grpc/support/string_util.h>
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080050#include <grpc/support/sync.h>
Craig Tiller8664ca62015-09-09 12:30:59 -070051#include <grpc/support/thd.h>
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080052#include <grpc/support/time.h>
53
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080054/* -- Common. -- */
55
Craig Tillera82950e2015-09-22 12:33:20 -070056struct grpc_credentials_metadata_request {
Julien Boeuf441176d2015-10-09 21:14:07 -070057 grpc_call_credentials *creds;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080058 grpc_credentials_metadata_cb cb;
59 void *user_data;
Julien Boeufb037bb62015-07-08 14:58:14 -070060};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080061
62static grpc_credentials_metadata_request *
Julien Boeuf441176d2015-10-09 21:14:07 -070063grpc_credentials_metadata_request_create(grpc_call_credentials *creds,
Craig Tillera82950e2015-09-22 12:33:20 -070064 grpc_credentials_metadata_cb cb,
65 void *user_data) {
66 grpc_credentials_metadata_request *r =
67 gpr_malloc(sizeof(grpc_credentials_metadata_request));
Julien Boeuf441176d2015-10-09 21:14:07 -070068 r->creds = grpc_call_credentials_ref(creds);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080069 r->cb = cb;
70 r->user_data = user_data;
71 return r;
72}
73
Craig Tillera82950e2015-09-22 12:33:20 -070074static void grpc_credentials_metadata_request_destroy(
75 grpc_credentials_metadata_request *r) {
Julien Boeuf441176d2015-10-09 21:14:07 -070076 grpc_call_credentials_unref(r->creds);
Craig Tillera82950e2015-09-22 12:33:20 -070077 gpr_free(r);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080078}
79
Julien Boeuf441176d2015-10-09 21:14:07 -070080grpc_channel_credentials *grpc_channel_credentials_ref(
81 grpc_channel_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -070082 if (creds == NULL) return NULL;
83 gpr_ref(&creds->refcount);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080084 return creds;
85}
86
Julien Boeuf441176d2015-10-09 21:14:07 -070087void grpc_channel_credentials_unref(grpc_channel_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -070088 if (creds == NULL) return;
89 if (gpr_unref(&creds->refcount)) {
Julien Boeufb73cbc22015-10-20 21:52:54 -070090 if (creds->vtable->destruct != NULL) creds->vtable->destruct(creds);
Craig Tillera82950e2015-09-22 12:33:20 -070091 gpr_free(creds);
92 }
93}
94
Julien Boeuf441176d2015-10-09 21:14:07 -070095void grpc_channel_credentials_release(grpc_channel_credentials *creds) {
96 GRPC_API_TRACE("grpc_channel_credentials_release(creds=%p)", 1, (creds));
97 grpc_channel_credentials_unref(creds);
Craig Tillera82950e2015-09-22 12:33:20 -070098}
99
Julien Boeuf441176d2015-10-09 21:14:07 -0700100grpc_call_credentials *grpc_call_credentials_ref(grpc_call_credentials *creds) {
101 if (creds == NULL) return NULL;
102 gpr_ref(&creds->refcount);
103 return creds;
Craig Tillera82950e2015-09-22 12:33:20 -0700104}
105
Julien Boeuf441176d2015-10-09 21:14:07 -0700106void grpc_call_credentials_unref(grpc_call_credentials *creds) {
107 if (creds == NULL) return;
108 if (gpr_unref(&creds->refcount)) {
Julien Boeufb73cbc22015-10-20 21:52:54 -0700109 if (creds->vtable->destruct != NULL) creds->vtable->destruct(creds);
Julien Boeuf441176d2015-10-09 21:14:07 -0700110 gpr_free(creds);
111 }
112}
113
114void grpc_call_credentials_release(grpc_call_credentials *creds) {
115 GRPC_API_TRACE("grpc_call_credentials_release(creds=%p)", 1, (creds));
116 grpc_call_credentials_unref(creds);
Craig Tillera82950e2015-09-22 12:33:20 -0700117}
118
Julien Boeuf4e02e842015-10-09 22:49:42 -0700119void grpc_call_credentials_get_request_metadata(
Julien Boeuf441176d2015-10-09 21:14:07 -0700120 grpc_exec_ctx *exec_ctx, grpc_call_credentials *creds, grpc_pollset *pollset,
Craig Tillera82950e2015-09-22 12:33:20 -0700121 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
Julien Boeuf441176d2015-10-09 21:14:07 -0700122 if (creds == NULL || creds->vtable->get_request_metadata == NULL) {
Craig Tillera82950e2015-09-22 12:33:20 -0700123 if (cb != NULL) {
124 cb(exec_ctx, user_data, NULL, 0, GRPC_CREDENTIALS_OK);
125 }
nnoble0c475f02014-12-05 15:37:39 -0800126 return;
Craig Tillera82950e2015-09-22 12:33:20 -0700127 }
128 creds->vtable->get_request_metadata(exec_ctx, creds, pollset, service_url, cb,
129 user_data);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800130}
131
Julien Boeuf441176d2015-10-09 21:14:07 -0700132grpc_security_status grpc_channel_credentials_create_security_connector(
133 grpc_channel_credentials *channel_creds, const char *target,
134 const grpc_channel_args *args, grpc_channel_security_connector **sc,
135 grpc_channel_args **new_args) {
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700136 *new_args = NULL;
Julien Boeufb73cbc22015-10-20 21:52:54 -0700137 if (channel_creds == NULL) {
Craig Tillera82950e2015-09-22 12:33:20 -0700138 return GRPC_SECURITY_ERROR;
139 }
Julien Boeufb73cbc22015-10-20 21:52:54 -0700140 GPR_ASSERT(channel_creds->vtable->create_security_connector != NULL);
141 return channel_creds->vtable->create_security_connector(
142 channel_creds, NULL, target, args, sc, new_args);
Craig Tillerc4885ed2015-04-14 09:51:28 -0700143}
144
Craig Tillera82950e2015-09-22 12:33:20 -0700145grpc_server_credentials *grpc_server_credentials_ref(
146 grpc_server_credentials *creds) {
147 if (creds == NULL) return NULL;
148 gpr_ref(&creds->refcount);
Julien Boeuffe1478f2015-08-30 21:57:38 -0700149 return creds;
150}
151
Craig Tillera82950e2015-09-22 12:33:20 -0700152void grpc_server_credentials_unref(grpc_server_credentials *creds) {
153 if (creds == NULL) return;
154 if (gpr_unref(&creds->refcount)) {
Julien Boeufb73cbc22015-10-20 21:52:54 -0700155 if (creds->vtable->destruct != NULL) creds->vtable->destruct(creds);
Craig Tillera82950e2015-09-22 12:33:20 -0700156 if (creds->processor.destroy != NULL && creds->processor.state != NULL) {
157 creds->processor.destroy(creds->processor.state);
Julien Boeuffe1478f2015-08-30 21:57:38 -0700158 }
Craig Tillera82950e2015-09-22 12:33:20 -0700159 gpr_free(creds);
160 }
Julien Boeuffe1478f2015-08-30 21:57:38 -0700161}
162
Craig Tillera82950e2015-09-22 12:33:20 -0700163void grpc_server_credentials_release(grpc_server_credentials *creds) {
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700164 GRPC_API_TRACE("grpc_server_credentials_release(creds=%p)", 1, (creds));
Craig Tillera82950e2015-09-22 12:33:20 -0700165 grpc_server_credentials_unref(creds);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800166}
167
Craig Tillera82950e2015-09-22 12:33:20 -0700168grpc_security_status grpc_server_credentials_create_security_connector(
169 grpc_server_credentials *creds, grpc_security_connector **sc) {
170 if (creds == NULL || creds->vtable->create_security_connector == NULL) {
171 gpr_log(GPR_ERROR, "Server credentials cannot create security context.");
172 return GRPC_SECURITY_ERROR;
173 }
174 return creds->vtable->create_security_connector(creds, sc);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700175}
176
Craig Tillera82950e2015-09-22 12:33:20 -0700177void grpc_server_credentials_set_auth_metadata_processor(
178 grpc_server_credentials *creds, grpc_auth_metadata_processor processor) {
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700179 GRPC_API_TRACE(
180 "grpc_server_credentials_set_auth_metadata_processor("
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700181 "creds=%p, "
182 "processor=grpc_auth_metadata_processor { process: %lx, state: %p })",
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700183 3, (creds, (unsigned long)processor.process, processor.state));
Craig Tillera82950e2015-09-22 12:33:20 -0700184 if (creds == NULL) return;
185 if (creds->processor.destroy != NULL && creds->processor.state != NULL) {
186 creds->processor.destroy(creds->processor.state);
187 }
Julien Boeuf6bdc9b42015-07-19 21:56:02 -0700188 creds->processor = processor;
189}
190
Julien Boeuf9a529082015-10-08 13:12:14 -0700191static void server_credentials_pointer_arg_destroy(void *p) {
192 grpc_server_credentials_unref(p);
193}
194
195static void *server_credentials_pointer_arg_copy(void *p) {
196 return grpc_server_credentials_ref(p);
197}
198
199grpc_arg grpc_server_credentials_to_arg(grpc_server_credentials *p) {
200 grpc_arg arg;
201 memset(&arg, 0, sizeof(grpc_arg));
202 arg.type = GRPC_ARG_POINTER;
203 arg.key = GRPC_SERVER_CREDENTIALS_ARG;
204 arg.value.pointer.p = p;
