blob: 38a6710cd47521c1b65e5a0b6855e16112563f89 [file] [log] [blame]
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001/*
2 *
Craig Tiller06059952015-02-18 08:34:56 -08003 * Copyright 2015, Google Inc.
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08004 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are
8 * met:
9 *
10 * * Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * * Redistributions in binary form must reproduce the above
13 * copyright notice, this list of conditions and the following disclaimer
14 * in the documentation and/or other materials provided with the
15 * distribution.
16 * * Neither the name of Google Inc. nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
24 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
30 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 *
32 */
33
34#include "src/core/security/credentials.h"
35
Julien Boeuff47a5cb2015-02-18 12:24:08 -080036#include <stdio.h>
Julien Boeuf3c957e62015-11-18 21:33:58 -080037#include <string.h>
Julien Boeuff47a5cb2015-02-18 12:24:08 -080038
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -070039#include "src/core/channel/channel_args.h"
40#include "src/core/channel/http_client_filter.h"
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080041#include "src/core/httpcli/httpcli.h"
Craig Tillerf62c4d52015-12-04 07:43:07 -080042#include "src/core/iomgr/executor.h"
Julien Boeuf3c957e62015-11-18 21:33:58 -080043#include "src/core/json/json.h"
Craig Tiller485d7762015-01-23 12:54:05 -080044#include "src/core/support/string.h"
Julien Boeuf3c957e62015-11-18 21:33:58 -080045#include "src/core/surface/api_trace.h"
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -070046
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080047#include <grpc/support/alloc.h>
48#include <grpc/support/log.h>
Masood Malekghassemi701af602015-06-03 15:01:17 -070049#include <grpc/support/string_util.h>
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080050#include <grpc/support/sync.h>
51#include <grpc/support/time.h>
52
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080053/* -- Common. -- */
54
Craig Tillera82950e2015-09-22 12:33:20 -070055struct grpc_credentials_metadata_request {
Julien Boeuf441176d2015-10-09 21:14:07 -070056 grpc_call_credentials *creds;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080057 grpc_credentials_metadata_cb cb;
58 void *user_data;
Julien Boeufb037bb62015-07-08 14:58:14 -070059};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080060
61static grpc_credentials_metadata_request *
Julien Boeuf441176d2015-10-09 21:14:07 -070062grpc_credentials_metadata_request_create(grpc_call_credentials *creds,
Craig Tillera82950e2015-09-22 12:33:20 -070063 grpc_credentials_metadata_cb cb,
64 void *user_data) {
65 grpc_credentials_metadata_request *r =
66 gpr_malloc(sizeof(grpc_credentials_metadata_request));
Julien Boeuf441176d2015-10-09 21:14:07 -070067 r->creds = grpc_call_credentials_ref(creds);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080068 r->cb = cb;
69 r->user_data = user_data;
70 return r;
71}
72
Craig Tillera82950e2015-09-22 12:33:20 -070073static void grpc_credentials_metadata_request_destroy(
74 grpc_credentials_metadata_request *r) {
Julien Boeuf441176d2015-10-09 21:14:07 -070075 grpc_call_credentials_unref(r->creds);
Craig Tillera82950e2015-09-22 12:33:20 -070076 gpr_free(r);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080077}
78
Julien Boeuf441176d2015-10-09 21:14:07 -070079grpc_channel_credentials *grpc_channel_credentials_ref(
80 grpc_channel_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -070081 if (creds == NULL) return NULL;
82 gpr_ref(&creds->refcount);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080083 return creds;
84}
85
Julien Boeuf441176d2015-10-09 21:14:07 -070086void grpc_channel_credentials_unref(grpc_channel_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -070087 if (creds == NULL) return;
88 if (gpr_unref(&creds->refcount)) {
Julien Boeufb73cbc22015-10-20 21:52:54 -070089 if (creds->vtable->destruct != NULL) creds->vtable->destruct(creds);
Craig Tillera82950e2015-09-22 12:33:20 -070090 gpr_free(creds);
91 }
92}
93
Julien Boeuf441176d2015-10-09 21:14:07 -070094void grpc_channel_credentials_release(grpc_channel_credentials *creds) {
95 GRPC_API_TRACE("grpc_channel_credentials_release(creds=%p)", 1, (creds));
96 grpc_channel_credentials_unref(creds);
Craig Tillera82950e2015-09-22 12:33:20 -070097}
98
Julien Boeuf441176d2015-10-09 21:14:07 -070099grpc_call_credentials *grpc_call_credentials_ref(grpc_call_credentials *creds) {
100 if (creds == NULL) return NULL;
101 gpr_ref(&creds->refcount);
102 return creds;
Craig Tillera82950e2015-09-22 12:33:20 -0700103}
104
Julien Boeuf441176d2015-10-09 21:14:07 -0700105void grpc_call_credentials_unref(grpc_call_credentials *creds) {
106 if (creds == NULL) return;
107 if (gpr_unref(&creds->refcount)) {
Julien Boeufb73cbc22015-10-20 21:52:54 -0700108 if (creds->vtable->destruct != NULL) creds->vtable->destruct(creds);
Julien Boeuf441176d2015-10-09 21:14:07 -0700109 gpr_free(creds);
110 }
111}
112
113void grpc_call_credentials_release(grpc_call_credentials *creds) {
114 GRPC_API_TRACE("grpc_call_credentials_release(creds=%p)", 1, (creds));
115 grpc_call_credentials_unref(creds);
Craig Tillera82950e2015-09-22 12:33:20 -0700116}
117
Julien Boeuf4e02e842015-10-09 22:49:42 -0700118void grpc_call_credentials_get_request_metadata(
Julien Boeuf3c957e62015-11-18 21:33:58 -0800119 grpc_exec_ctx *exec_ctx, grpc_call_credentials *creds,
120 grpc_pollset *pollset, grpc_auth_metadata_context context,
121 grpc_credentials_metadata_cb cb, void *user_data) {
Julien Boeuf441176d2015-10-09 21:14:07 -0700122 if (creds == NULL || creds->vtable->get_request_metadata == NULL) {
Craig Tillera82950e2015-09-22 12:33:20 -0700123 if (cb != NULL) {
124 cb(exec_ctx, user_data, NULL, 0, GRPC_CREDENTIALS_OK);
125 }
nnoble0c475f02014-12-05 15:37:39 -0800126 return;
Craig Tillera82950e2015-09-22 12:33:20 -0700127 }
Julien Boeuf3c957e62015-11-18 21:33:58 -0800128 creds->vtable->get_request_metadata(exec_ctx, creds, pollset, context, cb,
Craig Tillera82950e2015-09-22 12:33:20 -0700129 user_data);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800130}
131
Julien Boeuf441176d2015-10-09 21:14:07 -0700132grpc_security_status grpc_channel_credentials_create_security_connector(
133 grpc_channel_credentials *channel_creds, const char *target,
134 const grpc_channel_args *args, grpc_channel_security_connector **sc,
135 grpc_channel_args **new_args) {
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700136 *new_args = NULL;
Julien Boeufb73cbc22015-10-20 21:52:54 -0700137 if (channel_creds == NULL) {
Craig Tillera82950e2015-09-22 12:33:20 -0700138 return GRPC_SECURITY_ERROR;
139 }
Julien Boeufb73cbc22015-10-20 21:52:54 -0700140 GPR_ASSERT(channel_creds->vtable->create_security_connector != NULL);
141 return channel_creds->vtable->create_security_connector(
142 channel_creds, NULL, target, args, sc, new_args);
Craig Tillerc4885ed2015-04-14 09:51:28 -0700143}
144
Craig Tillera82950e2015-09-22 12:33:20 -0700145grpc_server_credentials *grpc_server_credentials_ref(
146 grpc_server_credentials *creds) {
147 if (creds == NULL) return NULL;
148 gpr_ref(&creds->refcount);
Julien Boeuffe1478f2015-08-30 21:57:38 -0700149 return creds;
150}
151
Craig Tillera82950e2015-09-22 12:33:20 -0700152void grpc_server_credentials_unref(grpc_server_credentials *creds) {
