blob: c45b5c065d14ff60bcc2db92edadf87dbb1af6c3 [file] [log] [blame]
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001/*
2 *
Craig Tiller06059952015-02-18 08:34:56 -08003 * Copyright 2015, Google Inc.
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08004 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are
8 * met:
9 *
10 * * Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * * Redistributions in binary form must reproduce the above
13 * copyright notice, this list of conditions and the following disclaimer
14 * in the documentation and/or other materials provided with the
15 * distribution.
16 * * Neither the name of Google Inc. nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
24 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
30 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 *
32 */
33
34#include "src/core/security/credentials.h"
35
Julien Boeuff47a5cb2015-02-18 12:24:08 -080036#include <string.h>
37#include <stdio.h>
38
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -070039#include "src/core/channel/channel_args.h"
40#include "src/core/channel/http_client_filter.h"
Julien Boeuff47a5cb2015-02-18 12:24:08 -080041#include "src/core/json/json.h"
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080042#include "src/core/httpcli/httpcli.h"
ctiller18b49ab2014-12-09 14:39:16 -080043#include "src/core/iomgr/iomgr.h"
Craig Tiller485d7762015-01-23 12:54:05 -080044#include "src/core/support/string.h"
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -070045
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080046#include <grpc/support/alloc.h>
47#include <grpc/support/log.h>
Masood Malekghassemi701af602015-06-03 15:01:17 -070048#include <grpc/support/string_util.h>
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080049#include <grpc/support/sync.h>
50#include <grpc/support/time.h>
51
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080052/* -- Common. -- */
53
Julien Boeufb037bb62015-07-08 14:58:14 -070054struct grpc_credentials_metadata_request {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080055 grpc_credentials *creds;
56 grpc_credentials_metadata_cb cb;
David Garcia Quintas69ba8712015-06-01 11:29:42 -070057 grpc_iomgr_closure *on_simulated_token_fetch_done_closure;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080058 void *user_data;
Julien Boeufb037bb62015-07-08 14:58:14 -070059};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080060
61static grpc_credentials_metadata_request *
62grpc_credentials_metadata_request_create(grpc_credentials *creds,
63 grpc_credentials_metadata_cb cb,
64 void *user_data) {
65 grpc_credentials_metadata_request *r =
66 gpr_malloc(sizeof(grpc_credentials_metadata_request));
67 r->creds = grpc_credentials_ref(creds);
68 r->cb = cb;
David Garcia Quintas69ba8712015-06-01 11:29:42 -070069 r->on_simulated_token_fetch_done_closure =
70 gpr_malloc(sizeof(grpc_iomgr_closure));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080071 r->user_data = user_data;
72 return r;
73}
74
75static void grpc_credentials_metadata_request_destroy(
76 grpc_credentials_metadata_request *r) {
77 grpc_credentials_unref(r->creds);
David Garcia Quintas69ba8712015-06-01 11:29:42 -070078 gpr_free(r->on_simulated_token_fetch_done_closure);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080079 gpr_free(r);
80}
81
82grpc_credentials *grpc_credentials_ref(grpc_credentials *creds) {
83 if (creds == NULL) return NULL;
84 gpr_ref(&creds->refcount);
85 return creds;
86}
87
88void grpc_credentials_unref(grpc_credentials *creds) {
89 if (creds == NULL) return;
90 if (gpr_unref(&creds->refcount)) creds->vtable->destroy(creds);
91}
92
93void grpc_credentials_release(grpc_credentials *creds) {
94 grpc_credentials_unref(creds);
95}
96
97int grpc_credentials_has_request_metadata(grpc_credentials *creds) {
98 if (creds == NULL) return 0;
99 return creds->vtable->has_request_metadata(creds);
100}
101
102int grpc_credentials_has_request_metadata_only(grpc_credentials *creds) {
103 if (creds == NULL) return 0;
104 return creds->vtable->has_request_metadata_only(creds);
105}
106
107void grpc_credentials_get_request_metadata(grpc_credentials *creds,
Craig Tiller06bac342015-06-01 12:55:57 -0700108 grpc_pollset *pollset,
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800109 const char *service_url,
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800110 grpc_credentials_metadata_cb cb,
111 void *user_data) {
nnoble0c475f02014-12-05 15:37:39 -0800112 if (creds == NULL || !grpc_credentials_has_request_metadata(creds) ||
113 creds->vtable->get_request_metadata == NULL) {
114 if (cb != NULL) {
115 cb(user_data, NULL, 0, GRPC_CREDENTIALS_OK);
116 }
117 return;
118 }
Craig Tiller06bac342015-06-01 12:55:57 -0700119 creds->vtable->get_request_metadata(creds, pollset, service_url, cb,
120 user_data);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800121}
122
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700123grpc_security_status grpc_credentials_create_security_connector(
124 grpc_credentials *creds, const char *target, const grpc_channel_args *args,
125 grpc_credentials *request_metadata_creds,
126 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
127 *new_args = NULL;
128 if (creds == NULL || creds->vtable->create_security_connector == NULL ||
129 grpc_credentials_has_request_metadata_only(creds)) {
130 gpr_log(GPR_ERROR,
131 "Invalid credentials for creating a security connector.");
132 return GRPC_SECURITY_ERROR;
133 }
134 return creds->vtable->create_security_connector(
135 creds, target, args, request_metadata_creds, sc, new_args);
Craig Tillerc4885ed2015-04-14 09:51:28 -0700136}
137
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800138void grpc_server_credentials_release(grpc_server_credentials *creds) {
139 if (creds == NULL) return;
140 creds->vtable->destroy(creds);
141}
142
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700143grpc_security_status grpc_server_credentials_create_security_connector(
144 grpc_server_credentials *creds, grpc_security_connector **sc) {
145 if (creds == NULL || creds->vtable->create_security_connector == NULL) {
146 gpr_log(GPR_ERROR, "Server credentials cannot create security context.");
147 return GRPC_SECURITY_ERROR;
148 }
149 return creds->vtable->create_security_connector(creds, sc);
150}
151
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800152/* -- Ssl credentials. -- */
153
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800154static void ssl_destroy(grpc_credentials *creds) {
155 grpc_ssl_credentials *c = (grpc_ssl_credentials *)creds;
156 if (c->config.pem_root_certs != NULL) gpr_free(c->config.pem_root_certs);
157 if (c->config.pem_private_key != NULL) gpr_free(c->config.pem_private_key);
158 if (c->config.pem_cert_chain != NULL) gpr_free(c->config.pem_cert_chain);
159 gpr_free(creds);
160}
161
162static void ssl_server_destroy(grpc_server_credentials *creds) {
163 grpc_ssl_server_credentials *c = (grpc_ssl_server_credentials *)creds;
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800164 size_t i;
165 for (i = 0; i < c->config.num_key_cert_pairs; i++) {
166 if (c->config.pem_private_keys[i] != NULL) {
167 gpr_free(c->config.pem_private_keys[i]);
168 }
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800169 if (c->config.pem_cert_chains[i] != NULL) {
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800170 gpr_free(c->config.pem_cert_chains[i]);
171 }
172 }
173 if (c->config.pem_private_keys != NULL) gpr_free(c->config.pem_private_keys);
174 if (c->config.pem_private_keys_sizes != NULL) {
175 gpr_free(c->config.pem_private_keys_sizes);
176 }
177 if (c->config.pem_cert_chains != NULL) gpr_free(c->config.pem_cert_chains);
178 if (c->config.pem_cert_chains_sizes != NULL) {
179 gpr_free(c->config.pem_cert_chains_sizes);