205 arg.value.pointer.copy = server_credentials_pointer_arg_copy;
206 arg.value.pointer.destroy = server_credentials_pointer_arg_destroy;
207 return arg;
208}
209
210grpc_server_credentials *grpc_server_credentials_from_arg(
211 const grpc_arg *arg) {
212 if (strcmp(arg->key, GRPC_SERVER_CREDENTIALS_ARG) != 0) return NULL;
213 if (arg->type != GRPC_ARG_POINTER) {
214 gpr_log(GPR_ERROR, "Invalid type %d for arg %s", arg->type,
215 GRPC_SERVER_CREDENTIALS_ARG);
216 return NULL;
217 }
218 return arg->value.pointer.p;
219}
220
221grpc_server_credentials *grpc_find_server_credentials_in_args(
222 const grpc_channel_args *args) {
223 size_t i;
224 if (args == NULL) return NULL;
225 for (i = 0; i < args->num_args; i++) {
226 grpc_server_credentials *p =
227 grpc_server_credentials_from_arg(&args->args[i]);
228 if (p != NULL) return p;
229 }
230 return NULL;
231}
232
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800233/* -- Ssl credentials. -- */
234
Julien Boeuf441176d2015-10-09 21:14:07 -0700235static void ssl_destruct(grpc_channel_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -0700236 grpc_ssl_credentials *c = (grpc_ssl_credentials *)creds;
237 if (c->config.pem_root_certs != NULL) gpr_free(c->config.pem_root_certs);
238 if (c->config.pem_private_key != NULL) gpr_free(c->config.pem_private_key);
239 if (c->config.pem_cert_chain != NULL) gpr_free(c->config.pem_cert_chain);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800240}
241
Craig Tillera82950e2015-09-22 12:33:20 -0700242static void ssl_server_destruct(grpc_server_credentials *creds) {
243 grpc_ssl_server_credentials *c = (grpc_ssl_server_credentials *)creds;
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800244 size_t i;
Craig Tillera82950e2015-09-22 12:33:20 -0700245 for (i = 0; i < c->config.num_key_cert_pairs; i++) {
246 if (c->config.pem_private_keys[i] != NULL) {
247 gpr_free(c->config.pem_private_keys[i]);
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800248 }
Craig Tillera82950e2015-09-22 12:33:20 -0700249 if (c->config.pem_cert_chains[i] != NULL) {
250 gpr_free(c->config.pem_cert_chains[i]);
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800251 }
Craig Tillera82950e2015-09-22 12:33:20 -0700252 }
253 if (c->config.pem_private_keys != NULL) gpr_free(c->config.pem_private_keys);
254 if (c->config.pem_private_keys_sizes != NULL) {
255 gpr_free(c->config.pem_private_keys_sizes);
256 }
257 if (c->config.pem_cert_chains != NULL) gpr_free(c->config.pem_cert_chains);
258 if (c->config.pem_cert_chains_sizes != NULL) {
259 gpr_free(c->config.pem_cert_chains_sizes);
260 }
261 if (c->config.pem_root_certs != NULL) gpr_free(c->config.pem_root_certs);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800262}
263
Craig Tillera82950e2015-09-22 12:33:20 -0700264static grpc_security_status ssl_create_security_connector(
Julien Boeufb73cbc22015-10-20 21:52:54 -0700265 grpc_channel_credentials *creds, grpc_call_credentials *call_creds,
266 const char *target, const grpc_channel_args *args,
Craig Tillera82950e2015-09-22 12:33:20 -0700267 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
268 grpc_ssl_credentials *c = (grpc_ssl_credentials *)creds;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700269 grpc_security_status status = GRPC_SECURITY_OK;
270 size_t i = 0;
271 const char *overridden_target_name = NULL;
Craig Tillerb9d35962015-09-11 13:31:16 -0700272 grpc_arg new_arg;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700273
Craig Tillera82950e2015-09-22 12:33:20 -0700274 for (i = 0; args && i < args->num_args; i++) {
275 grpc_arg *arg = &args->args[i];
276 if (strcmp(arg->key, GRPC_SSL_TARGET_NAME_OVERRIDE_ARG) == 0 &&
277 arg->type == GRPC_ARG_STRING) {
278 overridden_target_name = arg->value.string;
279 break;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700280 }
Craig Tillera82950e2015-09-22 12:33:20 -0700281 }
282 status = grpc_ssl_channel_security_connector_create(
Julien Boeufb73cbc22015-10-20 21:52:54 -0700283 call_creds, &c->config, target, overridden_target_name, sc);
Craig Tillera82950e2015-09-22 12:33:20 -0700284 if (status != GRPC_SECURITY_OK) {
285 return status;
286 }
Craig Tillerb9d35962015-09-11 13:31:16 -0700287 new_arg.type = GRPC_ARG_STRING;
288 new_arg.key = GRPC_ARG_HTTP2_SCHEME;
289 new_arg.value.string = "https";
290 *new_args = grpc_channel_args_copy_and_add(args, &new_arg, 1);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700291 return status;
292}
293
Craig Tillera82950e2015-09-22 12:33:20 -0700294static grpc_security_status ssl_server_create_security_connector(
295 grpc_server_credentials *creds, grpc_security_connector **sc) {
296 grpc_ssl_server_credentials *c = (grpc_ssl_server_credentials *)creds;
297 return grpc_ssl_server_security_connector_create(&c->config, sc);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700298}
299
Julien Boeuf441176d2015-10-09 21:14:07 -0700300static grpc_channel_credentials_vtable ssl_vtable = {
301 ssl_destruct, ssl_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800302
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700303static grpc_server_credentials_vtable ssl_server_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700304 ssl_server_destruct, ssl_server_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800305
Craig Tillera82950e2015-09-22 12:33:20 -0700306static void ssl_copy_key_material(const char *input, unsigned char **output,
307 size_t *output_size) {
308 *output_size = strlen(input);
309 *output = gpr_malloc(*output_size);
310 memcpy(*output, input, *output_size);
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800311}
312
Craig Tillera82950e2015-09-22 12:33:20 -0700313static void ssl_build_config(const char *pem_root_certs,
314 grpc_ssl_pem_key_cert_pair *pem_key_cert_pair,
315 grpc_ssl_config *config) {
316 if (pem_root_certs != NULL) {
317 ssl_copy_key_material(pem_root_certs, &config->pem_root_certs,
318 &config->pem_root_certs_size);
319 }
320 if (pem_key_cert_pair != NULL) {
321 GPR_ASSERT(pem_key_cert_pair->private_key != NULL);
322 GPR_ASSERT(pem_key_cert_pair->cert_chain != NULL);
323 ssl_copy_key_material(pem_key_cert_pair->private_key,
324 &config->pem_private_key,
325 &config->pem_private_key_size);
326 ssl_copy_key_material(pem_key_cert_pair->cert_chain,
327 &config->pem_cert_chain,
328 &config->pem_cert_chain_size);
329 }
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800330}
331
Craig Tillera82950e2015-09-22 12:33:20 -0700332static void ssl_build_server_config(
333 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs,
334 size_t num_key_cert_pairs, int force_client_auth,
335 grpc_ssl_server_config *config) {
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800336 size_t i;
Julien Boeuf5029b302015-07-21 23:02:16 -0700337 config->force_client_auth = force_client_auth;
Craig Tillera82950e2015-09-22 12:33:20 -0700338 if (pem_root_certs != NULL) {
339 ssl_copy_key_material(pem_root_certs, &config->pem_root_certs,
340 &config->pem_root_certs_size);
341 }
342 if (num_key_cert_pairs > 0) {
343 GPR_ASSERT(pem_key_cert_pairs != NULL);
344 config->pem_private_keys =
345 gpr_malloc(num_key_cert_pairs * sizeof(unsigned char *));
346 config->pem_cert_chains =
347 gpr_malloc(num_key_cert_pairs * sizeof(unsigned char *));
348 config->pem_private_keys_sizes =
349 gpr_malloc(num_key_cert_pairs * sizeof(size_t));
350 config->pem_cert_chains_sizes =
351 gpr_malloc(num_key_cert_pairs * sizeof(size_t));
352 }
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800353 config->num_key_cert_pairs = num_key_cert_pairs;
Craig Tillera82950e2015-09-22 12:33:20 -0700354 for (i = 0; i < num_key_cert_pairs; i++) {
355 GPR_ASSERT(pem_key_cert_pairs[i].private_key != NULL);
356 GPR_ASSERT(pem_key_cert_pairs[i].cert_chain != NULL);
357 ssl_copy_key_material(pem_key_cert_pairs[i].private_key,
358 &config->pem_private_keys[i],
359 &config->pem_private_keys_sizes[i]);
360 ssl_copy_key_material(pem_key_cert_pairs[i].cert_chain,
361 &config->pem_cert_chains[i],
362 &config->pem_cert_chains_sizes[i]);
363 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800364}
365
Julien Boeuf441176d2015-10-09 21:14:07 -0700366grpc_channel_credentials *grpc_ssl_credentials_create(
Craig Tillera82950e2015-09-22 12:33:20 -0700367 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pair,
368 void *reserved) {
369 grpc_ssl_credentials *c = gpr_malloc(sizeof(grpc_ssl_credentials));
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700370 GRPC_API_TRACE(