153 if (creds == NULL) return;
154 if (gpr_unref(&creds->refcount)) {
Julien Boeufb73cbc22015-10-20 21:52:54 -0700155 if (creds->vtable->destruct != NULL) creds->vtable->destruct(creds);
Craig Tillera82950e2015-09-22 12:33:20 -0700156 if (creds->processor.destroy != NULL && creds->processor.state != NULL) {
157 creds->processor.destroy(creds->processor.state);
Julien Boeuffe1478f2015-08-30 21:57:38 -0700158 }
Craig Tillera82950e2015-09-22 12:33:20 -0700159 gpr_free(creds);
160 }
Julien Boeuffe1478f2015-08-30 21:57:38 -0700161}
162
Craig Tillera82950e2015-09-22 12:33:20 -0700163void grpc_server_credentials_release(grpc_server_credentials *creds) {
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700164 GRPC_API_TRACE("grpc_server_credentials_release(creds=%p)", 1, (creds));
Craig Tillera82950e2015-09-22 12:33:20 -0700165 grpc_server_credentials_unref(creds);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800166}
167
Craig Tillera82950e2015-09-22 12:33:20 -0700168grpc_security_status grpc_server_credentials_create_security_connector(
169 grpc_server_credentials *creds, grpc_security_connector **sc) {
170 if (creds == NULL || creds->vtable->create_security_connector == NULL) {
171 gpr_log(GPR_ERROR, "Server credentials cannot create security context.");
172 return GRPC_SECURITY_ERROR;
173 }
174 return creds->vtable->create_security_connector(creds, sc);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700175}
176
Craig Tillera82950e2015-09-22 12:33:20 -0700177void grpc_server_credentials_set_auth_metadata_processor(
178 grpc_server_credentials *creds, grpc_auth_metadata_processor processor) {
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700179 GRPC_API_TRACE(
180 "grpc_server_credentials_set_auth_metadata_processor("
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700181 "creds=%p, "
182 "processor=grpc_auth_metadata_processor { process: %lx, state: %p })",
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700183 3, (creds, (unsigned long)processor.process, processor.state));
Craig Tillera82950e2015-09-22 12:33:20 -0700184 if (creds == NULL) return;
185 if (creds->processor.destroy != NULL && creds->processor.state != NULL) {
186 creds->processor.destroy(creds->processor.state);
187 }
Julien Boeuf6bdc9b42015-07-19 21:56:02 -0700188 creds->processor = processor;
189}
190
Julien Boeuf9a529082015-10-08 13:12:14 -0700191static void server_credentials_pointer_arg_destroy(void *p) {
192 grpc_server_credentials_unref(p);
193}
194
195static void *server_credentials_pointer_arg_copy(void *p) {
196 return grpc_server_credentials_ref(p);
197}
198
199grpc_arg grpc_server_credentials_to_arg(grpc_server_credentials *p) {
200 grpc_arg arg;
201 memset(&arg, 0, sizeof(grpc_arg));
202 arg.type = GRPC_ARG_POINTER;
203 arg.key = GRPC_SERVER_CREDENTIALS_ARG;
204 arg.value.pointer.p = p;
205 arg.value.pointer.copy = server_credentials_pointer_arg_copy;
206 arg.value.pointer.destroy = server_credentials_pointer_arg_destroy;
207 return arg;
208}
209
Craig Tiller0581d122015-11-02 14:09:40 -0800210grpc_server_credentials *grpc_server_credentials_from_arg(const grpc_arg *arg) {
Julien Boeuf9a529082015-10-08 13:12:14 -0700211 if (strcmp(arg->key, GRPC_SERVER_CREDENTIALS_ARG) != 0) return NULL;
212 if (arg->type != GRPC_ARG_POINTER) {
213 gpr_log(GPR_ERROR, "Invalid type %d for arg %s", arg->type,
214 GRPC_SERVER_CREDENTIALS_ARG);
215 return NULL;
216 }
217 return arg->value.pointer.p;
218}
219
220grpc_server_credentials *grpc_find_server_credentials_in_args(
221 const grpc_channel_args *args) {
222 size_t i;
223 if (args == NULL) return NULL;
224 for (i = 0; i < args->num_args; i++) {
225 grpc_server_credentials *p =
226 grpc_server_credentials_from_arg(&args->args[i]);
227 if (p != NULL) return p;
228 }
229 return NULL;
230}
231
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800232/* -- Ssl credentials. -- */
233
Julien Boeuf441176d2015-10-09 21:14:07 -0700234static void ssl_destruct(grpc_channel_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -0700235 grpc_ssl_credentials *c = (grpc_ssl_credentials *)creds;
236 if (c->config.pem_root_certs != NULL) gpr_free(c->config.pem_root_certs);
237 if (c->config.pem_private_key != NULL) gpr_free(c->config.pem_private_key);
238 if (c->config.pem_cert_chain != NULL) gpr_free(c->config.pem_cert_chain);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800239}
240
Craig Tillera82950e2015-09-22 12:33:20 -0700241static void ssl_server_destruct(grpc_server_credentials *creds) {
242 grpc_ssl_server_credentials *c = (grpc_ssl_server_credentials *)creds;
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800243 size_t i;
Craig Tillera82950e2015-09-22 12:33:20 -0700244 for (i = 0; i < c->config.num_key_cert_pairs; i++) {
245 if (c->config.pem_private_keys[i] != NULL) {
246 gpr_free(c->config.pem_private_keys[i]);
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800247 }
Craig Tillera82950e2015-09-22 12:33:20 -0700248 if (c->config.pem_cert_chains[i] != NULL) {
249 gpr_free(c->config.pem_cert_chains[i]);
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800250 }
Craig Tillera82950e2015-09-22 12:33:20 -0700251 }
252 if (c->config.pem_private_keys != NULL) gpr_free(c->config.pem_private_keys);
253 if (c->config.pem_private_keys_sizes != NULL) {
254 gpr_free(c->config.pem_private_keys_sizes);
255 }
256 if (c->config.pem_cert_chains != NULL) gpr_free(c->config.pem_cert_chains);
257 if (c->config.pem_cert_chains_sizes != NULL) {
258 gpr_free(c->config.pem_cert_chains_sizes);
259 }
260 if (c->config.pem_root_certs != NULL) gpr_free(c->config.pem_root_certs);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800261}
262
Craig Tillera82950e2015-09-22 12:33:20 -0700263static grpc_security_status ssl_create_security_connector(
Julien Boeufb73cbc22015-10-20 21:52:54 -0700264 grpc_channel_credentials *creds, grpc_call_credentials *call_creds,
265 const char *target, const grpc_channel_args *args,
Craig Tillera82950e2015-09-22 12:33:20 -0700266 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
267 grpc_ssl_credentials *c = (grpc_ssl_credentials *)creds;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700268 grpc_security_status status = GRPC_SECURITY_OK;
269 size_t i = 0;
270 const char *overridden_target_name = NULL;
Craig Tillerb9d35962015-09-11 13:31:16 -0700271 grpc_arg new_arg;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700272
Craig Tillera82950e2015-09-22 12:33:20 -0700273 for (i = 0; args && i < args->num_args; i++) {
274 grpc_arg *arg = &args->args[i];
275 if (strcmp(arg->key, GRPC_SSL_TARGET_NAME_OVERRIDE_ARG) == 0 &&
276 arg->type == GRPC_ARG_STRING) {
277 overridden_target_name = arg->value.string;
278 break;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700279 }
Craig Tillera82950e2015-09-22 12:33:20 -0700280 }
281 status = grpc_ssl_channel_security_connector_create(
Julien Boeufb73cbc22015-10-20 21:52:54 -0700282 call_creds, &c->config, target, overridden_target_name, sc);
Craig Tillera82950e2015-09-22 12:33:20 -0700283 if (status != GRPC_SECURITY_OK) {
284 return status;
285 }
Craig Tillerb9d35962015-09-11 13:31:16 -0700286 new_arg.type = GRPC_ARG_STRING;
287 new_arg.key = GRPC_ARG_HTTP2_SCHEME;
288 new_arg.value.string = "https";
289 *new_args = grpc_channel_args_copy_and_add(args, &new_arg, 1);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700290 return status;