180 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800181 if (c->config.pem_root_certs != NULL) gpr_free(c->config.pem_root_certs);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800182 gpr_free(creds);
183}
184
Craig Tiller83b826a2015-05-13 13:43:01 -0700185static int ssl_has_request_metadata(const grpc_credentials *creds) { return 0; }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800186
187static int ssl_has_request_metadata_only(const grpc_credentials *creds) {
188 return 0;
189}
190
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700191static grpc_security_status ssl_create_security_connector(
192 grpc_credentials *creds, const char *target, const grpc_channel_args *args,
193 grpc_credentials *request_metadata_creds,
194 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
195 grpc_ssl_credentials *c = (grpc_ssl_credentials *)creds;
196 grpc_security_status status = GRPC_SECURITY_OK;
197 size_t i = 0;
198 const char *overridden_target_name = NULL;
199 grpc_arg arg;
200
201 for (i = 0; args && i < args->num_args; i++) {
202 grpc_arg *arg = &args->args[i];
203 if (strcmp(arg->key, GRPC_SSL_TARGET_NAME_OVERRIDE_ARG) == 0 &&
204 arg->type == GRPC_ARG_STRING) {
205 overridden_target_name = arg->value.string;
206 break;
207 }
208 }
209 status = grpc_ssl_channel_security_connector_create(
210 request_metadata_creds, &c->config, target, overridden_target_name, sc);
211 if (status != GRPC_SECURITY_OK) {
212 return status;
213 }
214 arg.type = GRPC_ARG_STRING;
215 arg.key = GRPC_ARG_HTTP2_SCHEME;
216 arg.value.string = "https";
Craig Tillerd9a50882015-06-29 15:57:36 -0700217 *new_args = grpc_channel_args_copy_and_add(args, &arg, 1);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700218 return status;
219}
220
221static grpc_security_status ssl_server_create_security_connector(
222 grpc_server_credentials *creds, grpc_security_connector **sc) {
223 grpc_ssl_server_credentials *c = (grpc_ssl_server_credentials *)creds;
224 return grpc_ssl_server_security_connector_create(&c->config, sc);
225}
226
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800227static grpc_credentials_vtable ssl_vtable = {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700228 ssl_destroy, ssl_has_request_metadata, ssl_has_request_metadata_only, NULL,
229 ssl_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800230
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700231static grpc_server_credentials_vtable ssl_server_vtable = {
232 ssl_server_destroy, ssl_server_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800233
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800234static void ssl_copy_key_material(const char *input, unsigned char **output,
235 size_t *output_size) {
236 *output_size = strlen(input);
237 *output = gpr_malloc(*output_size);
238 memcpy(*output, input, *output_size);
239}
240
241static void ssl_build_config(const char *pem_root_certs,
242 grpc_ssl_pem_key_cert_pair *pem_key_cert_pair,
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800243 grpc_ssl_config *config) {
Julien Boeuf026a4172015-02-02 18:36:37 -0800244 if (pem_root_certs != NULL) {
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800245 ssl_copy_key_material(pem_root_certs, &config->pem_root_certs,
246 &config->pem_root_certs_size);
247 }
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800248 if (pem_key_cert_pair != NULL) {
249 GPR_ASSERT(pem_key_cert_pair->private_key != NULL);
250 GPR_ASSERT(pem_key_cert_pair->cert_chain != NULL);
251 ssl_copy_key_material(pem_key_cert_pair->private_key,
252 &config->pem_private_key,
253 &config->pem_private_key_size);
254 ssl_copy_key_material(pem_key_cert_pair->cert_chain,
255 &config->pem_cert_chain,
256 &config->pem_cert_chain_size);
257 }
258}
259
260static void ssl_build_server_config(
261 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs,
Julien Boeuf5029b302015-07-21 23:02:16 -0700262 size_t num_key_cert_pairs, int force_client_auth,
263 grpc_ssl_server_config *config) {
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800264 size_t i;
Julien Boeuf5029b302015-07-21 23:02:16 -0700265 config->force_client_auth = force_client_auth;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800266 if (pem_root_certs != NULL) {
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800267 ssl_copy_key_material(pem_root_certs, &config->pem_root_certs,
268 &config->pem_root_certs_size);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800269 }
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800270 if (num_key_cert_pairs > 0) {
271 GPR_ASSERT(pem_key_cert_pairs != NULL);
272 config->pem_private_keys =
273 gpr_malloc(num_key_cert_pairs * sizeof(unsigned char *));
274 config->pem_cert_chains =
275 gpr_malloc(num_key_cert_pairs * sizeof(unsigned char *));
276 config->pem_private_keys_sizes =
277 gpr_malloc(num_key_cert_pairs * sizeof(size_t));
278 config->pem_cert_chains_sizes =
279 gpr_malloc(num_key_cert_pairs * sizeof(size_t));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800280 }
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800281 config->num_key_cert_pairs = num_key_cert_pairs;
282 for (i = 0; i < num_key_cert_pairs; i++) {
283 GPR_ASSERT(pem_key_cert_pairs[i].private_key != NULL);
284 GPR_ASSERT(pem_key_cert_pairs[i].cert_chain != NULL);
285 ssl_copy_key_material(pem_key_cert_pairs[i].private_key,
286 &config->pem_private_keys[i],
287 &config->pem_private_keys_sizes[i]);
288 ssl_copy_key_material(pem_key_cert_pairs[i].cert_chain,
289 &config->pem_cert_chains[i],
290 &config->pem_cert_chains_sizes[i]);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800291 }
292}
293
294grpc_credentials *grpc_ssl_credentials_create(
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800295 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pair) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800296 grpc_ssl_credentials *c = gpr_malloc(sizeof(grpc_ssl_credentials));
297 memset(c, 0, sizeof(grpc_ssl_credentials));
298 c->base.type = GRPC_CREDENTIALS_TYPE_SSL;
299 c->base.vtable = &ssl_vtable;
300 gpr_ref_init(&c->base.refcount, 1);
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800301 ssl_build_config(pem_root_certs, pem_key_cert_pair, &c->config);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800302 return &c->base;
303}
304
305grpc_server_credentials *grpc_ssl_server_credentials_create(
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800306 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs,
Julien Boeuf5029b302015-07-21 23:02:16 -0700307 size_t num_key_cert_pairs, int force_client_auth) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800308 grpc_ssl_server_credentials *c =
309 gpr_malloc(sizeof(grpc_ssl_server_credentials));
310 memset(c, 0, sizeof(grpc_ssl_server_credentials));
311 c->base.type = GRPC_CREDENTIALS_TYPE_SSL;
312 c->base.vtable = &ssl_server_vtable;
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800313 ssl_build_server_config(pem_root_certs, pem_key_cert_pairs,
Julien Boeuf5029b302015-07-21 23:02:16 -0700314 num_key_cert_pairs, force_client_auth, &c->config);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800315 return &c->base;
316}
317
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800318/* -- Jwt credentials -- */
319
Julien Boeuffe4c3f42015-07-22 16:20:13 -0700320static void jwt_reset_cache(grpc_service_account_jwt_access_credentials *c) {
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800321 if (c->cached.jwt_md != NULL) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700322 grpc_credentials_md_store_unref(c->cached.jwt_md);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800323 c->cached.jwt_md = NULL;
324 }
325 if (c->cached.service_url != NULL) {
326 gpr_free(c->cached.service_url);
327 c->cached.service_url = NULL;