371 "grpc_ssl_credentials_create(pem_root_certs=%s, "
372 "pem_key_cert_pair=%p, "
373 "reserved=%p)",
374 3, (pem_root_certs, pem_key_cert_pair, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700375 GPR_ASSERT(reserved == NULL);
376 memset(c, 0, sizeof(grpc_ssl_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -0700377 c->base.type = GRPC_CHANNEL_CREDENTIALS_TYPE_SSL;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800378 c->base.vtable = &ssl_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700379 gpr_ref_init(&c->base.refcount, 1);
380 ssl_build_config(pem_root_certs, pem_key_cert_pair, &c->config);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800381 return &c->base;
382}
383
Craig Tillera82950e2015-09-22 12:33:20 -0700384grpc_server_credentials *grpc_ssl_server_credentials_create(
385 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs,
386 size_t num_key_cert_pairs, int force_client_auth, void *reserved) {
387 grpc_ssl_server_credentials *c =
388 gpr_malloc(sizeof(grpc_ssl_server_credentials));
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700389 GRPC_API_TRACE(
390 "grpc_ssl_server_credentials_create("
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700391 "pem_root_certs=%s, pem_key_cert_pairs=%p, num_key_cert_pairs=%lu, "
392 "force_client_auth=%d, reserved=%p)",
393 5, (pem_root_certs, pem_key_cert_pairs, (unsigned long)num_key_cert_pairs,
394 force_client_auth, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700395 GPR_ASSERT(reserved == NULL);
396 memset(c, 0, sizeof(grpc_ssl_server_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -0700397 c->base.type = GRPC_CHANNEL_CREDENTIALS_TYPE_SSL;
Craig Tillera82950e2015-09-22 12:33:20 -0700398 gpr_ref_init(&c->base.refcount, 1);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800399 c->base.vtable = &ssl_server_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700400 ssl_build_server_config(pem_root_certs, pem_key_cert_pairs,
401 num_key_cert_pairs, force_client_auth, &c->config);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800402 return &c->base;
403}
404
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800405/* -- Jwt credentials -- */
406
Craig Tillera82950e2015-09-22 12:33:20 -0700407static void jwt_reset_cache(grpc_service_account_jwt_access_credentials *c) {
408 if (c->cached.jwt_md != NULL) {
409 grpc_credentials_md_store_unref(c->cached.jwt_md);
410 c->cached.jwt_md = NULL;
411 }
412 if (c->cached.service_url != NULL) {
413 gpr_free(c->cached.service_url);
414 c->cached.service_url = NULL;
415 }
416 c->cached.jwt_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800417}
418
Julien Boeuf441176d2015-10-09 21:14:07 -0700419static void jwt_destruct(grpc_call_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -0700420 grpc_service_account_jwt_access_credentials *c =
421 (grpc_service_account_jwt_access_credentials *)creds;
422 grpc_auth_json_key_destruct(&c->key);
423 jwt_reset_cache(c);
424 gpr_mu_destroy(&c->cache_mu);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800425}
426
Craig Tillera82950e2015-09-22 12:33:20 -0700427static void jwt_get_request_metadata(
Julien Boeuf441176d2015-10-09 21:14:07 -0700428 grpc_exec_ctx *exec_ctx, grpc_call_credentials *creds, grpc_pollset *pollset,
Craig Tillera82950e2015-09-22 12:33:20 -0700429 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
430 grpc_service_account_jwt_access_credentials *c =
431 (grpc_service_account_jwt_access_credentials *)creds;
432 gpr_timespec refresh_threshold = gpr_time_from_seconds(
433 GRPC_SECURE_TOKEN_REFRESH_THRESHOLD_SECS, GPR_TIMESPAN);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800434
435 /* See if we can return a cached jwt. */
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700436 grpc_credentials_md_store *jwt_md = NULL;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800437 {
Craig Tillera82950e2015-09-22 12:33:20 -0700438 gpr_mu_lock(&c->cache_mu);
439 if (c->cached.service_url != NULL &&
440 strcmp(c->cached.service_url, service_url) == 0 &&
441 c->cached.jwt_md != NULL &&
442 (gpr_time_cmp(gpr_time_sub(c->cached.jwt_expiration,
443 gpr_now(GPR_CLOCK_REALTIME)),
444 refresh_threshold) > 0)) {
445 jwt_md = grpc_credentials_md_store_ref(c->cached.jwt_md);
446 }
447 gpr_mu_unlock(&c->cache_mu);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800448 }
449
Craig Tillera82950e2015-09-22 12:33:20 -0700450 if (jwt_md == NULL) {
451 char *jwt = NULL;
452 /* Generate a new jwt. */
453 gpr_mu_lock(&c->cache_mu);
454 jwt_reset_cache(c);
455 jwt = grpc_jwt_encode_and_sign(&c->key, service_url, c->jwt_lifetime, NULL);
456 if (jwt != NULL) {
457 char *md_value;
458 gpr_asprintf(&md_value, "Bearer %s", jwt);
459 gpr_free(jwt);
460 c->cached.jwt_expiration =
461 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), c->jwt_lifetime);
462 c->cached.service_url = gpr_strdup(service_url);
463 c->cached.jwt_md = grpc_credentials_md_store_create(1);
464 grpc_credentials_md_store_add_cstrings(
465 c->cached.jwt_md, GRPC_AUTHORIZATION_METADATA_KEY, md_value);
466 gpr_free(md_value);
467 jwt_md = grpc_credentials_md_store_ref(c->cached.jwt_md);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800468 }
Craig Tillera82950e2015-09-22 12:33:20 -0700469 gpr_mu_unlock(&c->cache_mu);
470 }
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800471
Craig Tillera82950e2015-09-22 12:33:20 -0700472 if (jwt_md != NULL) {
473 cb(exec_ctx, user_data, jwt_md->entries, jwt_md->num_entries,
474 GRPC_CREDENTIALS_OK);
475 grpc_credentials_md_store_unref(jwt_md);
476 } else {
477 cb(exec_ctx, user_data, NULL, 0, GRPC_CREDENTIALS_ERROR);
478 }
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800479}
480
Julien Boeuf441176d2015-10-09 21:14:07 -0700481static grpc_call_credentials_vtable jwt_vtable = {jwt_destruct,
482 jwt_get_request_metadata};
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800483
Julien Boeuf441176d2015-10-09 21:14:07 -0700484grpc_call_credentials *
Craig Tillera82950e2015-09-22 12:33:20 -0700485grpc_service_account_jwt_access_credentials_create_from_auth_json_key(
486 grpc_auth_json_key key, gpr_timespec token_lifetime) {
Julien Boeuffe4c3f42015-07-22 16:20:13 -0700487 grpc_service_account_jwt_access_credentials *c;
Craig Tillera82950e2015-09-22 12:33:20 -0700488 if (!grpc_auth_json_key_is_valid(&key)) {
489 gpr_log(GPR_ERROR, "Invalid input for jwt credentials creation");
490 return NULL;
491 }
492 c = gpr_malloc(sizeof(grpc_service_account_jwt_access_credentials));
493 memset(c, 0, sizeof(grpc_service_account_jwt_access_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -0700494 c->base.type = GRPC_CALL_CREDENTIALS_TYPE_JWT;
Craig Tillera82950e2015-09-22 12:33:20 -0700495 gpr_ref_init(&c->base.refcount, 1);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800496 c->base.vtable = &jwt_vtable;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800497 c->key = key;
498 c->jwt_lifetime = token_lifetime;
Craig Tillera82950e2015-09-22 12:33:20 -0700499 gpr_mu_init(&c->cache_mu);
500 jwt_reset_cache(c);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800501 return &c->base;
502}
503
Julien Boeuf441176d2015-10-09 21:14:07 -0700504grpc_call_credentials *grpc_service_account_jwt_access_credentials_create(
Craig Tillera82950e2015-09-22 12:33:20 -0700505 const char *json_key, gpr_timespec token_lifetime, void *reserved) {
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700506 GRPC_API_TRACE(
507 "grpc_service_account_jwt_access_credentials_create("
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700508 "json_key=%s, "
509 "token_lifetime="
510 "gpr_timespec { tv_sec: %ld, tv_nsec: %d, clock_type: %d }, "
511 "reserved=%p)",
512 5, (json_key, (long)token_lifetime.tv_sec, token_lifetime.tv_nsec,
513 (int)token_lifetime.clock_type, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700514 GPR_ASSERT(reserved == NULL);
515 return grpc_service_account_jwt_access_credentials_create_from_auth_json_key(
516 grpc_auth_json_key_create_from_string(json_key), token_lifetime);
Julien Boeuf54006062015-07-07 19:13:04 -0700517}
518
jboeuf1a809c02014-12-19 15:44:30 -0800519/* -- Oauth2TokenFetcher credentials -- */
520
Julien Boeuf441176d2015-10-09 21:14:07 -0700521static void oauth2_token_fetcher_destruct(grpc_call_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -0700522 grpc_oauth2_token_fetcher_credentials *c =
523 (grpc_oauth2_token_fetcher_credentials *)creds;