291}
292
Craig Tillera82950e2015-09-22 12:33:20 -0700293static grpc_security_status ssl_server_create_security_connector(
294 grpc_server_credentials *creds, grpc_security_connector **sc) {
295 grpc_ssl_server_credentials *c = (grpc_ssl_server_credentials *)creds;
296 return grpc_ssl_server_security_connector_create(&c->config, sc);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700297}
298
Julien Boeuf441176d2015-10-09 21:14:07 -0700299static grpc_channel_credentials_vtable ssl_vtable = {
300 ssl_destruct, ssl_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800301
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700302static grpc_server_credentials_vtable ssl_server_vtable = {
Craig Tillera82950e2015-09-22 12:33:20 -0700303 ssl_server_destruct, ssl_server_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800304
Craig Tillera82950e2015-09-22 12:33:20 -0700305static void ssl_copy_key_material(const char *input, unsigned char **output,
306 size_t *output_size) {
307 *output_size = strlen(input);
308 *output = gpr_malloc(*output_size);
309 memcpy(*output, input, *output_size);
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800310}
311
Craig Tillera82950e2015-09-22 12:33:20 -0700312static void ssl_build_config(const char *pem_root_certs,
313 grpc_ssl_pem_key_cert_pair *pem_key_cert_pair,
314 grpc_ssl_config *config) {
315 if (pem_root_certs != NULL) {
316 ssl_copy_key_material(pem_root_certs, &config->pem_root_certs,
317 &config->pem_root_certs_size);
318 }
319 if (pem_key_cert_pair != NULL) {
320 GPR_ASSERT(pem_key_cert_pair->private_key != NULL);
321 GPR_ASSERT(pem_key_cert_pair->cert_chain != NULL);
322 ssl_copy_key_material(pem_key_cert_pair->private_key,
323 &config->pem_private_key,
324 &config->pem_private_key_size);
325 ssl_copy_key_material(pem_key_cert_pair->cert_chain,
326 &config->pem_cert_chain,
327 &config->pem_cert_chain_size);
328 }
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800329}
330
Craig Tillera82950e2015-09-22 12:33:20 -0700331static void ssl_build_server_config(
332 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs,
333 size_t num_key_cert_pairs, int force_client_auth,
334 grpc_ssl_server_config *config) {
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800335 size_t i;
Julien Boeuf5029b302015-07-21 23:02:16 -0700336 config->force_client_auth = force_client_auth;
Craig Tillera82950e2015-09-22 12:33:20 -0700337 if (pem_root_certs != NULL) {
338 ssl_copy_key_material(pem_root_certs, &config->pem_root_certs,
339 &config->pem_root_certs_size);
340 }
341 if (num_key_cert_pairs > 0) {
342 GPR_ASSERT(pem_key_cert_pairs != NULL);
343 config->pem_private_keys =
344 gpr_malloc(num_key_cert_pairs * sizeof(unsigned char *));
345 config->pem_cert_chains =
346 gpr_malloc(num_key_cert_pairs * sizeof(unsigned char *));
347 config->pem_private_keys_sizes =
348 gpr_malloc(num_key_cert_pairs * sizeof(size_t));
349 config->pem_cert_chains_sizes =
350 gpr_malloc(num_key_cert_pairs * sizeof(size_t));
351 }
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800352 config->num_key_cert_pairs = num_key_cert_pairs;
Craig Tillera82950e2015-09-22 12:33:20 -0700353 for (i = 0; i < num_key_cert_pairs; i++) {
354 GPR_ASSERT(pem_key_cert_pairs[i].private_key != NULL);
355 GPR_ASSERT(pem_key_cert_pairs[i].cert_chain != NULL);
356 ssl_copy_key_material(pem_key_cert_pairs[i].private_key,
357 &config->pem_private_keys[i],
358 &config->pem_private_keys_sizes[i]);
359 ssl_copy_key_material(pem_key_cert_pairs[i].cert_chain,
360 &config->pem_cert_chains[i],
361 &config->pem_cert_chains_sizes[i]);
362 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800363}
364
Julien Boeuf441176d2015-10-09 21:14:07 -0700365grpc_channel_credentials *grpc_ssl_credentials_create(
Craig Tillera82950e2015-09-22 12:33:20 -0700366 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pair,
367 void *reserved) {
368 grpc_ssl_credentials *c = gpr_malloc(sizeof(grpc_ssl_credentials));
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700369 GRPC_API_TRACE(
370 "grpc_ssl_credentials_create(pem_root_certs=%s, "
371 "pem_key_cert_pair=%p, "
372 "reserved=%p)",
373 3, (pem_root_certs, pem_key_cert_pair, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700374 GPR_ASSERT(reserved == NULL);
375 memset(c, 0, sizeof(grpc_ssl_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -0700376 c->base.type = GRPC_CHANNEL_CREDENTIALS_TYPE_SSL;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800377 c->base.vtable = &ssl_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700378 gpr_ref_init(&c->base.refcount, 1);
379 ssl_build_config(pem_root_certs, pem_key_cert_pair, &c->config);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800380 return &c->base;
381}
382
Craig Tillera82950e2015-09-22 12:33:20 -0700383grpc_server_credentials *grpc_ssl_server_credentials_create(
384 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs,
385 size_t num_key_cert_pairs, int force_client_auth, void *reserved) {
386 grpc_ssl_server_credentials *c =
387 gpr_malloc(sizeof(grpc_ssl_server_credentials));
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700388 GRPC_API_TRACE(
389 "grpc_ssl_server_credentials_create("
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700390 "pem_root_certs=%s, pem_key_cert_pairs=%p, num_key_cert_pairs=%lu, "
391 "force_client_auth=%d, reserved=%p)",
392 5, (pem_root_certs, pem_key_cert_pairs, (unsigned long)num_key_cert_pairs,
393 force_client_auth, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700394 GPR_ASSERT(reserved == NULL);
395 memset(c, 0, sizeof(grpc_ssl_server_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -0700396 c->base.type = GRPC_CHANNEL_CREDENTIALS_TYPE_SSL;
Craig Tillera82950e2015-09-22 12:33:20 -0700397 gpr_ref_init(&c->base.refcount, 1);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800398 c->base.vtable = &ssl_server_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700399 ssl_build_server_config(pem_root_certs, pem_key_cert_pairs,
400 num_key_cert_pairs, force_client_auth, &c->config);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800401 return &c->base;
402}
403
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800404/* -- Jwt credentials -- */
405
Craig Tillera82950e2015-09-22 12:33:20 -0700406static void jwt_reset_cache(grpc_service_account_jwt_access_credentials *c) {
407 if (c->cached.jwt_md != NULL) {
408 grpc_credentials_md_store_unref(c->cached.jwt_md);
409 c->cached.jwt_md = NULL;
410 }
411 if (c->cached.service_url != NULL) {
412 gpr_free(c->cached.service_url);
413 c->cached.service_url = NULL;
414 }
415 c->cached.jwt_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800416}
417
Julien Boeuf441176d2015-10-09 21:14:07 -0700418static void jwt_destruct(grpc_call_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -0700419 grpc_service_account_jwt_access_credentials *c =
420 (grpc_service_account_jwt_access_credentials *)creds;
421 grpc_auth_json_key_destruct(&c->key);
422 jwt_reset_cache(c);
423 gpr_mu_destroy(&c->cache_mu);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800424}
425
Craig Tillerb1136492015-11-18 11:30:17 -0800426static void jwt_get_request_metadata(grpc_exec_ctx *exec_ctx,
427 grpc_call_credentials *creds,
428 grpc_pollset *pollset,
Julien Boeuf3c957e62015-11-18 21:33:58 -0800429 grpc_auth_metadata_context context,
Craig Tillerb1136492015-11-18 11:30:17 -0800430 grpc_credentials_metadata_cb cb,