328 }
Craig Tiller143e7bf2015-07-13 08:41:49 -0700329 c->cached.jwt_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800330}
331
332static void jwt_destroy(grpc_credentials *creds) {
Julien Boeuffe4c3f42015-07-22 16:20:13 -0700333 grpc_service_account_jwt_access_credentials *c =
334 (grpc_service_account_jwt_access_credentials *)creds;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800335 grpc_auth_json_key_destruct(&c->key);
336 jwt_reset_cache(c);
337 gpr_mu_destroy(&c->cache_mu);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800338 gpr_free(c);
339}
340
341static int jwt_has_request_metadata(const grpc_credentials *creds) { return 1; }
342
343static int jwt_has_request_metadata_only(const grpc_credentials *creds) {
344 return 1;
345}
346
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800347static void jwt_get_request_metadata(grpc_credentials *creds,
Craig Tiller06bac342015-06-01 12:55:57 -0700348 grpc_pollset *pollset,
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800349 const char *service_url,
350 grpc_credentials_metadata_cb cb,
351 void *user_data) {
Julien Boeuffe4c3f42015-07-22 16:20:13 -0700352 grpc_service_account_jwt_access_credentials *c =
353 (grpc_service_account_jwt_access_credentials *)creds;
Craig Tiller58bbc862015-07-13 09:51:17 -0700354 gpr_timespec refresh_threshold = gpr_time_from_seconds(
355 GRPC_SECURE_TOKEN_REFRESH_THRESHOLD_SECS, GPR_TIMESPAN);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800356
357 /* See if we can return a cached jwt. */
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700358 grpc_credentials_md_store *jwt_md = NULL;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800359 {
360 gpr_mu_lock(&c->cache_mu);
361 if (c->cached.service_url != NULL &&
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -0800362 strcmp(c->cached.service_url, service_url) == 0 &&
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800363 c->cached.jwt_md != NULL &&
Craig Tillerf1bff012015-07-06 11:20:50 -0700364 (gpr_time_cmp(gpr_time_sub(c->cached.jwt_expiration,
365 gpr_now(GPR_CLOCK_REALTIME)),
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800366 refresh_threshold) > 0)) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700367 jwt_md = grpc_credentials_md_store_ref(c->cached.jwt_md);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800368 }
369 gpr_mu_unlock(&c->cache_mu);
370 }
371
372 if (jwt_md == NULL) {
373 char *jwt = NULL;
374 /* Generate a new jwt. */
375 gpr_mu_lock(&c->cache_mu);
376 jwt_reset_cache(c);
377 jwt = grpc_jwt_encode_and_sign(&c->key, service_url, c->jwt_lifetime, NULL);
378 if (jwt != NULL) {
379 char *md_value;
380 gpr_asprintf(&md_value, "Bearer %s", jwt);
381 gpr_free(jwt);
Craig Tillerf1bff012015-07-06 11:20:50 -0700382 c->cached.jwt_expiration =
383 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), c->jwt_lifetime);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800384 c->cached.service_url = gpr_strdup(service_url);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700385 c->cached.jwt_md = grpc_credentials_md_store_create(1);
386 grpc_credentials_md_store_add_cstrings(
387 c->cached.jwt_md, GRPC_AUTHORIZATION_METADATA_KEY, md_value);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800388 gpr_free(md_value);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700389 jwt_md = grpc_credentials_md_store_ref(c->cached.jwt_md);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800390 }
391 gpr_mu_unlock(&c->cache_mu);
392 }
393
394 if (jwt_md != NULL) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700395 cb(user_data, jwt_md->entries, jwt_md->num_entries, GRPC_CREDENTIALS_OK);
396 grpc_credentials_md_store_unref(jwt_md);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800397 } else {
398 cb(user_data, NULL, 0, GRPC_CREDENTIALS_ERROR);
399 }
400}
401
402static grpc_credentials_vtable jwt_vtable = {
403 jwt_destroy, jwt_has_request_metadata, jwt_has_request_metadata_only,
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700404 jwt_get_request_metadata, NULL};
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800405
Julien Boeuffe4c3f42015-07-22 16:20:13 -0700406grpc_credentials *
407grpc_service_account_jwt_access_credentials_create_from_auth_json_key(
Julien Boeuf54006062015-07-07 19:13:04 -0700408 grpc_auth_json_key key, gpr_timespec token_lifetime) {
Julien Boeuffe4c3f42015-07-22 16:20:13 -0700409 grpc_service_account_jwt_access_credentials *c;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800410 if (!grpc_auth_json_key_is_valid(&key)) {
411 gpr_log(GPR_ERROR, "Invalid input for jwt credentials creation");
412 return NULL;
413 }
Julien Boeuffe4c3f42015-07-22 16:20:13 -0700414 c = gpr_malloc(sizeof(grpc_service_account_jwt_access_credentials));
415 memset(c, 0, sizeof(grpc_service_account_jwt_access_credentials));
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800416 c->base.type = GRPC_CREDENTIALS_TYPE_JWT;
417 gpr_ref_init(&c->base.refcount, 1);
418 c->base.vtable = &jwt_vtable;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800419 c->key = key;
420 c->jwt_lifetime = token_lifetime;
421 gpr_mu_init(&c->cache_mu);
422 jwt_reset_cache(c);
423 return &c->base;
424}
425
Julien Boeuffe4c3f42015-07-22 16:20:13 -0700426grpc_credentials *grpc_service_account_jwt_access_credentials_create(
427 const char *json_key, gpr_timespec token_lifetime) {
428 return grpc_service_account_jwt_access_credentials_create_from_auth_json_key(
Julien Boeuf54006062015-07-07 19:13:04 -0700429 grpc_auth_json_key_create_from_string(json_key), token_lifetime);
430}
431
jboeuf1a809c02014-12-19 15:44:30 -0800432/* -- Oauth2TokenFetcher credentials -- */
433
jboeuf1a809c02014-12-19 15:44:30 -0800434static void oauth2_token_fetcher_destroy(grpc_credentials *creds) {
435 grpc_oauth2_token_fetcher_credentials *c =
436 (grpc_oauth2_token_fetcher_credentials *)creds;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700437 grpc_credentials_md_store_unref(c->access_token_md);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800438 gpr_mu_destroy(&c->mu);
Craig Tillera0abe372015-06-01 11:31:08 -0700439 grpc_httpcli_context_destroy(&c->httpcli_context);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800440 gpr_free(c);
441}
442
jboeuf1a809c02014-12-19 15:44:30 -0800443static int oauth2_token_fetcher_has_request_metadata(
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800444 const grpc_credentials *creds) {
445 return 1;
446}
447
jboeuf1a809c02014-12-19 15:44:30 -0800448static int oauth2_token_fetcher_has_request_metadata_only(
449 const grpc_credentials *creds) {
450 return 1;
451}
452
453grpc_credentials_status
454grpc_oauth2_token_fetcher_credentials_parse_server_response(
Craig Tiller8674cb12015-06-05 07:09:25 -0700455 const grpc_httpcli_response *response, grpc_credentials_md_store **token_md,
456 gpr_timespec *token_lifetime) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800457 char *null_terminated_body = NULL;
458 char *new_access_token = NULL;
459 grpc_credentials_status status = GRPC_CREDENTIALS_OK;
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800460 grpc_json *json = NULL;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800461
Julien Boeuf90bd7c42015-02-18 18:51:16 -0800462 if (response == NULL) {
463 gpr_log(GPR_ERROR, "Received NULL response.");
464 status = GRPC_CREDENTIALS_ERROR;
465 goto end;
466 }
467
jboeuf1a809c02014-12-19 15:44:30 -0800468 if (response->body_length > 0) {
469 null_terminated_body = gpr_malloc(response->body_length + 1);
470 null_terminated_body[response->body_length] = '\0';
471 memcpy(null_terminated_body, response->body, response->body_length);
472 }
473
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800474 if (response->status != 200) {