524 grpc_credentials_md_store_unref(c->access_token_md);
525 gpr_mu_destroy(&c->mu);
526 grpc_httpcli_context_destroy(&c->httpcli_context);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800527}
528
jboeuf1a809c02014-12-19 15:44:30 -0800529grpc_credentials_status
Craig Tillera82950e2015-09-22 12:33:20 -0700530grpc_oauth2_token_fetcher_credentials_parse_server_response(
531 const grpc_httpcli_response *response, grpc_credentials_md_store **token_md,
532 gpr_timespec *token_lifetime) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800533 char *null_terminated_body = NULL;
534 char *new_access_token = NULL;
535 grpc_credentials_status status = GRPC_CREDENTIALS_OK;
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800536 grpc_json *json = NULL;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800537
Craig Tillera82950e2015-09-22 12:33:20 -0700538 if (response == NULL) {
539 gpr_log(GPR_ERROR, "Received NULL response.");
540 status = GRPC_CREDENTIALS_ERROR;
541 goto end;
542 }
543
544 if (response->body_length > 0) {
545 null_terminated_body = gpr_malloc(response->body_length + 1);
546 null_terminated_body[response->body_length] = '\0';
547 memcpy(null_terminated_body, response->body, response->body_length);
548 }
549
550 if (response->status != 200) {
551 gpr_log(GPR_ERROR, "Call to http server ended with error %d [%s].",
552 response->status,
553 null_terminated_body != NULL ? null_terminated_body : "");
554 status = GRPC_CREDENTIALS_ERROR;
555 goto end;
556 } else {
557 grpc_json *access_token = NULL;
558 grpc_json *token_type = NULL;
559 grpc_json *expires_in = NULL;
560 grpc_json *ptr;
561 json = grpc_json_parse_string(null_terminated_body);
562 if (json == NULL) {
563 gpr_log(GPR_ERROR, "Could not parse JSON from %s", null_terminated_body);
Craig Tiller45724b32015-09-22 10:42:19 -0700564 status = GRPC_CREDENTIALS_ERROR;
565 goto end;
566 }
Craig Tillera82950e2015-09-22 12:33:20 -0700567 if (json->type != GRPC_JSON_OBJECT) {
568 gpr_log(GPR_ERROR, "Response should be a JSON object");
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800569 status = GRPC_CREDENTIALS_ERROR;
570 goto end;
571 }
Craig Tillera82950e2015-09-22 12:33:20 -0700572 for (ptr = json->child; ptr; ptr = ptr->next) {
573 if (strcmp(ptr->key, "access_token") == 0) {
574 access_token = ptr;
575 } else if (strcmp(ptr->key, "token_type") == 0) {
576 token_type = ptr;
577 } else if (strcmp(ptr->key, "expires_in") == 0) {
578 expires_in = ptr;
579 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800580 }
Craig Tillera82950e2015-09-22 12:33:20 -0700581 if (access_token == NULL || access_token->type != GRPC_JSON_STRING) {
582 gpr_log(GPR_ERROR, "Missing or invalid access_token in JSON.");
583 status = GRPC_CREDENTIALS_ERROR;
584 goto end;
585 }
586 if (token_type == NULL || token_type->type != GRPC_JSON_STRING) {
587 gpr_log(GPR_ERROR, "Missing or invalid token_type in JSON.");
588 status = GRPC_CREDENTIALS_ERROR;
589 goto end;
590 }
591 if (expires_in == NULL || expires_in->type != GRPC_JSON_NUMBER) {
592 gpr_log(GPR_ERROR, "Missing or invalid expires_in in JSON.");
593 status = GRPC_CREDENTIALS_ERROR;
594 goto end;
595 }
596 gpr_asprintf(&new_access_token, "%s %s", token_type->value,
597 access_token->value);
598 token_lifetime->tv_sec = strtol(expires_in->value, NULL, 10);
599 token_lifetime->tv_nsec = 0;
600 token_lifetime->clock_type = GPR_TIMESPAN;
601 if (*token_md != NULL) grpc_credentials_md_store_unref(*token_md);
602 *token_md = grpc_credentials_md_store_create(1);
603 grpc_credentials_md_store_add_cstrings(
604 *token_md, GRPC_AUTHORIZATION_METADATA_KEY, new_access_token);
605 status = GRPC_CREDENTIALS_OK;
606 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800607
608end:
Craig Tillera82950e2015-09-22 12:33:20 -0700609 if (status != GRPC_CREDENTIALS_OK && (*token_md != NULL)) {
610 grpc_credentials_md_store_unref(*token_md);
611 *token_md = NULL;
612 }
613 if (null_terminated_body != NULL) gpr_free(null_terminated_body);
614 if (new_access_token != NULL) gpr_free(new_access_token);
615 if (json != NULL) grpc_json_destroy(json);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800616 return status;
617}
618
Craig Tillera82950e2015-09-22 12:33:20 -0700619static void on_oauth2_token_fetcher_http_response(
620 grpc_exec_ctx *exec_ctx, void *user_data,
621 const grpc_httpcli_response *response) {
622 grpc_credentials_metadata_request *r =
623 (grpc_credentials_metadata_request *)user_data;
624 grpc_oauth2_token_fetcher_credentials *c =
625 (grpc_oauth2_token_fetcher_credentials *)r->creds;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800626 gpr_timespec token_lifetime;
627 grpc_credentials_status status;
628
Craig Tillera82950e2015-09-22 12:33:20 -0700629 gpr_mu_lock(&c->mu);
630 status = grpc_oauth2_token_fetcher_credentials_parse_server_response(
631 response, &c->access_token_md, &token_lifetime);
632 if (status == GRPC_CREDENTIALS_OK) {
633 c->token_expiration =
634 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), token_lifetime);
635 r->cb(exec_ctx, r->user_data, c->access_token_md->entries,
636 c->access_token_md->num_entries, status);
637 } else {
638 c->token_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
639 r->cb(exec_ctx, r->user_data, NULL, 0, status);
640 }
641 gpr_mu_unlock(&c->mu);
642 grpc_credentials_metadata_request_destroy(r);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800643}
644
Craig Tillera82950e2015-09-22 12:33:20 -0700645static void oauth2_token_fetcher_get_request_metadata(
Julien Boeuf441176d2015-10-09 21:14:07 -0700646 grpc_exec_ctx *exec_ctx, grpc_call_credentials *creds,
647 grpc_pollset *pollset, const char *service_url,
648 grpc_credentials_metadata_cb cb, void *user_data) {
Craig Tillera82950e2015-09-22 12:33:20 -0700649 grpc_oauth2_token_fetcher_credentials *c =
650 (grpc_oauth2_token_fetcher_credentials *)creds;
651 gpr_timespec refresh_threshold = gpr_time_from_seconds(
652 GRPC_SECURE_TOKEN_REFRESH_THRESHOLD_SECS, GPR_TIMESPAN);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700653 grpc_credentials_md_store *cached_access_token_md = NULL;
jboeuf1a809c02014-12-19 15:44:30 -0800654 {
Craig Tillera82950e2015-09-22 12:33:20 -0700655 gpr_mu_lock(&c->mu);
656 if (c->access_token_md != NULL &&
657 (gpr_time_cmp(
658 gpr_time_sub(c->token_expiration, gpr_now(GPR_CLOCK_REALTIME)),
659 refresh_threshold) > 0)) {
660 cached_access_token_md =
661 grpc_credentials_md_store_ref(c->access_token_md);
662 }
663 gpr_mu_unlock(&c->mu);
Craig Tiller45724b32015-09-22 10:42:19 -0700664 }
Craig Tillera82950e2015-09-22 12:33:20 -0700665 if (cached_access_token_md != NULL) {
666 cb(exec_ctx, user_data, cached_access_token_md->entries,
667 cached_access_token_md->num_entries, GRPC_CREDENTIALS_OK);
668 grpc_credentials_md_store_unref(cached_access_token_md);
669 } else {
670 c->fetch_func(
671 exec_ctx,
672 grpc_credentials_metadata_request_create(creds, cb, user_data),
673 &c->httpcli_context, pollset, on_oauth2_token_fetcher_http_response,
674 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), refresh_threshold));
675 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800676}
677
Craig Tillera82950e2015-09-22 12:33:20 -0700678static void init_oauth2_token_fetcher(grpc_oauth2_token_fetcher_credentials *c,
679 grpc_fetch_oauth2_func fetch_func) {
680 memset(c, 0, sizeof(grpc_oauth2_token_fetcher_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -0700681 c->base.type = GRPC_CALL_CREDENTIALS_TYPE_OAUTH2;
Craig Tillera82950e2015-09-22 12:33:20 -0700682 gpr_ref_init(&c->base.refcount, 1);
683 gpr_mu_init(&c->mu);
684 c->token_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
jboeuf1a809c02014-12-19 15:44:30 -0800685 c->fetch_func = fetch_func;
Craig Tillera82950e2015-09-22 12:33:20 -0700686 grpc_httpcli_context_init(&c->httpcli_context);
jboeuf1a809c02014-12-19 15:44:30 -0800687}
688
Julien Boeuf510a9202015-08-25 21:51:07 -0700689/* -- GoogleComputeEngine credentials. -- */
jboeuf1a809c02014-12-19 15:44:30 -0800690
Julien Boeuf441176d2015-10-09 21:14:07 -0700691static grpc_call_credentials_vtable compute_engine_vtable = {
692 oauth2_token_fetcher_destruct, oauth2_token_fetcher_get_request_metadata};
jboeuf1a809c02014-12-19 15:44:30 -0800693
Craig Tillera82950e2015-09-22 12:33:20 -0700694static void compute_engine_fetch_oauth2(
695 grpc_exec_ctx *exec_ctx, grpc_credentials_metadata_request *metadata_req,
696 grpc_httpcli_context *httpcli_context, grpc_pollset *pollset,