431 void *user_data) {
Craig Tillera82950e2015-09-22 12:33:20 -0700432 grpc_service_account_jwt_access_credentials *c =
433 (grpc_service_account_jwt_access_credentials *)creds;
434 gpr_timespec refresh_threshold = gpr_time_from_seconds(
435 GRPC_SECURE_TOKEN_REFRESH_THRESHOLD_SECS, GPR_TIMESPAN);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800436
437 /* See if we can return a cached jwt. */
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700438 grpc_credentials_md_store *jwt_md = NULL;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800439 {
Craig Tillera82950e2015-09-22 12:33:20 -0700440 gpr_mu_lock(&c->cache_mu);
441 if (c->cached.service_url != NULL &&
Julien Boeuf3c957e62015-11-18 21:33:58 -0800442 strcmp(c->cached.service_url, context.service_url) == 0 &&
Craig Tillera82950e2015-09-22 12:33:20 -0700443 c->cached.jwt_md != NULL &&
444 (gpr_time_cmp(gpr_time_sub(c->cached.jwt_expiration,
445 gpr_now(GPR_CLOCK_REALTIME)),
446 refresh_threshold) > 0)) {
447 jwt_md = grpc_credentials_md_store_ref(c->cached.jwt_md);
448 }
449 gpr_mu_unlock(&c->cache_mu);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800450 }
451
Craig Tillera82950e2015-09-22 12:33:20 -0700452 if (jwt_md == NULL) {
453 char *jwt = NULL;
454 /* Generate a new jwt. */
455 gpr_mu_lock(&c->cache_mu);
456 jwt_reset_cache(c);
Julien Boeuf3c957e62015-11-18 21:33:58 -0800457 jwt = grpc_jwt_encode_and_sign(&c->key, context.service_url,
458 c->jwt_lifetime, NULL);
Craig Tillera82950e2015-09-22 12:33:20 -0700459 if (jwt != NULL) {
460 char *md_value;
461 gpr_asprintf(&md_value, "Bearer %s", jwt);
462 gpr_free(jwt);
463 c->cached.jwt_expiration =
464 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), c->jwt_lifetime);
Julien Boeuf3c957e62015-11-18 21:33:58 -0800465 c->cached.service_url = gpr_strdup(context.service_url);
Craig Tillera82950e2015-09-22 12:33:20 -0700466 c->cached.jwt_md = grpc_credentials_md_store_create(1);
467 grpc_credentials_md_store_add_cstrings(
468 c->cached.jwt_md, GRPC_AUTHORIZATION_METADATA_KEY, md_value);
469 gpr_free(md_value);
470 jwt_md = grpc_credentials_md_store_ref(c->cached.jwt_md);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800471 }
Craig Tillera82950e2015-09-22 12:33:20 -0700472 gpr_mu_unlock(&c->cache_mu);
473 }
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800474
Craig Tillera82950e2015-09-22 12:33:20 -0700475 if (jwt_md != NULL) {
476 cb(exec_ctx, user_data, jwt_md->entries, jwt_md->num_entries,
477 GRPC_CREDENTIALS_OK);
478 grpc_credentials_md_store_unref(jwt_md);
479 } else {
480 cb(exec_ctx, user_data, NULL, 0, GRPC_CREDENTIALS_ERROR);
481 }
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800482}
483
Julien Boeuf441176d2015-10-09 21:14:07 -0700484static grpc_call_credentials_vtable jwt_vtable = {jwt_destruct,
485 jwt_get_request_metadata};
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800486
Julien Boeuf441176d2015-10-09 21:14:07 -0700487grpc_call_credentials *
Craig Tillera82950e2015-09-22 12:33:20 -0700488grpc_service_account_jwt_access_credentials_create_from_auth_json_key(
489 grpc_auth_json_key key, gpr_timespec token_lifetime) {
Julien Boeuffe4c3f42015-07-22 16:20:13 -0700490 grpc_service_account_jwt_access_credentials *c;
Craig Tillera82950e2015-09-22 12:33:20 -0700491 if (!grpc_auth_json_key_is_valid(&key)) {
492 gpr_log(GPR_ERROR, "Invalid input for jwt credentials creation");
493 return NULL;
494 }
495 c = gpr_malloc(sizeof(grpc_service_account_jwt_access_credentials));
496 memset(c, 0, sizeof(grpc_service_account_jwt_access_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -0700497 c->base.type = GRPC_CALL_CREDENTIALS_TYPE_JWT;
Craig Tillera82950e2015-09-22 12:33:20 -0700498 gpr_ref_init(&c->base.refcount, 1);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800499 c->base.vtable = &jwt_vtable;
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800500 c->key = key;
501 c->jwt_lifetime = token_lifetime;
Craig Tillera82950e2015-09-22 12:33:20 -0700502 gpr_mu_init(&c->cache_mu);
503 jwt_reset_cache(c);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800504 return &c->base;
505}
506
Julien Boeuf441176d2015-10-09 21:14:07 -0700507grpc_call_credentials *grpc_service_account_jwt_access_credentials_create(
Craig Tillera82950e2015-09-22 12:33:20 -0700508 const char *json_key, gpr_timespec token_lifetime, void *reserved) {
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700509 GRPC_API_TRACE(
510 "grpc_service_account_jwt_access_credentials_create("
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700511 "json_key=%s, "
512 "token_lifetime="
513 "gpr_timespec { tv_sec: %ld, tv_nsec: %d, clock_type: %d }, "
514 "reserved=%p)",
515 5, (json_key, (long)token_lifetime.tv_sec, token_lifetime.tv_nsec,
516 (int)token_lifetime.clock_type, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700517 GPR_ASSERT(reserved == NULL);
518 return grpc_service_account_jwt_access_credentials_create_from_auth_json_key(
519 grpc_auth_json_key_create_from_string(json_key), token_lifetime);
Julien Boeuf54006062015-07-07 19:13:04 -0700520}
521
jboeuf1a809c02014-12-19 15:44:30 -0800522/* -- Oauth2TokenFetcher credentials -- */
523
Julien Boeuf441176d2015-10-09 21:14:07 -0700524static void oauth2_token_fetcher_destruct(grpc_call_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -0700525 grpc_oauth2_token_fetcher_credentials *c =
526 (grpc_oauth2_token_fetcher_credentials *)creds;
527 grpc_credentials_md_store_unref(c->access_token_md);
528 gpr_mu_destroy(&c->mu);
529 grpc_httpcli_context_destroy(&c->httpcli_context);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800530}
531
jboeuf1a809c02014-12-19 15:44:30 -0800532grpc_credentials_status
Craig Tillera82950e2015-09-22 12:33:20 -0700533grpc_oauth2_token_fetcher_credentials_parse_server_response(
534 const grpc_httpcli_response *response, grpc_credentials_md_store **token_md,
535 gpr_timespec *token_lifetime) {
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800536 char *null_terminated_body = NULL;
537 char *new_access_token = NULL;
538 grpc_credentials_status status = GRPC_CREDENTIALS_OK;
Nicolas Noble614c2bf2015-01-21 15:48:36 -0800539 grpc_json *json = NULL;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800540
Craig Tillera82950e2015-09-22 12:33:20 -0700541 if (response == NULL) {
542 gpr_log(GPR_ERROR, "Received NULL response.");
543 status = GRPC_CREDENTIALS_ERROR;
544 goto end;
545 }
546
547 if (response->body_length > 0) {
548 null_terminated_body = gpr_malloc(response->body_length + 1);
549 null_terminated_body[response->body_length] = '\0';
550 memcpy(null_terminated_body, response->body, response->body_length);
551 }
552
553 if (response->status != 200) {
554 gpr_log(GPR_ERROR, "Call to http server ended with error %d [%s].",
555 response->status,
556 null_terminated_body != NULL ? null_terminated_body : "");
557 status = GRPC_CREDENTIALS_ERROR;
558 goto end;
559 } else {
560 grpc_json *access_token = NULL;
561 grpc_json *token_type = NULL;
562 grpc_json *expires_in = NULL;
563 grpc_json *ptr;
564 json = grpc_json_parse_string(null_terminated_body);
565 if (json == NULL) {
566 gpr_log(GPR_ERROR, "Could not parse JSON from %s", null_terminated_body);
Craig Tiller45724b32015-09-22 10:42:19 -0700567 status = GRPC_CREDENTIALS_ERROR;
568 goto end;
569 }
Craig Tillera82950e2015-09-22 12:33:20 -0700570 if (json->type != GRPC_JSON_OBJECT) {