jboeuf1a809c02014-12-19 15:44:30 -0800475 gpr_log(GPR_ERROR, "Call to http server ended with error %d [%s].",
476 response->status,
477 null_terminated_body != NULL ? null_terminated_body : "");
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800478 status = GRPC_CREDENTIALS_ERROR;
479 goto end;
480 } else {
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800481 grpc_json *access_token = NULL;
482 grpc_json *token_type = NULL;
483 grpc_json *expires_in = NULL;
484 grpc_json *ptr;
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800485 json = grpc_json_parse_string(null_terminated_body);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800486 if (json == NULL) {
487 gpr_log(GPR_ERROR, "Could not parse JSON from %s", null_terminated_body);
488 status = GRPC_CREDENTIALS_ERROR;
489 goto end;
490 }
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800491 if (json->type != GRPC_JSON_OBJECT) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800492 gpr_log(GPR_ERROR, "Response should be a JSON object");
493 status = GRPC_CREDENTIALS_ERROR;
494 goto end;
495 }
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800496 for (ptr = json->child; ptr; ptr = ptr->next) {
497 if (strcmp(ptr->key, "access_token") == 0) {
498 access_token = ptr;
499 } else if (strcmp(ptr->key, "token_type") == 0) {
500 token_type = ptr;
501 } else if (strcmp(ptr->key, "expires_in") == 0) {
502 expires_in = ptr;
503 }
504 }
505 if (access_token == NULL || access_token->type != GRPC_JSON_STRING) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800506 gpr_log(GPR_ERROR, "Missing or invalid access_token in JSON.");
507 status = GRPC_CREDENTIALS_ERROR;
508 goto end;
509 }
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800510 if (token_type == NULL || token_type->type != GRPC_JSON_STRING) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800511 gpr_log(GPR_ERROR, "Missing or invalid token_type in JSON.");
512 status = GRPC_CREDENTIALS_ERROR;
513 goto end;
514 }
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800515 if (expires_in == NULL || expires_in->type != GRPC_JSON_NUMBER) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800516 gpr_log(GPR_ERROR, "Missing or invalid expires_in in JSON.");
517 status = GRPC_CREDENTIALS_ERROR;
518 goto end;
519 }
Nicolas Noblefee065c2015-01-26 11:41:12 -0800520 gpr_asprintf(&new_access_token, "%s %s", token_type->value,
521 access_token->value);
Nicolas Noblee04455a2015-01-26 17:01:29 -0800522 token_lifetime->tv_sec = strtol(expires_in->value, NULL, 10);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800523 token_lifetime->tv_nsec = 0;
Craig Tiller143e7bf2015-07-13 08:41:49 -0700524 token_lifetime->clock_type = GPR_TIMESPAN;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700525 if (*token_md != NULL) grpc_credentials_md_store_unref(*token_md);
526 *token_md = grpc_credentials_md_store_create(1);
527 grpc_credentials_md_store_add_cstrings(
528 *token_md, GRPC_AUTHORIZATION_METADATA_KEY, new_access_token);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800529 status = GRPC_CREDENTIALS_OK;
530 }
531
532end:
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700533 if (status != GRPC_CREDENTIALS_OK && (*token_md != NULL)) {
534 grpc_credentials_md_store_unref(*token_md);
535 *token_md = NULL;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800536 }
537 if (null_terminated_body != NULL) gpr_free(null_terminated_body);
538 if (new_access_token != NULL) gpr_free(new_access_token);
Nicolas Noble8c2be9b2015-01-27 14:21:18 -0800539 if (json != NULL) grpc_json_destroy(json);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800540 return status;
541}
542
jboeuf1a809c02014-12-19 15:44:30 -0800543static void on_oauth2_token_fetcher_http_response(
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800544 void *user_data, const grpc_httpcli_response *response) {
545 grpc_credentials_metadata_request *r =
546 (grpc_credentials_metadata_request *)user_data;
jboeuf1a809c02014-12-19 15:44:30 -0800547 grpc_oauth2_token_fetcher_credentials *c =
548 (grpc_oauth2_token_fetcher_credentials *)r->creds;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800549 gpr_timespec token_lifetime;
550 grpc_credentials_status status;
551
552 gpr_mu_lock(&c->mu);
jboeuf1a809c02014-12-19 15:44:30 -0800553 status = grpc_oauth2_token_fetcher_credentials_parse_server_response(
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700554 response, &c->access_token_md, &token_lifetime);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800555 if (status == GRPC_CREDENTIALS_OK) {
Craig Tillerf1bff012015-07-06 11:20:50 -0700556 c->token_expiration =
557 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), token_lifetime);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700558 r->cb(r->user_data, c->access_token_md->entries,
559 c->access_token_md->num_entries, status);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800560 } else {
Craig Tiller143e7bf2015-07-13 08:41:49 -0700561 c->token_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800562 r->cb(r->user_data, NULL, 0, status);
563 }
564 gpr_mu_unlock(&c->mu);
565 grpc_credentials_metadata_request_destroy(r);
566}
567
jboeuf1a809c02014-12-19 15:44:30 -0800568static void oauth2_token_fetcher_get_request_metadata(
Craig Tiller06bac342015-06-01 12:55:57 -0700569 grpc_credentials *creds, grpc_pollset *pollset, const char *service_url,
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800570 grpc_credentials_metadata_cb cb, void *user_data) {
jboeuf1a809c02014-12-19 15:44:30 -0800571 grpc_oauth2_token_fetcher_credentials *c =
572 (grpc_oauth2_token_fetcher_credentials *)creds;
Craig Tiller58bbc862015-07-13 09:51:17 -0700573 gpr_timespec refresh_threshold = gpr_time_from_seconds(
574 GRPC_SECURE_TOKEN_REFRESH_THRESHOLD_SECS, GPR_TIMESPAN);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700575 grpc_credentials_md_store *cached_access_token_md = NULL;
jboeuf1a809c02014-12-19 15:44:30 -0800576 {
577 gpr_mu_lock(&c->mu);
578 if (c->access_token_md != NULL &&
Craig Tillerf1bff012015-07-06 11:20:50 -0700579 (gpr_time_cmp(
580 gpr_time_sub(c->token_expiration, gpr_now(GPR_CLOCK_REALTIME)),
581 refresh_threshold) > 0)) {
Craig Tiller8674cb12015-06-05 07:09:25 -0700582 cached_access_token_md =
583 grpc_credentials_md_store_ref(c->access_token_md);
jboeuf1a809c02014-12-19 15:44:30 -0800584 }
585 gpr_mu_unlock(&c->mu);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800586 }
jboeuf1a809c02014-12-19 15:44:30 -0800587 if (cached_access_token_md != NULL) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700588 cb(user_data, cached_access_token_md->entries,
589 cached_access_token_md->num_entries, GRPC_CREDENTIALS_OK);
590 grpc_credentials_md_store_unref(cached_access_token_md);
jboeuf1a809c02014-12-19 15:44:30 -0800591 } else {
592 c->fetch_func(
593 grpc_credentials_metadata_request_create(creds, cb, user_data),
Craig Tiller06bac342015-06-01 12:55:57 -0700594 &c->httpcli_context, pollset, on_oauth2_token_fetcher_http_response,
Craig Tillerf3756c12015-07-01 17:21:01 -0700595 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), refresh_threshold));
jboeuf1a809c02014-12-19 15:44:30 -0800596 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800597}
598
jboeuf1a809c02014-12-19 15:44:30 -0800599static void init_oauth2_token_fetcher(grpc_oauth2_token_fetcher_credentials *c,
600 grpc_fetch_oauth2_func fetch_func) {
601 memset(c, 0, sizeof(grpc_oauth2_token_fetcher_credentials));
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800602 c->base.type = GRPC_CREDENTIALS_TYPE_OAUTH2;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800603 gpr_ref_init(&c->base.refcount, 1);
604 gpr_mu_init(&c->mu);
Craig Tiller143e7bf2015-07-13 08:41:49 -0700605 c->token_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