697 grpc_httpcli_response_cb response_cb, gpr_timespec deadline) {
698 grpc_httpcli_header header = {"Metadata-Flavor", "Google"};
jboeuf1a809c02014-12-19 15:44:30 -0800699 grpc_httpcli_request request;
Craig Tillera82950e2015-09-22 12:33:20 -0700700 memset(&request, 0, sizeof(grpc_httpcli_request));
jboeuf1a809c02014-12-19 15:44:30 -0800701 request.host = GRPC_COMPUTE_ENGINE_METADATA_HOST;
702 request.path = GRPC_COMPUTE_ENGINE_METADATA_TOKEN_PATH;
703 request.hdr_count = 1;
704 request.hdrs = &header;
Craig Tillera82950e2015-09-22 12:33:20 -0700705 grpc_httpcli_get(exec_ctx, httpcli_context, pollset, &request, deadline,
706 response_cb, metadata_req);
jboeuf1a809c02014-12-19 15:44:30 -0800707}
708
Julien Boeuf441176d2015-10-09 21:14:07 -0700709grpc_call_credentials *grpc_google_compute_engine_credentials_create(
Craig Tillera82950e2015-09-22 12:33:20 -0700710 void *reserved) {
711 grpc_oauth2_token_fetcher_credentials *c =
712 gpr_malloc(sizeof(grpc_oauth2_token_fetcher_credentials));
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700713 GRPC_API_TRACE("grpc_compute_engine_credentials_create(reserved=%p)", 1,
714 (reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700715 GPR_ASSERT(reserved == NULL);
716 init_oauth2_token_fetcher(c, compute_engine_fetch_oauth2);
jboeuf1a809c02014-12-19 15:44:30 -0800717 c->base.vtable = &compute_engine_vtable;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800718 return &c->base;
719}
720
Julien Boeuf510a9202015-08-25 21:51:07 -0700721/* -- GoogleRefreshToken credentials. -- */
Julien Boeuf9835cf02015-03-09 16:56:44 -0700722
Julien Boeuf441176d2015-10-09 21:14:07 -0700723static void refresh_token_destruct(grpc_call_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -0700724 grpc_google_refresh_token_credentials *c =
725 (grpc_google_refresh_token_credentials *)creds;
726 grpc_auth_refresh_token_destruct(&c->refresh_token);
727 oauth2_token_fetcher_destruct(&c->base.base);
Julien Boeuf9835cf02015-03-09 16:56:44 -0700728}
729
Julien Boeuf441176d2015-10-09 21:14:07 -0700730static grpc_call_credentials_vtable refresh_token_vtable = {
731 refresh_token_destruct, oauth2_token_fetcher_get_request_metadata};
Julien Boeuf9835cf02015-03-09 16:56:44 -0700732
Craig Tillera82950e2015-09-22 12:33:20 -0700733static void refresh_token_fetch_oauth2(
734 grpc_exec_ctx *exec_ctx, grpc_credentials_metadata_request *metadata_req,
735 grpc_httpcli_context *httpcli_context, grpc_pollset *pollset,
736 grpc_httpcli_response_cb response_cb, gpr_timespec deadline) {
737 grpc_google_refresh_token_credentials *c =
738 (grpc_google_refresh_token_credentials *)metadata_req->creds;
739 grpc_httpcli_header header = {"Content-Type",
740 "application/x-www-form-urlencoded"};
Julien Boeuf9835cf02015-03-09 16:56:44 -0700741 grpc_httpcli_request request;
742 char *body = NULL;
Craig Tillera82950e2015-09-22 12:33:20 -0700743 gpr_asprintf(&body, GRPC_REFRESH_TOKEN_POST_BODY_FORMAT_STRING,
744 c->refresh_token.client_id, c->refresh_token.client_secret,
745 c->refresh_token.refresh_token);
746 memset(&request, 0, sizeof(grpc_httpcli_request));
Julien Boeuf9835cf02015-03-09 16:56:44 -0700747 request.host = GRPC_GOOGLE_OAUTH2_SERVICE_HOST;
748 request.path = GRPC_GOOGLE_OAUTH2_SERVICE_TOKEN_PATH;
749 request.hdr_count = 1;
750 request.hdrs = &header;
Craig Tillerf53d9c82015-08-04 14:19:43 -0700751 request.handshaker = &grpc_httpcli_ssl;
Craig Tillera82950e2015-09-22 12:33:20 -0700752 grpc_httpcli_post(exec_ctx, httpcli_context, pollset, &request, body,
753 strlen(body), deadline, response_cb, metadata_req);
754 gpr_free(body);
Julien Boeuf9835cf02015-03-09 16:56:44 -0700755}
756
Julien Boeuf441176d2015-10-09 21:14:07 -0700757grpc_call_credentials *
758grpc_refresh_token_credentials_create_from_auth_refresh_token(
Craig Tillera82950e2015-09-22 12:33:20 -0700759 grpc_auth_refresh_token refresh_token) {
Julien Boeuf510a9202015-08-25 21:51:07 -0700760 grpc_google_refresh_token_credentials *c;
Craig Tillera82950e2015-09-22 12:33:20 -0700761 if (!grpc_auth_refresh_token_is_valid(&refresh_token)) {
762 gpr_log(GPR_ERROR, "Invalid input for refresh token credentials creation");
763 return NULL;
764 }
765 c = gpr_malloc(sizeof(grpc_google_refresh_token_credentials));
766 memset(c, 0, sizeof(grpc_google_refresh_token_credentials));
767 init_oauth2_token_fetcher(&c->base, refresh_token_fetch_oauth2);
Julien Boeuf9835cf02015-03-09 16:56:44 -0700768 c->base.base.vtable = &refresh_token_vtable;
769 c->refresh_token = refresh_token;
770 return &c->base.base;
771}
772
Julien Boeuf441176d2015-10-09 21:14:07 -0700773grpc_call_credentials *grpc_google_refresh_token_credentials_create(
Craig Tillera82950e2015-09-22 12:33:20 -0700774 const char *json_refresh_token, void *reserved) {
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700775 GRPC_API_TRACE(
776 "grpc_refresh_token_credentials_create(json_refresh_token=%s, "
777 "reserved=%p)",
778 2, (json_refresh_token, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700779 GPR_ASSERT(reserved == NULL);
780 return grpc_refresh_token_credentials_create_from_auth_refresh_token(
781 grpc_auth_refresh_token_create_from_string(json_refresh_token));
Julien Boeuf54006062015-07-07 19:13:04 -0700782}
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800783
Julien Boeufea456fc2015-07-07 15:23:30 -0700784/* -- Metadata-only credentials. -- */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800785
Julien Boeuf441176d2015-10-09 21:14:07 -0700786static void md_only_test_destruct(grpc_call_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -0700787 grpc_md_only_test_credentials *c = (grpc_md_only_test_credentials *)creds;
788 grpc_credentials_md_store_unref(c->md_store);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800789}
790
Craig Tillera82950e2015-09-22 12:33:20 -0700791static void on_simulated_token_fetch_done(void *user_data) {
792 grpc_credentials_metadata_request *r =
793 (grpc_credentials_metadata_request *)user_data;
794 grpc_md_only_test_credentials *c = (grpc_md_only_test_credentials *)r->creds;
Craig Tillerf5768a62015-09-22 10:54:34 -0700795 grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
Craig Tillera82950e2015-09-22 12:33:20 -0700796 r->cb(&exec_ctx, r->user_data, c->md_store->entries, c->md_store->num_entries,
797 GRPC_CREDENTIALS_OK);
798 grpc_credentials_metadata_request_destroy(r);
799 grpc_exec_ctx_finish(&exec_ctx);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800800}
801
Craig Tillera82950e2015-09-22 12:33:20 -0700802static void md_only_test_get_request_metadata(
Julien Boeuf441176d2015-10-09 21:14:07 -0700803 grpc_exec_ctx *exec_ctx, grpc_call_credentials *creds, grpc_pollset *pollset,
Craig Tillera82950e2015-09-22 12:33:20 -0700804 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
805 grpc_md_only_test_credentials *c = (grpc_md_only_test_credentials *)creds;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800806
Craig Tillera82950e2015-09-22 12:33:20 -0700807 if (c->is_async) {
808 gpr_thd_id thd_id;
809 grpc_credentials_metadata_request *cb_arg =
810 grpc_credentials_metadata_request_create(creds, cb, user_data);
811 gpr_thd_new(&thd_id, on_simulated_token_fetch_done, cb_arg, NULL);
812 } else {
813 cb(exec_ctx, user_data, c->md_store->entries, 1, GRPC_CREDENTIALS_OK);
814 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800815}
816
Julien Boeuf441176d2015-10-09 21:14:07 -0700817static grpc_call_credentials_vtable md_only_test_vtable = {
818 md_only_test_destruct, md_only_test_get_request_metadata};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800819
Julien Boeuf441176d2015-10-09 21:14:07 -0700820grpc_call_credentials *grpc_md_only_test_credentials_create(
821 const char *md_key, const char *md_value, int is_async) {
Craig Tillera82950e2015-09-22 12:33:20 -0700822 grpc_md_only_test_credentials *c =
823 gpr_malloc(sizeof(grpc_md_only_test_credentials));
824 memset(c, 0, sizeof(grpc_md_only_test_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -0700825 c->base.type = GRPC_CALL_CREDENTIALS_TYPE_OAUTH2;
Julien Boeufea456fc2015-07-07 15:23:30 -0700826 c->base.vtable = &md_only_test_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700827 gpr_ref_init(&c->base.refcount, 1);
828 c->md_store = grpc_credentials_md_store_create(1);
829 grpc_credentials_md_store_add_cstrings(c->md_store, md_key, md_value);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800830 c->is_async = is_async;
831 return &c->base;