571 gpr_log(GPR_ERROR, "Response should be a JSON object");
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800572 status = GRPC_CREDENTIALS_ERROR;
573 goto end;
574 }
Craig Tillera82950e2015-09-22 12:33:20 -0700575 for (ptr = json->child; ptr; ptr = ptr->next) {
576 if (strcmp(ptr->key, "access_token") == 0) {
577 access_token = ptr;
578 } else if (strcmp(ptr->key, "token_type") == 0) {
579 token_type = ptr;
580 } else if (strcmp(ptr->key, "expires_in") == 0) {
581 expires_in = ptr;
582 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800583 }
Craig Tillera82950e2015-09-22 12:33:20 -0700584 if (access_token == NULL || access_token->type != GRPC_JSON_STRING) {
585 gpr_log(GPR_ERROR, "Missing or invalid access_token in JSON.");
586 status = GRPC_CREDENTIALS_ERROR;
587 goto end;
588 }
589 if (token_type == NULL || token_type->type != GRPC_JSON_STRING) {
590 gpr_log(GPR_ERROR, "Missing or invalid token_type in JSON.");
591 status = GRPC_CREDENTIALS_ERROR;
592 goto end;
593 }
594 if (expires_in == NULL || expires_in->type != GRPC_JSON_NUMBER) {
595 gpr_log(GPR_ERROR, "Missing or invalid expires_in in JSON.");
596 status = GRPC_CREDENTIALS_ERROR;
597 goto end;
598 }
599 gpr_asprintf(&new_access_token, "%s %s", token_type->value,
600 access_token->value);
601 token_lifetime->tv_sec = strtol(expires_in->value, NULL, 10);
602 token_lifetime->tv_nsec = 0;
603 token_lifetime->clock_type = GPR_TIMESPAN;
604 if (*token_md != NULL) grpc_credentials_md_store_unref(*token_md);
605 *token_md = grpc_credentials_md_store_create(1);
606 grpc_credentials_md_store_add_cstrings(
607 *token_md, GRPC_AUTHORIZATION_METADATA_KEY, new_access_token);
608 status = GRPC_CREDENTIALS_OK;
609 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800610
611end:
Craig Tillera82950e2015-09-22 12:33:20 -0700612 if (status != GRPC_CREDENTIALS_OK && (*token_md != NULL)) {
613 grpc_credentials_md_store_unref(*token_md);
614 *token_md = NULL;
615 }
616 if (null_terminated_body != NULL) gpr_free(null_terminated_body);
617 if (new_access_token != NULL) gpr_free(new_access_token);
618 if (json != NULL) grpc_json_destroy(json);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800619 return status;
620}
621
Craig Tillera82950e2015-09-22 12:33:20 -0700622static void on_oauth2_token_fetcher_http_response(
623 grpc_exec_ctx *exec_ctx, void *user_data,
624 const grpc_httpcli_response *response) {
625 grpc_credentials_metadata_request *r =
626 (grpc_credentials_metadata_request *)user_data;
627 grpc_oauth2_token_fetcher_credentials *c =
628 (grpc_oauth2_token_fetcher_credentials *)r->creds;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800629 gpr_timespec token_lifetime;
630 grpc_credentials_status status;
631
Craig Tillera82950e2015-09-22 12:33:20 -0700632 gpr_mu_lock(&c->mu);
633 status = grpc_oauth2_token_fetcher_credentials_parse_server_response(
634 response, &c->access_token_md, &token_lifetime);
635 if (status == GRPC_CREDENTIALS_OK) {
636 c->token_expiration =
637 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), token_lifetime);
638 r->cb(exec_ctx, r->user_data, c->access_token_md->entries,
639 c->access_token_md->num_entries, status);
640 } else {
641 c->token_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
642 r->cb(exec_ctx, r->user_data, NULL, 0, status);
643 }
644 gpr_mu_unlock(&c->mu);
645 grpc_credentials_metadata_request_destroy(r);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800646}
647
Craig Tillera82950e2015-09-22 12:33:20 -0700648static void oauth2_token_fetcher_get_request_metadata(
Julien Boeuf441176d2015-10-09 21:14:07 -0700649 grpc_exec_ctx *exec_ctx, grpc_call_credentials *creds,
Julien Boeuf3c957e62015-11-18 21:33:58 -0800650 grpc_pollset *pollset, grpc_auth_metadata_context context,
Julien Boeuf441176d2015-10-09 21:14:07 -0700651 grpc_credentials_metadata_cb cb, void *user_data) {
Craig Tillera82950e2015-09-22 12:33:20 -0700652 grpc_oauth2_token_fetcher_credentials *c =
653 (grpc_oauth2_token_fetcher_credentials *)creds;
654 gpr_timespec refresh_threshold = gpr_time_from_seconds(
655 GRPC_SECURE_TOKEN_REFRESH_THRESHOLD_SECS, GPR_TIMESPAN);
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700656 grpc_credentials_md_store *cached_access_token_md = NULL;
jboeuf1a809c02014-12-19 15:44:30 -0800657 {
Craig Tillera82950e2015-09-22 12:33:20 -0700658 gpr_mu_lock(&c->mu);
659 if (c->access_token_md != NULL &&
660 (gpr_time_cmp(
661 gpr_time_sub(c->token_expiration, gpr_now(GPR_CLOCK_REALTIME)),
662 refresh_threshold) > 0)) {
663 cached_access_token_md =
664 grpc_credentials_md_store_ref(c->access_token_md);
665 }
666 gpr_mu_unlock(&c->mu);
Craig Tiller45724b32015-09-22 10:42:19 -0700667 }
Craig Tillera82950e2015-09-22 12:33:20 -0700668 if (cached_access_token_md != NULL) {
669 cb(exec_ctx, user_data, cached_access_token_md->entries,
670 cached_access_token_md->num_entries, GRPC_CREDENTIALS_OK);
671 grpc_credentials_md_store_unref(cached_access_token_md);
672 } else {
673 c->fetch_func(
674 exec_ctx,
675 grpc_credentials_metadata_request_create(creds, cb, user_data),
676 &c->httpcli_context, pollset, on_oauth2_token_fetcher_http_response,
677 gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), refresh_threshold));
678 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800679}
680
Craig Tillera82950e2015-09-22 12:33:20 -0700681static void init_oauth2_token_fetcher(grpc_oauth2_token_fetcher_credentials *c,
682 grpc_fetch_oauth2_func fetch_func) {
683 memset(c, 0, sizeof(grpc_oauth2_token_fetcher_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -0700684 c->base.type = GRPC_CALL_CREDENTIALS_TYPE_OAUTH2;
Craig Tillera82950e2015-09-22 12:33:20 -0700685 gpr_ref_init(&c->base.refcount, 1);
686 gpr_mu_init(&c->mu);
687 c->token_expiration = gpr_inf_past(GPR_CLOCK_REALTIME);
jboeuf1a809c02014-12-19 15:44:30 -0800688 c->fetch_func = fetch_func;
Craig Tillera82950e2015-09-22 12:33:20 -0700689 grpc_httpcli_context_init(&c->httpcli_context);
jboeuf1a809c02014-12-19 15:44:30 -0800690}
691
Julien Boeuf510a9202015-08-25 21:51:07 -0700692/* -- GoogleComputeEngine credentials. -- */
jboeuf1a809c02014-12-19 15:44:30 -0800693
Julien Boeuf441176d2015-10-09 21:14:07 -0700694static grpc_call_credentials_vtable compute_engine_vtable = {
695 oauth2_token_fetcher_destruct, oauth2_token_fetcher_get_request_metadata};
jboeuf1a809c02014-12-19 15:44:30 -0800696
Craig Tillera82950e2015-09-22 12:33:20 -0700697static void compute_engine_fetch_oauth2(
698 grpc_exec_ctx *exec_ctx, grpc_credentials_metadata_request *metadata_req,
699 grpc_httpcli_context *httpcli_context, grpc_pollset *pollset,
700 grpc_httpcli_response_cb response_cb, gpr_timespec deadline) {
701 grpc_httpcli_header header = {"Metadata-Flavor", "Google"};
jboeuf1a809c02014-12-19 15:44:30 -0800702 grpc_httpcli_request request;
Craig Tillera82950e2015-09-22 12:33:20 -0700703 memset(&request, 0, sizeof(grpc_httpcli_request));
jboeuf1a809c02014-12-19 15:44:30 -0800704 request.host = GRPC_COMPUTE_ENGINE_METADATA_HOST;
705 request.path = GRPC_COMPUTE_ENGINE_METADATA_TOKEN_PATH;
706 request.hdr_count = 1;
707 request.hdrs = &header;
Craig Tillera82950e2015-09-22 12:33:20 -0700708 grpc_httpcli_get(exec_ctx, httpcli_context, pollset, &request, deadline,
709 response_cb, metadata_req);
jboeuf1a809c02014-12-19 15:44:30 -0800710}
711
Julien Boeuf441176d2015-10-09 21:14:07 -0700712grpc_call_credentials *grpc_google_compute_engine_credentials_create(