jboeuf1a809c02014-12-19 15:44:30 -0800606 c->fetch_func = fetch_func;
Julien Boeuffeca1bf2015-06-22 16:46:20 +0200607 grpc_httpcli_context_init(&c->httpcli_context);
jboeuf1a809c02014-12-19 15:44:30 -0800608}
609
610/* -- ComputeEngine credentials. -- */
611
612static grpc_credentials_vtable compute_engine_vtable = {
Craig Tiller8674cb12015-06-05 07:09:25 -0700613 oauth2_token_fetcher_destroy, oauth2_token_fetcher_has_request_metadata,
jboeuf1a809c02014-12-19 15:44:30 -0800614 oauth2_token_fetcher_has_request_metadata_only,
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700615 oauth2_token_fetcher_get_request_metadata, NULL};
jboeuf1a809c02014-12-19 15:44:30 -0800616
617static void compute_engine_fetch_oauth2(
618 grpc_credentials_metadata_request *metadata_req,
Craig Tiller06bac342015-06-01 12:55:57 -0700619 grpc_httpcli_context *httpcli_context, grpc_pollset *pollset,
620 grpc_httpcli_response_cb response_cb, gpr_timespec deadline) {
jboeuf1a809c02014-12-19 15:44:30 -0800621 grpc_httpcli_header header = {"Metadata-Flavor", "Google"};
622 grpc_httpcli_request request;
623 memset(&request, 0, sizeof(grpc_httpcli_request));
624 request.host = GRPC_COMPUTE_ENGINE_METADATA_HOST;
625 request.path = GRPC_COMPUTE_ENGINE_METADATA_TOKEN_PATH;
626 request.hdr_count = 1;
627 request.hdrs = &header;
Craig Tiller06bac342015-06-01 12:55:57 -0700628 grpc_httpcli_get(httpcli_context, pollset, &request, deadline, response_cb,
Craig Tiller83b826a2015-05-13 13:43:01 -0700629 metadata_req);
jboeuf1a809c02014-12-19 15:44:30 -0800630}
631
632grpc_credentials *grpc_compute_engine_credentials_create(void) {
633 grpc_oauth2_token_fetcher_credentials *c =
634 gpr_malloc(sizeof(grpc_oauth2_token_fetcher_credentials));
635 init_oauth2_token_fetcher(c, compute_engine_fetch_oauth2);
636 c->base.vtable = &compute_engine_vtable;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800637 return &c->base;
638}
639
jboeuf1a809c02014-12-19 15:44:30 -0800640/* -- ServiceAccount credentials. -- */
641
jboeuf1a809c02014-12-19 15:44:30 -0800642static void service_account_destroy(grpc_credentials *creds) {
643 grpc_service_account_credentials *c =
644 (grpc_service_account_credentials *)creds;
645 if (c->scope != NULL) gpr_free(c->scope);
646 grpc_auth_json_key_destruct(&c->key);
647 oauth2_token_fetcher_destroy(&c->base.base);
648}
649
650static grpc_credentials_vtable service_account_vtable = {
Craig Tiller8674cb12015-06-05 07:09:25 -0700651 service_account_destroy, oauth2_token_fetcher_has_request_metadata,
jboeuf1a809c02014-12-19 15:44:30 -0800652 oauth2_token_fetcher_has_request_metadata_only,
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700653 oauth2_token_fetcher_get_request_metadata, NULL};
jboeuf1a809c02014-12-19 15:44:30 -0800654
655static void service_account_fetch_oauth2(
656 grpc_credentials_metadata_request *metadata_req,
Craig Tiller06bac342015-06-01 12:55:57 -0700657 grpc_httpcli_context *httpcli_context, grpc_pollset *pollset,
658 grpc_httpcli_response_cb response_cb, gpr_timespec deadline) {
jboeuf1a809c02014-12-19 15:44:30 -0800659 grpc_service_account_credentials *c =
660 (grpc_service_account_credentials *)metadata_req->creds;
661 grpc_httpcli_header header = {"Content-Type",
662 "application/x-www-form-urlencoded"};
663 grpc_httpcli_request request;
664 char *body = NULL;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800665 char *jwt = grpc_jwt_encode_and_sign(&c->key, GRPC_JWT_OAUTH2_AUDIENCE,
666 c->token_lifetime, c->scope);
jboeuf1a809c02014-12-19 15:44:30 -0800667 if (jwt == NULL) {
668 grpc_httpcli_response response;
669 memset(&response, 0, sizeof(grpc_httpcli_response));
670 response.status = 400; /* Invalid request. */
671 gpr_log(GPR_ERROR, "Could not create signed jwt.");
672 /* Do not even send the request, just call the response callback. */
673 response_cb(metadata_req, &response);
674 return;
675 }
Craig Tillerbe6a3552015-01-23 13:04:45 -0800676 gpr_asprintf(&body, "%s%s", GRPC_SERVICE_ACCOUNT_POST_BODY_PREFIX, jwt);
jboeuf1a809c02014-12-19 15:44:30 -0800677 memset(&request, 0, sizeof(grpc_httpcli_request));
Julien Boeuf9835cf02015-03-09 16:56:44 -0700678 request.host = GRPC_GOOGLE_OAUTH2_SERVICE_HOST;
679 request.path = GRPC_GOOGLE_OAUTH2_SERVICE_TOKEN_PATH;
jboeuf1a809c02014-12-19 15:44:30 -0800680 request.hdr_count = 1;
681 request.hdrs = &header;
Craig Tillerf53d9c82015-08-04 14:19:43 -0700682 request.handshaker = &grpc_httpcli_ssl;
Craig Tiller06bac342015-06-01 12:55:57 -0700683 grpc_httpcli_post(httpcli_context, pollset, &request, body, strlen(body),
684 deadline, response_cb, metadata_req);
jboeuf1a809c02014-12-19 15:44:30 -0800685 gpr_free(body);
686 gpr_free(jwt);
687}
688
689grpc_credentials *grpc_service_account_credentials_create(
690 const char *json_key, const char *scope, gpr_timespec token_lifetime) {
691 grpc_service_account_credentials *c;
692 grpc_auth_json_key key = grpc_auth_json_key_create_from_string(json_key);
693
694 if (scope == NULL || (strlen(scope) == 0) ||
695 !grpc_auth_json_key_is_valid(&key)) {
696 gpr_log(GPR_ERROR,
697 "Invalid input for service account credentials creation");
698 return NULL;
699 }
700 c = gpr_malloc(sizeof(grpc_service_account_credentials));
701 memset(c, 0, sizeof(grpc_service_account_credentials));
702 init_oauth2_token_fetcher(&c->base, service_account_fetch_oauth2);
703 c->base.base.vtable = &service_account_vtable;
704 c->scope = gpr_strdup(scope);
705 c->key = key;
706 c->token_lifetime = token_lifetime;
707 return &c->base.base;
708}
709
Julien Boeuf9835cf02015-03-09 16:56:44 -0700710/* -- RefreshToken credentials. -- */
711
Julien Boeuf9835cf02015-03-09 16:56:44 -0700712static void refresh_token_destroy(grpc_credentials *creds) {
Craig Tiller83b826a2015-05-13 13:43:01 -0700713 grpc_refresh_token_credentials *c = (grpc_refresh_token_credentials *)creds;
Julien Boeuf9835cf02015-03-09 16:56:44 -0700714 grpc_auth_refresh_token_destruct(&c->refresh_token);
715 oauth2_token_fetcher_destroy(&c->base.base);
716}
717
718static grpc_credentials_vtable refresh_token_vtable = {
Craig Tiller8674cb12015-06-05 07:09:25 -0700719 refresh_token_destroy, oauth2_token_fetcher_has_request_metadata,
Julien Boeuf9835cf02015-03-09 16:56:44 -0700720 oauth2_token_fetcher_has_request_metadata_only,
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700721 oauth2_token_fetcher_get_request_metadata, NULL};
Julien Boeuf9835cf02015-03-09 16:56:44 -0700722
723static void refresh_token_fetch_oauth2(
724 grpc_credentials_metadata_request *metadata_req,
Craig Tiller06bac342015-06-01 12:55:57 -0700725 grpc_httpcli_context *httpcli_context, grpc_pollset *pollset,
726 grpc_httpcli_response_cb response_cb, gpr_timespec deadline) {
Julien Boeuf9835cf02015-03-09 16:56:44 -0700727 grpc_refresh_token_credentials *c =
728 (grpc_refresh_token_credentials *)metadata_req->creds;
729 grpc_httpcli_header header = {"Content-Type",
730 "application/x-www-form-urlencoded"};
731 grpc_httpcli_request request;
732 char *body = NULL;
733 gpr_asprintf(&body, GRPC_REFRESH_TOKEN_POST_BODY_FORMAT_STRING,
734 c->refresh_token.client_id, c->refresh_token.client_secret,
735 c->refresh_token.refresh_token);
736 memset(&request, 0, sizeof(grpc_httpcli_request));
737 request.host = GRPC_GOOGLE_OAUTH2_SERVICE_HOST;
738 request.path = GRPC_GOOGLE_OAUTH2_SERVICE_TOKEN_PATH;
739 request.hdr_count = 1;
740 request.hdrs = &header;
Craig Tillerf53d9c82015-08-04 14:19:43 -0700741 request.handshaker = &grpc_httpcli_ssl;
Craig Tiller06bac342015-06-01 12:55:57 -0700742 grpc_httpcli_post(httpcli_context, pollset, &request, body, strlen(body),
743 deadline, response_cb, metadata_req);
Julien Boeuf9835cf02015-03-09 16:56:44 -0700744 gpr_free(body);
745}
746
Julien Boeuf54006062015-07-07 19:13:04 -0700747grpc_credentials *grpc_refresh_token_credentials_create_from_auth_refresh_token(