832}
833
Julien Boeuf2805be12015-07-01 02:47:18 -0700834/* -- Oauth2 Access Token credentials. -- */
835
Julien Boeuf441176d2015-10-09 21:14:07 -0700836static void access_token_destruct(grpc_call_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -0700837 grpc_access_token_credentials *c = (grpc_access_token_credentials *)creds;
838 grpc_credentials_md_store_unref(c->access_token_md);
Julien Boeuf2805be12015-07-01 02:47:18 -0700839}
840
Craig Tillera82950e2015-09-22 12:33:20 -0700841static void access_token_get_request_metadata(
Julien Boeuf441176d2015-10-09 21:14:07 -0700842 grpc_exec_ctx *exec_ctx, grpc_call_credentials *creds, grpc_pollset *pollset,
Craig Tillera82950e2015-09-22 12:33:20 -0700843 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
844 grpc_access_token_credentials *c = (grpc_access_token_credentials *)creds;
845 cb(exec_ctx, user_data, c->access_token_md->entries, 1, GRPC_CREDENTIALS_OK);
Julien Boeuf2805be12015-07-01 02:47:18 -0700846}
847
Julien Boeuf441176d2015-10-09 21:14:07 -0700848static grpc_call_credentials_vtable access_token_vtable = {
849 access_token_destruct, access_token_get_request_metadata};
Julien Boeuf2805be12015-07-01 02:47:18 -0700850
Julien Boeuf441176d2015-10-09 21:14:07 -0700851grpc_call_credentials *grpc_access_token_credentials_create(
852 const char *access_token, void *reserved) {
Craig Tillera82950e2015-09-22 12:33:20 -0700853 grpc_access_token_credentials *c =
854 gpr_malloc(sizeof(grpc_access_token_credentials));
Julien Boeuf2805be12015-07-01 02:47:18 -0700855 char *token_md_value;
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700856 GRPC_API_TRACE(
857 "grpc_access_token_credentials_create(access_token=%s, "
858 "reserved=%p)",
859 2, (access_token, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700860 GPR_ASSERT(reserved == NULL);
861 memset(c, 0, sizeof(grpc_access_token_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -0700862 c->base.type = GRPC_CALL_CREDENTIALS_TYPE_OAUTH2;
Julien Boeuf2805be12015-07-01 02:47:18 -0700863 c->base.vtable = &access_token_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700864 gpr_ref_init(&c->base.refcount, 1);
865 c->access_token_md = grpc_credentials_md_store_create(1);
866 gpr_asprintf(&token_md_value, "Bearer %s", access_token);
867 grpc_credentials_md_store_add_cstrings(
868 c->access_token_md, GRPC_AUTHORIZATION_METADATA_KEY, token_md_value);
869 gpr_free(token_md_value);
Julien Boeuf2805be12015-07-01 02:47:18 -0700870 return &c->base;
871}
872
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800873/* -- Fake transport security credentials. -- */
874
Craig Tillera82950e2015-09-22 12:33:20 -0700875static grpc_security_status fake_transport_security_create_security_connector(
Julien Boeufb73cbc22015-10-20 21:52:54 -0700876 grpc_channel_credentials *c, grpc_call_credentials *call_creds,
877 const char *target, const grpc_channel_args *args,
878 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
879 *sc = grpc_fake_channel_security_connector_create(call_creds, 1);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700880 return GRPC_SECURITY_OK;
881}
882
883static grpc_security_status
Craig Tillera82950e2015-09-22 12:33:20 -0700884fake_transport_security_server_create_security_connector(
885 grpc_server_credentials *c, grpc_security_connector **sc) {
886 *sc = grpc_fake_server_security_connector_create();
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700887 return GRPC_SECURITY_OK;
888}
889
Julien Boeuf441176d2015-10-09 21:14:07 -0700890static grpc_channel_credentials_vtable
891 fake_transport_security_credentials_vtable = {
Julien Boeufb73cbc22015-10-20 21:52:54 -0700892 NULL, fake_transport_security_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800893
Craig Tillera82950e2015-09-22 12:33:20 -0700894static grpc_server_credentials_vtable
895 fake_transport_security_server_credentials_vtable = {
Julien Boeufb73cbc22015-10-20 21:52:54 -0700896 NULL, fake_transport_security_server_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800897
Julien Boeuf441176d2015-10-09 21:14:07 -0700898grpc_channel_credentials *grpc_fake_transport_security_credentials_create(
899 void) {
900 grpc_channel_credentials *c = gpr_malloc(sizeof(grpc_channel_credentials));
901 memset(c, 0, sizeof(grpc_channel_credentials));
902 c->type = GRPC_CHANNEL_CREDENTIALS_TYPE_FAKE_TRANSPORT_SECURITY;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800903 c->vtable = &fake_transport_security_credentials_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700904 gpr_ref_init(&c->refcount, 1);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800905 return c;
906}
907
Craig Tillera82950e2015-09-22 12:33:20 -0700908grpc_server_credentials *grpc_fake_transport_security_server_credentials_create(
909 void) {
910 grpc_server_credentials *c = gpr_malloc(sizeof(grpc_server_credentials));
911 memset(c, 0, sizeof(grpc_server_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -0700912 c->type = GRPC_CHANNEL_CREDENTIALS_TYPE_FAKE_TRANSPORT_SECURITY;
Craig Tillera82950e2015-09-22 12:33:20 -0700913 gpr_ref_init(&c->refcount, 1);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800914 c->vtable = &fake_transport_security_server_credentials_vtable;
915 return c;
916}
917
Julien Boeufb73cbc22015-10-20 21:52:54 -0700918/* -- Composite call credentials. -- */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800919
Craig Tillera82950e2015-09-22 12:33:20 -0700920typedef struct {
Julien Boeufb73cbc22015-10-20 21:52:54 -0700921 grpc_composite_call_credentials *composite_creds;
nnoble0c475f02014-12-05 15:37:39 -0800922 size_t creds_index;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700923 grpc_credentials_md_store *md_elems;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800924 char *service_url;
nnoble0c475f02014-12-05 15:37:39 -0800925 void *user_data;
Craig Tiller06bac342015-06-01 12:55:57 -0700926 grpc_pollset *pollset;
nnoble0c475f02014-12-05 15:37:39 -0800927 grpc_credentials_metadata_cb cb;
Julien Boeufb73cbc22015-10-20 21:52:54 -0700928} grpc_composite_call_credentials_metadata_context;
nnoble0c475f02014-12-05 15:37:39 -0800929
Julien Boeufb73cbc22015-10-20 21:52:54 -0700930static void composite_call_destruct(grpc_call_credentials *creds) {
931 grpc_composite_call_credentials *c = (grpc_composite_call_credentials *)creds;
nnoble0c475f02014-12-05 15:37:39 -0800932 size_t i;
Craig Tillera82950e2015-09-22 12:33:20 -0700933 for (i = 0; i < c->inner.num_creds; i++) {
Julien Boeuf441176d2015-10-09 21:14:07 -0700934 grpc_call_credentials_unref(c->inner.creds_array[i]);
Craig Tillera82950e2015-09-22 12:33:20 -0700935 }
936 gpr_free(c->inner.creds_array);
nnoble0c475f02014-12-05 15:37:39 -0800937}
938
Julien Boeufb73cbc22015-10-20 21:52:54 -0700939static void composite_call_md_context_destroy(
940 grpc_composite_call_credentials_metadata_context *ctx) {
Craig Tillera82950e2015-09-22 12:33:20 -0700941 grpc_credentials_md_store_unref(ctx->md_elems);
942 if (ctx->service_url != NULL) gpr_free(ctx->service_url);
943 gpr_free(ctx);
nnoble0c475f02014-12-05 15:37:39 -0800944}
945
Julien Boeufb73cbc22015-10-20 21:52:54 -0700946static void composite_call_metadata_cb(grpc_exec_ctx *exec_ctx, void *user_data,
947 grpc_credentials_md *md_elems,
948 size_t num_md,
949 grpc_credentials_status status) {
950 grpc_composite_call_credentials_metadata_context *ctx =
951 (grpc_composite_call_credentials_metadata_context *)user_data;
Craig Tillera82950e2015-09-22 12:33:20 -0700952 if (status != GRPC_CREDENTIALS_OK) {
953 ctx->cb(exec_ctx, ctx->user_data, NULL, 0, status);
954 return;
955 }
Craig Tiller45724b32015-09-22 10:42:19 -0700956
957 /* Copy the metadata in the context. */
Craig Tillera82950e2015-09-22 12:33:20 -0700958 if (num_md > 0) {
959 size_t i;
960 for (i = 0; i < num_md; i++) {
961 grpc_credentials_md_store_add(ctx->md_elems, md_elems[i].key,
962 md_elems[i].value);
Craig Tiller45724b32015-09-22 10:42:19 -0700963 }
Craig Tillera82950e2015-09-22 12:33:20 -0700964 }
Craig Tiller45724b32015-09-22 10:42:19 -0700965
966 /* See if we need to get some more metadata. */
Julien Boeuf441176d2015-10-09 21:14:07 -0700967 if (ctx->creds_index < ctx->composite_creds->inner.num_creds) {
968 grpc_call_credentials *inner_creds =
Craig Tillera82950e2015-09-22 12:33:20 -0700969 ctx->composite_creds->inner.creds_array[ctx->creds_index++];
Julien Boeuf4e02e842015-10-09 22:49:42 -0700970 grpc_call_credentials_get_request_metadata(exec_ctx, inner_creds,