Craig Tillera82950e2015-09-22 12:33:20 -0700713 void *reserved) {
714 grpc_oauth2_token_fetcher_credentials *c =
715 gpr_malloc(sizeof(grpc_oauth2_token_fetcher_credentials));
Masood Malekghassemi76c3d742015-08-19 18:22:53 -0700716 GRPC_API_TRACE("grpc_compute_engine_credentials_create(reserved=%p)", 1,
717 (reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700718 GPR_ASSERT(reserved == NULL);
719 init_oauth2_token_fetcher(c, compute_engine_fetch_oauth2);
jboeuf1a809c02014-12-19 15:44:30 -0800720 c->base.vtable = &compute_engine_vtable;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800721 return &c->base;
722}
723
Julien Boeuf510a9202015-08-25 21:51:07 -0700724/* -- GoogleRefreshToken credentials. -- */
Julien Boeuf9835cf02015-03-09 16:56:44 -0700725
Julien Boeuf441176d2015-10-09 21:14:07 -0700726static void refresh_token_destruct(grpc_call_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -0700727 grpc_google_refresh_token_credentials *c =
728 (grpc_google_refresh_token_credentials *)creds;
729 grpc_auth_refresh_token_destruct(&c->refresh_token);
730 oauth2_token_fetcher_destruct(&c->base.base);
Julien Boeuf9835cf02015-03-09 16:56:44 -0700731}
732
Julien Boeuf441176d2015-10-09 21:14:07 -0700733static grpc_call_credentials_vtable refresh_token_vtable = {
734 refresh_token_destruct, oauth2_token_fetcher_get_request_metadata};
Julien Boeuf9835cf02015-03-09 16:56:44 -0700735
Craig Tillera82950e2015-09-22 12:33:20 -0700736static void refresh_token_fetch_oauth2(
737 grpc_exec_ctx *exec_ctx, grpc_credentials_metadata_request *metadata_req,
738 grpc_httpcli_context *httpcli_context, grpc_pollset *pollset,
739 grpc_httpcli_response_cb response_cb, gpr_timespec deadline) {
740 grpc_google_refresh_token_credentials *c =
741 (grpc_google_refresh_token_credentials *)metadata_req->creds;
742 grpc_httpcli_header header = {"Content-Type",
743 "application/x-www-form-urlencoded"};
Julien Boeuf9835cf02015-03-09 16:56:44 -0700744 grpc_httpcli_request request;
745 char *body = NULL;
Craig Tillera82950e2015-09-22 12:33:20 -0700746 gpr_asprintf(&body, GRPC_REFRESH_TOKEN_POST_BODY_FORMAT_STRING,
747 c->refresh_token.client_id, c->refresh_token.client_secret,
748 c->refresh_token.refresh_token);
749 memset(&request, 0, sizeof(grpc_httpcli_request));
Julien Boeuf9835cf02015-03-09 16:56:44 -0700750 request.host = GRPC_GOOGLE_OAUTH2_SERVICE_HOST;
751 request.path = GRPC_GOOGLE_OAUTH2_SERVICE_TOKEN_PATH;
752 request.hdr_count = 1;
753 request.hdrs = &header;
Craig Tillerf53d9c82015-08-04 14:19:43 -0700754 request.handshaker = &grpc_httpcli_ssl;
Craig Tillera82950e2015-09-22 12:33:20 -0700755 grpc_httpcli_post(exec_ctx, httpcli_context, pollset, &request, body,
756 strlen(body), deadline, response_cb, metadata_req);
757 gpr_free(body);
Julien Boeuf9835cf02015-03-09 16:56:44 -0700758}
759
Julien Boeuf441176d2015-10-09 21:14:07 -0700760grpc_call_credentials *
761grpc_refresh_token_credentials_create_from_auth_refresh_token(
Craig Tillera82950e2015-09-22 12:33:20 -0700762 grpc_auth_refresh_token refresh_token) {
Julien Boeuf510a9202015-08-25 21:51:07 -0700763 grpc_google_refresh_token_credentials *c;
Craig Tillera82950e2015-09-22 12:33:20 -0700764 if (!grpc_auth_refresh_token_is_valid(&refresh_token)) {
765 gpr_log(GPR_ERROR, "Invalid input for refresh token credentials creation");
766 return NULL;
767 }
768 c = gpr_malloc(sizeof(grpc_google_refresh_token_credentials));
769 memset(c, 0, sizeof(grpc_google_refresh_token_credentials));
770 init_oauth2_token_fetcher(&c->base, refresh_token_fetch_oauth2);
Julien Boeuf9835cf02015-03-09 16:56:44 -0700771 c->base.base.vtable = &refresh_token_vtable;
772 c->refresh_token = refresh_token;
773 return &c->base.base;
774}
775
Julien Boeuf441176d2015-10-09 21:14:07 -0700776grpc_call_credentials *grpc_google_refresh_token_credentials_create(
Craig Tillera82950e2015-09-22 12:33:20 -0700777 const char *json_refresh_token, void *reserved) {
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700778 GRPC_API_TRACE(
779 "grpc_refresh_token_credentials_create(json_refresh_token=%s, "
780 "reserved=%p)",
781 2, (json_refresh_token, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700782 GPR_ASSERT(reserved == NULL);
783 return grpc_refresh_token_credentials_create_from_auth_refresh_token(
784 grpc_auth_refresh_token_create_from_string(json_refresh_token));
Julien Boeuf54006062015-07-07 19:13:04 -0700785}
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800786
Julien Boeufea456fc2015-07-07 15:23:30 -0700787/* -- Metadata-only credentials. -- */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800788
Julien Boeuf441176d2015-10-09 21:14:07 -0700789static void md_only_test_destruct(grpc_call_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -0700790 grpc_md_only_test_credentials *c = (grpc_md_only_test_credentials *)creds;
791 grpc_credentials_md_store_unref(c->md_store);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800792}
793
Craig Tillerf62c4d52015-12-04 07:43:07 -0800794static void on_simulated_token_fetch_done(grpc_exec_ctx *exec_ctx,
795 void *user_data, int success) {
Craig Tillera82950e2015-09-22 12:33:20 -0700796 grpc_credentials_metadata_request *r =
797 (grpc_credentials_metadata_request *)user_data;
798 grpc_md_only_test_credentials *c = (grpc_md_only_test_credentials *)r->creds;
Craig Tillerf62c4d52015-12-04 07:43:07 -0800799 r->cb(exec_ctx, r->user_data, c->md_store->entries, c->md_store->num_entries,
Craig Tillera82950e2015-09-22 12:33:20 -0700800 GRPC_CREDENTIALS_OK);
801 grpc_credentials_metadata_request_destroy(r);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800802}
803
Craig Tillera82950e2015-09-22 12:33:20 -0700804static void md_only_test_get_request_metadata(
Julien Boeuf3c957e62015-11-18 21:33:58 -0800805 grpc_exec_ctx *exec_ctx, grpc_call_credentials *creds,
806 grpc_pollset *pollset, grpc_auth_metadata_context context,
807 grpc_credentials_metadata_cb cb, void *user_data) {
Craig Tillera82950e2015-09-22 12:33:20 -0700808 grpc_md_only_test_credentials *c = (grpc_md_only_test_credentials *)creds;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800809
Craig Tillera82950e2015-09-22 12:33:20 -0700810 if (c->is_async) {
Craig Tillera82950e2015-09-22 12:33:20 -0700811 grpc_credentials_metadata_request *cb_arg =
812 grpc_credentials_metadata_request_create(creds, cb, user_data);
Craig Tillerf62c4d52015-12-04 07:43:07 -0800813 grpc_executor_enqueue(
814 grpc_closure_create(on_simulated_token_fetch_done, cb_arg), 1);
Craig Tillera82950e2015-09-22 12:33:20 -0700815 } else {
816 cb(exec_ctx, user_data, c->md_store->entries, 1, GRPC_CREDENTIALS_OK);
817 }
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800818}
819
Julien Boeuf441176d2015-10-09 21:14:07 -0700820static grpc_call_credentials_vtable md_only_test_vtable = {
821 md_only_test_destruct, md_only_test_get_request_metadata};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800822
Julien Boeuf441176d2015-10-09 21:14:07 -0700823grpc_call_credentials *grpc_md_only_test_credentials_create(
824 const char *md_key, const char *md_value, int is_async) {
Craig Tillera82950e2015-09-22 12:33:20 -0700825 grpc_md_only_test_credentials *c =
826 gpr_malloc(sizeof(grpc_md_only_test_credentials));
827 memset(c, 0, sizeof(grpc_md_only_test_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -0700828 c->base.type = GRPC_CALL_CREDENTIALS_TYPE_OAUTH2;