748 grpc_auth_refresh_token refresh_token) {
Julien Boeuf9835cf02015-03-09 16:56:44 -0700749 grpc_refresh_token_credentials *c;
Julien Boeuf9835cf02015-03-09 16:56:44 -0700750 if (!grpc_auth_refresh_token_is_valid(&refresh_token)) {
Craig Tiller83b826a2015-05-13 13:43:01 -0700751 gpr_log(GPR_ERROR, "Invalid input for refresh token credentials creation");
Julien Boeuf9835cf02015-03-09 16:56:44 -0700752 return NULL;
753 }
754 c = gpr_malloc(sizeof(grpc_refresh_token_credentials));
755 memset(c, 0, sizeof(grpc_refresh_token_credentials));
756 init_oauth2_token_fetcher(&c->base, refresh_token_fetch_oauth2);
757 c->base.base.vtable = &refresh_token_vtable;
758 c->refresh_token = refresh_token;
759 return &c->base.base;
760}
761
Julien Boeuf54006062015-07-07 19:13:04 -0700762grpc_credentials *grpc_refresh_token_credentials_create(
763 const char *json_refresh_token) {
764 return grpc_refresh_token_credentials_create_from_auth_refresh_token(
765 grpc_auth_refresh_token_create_from_string(json_refresh_token));
766}
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800767
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800768/* -- Fake Oauth2 credentials. -- */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800769
770static void fake_oauth2_destroy(grpc_credentials *creds) {
771 grpc_fake_oauth2_credentials *c = (grpc_fake_oauth2_credentials *)creds;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700772 grpc_credentials_md_store_unref(c->access_token_md);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800773 gpr_free(c);
774}
775
776static int fake_oauth2_has_request_metadata(const grpc_credentials *creds) {
777 return 1;
778}
779
780static int fake_oauth2_has_request_metadata_only(
781 const grpc_credentials *creds) {
782 return 1;
783}
784
ctiller58393c22015-01-07 14:03:30 -0800785void on_simulated_token_fetch_done(void *user_data, int success) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800786 grpc_credentials_metadata_request *r =
787 (grpc_credentials_metadata_request *)user_data;
788 grpc_fake_oauth2_credentials *c = (grpc_fake_oauth2_credentials *)r->creds;
ctiller58393c22015-01-07 14:03:30 -0800789 GPR_ASSERT(success);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700790 r->cb(r->user_data, c->access_token_md->entries,
791 c->access_token_md->num_entries, GRPC_CREDENTIALS_OK);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800792 grpc_credentials_metadata_request_destroy(r);
793}
794
795static void fake_oauth2_get_request_metadata(grpc_credentials *creds,
Craig Tiller06bac342015-06-01 12:55:57 -0700796 grpc_pollset *pollset,
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800797 const char *service_url,
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800798 grpc_credentials_metadata_cb cb,
799 void *user_data) {
800 grpc_fake_oauth2_credentials *c = (grpc_fake_oauth2_credentials *)creds;
801
802 if (c->is_async) {
David Garcia Quintas69ba8712015-06-01 11:29:42 -0700803 grpc_credentials_metadata_request *cb_arg =
David Garcia Quintas8b8cce02015-05-31 12:39:40 -0700804 grpc_credentials_metadata_request_create(creds, cb, user_data);
David Garcia Quintas69ba8712015-06-01 11:29:42 -0700805 grpc_iomgr_closure_init(cb_arg->on_simulated_token_fetch_done_closure,
806 on_simulated_token_fetch_done, cb_arg);
807 grpc_iomgr_add_callback(cb_arg->on_simulated_token_fetch_done_closure);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800808 } else {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700809 cb(user_data, c->access_token_md->entries, 1, GRPC_CREDENTIALS_OK);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800810 }
811}
812
813static grpc_credentials_vtable fake_oauth2_vtable = {
814 fake_oauth2_destroy, fake_oauth2_has_request_metadata,
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700815 fake_oauth2_has_request_metadata_only, fake_oauth2_get_request_metadata,
Craig Tiller83b826a2015-05-13 13:43:01 -0700816 NULL};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800817
818grpc_credentials *grpc_fake_oauth2_credentials_create(
819 const char *token_md_value, int is_async) {
820 grpc_fake_oauth2_credentials *c =
821 gpr_malloc(sizeof(grpc_fake_oauth2_credentials));
822 memset(c, 0, sizeof(grpc_fake_oauth2_credentials));
823 c->base.type = GRPC_CREDENTIALS_TYPE_OAUTH2;
824 c->base.vtable = &fake_oauth2_vtable;
825 gpr_ref_init(&c->base.refcount, 1);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700826 c->access_token_md = grpc_credentials_md_store_create(1);
827 grpc_credentials_md_store_add_cstrings(
828 c->access_token_md, GRPC_AUTHORIZATION_METADATA_KEY, token_md_value);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800829 c->is_async = is_async;
830 return &c->base;
831}
832
Julien Boeuf2805be12015-07-01 02:47:18 -0700833/* -- Oauth2 Access Token credentials. -- */
834
Julien Boeuf2805be12015-07-01 02:47:18 -0700835static void access_token_destroy(grpc_credentials *creds) {
836 grpc_access_token_credentials *c = (grpc_access_token_credentials *)creds;
837 grpc_credentials_md_store_unref(c->access_token_md);
838 gpr_free(c);
839}
840
841static int access_token_has_request_metadata(const grpc_credentials *creds) {
842 return 1;
843}
844
845static int access_token_has_request_metadata_only(
846 const grpc_credentials *creds) {
847 return 1;
848}
849
850static void access_token_get_request_metadata(grpc_credentials *creds,
851 grpc_pollset *pollset,
852 const char *service_url,
853 grpc_credentials_metadata_cb cb,
854 void *user_data) {
855 grpc_access_token_credentials *c = (grpc_access_token_credentials *)creds;
856 cb(user_data, c->access_token_md->entries, 1, GRPC_CREDENTIALS_OK);
857}
858
859static grpc_credentials_vtable access_token_vtable = {
860 access_token_destroy, access_token_has_request_metadata,
861 access_token_has_request_metadata_only, access_token_get_request_metadata,
862 NULL};
863
864grpc_credentials *grpc_access_token_credentials_create(
865 const char *access_token) {
866 grpc_access_token_credentials *c =
867 gpr_malloc(sizeof(grpc_access_token_credentials));
868 char *token_md_value;
869 memset(c, 0, sizeof(grpc_access_token_credentials));
870 c->base.type = GRPC_CREDENTIALS_TYPE_OAUTH2;
871 c->base.vtable = &access_token_vtable;
872 gpr_ref_init(&c->base.refcount, 1);
873 c->access_token_md = grpc_credentials_md_store_create(1);
874 gpr_asprintf(&token_md_value, "Bearer %s", access_token);
875 grpc_credentials_md_store_add_cstrings(
876 c->access_token_md, GRPC_AUTHORIZATION_METADATA_KEY, token_md_value);
877 gpr_free(token_md_value);
878 return &c->base;
879}
880
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800881/* -- Fake transport security credentials. -- */
882
883static void fake_transport_security_credentials_destroy(
884 grpc_credentials *creds) {
885 gpr_free(creds);
886}
887
888static void fake_transport_security_server_credentials_destroy(
889 grpc_server_credentials *creds) {
890 gpr_free(creds);
891}
892
893static int fake_transport_security_has_request_metadata(
894 const grpc_credentials *creds) {
895 return 0;
896}
897
898static int fake_transport_security_has_request_metadata_only(
899 const grpc_credentials *creds) {
900 return 0;
901}
902
Craig Tiller8674cb12015-06-05 07:09:25 -0700903static grpc_security_status fake_transport_security_create_security_connector(
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700904 grpc_credentials *c, const char *target, const grpc_channel_args *args,
905 grpc_credentials *request_metadata_creds,
906 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
907 *sc = grpc_fake_channel_security_connector_create(request_metadata_creds, 1);
908 return GRPC_SECURITY_OK;
909}
910
911static grpc_security_status
912fake_transport_security_server_create_security_connector(