971 ctx->pollset, ctx->service_url,
Julien Boeufb73cbc22015-10-20 21:52:54 -0700972 composite_call_metadata_cb, ctx);
Julien Boeuf441176d2015-10-09 21:14:07 -0700973 return;
Craig Tillera82950e2015-09-22 12:33:20 -0700974 }
975
976 /* We're done!. */
977 ctx->cb(exec_ctx, ctx->user_data, ctx->md_elems->entries,
978 ctx->md_elems->num_entries, GRPC_CREDENTIALS_OK);
Julien Boeufb73cbc22015-10-20 21:52:54 -0700979 composite_call_md_context_destroy(ctx);
Craig Tillera82950e2015-09-22 12:33:20 -0700980}
981
Julien Boeufb73cbc22015-10-20 21:52:54 -0700982static void composite_call_get_request_metadata(
Julien Boeuf441176d2015-10-09 21:14:07 -0700983 grpc_exec_ctx *exec_ctx, grpc_call_credentials *creds, grpc_pollset *pollset,
Craig Tillera82950e2015-09-22 12:33:20 -0700984 const char *service_url, grpc_credentials_metadata_cb cb, void *user_data) {
Julien Boeufb73cbc22015-10-20 21:52:54 -0700985 grpc_composite_call_credentials *c = (grpc_composite_call_credentials *)creds;
986 grpc_composite_call_credentials_metadata_context *ctx;
Julien Boeuf441176d2015-10-09 21:14:07 -0700987
Julien Boeufb73cbc22015-10-20 21:52:54 -0700988 ctx = gpr_malloc(sizeof(grpc_composite_call_credentials_metadata_context));
989 memset(ctx, 0, sizeof(grpc_composite_call_credentials_metadata_context));
Craig Tillera82950e2015-09-22 12:33:20 -0700990 ctx->service_url = gpr_strdup(service_url);
nnoble0c475f02014-12-05 15:37:39 -0800991 ctx->user_data = user_data;
992 ctx->cb = cb;
993 ctx->composite_creds = c;
Craig Tiller06bac342015-06-01 12:55:57 -0700994 ctx->pollset = pollset;
Craig Tillera82950e2015-09-22 12:33:20 -0700995 ctx->md_elems = grpc_credentials_md_store_create(c->inner.num_creds);
Julien Boeuf4e02e842015-10-09 22:49:42 -0700996 grpc_call_credentials_get_request_metadata(
Julien Boeuf441176d2015-10-09 21:14:07 -0700997 exec_ctx, c->inner.creds_array[ctx->creds_index++], pollset, service_url,
Julien Boeufb73cbc22015-10-20 21:52:54 -0700998 composite_call_metadata_cb, ctx);
nnoble0c475f02014-12-05 15:37:39 -0800999}
1000
Julien Boeufb73cbc22015-10-20 21:52:54 -07001001static grpc_call_credentials_vtable composite_call_credentials_vtable = {
1002 composite_call_destruct, composite_call_get_request_metadata};
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001003
Julien Boeuf441176d2015-10-09 21:14:07 -07001004static grpc_call_credentials_array get_creds_array(
1005 grpc_call_credentials **creds_addr) {
1006 grpc_call_credentials_array result;
1007 grpc_call_credentials *creds = *creds_addr;
nnoble0c475f02014-12-05 15:37:39 -08001008 result.creds_array = creds_addr;
1009 result.num_creds = 1;
Julien Boeuf441176d2015-10-09 21:14:07 -07001010 if (strcmp(creds->type, GRPC_CALL_CREDENTIALS_TYPE_COMPOSITE) == 0) {
Julien Boeufb73cbc22015-10-20 21:52:54 -07001011 result = *grpc_composite_call_credentials_get_credentials(creds);
Craig Tillera82950e2015-09-22 12:33:20 -07001012 }
nnoble0c475f02014-12-05 15:37:39 -08001013 return result;
1014}
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001015
Julien Boeuf441176d2015-10-09 21:14:07 -07001016grpc_call_credentials *grpc_composite_call_credentials_create(
1017 grpc_call_credentials *creds1, grpc_call_credentials *creds2,
1018 void *reserved) {
nnoble0c475f02014-12-05 15:37:39 -08001019 size_t i;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001020 size_t creds_array_byte_size;
Julien Boeuf441176d2015-10-09 21:14:07 -07001021 grpc_call_credentials_array creds1_array;
1022 grpc_call_credentials_array creds2_array;
Julien Boeufb73cbc22015-10-20 21:52:54 -07001023 grpc_composite_call_credentials *c;
Craig Tiller4de3e4f2015-10-05 08:55:50 -07001024 GRPC_API_TRACE(
Julien Boeufb73cbc22015-10-20 21:52:54 -07001025 "grpc_composite_call_credentials_create(creds1=%p, creds2=%p, "
Craig Tiller4de3e4f2015-10-05 08:55:50 -07001026 "reserved=%p)",
1027 3, (creds1, creds2, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -07001028 GPR_ASSERT(reserved == NULL);
1029 GPR_ASSERT(creds1 != NULL);
1030 GPR_ASSERT(creds2 != NULL);
Julien Boeufb73cbc22015-10-20 21:52:54 -07001031 c = gpr_malloc(sizeof(grpc_composite_call_credentials));
1032 memset(c, 0, sizeof(grpc_composite_call_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -07001033 c->base.type = GRPC_CALL_CREDENTIALS_TYPE_COMPOSITE;
Julien Boeufb73cbc22015-10-20 21:52:54 -07001034 c->base.vtable = &composite_call_credentials_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -07001035 gpr_ref_init(&c->base.refcount, 1);
1036 creds1_array = get_creds_array(&creds1);
1037 creds2_array = get_creds_array(&creds2);
nnoble0c475f02014-12-05 15:37:39 -08001038 c->inner.num_creds = creds1_array.num_creds + creds2_array.num_creds;
Julien Boeuf441176d2015-10-09 21:14:07 -07001039 creds_array_byte_size = c->inner.num_creds * sizeof(grpc_call_credentials *);
Craig Tillera82950e2015-09-22 12:33:20 -07001040 c->inner.creds_array = gpr_malloc(creds_array_byte_size);
1041 memset(c->inner.creds_array, 0, creds_array_byte_size);
1042 for (i = 0; i < creds1_array.num_creds; i++) {
Julien Boeuf441176d2015-10-09 21:14:07 -07001043 grpc_call_credentials *cur_creds = creds1_array.creds_array[i];
1044 c->inner.creds_array[i] = grpc_call_credentials_ref(cur_creds);
Craig Tillera82950e2015-09-22 12:33:20 -07001045 }
1046 for (i = 0; i < creds2_array.num_creds; i++) {
Julien Boeuf441176d2015-10-09 21:14:07 -07001047 grpc_call_credentials *cur_creds = creds2_array.creds_array[i];
Craig Tillera82950e2015-09-22 12:33:20 -07001048 c->inner.creds_array[i + creds1_array.num_creds] =
Julien Boeuf441176d2015-10-09 21:14:07 -07001049 grpc_call_credentials_ref(cur_creds);
Craig Tillera82950e2015-09-22 12:33:20 -07001050 }
nnoble0c475f02014-12-05 15:37:39 -08001051 return &c->base;
1052}
1053
Julien Boeufb73cbc22015-10-20 21:52:54 -07001054const grpc_call_credentials_array *
1055grpc_composite_call_credentials_get_credentials(grpc_call_credentials *creds) {
1056 const grpc_composite_call_credentials *c =
1057 (const grpc_composite_call_credentials *)creds;
Julien Boeuf441176d2015-10-09 21:14:07 -07001058 GPR_ASSERT(strcmp(creds->type, GRPC_CALL_CREDENTIALS_TYPE_COMPOSITE) == 0);
nnoble0c475f02014-12-05 15:37:39 -08001059 return &c->inner;
1060}
1061
Julien Boeuf441176d2015-10-09 21:14:07 -07001062grpc_call_credentials *grpc_credentials_contains_type(
1063 grpc_call_credentials *creds, const char *type,
1064 grpc_call_credentials **composite_creds) {
jboeuf6ad120e2015-01-12 17:08:15 -08001065 size_t i;
Craig Tillera82950e2015-09-22 12:33:20 -07001066 if (strcmp(creds->type, type) == 0) {
1067 if (composite_creds != NULL) *composite_creds = NULL;
1068 return creds;
Julien Boeuf441176d2015-10-09 21:14:07 -07001069 } else if (strcmp(creds->type, GRPC_CALL_CREDENTIALS_TYPE_COMPOSITE) == 0) {
1070 const grpc_call_credentials_array *inner_creds_array =
Julien Boeufb73cbc22015-10-20 21:52:54 -07001071 grpc_composite_call_credentials_get_credentials(creds);
Craig Tillera82950e2015-09-22 12:33:20 -07001072 for (i = 0; i < inner_creds_array->num_creds; i++) {
1073 if (strcmp(type, inner_creds_array->creds_array[i]->type) == 0) {
1074 if (composite_creds != NULL) *composite_creds = creds;
1075 return inner_creds_array->creds_array[i];
1076 }
jboeuf6ad120e2015-01-12 17:08:15 -08001077 }
Craig Tillera82950e2015-09-22 12:33:20 -07001078 }
jboeuf6ad120e2015-01-12 17:08:15 -08001079 return NULL;
1080}
1081
nnoble0c475f02014-12-05 15:37:39 -08001082/* -- IAM credentials. -- */
1083
Julien Boeuf441176d2015-10-09 21:14:07 -07001084static void iam_destruct(grpc_call_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -07001085 grpc_google_iam_credentials *c = (grpc_google_iam_credentials *)creds;
1086 grpc_credentials_md_store_unref(c->iam_md);
nnoble0c475f02014-12-05 15:37:39 -08001087}
1088
Julien Boeuf441176d2015-10-09 21:14:07 -07001089static void iam_get_request_metadata(grpc_exec_ctx *exec_ctx,
1090 grpc_call_credentials *creds,
1091 grpc_pollset *pollset,
1092 const char *service_url,
1093 grpc_credentials_metadata_cb cb,
1094 void *user_data) {
Craig Tillera82950e2015-09-22 12:33:20 -07001095 grpc_google_iam_credentials *c = (grpc_google_iam_credentials *)creds;
1096 cb(exec_ctx, user_data, c->iam_md->entries, c->iam_md->num_entries,
1097 GRPC_CREDENTIALS_OK);
nnoble0c475f02014-12-05 15:37:39 -08001098}
1099
Julien Boeuf441176d2015-10-09 21:14:07 -07001100static grpc_call_credentials_vtable iam_vtable = {iam_destruct,
1101 iam_get_request_metadata};