Julien Boeufea456fc2015-07-07 15:23:30 -0700829 c->base.vtable = &md_only_test_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700830 gpr_ref_init(&c->base.refcount, 1);
831 c->md_store = grpc_credentials_md_store_create(1);
832 grpc_credentials_md_store_add_cstrings(c->md_store, md_key, md_value);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800833 c->is_async = is_async;
834 return &c->base;
835}
836
Julien Boeuf2805be12015-07-01 02:47:18 -0700837/* -- Oauth2 Access Token credentials. -- */
838
Julien Boeuf441176d2015-10-09 21:14:07 -0700839static void access_token_destruct(grpc_call_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -0700840 grpc_access_token_credentials *c = (grpc_access_token_credentials *)creds;
841 grpc_credentials_md_store_unref(c->access_token_md);
Julien Boeuf2805be12015-07-01 02:47:18 -0700842}
843
Craig Tillera82950e2015-09-22 12:33:20 -0700844static void access_token_get_request_metadata(
Julien Boeuf3c957e62015-11-18 21:33:58 -0800845 grpc_exec_ctx *exec_ctx, grpc_call_credentials *creds,
846 grpc_pollset *pollset, grpc_auth_metadata_context context,
847 grpc_credentials_metadata_cb cb, void *user_data) {
Craig Tillera82950e2015-09-22 12:33:20 -0700848 grpc_access_token_credentials *c = (grpc_access_token_credentials *)creds;
849 cb(exec_ctx, user_data, c->access_token_md->entries, 1, GRPC_CREDENTIALS_OK);
Julien Boeuf2805be12015-07-01 02:47:18 -0700850}
851
Julien Boeuf441176d2015-10-09 21:14:07 -0700852static grpc_call_credentials_vtable access_token_vtable = {
853 access_token_destruct, access_token_get_request_metadata};
Julien Boeuf2805be12015-07-01 02:47:18 -0700854
Julien Boeuf441176d2015-10-09 21:14:07 -0700855grpc_call_credentials *grpc_access_token_credentials_create(
856 const char *access_token, void *reserved) {
Craig Tillera82950e2015-09-22 12:33:20 -0700857 grpc_access_token_credentials *c =
858 gpr_malloc(sizeof(grpc_access_token_credentials));
Julien Boeuf2805be12015-07-01 02:47:18 -0700859 char *token_md_value;
Craig Tiller4de3e4f2015-10-05 08:55:50 -0700860 GRPC_API_TRACE(
861 "grpc_access_token_credentials_create(access_token=%s, "
862 "reserved=%p)",
863 2, (access_token, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -0700864 GPR_ASSERT(reserved == NULL);
865 memset(c, 0, sizeof(grpc_access_token_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -0700866 c->base.type = GRPC_CALL_CREDENTIALS_TYPE_OAUTH2;
Julien Boeuf2805be12015-07-01 02:47:18 -0700867 c->base.vtable = &access_token_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700868 gpr_ref_init(&c->base.refcount, 1);
869 c->access_token_md = grpc_credentials_md_store_create(1);
870 gpr_asprintf(&token_md_value, "Bearer %s", access_token);
871 grpc_credentials_md_store_add_cstrings(
872 c->access_token_md, GRPC_AUTHORIZATION_METADATA_KEY, token_md_value);
873 gpr_free(token_md_value);
Julien Boeuf2805be12015-07-01 02:47:18 -0700874 return &c->base;
875}
876
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800877/* -- Fake transport security credentials. -- */
878
Craig Tillera82950e2015-09-22 12:33:20 -0700879static grpc_security_status fake_transport_security_create_security_connector(
Julien Boeufb73cbc22015-10-20 21:52:54 -0700880 grpc_channel_credentials *c, grpc_call_credentials *call_creds,
881 const char *target, const grpc_channel_args *args,
882 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
883 *sc = grpc_fake_channel_security_connector_create(call_creds, 1);
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700884 return GRPC_SECURITY_OK;
885}
886
887static grpc_security_status
Craig Tillera82950e2015-09-22 12:33:20 -0700888fake_transport_security_server_create_security_connector(
889 grpc_server_credentials *c, grpc_security_connector **sc) {
890 *sc = grpc_fake_server_security_connector_create();
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -0700891 return GRPC_SECURITY_OK;
892}
893
Julien Boeuf441176d2015-10-09 21:14:07 -0700894static grpc_channel_credentials_vtable
895 fake_transport_security_credentials_vtable = {
Julien Boeufb73cbc22015-10-20 21:52:54 -0700896 NULL, fake_transport_security_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800897
Craig Tillera82950e2015-09-22 12:33:20 -0700898static grpc_server_credentials_vtable
899 fake_transport_security_server_credentials_vtable = {
Julien Boeufb73cbc22015-10-20 21:52:54 -0700900 NULL, fake_transport_security_server_create_security_connector};
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800901
Julien Boeuf441176d2015-10-09 21:14:07 -0700902grpc_channel_credentials *grpc_fake_transport_security_credentials_create(
903 void) {
904 grpc_channel_credentials *c = gpr_malloc(sizeof(grpc_channel_credentials));
905 memset(c, 0, sizeof(grpc_channel_credentials));
906 c->type = GRPC_CHANNEL_CREDENTIALS_TYPE_FAKE_TRANSPORT_SECURITY;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800907 c->vtable = &fake_transport_security_credentials_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -0700908 gpr_ref_init(&c->refcount, 1);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800909 return c;
910}
911
Craig Tillera82950e2015-09-22 12:33:20 -0700912grpc_server_credentials *grpc_fake_transport_security_server_credentials_create(
913 void) {
914 grpc_server_credentials *c = gpr_malloc(sizeof(grpc_server_credentials));
915 memset(c, 0, sizeof(grpc_server_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -0700916 c->type = GRPC_CHANNEL_CREDENTIALS_TYPE_FAKE_TRANSPORT_SECURITY;
Craig Tillera82950e2015-09-22 12:33:20 -0700917 gpr_ref_init(&c->refcount, 1);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800918 c->vtable = &fake_transport_security_server_credentials_vtable;
919 return c;
920}
921
Julien Boeufb73cbc22015-10-20 21:52:54 -0700922/* -- Composite call credentials. -- */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800923
Craig Tillera82950e2015-09-22 12:33:20 -0700924typedef struct {
Julien Boeufb73cbc22015-10-20 21:52:54 -0700925 grpc_composite_call_credentials *composite_creds;
nnoble0c475f02014-12-05 15:37:39 -0800926 size_t creds_index;
Julien Boeuf75c9b6f2015-05-29 13:12:12 -0700927 grpc_credentials_md_store *md_elems;
Julien Boeuf3c957e62015-11-18 21:33:58 -0800928 grpc_auth_metadata_context auth_md_context;
nnoble0c475f02014-12-05 15:37:39 -0800929 void *user_data;
Craig Tiller06bac342015-06-01 12:55:57 -0700930 grpc_pollset *pollset;
nnoble0c475f02014-12-05 15:37:39 -0800931 grpc_credentials_metadata_cb cb;
Julien Boeufb73cbc22015-10-20 21:52:54 -0700932} grpc_composite_call_credentials_metadata_context;
nnoble0c475f02014-12-05 15:37:39 -0800933
Julien Boeufb73cbc22015-10-20 21:52:54 -0700934static void composite_call_destruct(grpc_call_credentials *creds) {
935 grpc_composite_call_credentials *c = (grpc_composite_call_credentials *)creds;
nnoble0c475f02014-12-05 15:37:39 -0800936 size_t i;
Craig Tillera82950e2015-09-22 12:33:20 -0700937 for (i = 0; i < c->inner.num_creds; i++) {
Julien Boeuf441176d2015-10-09 21:14:07 -0700938 grpc_call_credentials_unref(c->inner.creds_array[i]);
Craig Tillera82950e2015-09-22 12:33:20 -0700939 }
940 gpr_free(c->inner.creds_array);
nnoble0c475f02014-12-05 15:37:39 -0800941}
942
Julien Boeufb73cbc22015-10-20 21:52:54 -0700943static void composite_call_md_context_destroy(
944 grpc_composite_call_credentials_metadata_context *ctx) {
Craig Tillera82950e2015-09-22 12:33:20 -0700945 grpc_credentials_md_store_unref(ctx->md_elems);