913 grpc_server_credentials *c, grpc_security_connector **sc) {
914 *sc = grpc_fake_server_security_connector_create();
915 return GRPC_SECURITY_OK;
916}
917
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800918static grpc_credentials_vtable fake_transport_security_credentials_vtable = {
919 fake_transport_security_credentials_destroy,
920 fake_transport_security_has_request_metadata,
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700921 fake_transport_security_has_request_metadata_only, NULL,
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700922 fake_transport_security_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800923
924static grpc_server_credentials_vtable
925 fake_transport_security_server_credentials_vtable = {
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700926 fake_transport_security_server_credentials_destroy,
927 fake_transport_security_server_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800928
929grpc_credentials *grpc_fake_transport_security_credentials_create(void) {
930 grpc_credentials *c = gpr_malloc(sizeof(grpc_credentials));
931 memset(c, 0, sizeof(grpc_credentials));
932 c->type = GRPC_CREDENTIALS_TYPE_FAKE_TRANSPORT_SECURITY;
933 c->vtable = &fake_transport_security_credentials_vtable;
934 gpr_ref_init(&c->refcount, 1);
935 return c;
936}
937
Craig Tiller3eef2c42015-01-15 11:37:54 -0800938grpc_server_credentials *grpc_fake_transport_security_server_credentials_create(
939 void) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800940 grpc_server_credentials *c = gpr_malloc(sizeof(grpc_server_credentials));
941 memset(c, 0, sizeof(grpc_server_credentials));
942 c->type = GRPC_CREDENTIALS_TYPE_FAKE_TRANSPORT_SECURITY;
943 c->vtable = &fake_transport_security_server_credentials_vtable;
944 return c;
945}
946
nnoble0c475f02014-12-05 15:37:39 -0800947/* -- Composite credentials. -- */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800948
nnoble0c475f02014-12-05 15:37:39 -0800949typedef struct {
nnoble0c475f02014-12-05 15:37:39 -0800950 grpc_composite_credentials *composite_creds;
951 size_t creds_index;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700952 grpc_credentials_md_store *md_elems;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800953 char *service_url;
nnoble0c475f02014-12-05 15:37:39 -0800954 void *user_data;
Craig Tiller06bac342015-06-01 12:55:57 -0700955 grpc_pollset *pollset;
nnoble0c475f02014-12-05 15:37:39 -0800956 grpc_credentials_metadata_cb cb;
957} grpc_composite_credentials_metadata_context;
958
959static void composite_destroy(grpc_credentials *creds) {
960 grpc_composite_credentials *c = (grpc_composite_credentials *)creds;
961 size_t i;
962 for (i = 0; i < c->inner.num_creds; i++) {
963 grpc_credentials_unref(c->inner.creds_array[i]);
964 }
965 gpr_free(c->inner.creds_array);
966 gpr_free(creds);
967}
968
969static int composite_has_request_metadata(const grpc_credentials *creds) {
970 const grpc_composite_credentials *c =
971 (const grpc_composite_credentials *)creds;
972 size_t i;
973 for (i = 0; i < c->inner.num_creds; i++) {
974 if (grpc_credentials_has_request_metadata(c->inner.creds_array[i])) {
975 return 1;
976 }
977 }
978 return 0;
979}
980
981static int composite_has_request_metadata_only(const grpc_credentials *creds) {
982 const grpc_composite_credentials *c =
983 (const grpc_composite_credentials *)creds;
984 size_t i;
985 for (i = 0; i < c->inner.num_creds; i++) {
986 if (!grpc_credentials_has_request_metadata_only(c->inner.creds_array[i])) {
987 return 0;
988 }
989 }
990 return 1;
991}
992
993static void composite_md_context_destroy(
994 grpc_composite_credentials_metadata_context *ctx) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700995 grpc_credentials_md_store_unref(ctx->md_elems);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800996 if (ctx->service_url != NULL) gpr_free(ctx->service_url);
nnoble0c475f02014-12-05 15:37:39 -0800997 gpr_free(ctx);
998}
999
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001000static void composite_metadata_cb(void *user_data,
1001 grpc_credentials_md *md_elems, size_t num_md,
nnoble0c475f02014-12-05 15:37:39 -08001002 grpc_credentials_status status) {
1003 grpc_composite_credentials_metadata_context *ctx =
1004 (grpc_composite_credentials_metadata_context *)user_data;
nnoble0c475f02014-12-05 15:37:39 -08001005 if (status != GRPC_CREDENTIALS_OK) {
1006 ctx->cb(ctx->user_data, NULL, 0, status);
1007 return;
1008 }
1009
1010 /* Copy the metadata in the context. */
1011 if (num_md > 0) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001012 size_t i;
nnoble0c475f02014-12-05 15:37:39 -08001013 for (i = 0; i < num_md; i++) {
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001014 grpc_credentials_md_store_add(ctx->md_elems, md_elems[i].key,
1015 md_elems[i].value);
nnoble0c475f02014-12-05 15:37:39 -08001016 }
nnoble0c475f02014-12-05 15:37:39 -08001017 }
1018
1019 /* See if we need to get some more metadata. */
1020 while (ctx->creds_index < ctx->composite_creds->inner.num_creds) {
1021 grpc_credentials *inner_creds =
1022 ctx->composite_creds->inner.creds_array[ctx->creds_index++];
1023 if (grpc_credentials_has_request_metadata(inner_creds)) {
Craig Tiller06bac342015-06-01 12:55:57 -07001024 grpc_credentials_get_request_metadata(inner_creds, ctx->pollset,
1025 ctx->service_url,
Julien Boeuff47a5cb2015-02-18 12:24:08 -08001026 composite_metadata_cb, ctx);
nnoble0c475f02014-12-05 15:37:39 -08001027 return;
1028 }
1029 }
1030
1031 /* We're done!. */
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001032 ctx->cb(ctx->user_data, ctx->md_elems->entries, ctx->md_elems->num_entries,
1033 GRPC_CREDENTIALS_OK);
nnoble0c475f02014-12-05 15:37:39 -08001034 composite_md_context_destroy(ctx);
1035}
1036
1037static void composite_get_request_metadata(grpc_credentials *creds,
Craig Tiller06bac342015-06-01 12:55:57 -07001038 grpc_pollset *pollset,
Julien Boeuff47a5cb2015-02-18 12:24:08 -08001039 const char *service_url,
nnoble0c475f02014-12-05 15:37:39 -08001040 grpc_credentials_metadata_cb cb,
1041 void *user_data) {
1042 grpc_composite_credentials *c = (grpc_composite_credentials *)creds;
1043 grpc_composite_credentials_metadata_context *ctx;
1044 if (!grpc_credentials_has_request_metadata(creds)) {
1045 cb(user_data, NULL, 0, GRPC_CREDENTIALS_OK);
1046 return;
1047 }
1048 ctx = gpr_malloc(sizeof(grpc_composite_credentials_metadata_context));
1049 memset(ctx, 0, sizeof(grpc_composite_credentials_metadata_context));
Julien Boeuff47a5cb2015-02-18 12:24:08 -08001050 ctx->service_url = gpr_strdup(service_url);
nnoble0c475f02014-12-05 15:37:39 -08001051 ctx->user_data = user_data;
1052 ctx->cb = cb;
1053 ctx->composite_creds = c;
Craig Tiller06bac342015-06-01 12:55:57 -07001054 ctx->pollset = pollset;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001055 ctx->md_elems = grpc_credentials_md_store_create(c->inner.num_creds);
nnoble0c475f02014-12-05 15:37:39 -08001056 while (ctx->creds_index < c->inner.num_creds) {
1057 grpc_credentials *inner_creds = c->inner.creds_array[ctx->creds_index++];
1058 if (grpc_credentials_has_request_metadata(inner_creds)) {
Craig Tiller06bac342015-06-01 12:55:57 -07001059 grpc_credentials_get_request_metadata(inner_creds, pollset, service_url,
Julien Boeuff47a5cb2015-02-18 12:24:08 -08001060 composite_metadata_cb, ctx);
nnoble0c475f02014-12-05 15:37:39 -08001061 return;
1062 }
1063 }
1064 GPR_ASSERT(0); /* Should have exited before. */
1065}
1066
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001067static grpc_security_status composite_create_security_connector(
1068 grpc_credentials *creds, const char *target, const grpc_channel_args *args,
1069 grpc_credentials *request_metadata_creds,
1070 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