nnoble0c475f02014-12-05 15:37:39 -08001102
Julien Boeuf441176d2015-10-09 21:14:07 -07001103grpc_call_credentials *grpc_google_iam_credentials_create(
Craig Tillera82950e2015-09-22 12:33:20 -07001104 const char *token, const char *authority_selector, void *reserved) {
Julien Boeuf510a9202015-08-25 21:51:07 -07001105 grpc_google_iam_credentials *c;
Craig Tiller4de3e4f2015-10-05 08:55:50 -07001106 GRPC_API_TRACE(
1107 "grpc_iam_credentials_create(token=%s, authority_selector=%s, "
1108 "reserved=%p)",
1109 3, (token, authority_selector, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -07001110 GPR_ASSERT(reserved == NULL);
1111 GPR_ASSERT(token != NULL);
1112 GPR_ASSERT(authority_selector != NULL);
1113 c = gpr_malloc(sizeof(grpc_google_iam_credentials));
1114 memset(c, 0, sizeof(grpc_google_iam_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -07001115 c->base.type = GRPC_CALL_CREDENTIALS_TYPE_IAM;
nnoble0c475f02014-12-05 15:37:39 -08001116 c->base.vtable = &iam_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -07001117 gpr_ref_init(&c->base.refcount, 1);
1118 c->iam_md = grpc_credentials_md_store_create(2);
1119 grpc_credentials_md_store_add_cstrings(
1120 c->iam_md, GRPC_IAM_AUTHORIZATION_TOKEN_METADATA_KEY, token);
1121 grpc_credentials_md_store_add_cstrings(
1122 c->iam_md, GRPC_IAM_AUTHORITY_SELECTOR_METADATA_KEY, authority_selector);
nnoble0c475f02014-12-05 15:37:39 -08001123 return &c->base;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001124}
Julien Boeuf2d041182015-08-31 20:30:09 -07001125
1126/* -- Plugin credentials. -- */
1127
Craig Tillera82950e2015-09-22 12:33:20 -07001128typedef struct {
Julien Boeuf2d041182015-08-31 20:30:09 -07001129 void *user_data;
1130 grpc_credentials_metadata_cb cb;
1131} grpc_metadata_plugin_request;
1132
Julien Boeuf441176d2015-10-09 21:14:07 -07001133static void plugin_destruct(grpc_call_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -07001134 grpc_plugin_credentials *c = (grpc_plugin_credentials *)creds;
1135 if (c->plugin.state != NULL && c->plugin.destroy != NULL) {
1136 c->plugin.destroy(c->plugin.state);
1137 }
Julien Boeuf2d041182015-08-31 20:30:09 -07001138}
1139
Craig Tillera82950e2015-09-22 12:33:20 -07001140static void plugin_md_request_metadata_ready(void *request,
1141 const grpc_metadata *md,
1142 size_t num_md,
1143 grpc_status_code status,
1144 const char *error_details) {
Craig Tiller10ee2742015-09-22 09:25:57 -07001145 /* called from application code */
Craig Tillerf5768a62015-09-22 10:54:34 -07001146 grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
Craig Tillera82950e2015-09-22 12:33:20 -07001147 grpc_metadata_plugin_request *r = (grpc_metadata_plugin_request *)request;
1148 if (status != GRPC_STATUS_OK) {
1149 if (error_details != NULL) {
1150 gpr_log(GPR_ERROR, "Getting metadata from plugin failed with error: %s",
1151 error_details);
Julien Boeuf2d041182015-08-31 20:30:09 -07001152 }
Craig Tillera82950e2015-09-22 12:33:20 -07001153 r->cb(&exec_ctx, r->user_data, NULL, 0, GRPC_CREDENTIALS_ERROR);
1154 } else {
1155 size_t i;
1156 grpc_credentials_md *md_array = NULL;
1157 if (num_md > 0) {
1158 md_array = gpr_malloc(num_md * sizeof(grpc_credentials_md));
1159 for (i = 0; i < num_md; i++) {
1160 md_array[i].key = gpr_slice_from_copied_string(md[i].key);
1161 md_array[i].value =
1162 gpr_slice_from_copied_buffer(md[i].value, md[i].value_length);
1163 }
Julien Boeuf2d041182015-08-31 20:30:09 -07001164 }
Craig Tillera82950e2015-09-22 12:33:20 -07001165 r->cb(&exec_ctx, r->user_data, md_array, num_md, GRPC_CREDENTIALS_OK);
1166 if (md_array != NULL) {
1167 for (i = 0; i < num_md; i++) {
1168 gpr_slice_unref(md_array[i].key);
1169 gpr_slice_unref(md_array[i].value);
1170 }
1171 gpr_free(md_array);
1172 }
1173 }
1174 gpr_free(r);
Craig Tiller80183f32015-09-23 12:33:59 -07001175 grpc_exec_ctx_finish(&exec_ctx);
Julien Boeuf2d041182015-08-31 20:30:09 -07001176}
1177
Julien Boeuf441176d2015-10-09 21:14:07 -07001178static void plugin_get_request_metadata(grpc_exec_ctx *exec_ctx,
1179 grpc_call_credentials *creds,
1180 grpc_pollset *pollset,
1181 const char *service_url,
1182 grpc_credentials_metadata_cb cb,
1183 void *user_data) {
Craig Tillera82950e2015-09-22 12:33:20 -07001184 grpc_plugin_credentials *c = (grpc_plugin_credentials *)creds;
1185 if (c->plugin.get_metadata != NULL) {
1186 grpc_metadata_plugin_request *request = gpr_malloc(sizeof(*request));
1187 memset(request, 0, sizeof(*request));
1188 request->user_data = user_data;
1189 request->cb = cb;
1190 c->plugin.get_metadata(c->plugin.state, service_url,
1191 plugin_md_request_metadata_ready, request);
1192 } else {
1193 cb(exec_ctx, user_data, NULL, 0, GRPC_CREDENTIALS_OK);
1194 }
Julien Boeuf2d041182015-08-31 20:30:09 -07001195}
1196
Julien Boeuf441176d2015-10-09 21:14:07 -07001197static grpc_call_credentials_vtable plugin_vtable = {
1198 plugin_destruct, plugin_get_request_metadata};
Julien Boeuf2d041182015-08-31 20:30:09 -07001199
Julien Boeuf441176d2015-10-09 21:14:07 -07001200grpc_call_credentials *grpc_metadata_credentials_create_from_plugin(
Craig Tillera82950e2015-09-22 12:33:20 -07001201 grpc_metadata_credentials_plugin plugin, void *reserved) {
1202 grpc_plugin_credentials *c = gpr_malloc(sizeof(*c));
Julien Boeufb73cbc22015-10-20 21:52:54 -07001203 GRPC_API_TRACE("grpc_metadata_credentials_create_from_plugin(reserved=%p)", 1,
1204 (reserved));
Craig Tillera82950e2015-09-22 12:33:20 -07001205 GPR_ASSERT(reserved == NULL);
1206 memset(c, 0, sizeof(*c));
Julien Boeuf441176d2015-10-09 21:14:07 -07001207 c->base.type = GRPC_CALL_CREDENTIALS_TYPE_METADATA_PLUGIN;
Julien Boeuf2d041182015-08-31 20:30:09 -07001208 c->base.vtable = &plugin_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -07001209 gpr_ref_init(&c->base.refcount, 1);
Julien Boeuf2d041182015-08-31 20:30:09 -07001210 c->plugin = plugin;
1211 return &c->base;
1212}
Julien Boeufb73cbc22015-10-20 21:52:54 -07001213
1214/* -- Composite channel credentials. -- */
1215
1216static void composite_channel_destruct(grpc_channel_credentials *creds) {
1217 grpc_composite_channel_credentials *c =
1218 (grpc_composite_channel_credentials *)creds;
1219 grpc_channel_credentials_unref(c->inner_creds);
1220 grpc_call_credentials_unref(c->call_creds);
1221}
1222
1223static grpc_security_status composite_channel_create_security_connector(
1224 grpc_channel_credentials *creds, grpc_call_credentials *call_creds,
1225 const char *target, const grpc_channel_args *args,
1226 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
1227 grpc_composite_channel_credentials *c =
1228 (grpc_composite_channel_credentials *)creds;
1229 grpc_security_status status = GRPC_SECURITY_ERROR;
1230
1231 GPR_ASSERT(c->inner_creds != NULL && c->call_creds != NULL &&
1232 c->inner_creds->vtable != NULL &&
1233 c->inner_creds->vtable->create_security_connector != NULL);
1234 /* If we are passed a call_creds, create a call composite to pass it
1235 downstream. */
1236 if (call_creds != NULL) {
1237 grpc_call_credentials *composite_call_creds =
1238 grpc_composite_call_credentials_create(c->call_creds, call_creds, NULL);
1239 status = c->inner_creds->vtable->create_security_connector(
1240 c->inner_creds, composite_call_creds, target, args, sc, new_args);
1241 grpc_call_credentials_unref(composite_call_creds);
1242 } else {
1243 status = c->inner_creds->vtable->create_security_connector(
1244 c->inner_creds, c->call_creds, target, args, sc, new_args);
1245 }
1246 return status;
1247}
1248
1249static grpc_channel_credentials_vtable composite_channel_credentials_vtable = {
1250 composite_channel_destruct, composite_channel_create_security_connector};
1251
1252grpc_channel_credentials *grpc_composite_channel_credentials_create(
1253 grpc_channel_credentials *channel_creds, grpc_call_credentials *call_creds,
1254 void *reserved) {
1255 grpc_composite_channel_credentials *c = gpr_malloc(sizeof(*c));
1256 memset(c, 0, sizeof(*c));
1257 GPR_ASSERT(channel_creds != NULL && call_creds != NULL && reserved == NULL);
1258 GRPC_API_TRACE(
1259 "grpc_composite_channel_credentials_create(channel_creds=%p, "
1260 "call_creds=%p, reserved=%p)",
1261 3, (channel_creds, call_creds, reserved));
1262 c->base.type = channel_creds->type;
1263 c->base.vtable = &composite_channel_credentials_vtable;
1264 gpr_ref_init(&c->base.refcount, 1);
1265 c->inner_creds = grpc_channel_credentials_ref(channel_creds);
1266 c->call_creds = grpc_call_credentials_ref(call_creds);
1267 return &c->base;
1268}
1269