1071 grpc_composite_credentials *c = (grpc_composite_credentials *)creds;
1072 if (c->connector_creds == NULL) {
1073 gpr_log(GPR_ERROR,
1074 "Cannot create security connector, missing connector credentials.");
1075 return GRPC_SECURITY_ERROR;
1076 }
1077 return grpc_credentials_create_security_connector(c->connector_creds, target,
1078 args, creds, sc, new_args);
1079}
1080
nnoble0c475f02014-12-05 15:37:39 -08001081static grpc_credentials_vtable composite_credentials_vtable = {
1082 composite_destroy, composite_has_request_metadata,
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001083 composite_has_request_metadata_only, composite_get_request_metadata,
Craig Tiller83b826a2015-05-13 13:43:01 -07001084 composite_create_security_connector};
nnoble0c475f02014-12-05 15:37:39 -08001085
1086static grpc_credentials_array get_creds_array(grpc_credentials **creds_addr) {
1087 grpc_credentials_array result;
1088 grpc_credentials *creds = *creds_addr;
1089 result.creds_array = creds_addr;
1090 result.num_creds = 1;
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -08001091 if (strcmp(creds->type, GRPC_CREDENTIALS_TYPE_COMPOSITE) == 0) {
nnoble0c475f02014-12-05 15:37:39 -08001092 result = *grpc_composite_credentials_get_credentials(creds);
1093 }
1094 return result;
1095}
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001096
1097grpc_credentials *grpc_composite_credentials_create(grpc_credentials *creds1,
1098 grpc_credentials *creds2) {
nnoble0c475f02014-12-05 15:37:39 -08001099 size_t i;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001100 size_t creds_array_byte_size;
nnoble0c475f02014-12-05 15:37:39 -08001101 grpc_credentials_array creds1_array;
1102 grpc_credentials_array creds2_array;
1103 grpc_composite_credentials *c;
1104 GPR_ASSERT(creds1 != NULL);
1105 GPR_ASSERT(creds2 != NULL);
1106 c = gpr_malloc(sizeof(grpc_composite_credentials));
1107 memset(c, 0, sizeof(grpc_composite_credentials));
1108 c->base.type = GRPC_CREDENTIALS_TYPE_COMPOSITE;
1109 c->base.vtable = &composite_credentials_vtable;
1110 gpr_ref_init(&c->base.refcount, 1);
1111 creds1_array = get_creds_array(&creds1);
1112 creds2_array = get_creds_array(&creds2);
1113 c->inner.num_creds = creds1_array.num_creds + creds2_array.num_creds;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001114 creds_array_byte_size = c->inner.num_creds * sizeof(grpc_credentials *);
1115 c->inner.creds_array = gpr_malloc(creds_array_byte_size);
1116 memset(c->inner.creds_array, 0, creds_array_byte_size);
nnoble0c475f02014-12-05 15:37:39 -08001117 for (i = 0; i < creds1_array.num_creds; i++) {
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001118 grpc_credentials *cur_creds = creds1_array.creds_array[i];
1119 if (!grpc_credentials_has_request_metadata_only(cur_creds)) {
1120 if (c->connector_creds == NULL) {
1121 c->connector_creds = cur_creds;
1122 } else {
1123 gpr_log(GPR_ERROR, "Cannot compose multiple connector credentials.");
1124 goto fail;
1125 }
1126 }
1127 c->inner.creds_array[i] = grpc_credentials_ref(cur_creds);
nnoble0c475f02014-12-05 15:37:39 -08001128 }
1129 for (i = 0; i < creds2_array.num_creds; i++) {
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001130 grpc_credentials *cur_creds = creds2_array.creds_array[i];
1131 if (!grpc_credentials_has_request_metadata_only(cur_creds)) {
1132 if (c->connector_creds == NULL) {
1133 c->connector_creds = cur_creds;
1134 } else {
1135 gpr_log(GPR_ERROR, "Cannot compose multiple connector credentials.");
1136 goto fail;
1137 }
1138 }
nnoble0c475f02014-12-05 15:37:39 -08001139 c->inner.creds_array[i + creds1_array.num_creds] =
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001140 grpc_credentials_ref(cur_creds);
nnoble0c475f02014-12-05 15:37:39 -08001141 }
1142 return &c->base;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001143
1144fail:
1145 grpc_credentials_unref(&c->base);
1146 return NULL;
nnoble0c475f02014-12-05 15:37:39 -08001147}
1148
1149const grpc_credentials_array *grpc_composite_credentials_get_credentials(
1150 grpc_credentials *creds) {
1151 const grpc_composite_credentials *c =
1152 (const grpc_composite_credentials *)creds;
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -08001153 GPR_ASSERT(strcmp(creds->type, GRPC_CREDENTIALS_TYPE_COMPOSITE) == 0);
nnoble0c475f02014-12-05 15:37:39 -08001154 return &c->inner;
1155}
1156
jboeuf6ad120e2015-01-12 17:08:15 -08001157grpc_credentials *grpc_credentials_contains_type(
1158 grpc_credentials *creds, const char *type,
1159 grpc_credentials **composite_creds) {
1160 size_t i;
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -08001161 if (strcmp(creds->type, type) == 0) {
jboeuf6ad120e2015-01-12 17:08:15 -08001162 if (composite_creds != NULL) *composite_creds = NULL;
1163 return creds;
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -08001164 } else if (strcmp(creds->type, GRPC_CREDENTIALS_TYPE_COMPOSITE) == 0) {
jboeuf6ad120e2015-01-12 17:08:15 -08001165 const grpc_credentials_array *inner_creds_array =
1166 grpc_composite_credentials_get_credentials(creds);
1167 for (i = 0; i < inner_creds_array->num_creds; i++) {
Ronnie Sahlberg2ad8d212015-03-07 08:39:22 -08001168 if (strcmp(type, inner_creds_array->creds_array[i]->type) == 0) {
jboeuf6ad120e2015-01-12 17:08:15 -08001169 if (composite_creds != NULL) *composite_creds = creds;
1170 return inner_creds_array->creds_array[i];
1171 }
1172 }
1173 }
1174 return NULL;
1175}
1176
nnoble0c475f02014-12-05 15:37:39 -08001177/* -- IAM credentials. -- */
1178
nnoble0c475f02014-12-05 15:37:39 -08001179static void iam_destroy(grpc_credentials *creds) {
1180 grpc_iam_credentials *c = (grpc_iam_credentials *)creds;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001181 grpc_credentials_md_store_unref(c->iam_md);
nnoble0c475f02014-12-05 15:37:39 -08001182 gpr_free(c);
1183}
1184
Craig Tiller83b826a2015-05-13 13:43:01 -07001185static int iam_has_request_metadata(const grpc_credentials *creds) { return 1; }
nnoble0c475f02014-12-05 15:37:39 -08001186
1187static int iam_has_request_metadata_only(const grpc_credentials *creds) {
1188 return 1;
1189}
1190
1191static void iam_get_request_metadata(grpc_credentials *creds,
Craig Tiller06bac342015-06-01 12:55:57 -07001192 grpc_pollset *pollset,
Julien Boeuff47a5cb2015-02-18 12:24:08 -08001193 const char *service_url,
nnoble0c475f02014-12-05 15:37:39 -08001194 grpc_credentials_metadata_cb cb,
1195 void *user_data) {
1196 grpc_iam_credentials *c = (grpc_iam_credentials *)creds;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001197 cb(user_data, c->iam_md->entries, c->iam_md->num_entries,
1198 GRPC_CREDENTIALS_OK);
nnoble0c475f02014-12-05 15:37:39 -08001199}
1200
1201static grpc_credentials_vtable iam_vtable = {
1202 iam_destroy, iam_has_request_metadata, iam_has_request_metadata_only,
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001203 iam_get_request_metadata, NULL};
nnoble0c475f02014-12-05 15:37:39 -08001204
1205grpc_credentials *grpc_iam_credentials_create(const char *token,
1206 const char *authority_selector) {
1207 grpc_iam_credentials *c;
1208 GPR_ASSERT(token != NULL);
1209 GPR_ASSERT(authority_selector != NULL);
1210 c = gpr_malloc(sizeof(grpc_iam_credentials));
1211 memset(c, 0, sizeof(grpc_iam_credentials));
1212 c->base.type = GRPC_CREDENTIALS_TYPE_IAM;
1213 c->base.vtable = &iam_vtable;
1214 gpr_ref_init(&c->base.refcount, 1);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -07001215 c->iam_md = grpc_credentials_md_store_create(2);
1216 grpc_credentials_md_store_add_cstrings(
1217 c->iam_md, GRPC_IAM_AUTHORIZATION_TOKEN_METADATA_KEY, token);
1218 grpc_credentials_md_store_add_cstrings(
1219 c->iam_md, GRPC_IAM_AUTHORITY_SELECTOR_METADATA_KEY, authority_selector);
nnoble0c475f02014-12-05 15:37:39 -08001220 return &c->base;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001221}