Craig Tillera82950e2015-09-22 12:33:20 -0700946 gpr_free(ctx);
nnoble0c475f02014-12-05 15:37:39 -0800947}
948
Julien Boeufb73cbc22015-10-20 21:52:54 -0700949static void composite_call_metadata_cb(grpc_exec_ctx *exec_ctx, void *user_data,
950 grpc_credentials_md *md_elems,
951 size_t num_md,
952 grpc_credentials_status status) {
953 grpc_composite_call_credentials_metadata_context *ctx =
954 (grpc_composite_call_credentials_metadata_context *)user_data;
Craig Tillera82950e2015-09-22 12:33:20 -0700955 if (status != GRPC_CREDENTIALS_OK) {
956 ctx->cb(exec_ctx, ctx->user_data, NULL, 0, status);
957 return;
958 }
Craig Tiller45724b32015-09-22 10:42:19 -0700959
960 /* Copy the metadata in the context. */
Craig Tillera82950e2015-09-22 12:33:20 -0700961 if (num_md > 0) {
962 size_t i;
963 for (i = 0; i < num_md; i++) {
964 grpc_credentials_md_store_add(ctx->md_elems, md_elems[i].key,
965 md_elems[i].value);
Craig Tiller45724b32015-09-22 10:42:19 -0700966 }
Craig Tillera82950e2015-09-22 12:33:20 -0700967 }
Craig Tiller45724b32015-09-22 10:42:19 -0700968
969 /* See if we need to get some more metadata. */
Julien Boeuf441176d2015-10-09 21:14:07 -0700970 if (ctx->creds_index < ctx->composite_creds->inner.num_creds) {
971 grpc_call_credentials *inner_creds =
Craig Tillera82950e2015-09-22 12:33:20 -0700972 ctx->composite_creds->inner.creds_array[ctx->creds_index++];
Julien Boeuf3c957e62015-11-18 21:33:58 -0800973 grpc_call_credentials_get_request_metadata(
974 exec_ctx, inner_creds, ctx->pollset, ctx->auth_md_context,
975 composite_call_metadata_cb, ctx);
Julien Boeuf441176d2015-10-09 21:14:07 -0700976 return;
Craig Tillera82950e2015-09-22 12:33:20 -0700977 }
978
979 /* We're done!. */
980 ctx->cb(exec_ctx, ctx->user_data, ctx->md_elems->entries,
981 ctx->md_elems->num_entries, GRPC_CREDENTIALS_OK);
Julien Boeufb73cbc22015-10-20 21:52:54 -0700982 composite_call_md_context_destroy(ctx);
Craig Tillera82950e2015-09-22 12:33:20 -0700983}
984
Julien Boeufb73cbc22015-10-20 21:52:54 -0700985static void composite_call_get_request_metadata(
Julien Boeuf3c957e62015-11-18 21:33:58 -0800986 grpc_exec_ctx *exec_ctx, grpc_call_credentials *creds,
987 grpc_pollset *pollset, grpc_auth_metadata_context auth_md_context,
988 grpc_credentials_metadata_cb cb, void *user_data) {
Julien Boeufb73cbc22015-10-20 21:52:54 -0700989 grpc_composite_call_credentials *c = (grpc_composite_call_credentials *)creds;
990 grpc_composite_call_credentials_metadata_context *ctx;
Julien Boeuf441176d2015-10-09 21:14:07 -0700991
Julien Boeufb73cbc22015-10-20 21:52:54 -0700992 ctx = gpr_malloc(sizeof(grpc_composite_call_credentials_metadata_context));
993 memset(ctx, 0, sizeof(grpc_composite_call_credentials_metadata_context));
Julien Boeuf3c957e62015-11-18 21:33:58 -0800994 ctx->auth_md_context = auth_md_context;
nnoble0c475f02014-12-05 15:37:39 -0800995 ctx->user_data = user_data;
996 ctx->cb = cb;
997 ctx->composite_creds = c;
Craig Tiller06bac342015-06-01 12:55:57 -0700998 ctx->pollset = pollset;
Craig Tillera82950e2015-09-22 12:33:20 -0700999 ctx->md_elems = grpc_credentials_md_store_create(c->inner.num_creds);
Julien Boeuf4e02e842015-10-09 22:49:42 -07001000 grpc_call_credentials_get_request_metadata(
Julien Boeuf3c957e62015-11-18 21:33:58 -08001001 exec_ctx, c->inner.creds_array[ctx->creds_index++], pollset,
1002 auth_md_context, composite_call_metadata_cb, ctx);
nnoble0c475f02014-12-05 15:37:39 -08001003}
1004
Julien Boeufb73cbc22015-10-20 21:52:54 -07001005static grpc_call_credentials_vtable composite_call_credentials_vtable = {
1006 composite_call_destruct, composite_call_get_request_metadata};
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001007
Julien Boeuf441176d2015-10-09 21:14:07 -07001008static grpc_call_credentials_array get_creds_array(
1009 grpc_call_credentials **creds_addr) {
1010 grpc_call_credentials_array result;
1011 grpc_call_credentials *creds = *creds_addr;
nnoble0c475f02014-12-05 15:37:39 -08001012 result.creds_array = creds_addr;
1013 result.num_creds = 1;
Julien Boeuf441176d2015-10-09 21:14:07 -07001014 if (strcmp(creds->type, GRPC_CALL_CREDENTIALS_TYPE_COMPOSITE) == 0) {
Julien Boeufb73cbc22015-10-20 21:52:54 -07001015 result = *grpc_composite_call_credentials_get_credentials(creds);
Craig Tillera82950e2015-09-22 12:33:20 -07001016 }
nnoble0c475f02014-12-05 15:37:39 -08001017 return result;
1018}
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001019
Julien Boeuf441176d2015-10-09 21:14:07 -07001020grpc_call_credentials *grpc_composite_call_credentials_create(
1021 grpc_call_credentials *creds1, grpc_call_credentials *creds2,
1022 void *reserved) {
nnoble0c475f02014-12-05 15:37:39 -08001023 size_t i;
Julien Boeuf7d1d9ca2015-04-17 14:38:48 -07001024 size_t creds_array_byte_size;
Julien Boeuf441176d2015-10-09 21:14:07 -07001025 grpc_call_credentials_array creds1_array;
1026 grpc_call_credentials_array creds2_array;
Julien Boeufb73cbc22015-10-20 21:52:54 -07001027 grpc_composite_call_credentials *c;
Craig Tiller4de3e4f2015-10-05 08:55:50 -07001028 GRPC_API_TRACE(
Julien Boeufb73cbc22015-10-20 21:52:54 -07001029 "grpc_composite_call_credentials_create(creds1=%p, creds2=%p, "
Craig Tiller4de3e4f2015-10-05 08:55:50 -07001030 "reserved=%p)",
1031 3, (creds1, creds2, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -07001032 GPR_ASSERT(reserved == NULL);
1033 GPR_ASSERT(creds1 != NULL);
1034 GPR_ASSERT(creds2 != NULL);
Julien Boeufb73cbc22015-10-20 21:52:54 -07001035 c = gpr_malloc(sizeof(grpc_composite_call_credentials));
1036 memset(c, 0, sizeof(grpc_composite_call_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -07001037 c->base.type = GRPC_CALL_CREDENTIALS_TYPE_COMPOSITE;
Julien Boeufb73cbc22015-10-20 21:52:54 -07001038 c->base.vtable = &composite_call_credentials_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -07001039 gpr_ref_init(&c->base.refcount, 1);
1040 creds1_array = get_creds_array(&creds1);
1041 creds2_array = get_creds_array(&creds2);
nnoble0c475f02014-12-05 15:37:39 -08001042 c->inner.num_creds = creds1_array.num_creds + creds2_array.num_creds;
Julien Boeuf441176d2015-10-09 21:14:07 -07001043 creds_array_byte_size = c->inner.num_creds * sizeof(grpc_call_credentials *);
Craig Tillera82950e2015-09-22 12:33:20 -07001044 c->inner.creds_array = gpr_malloc(creds_array_byte_size);
1045 memset(c->inner.creds_array, 0, creds_array_byte_size);
1046 for (i = 0; i < creds1_array.num_creds; i++) {
Julien Boeuf441176d2015-10-09 21:14:07 -07001047 grpc_call_credentials *cur_creds = creds1_array.creds_array[i];
1048 c->inner.creds_array[i] = grpc_call_credentials_ref(cur_creds);
Craig Tillera82950e2015-09-22 12:33:20 -07001049 }
1050 for (i = 0; i < creds2_array.num_creds; i++) {
Julien Boeuf441176d2015-10-09 21:14:07 -07001051 grpc_call_credentials *cur_creds = creds2_array.creds_array[i];
Craig Tillera82950e2015-09-22 12:33:20 -07001052 c->inner.creds_array[i + creds1_array.num_creds] =
Julien Boeuf441176d2015-10-09 21:14:07 -07001053 grpc_call_credentials_ref(cur_creds);
Craig Tillera82950e2015-09-22 12:33:20 -07001054 }
nnoble0c475f02014-12-05 15:37:39 -08001055 return &c->base;
1056}
1057
Julien Boeufb73cbc22015-10-20 21:52:54 -07001058const grpc_call_credentials_array *
1059grpc_composite_call_credentials_get_credentials(grpc_call_credentials *creds) {
1060 const grpc_composite_call_credentials *c =
1061 (const grpc_composite_call_credentials *)creds;
Julien Boeuf441176d2015-10-09 21:14:07 -07001062 GPR_ASSERT(strcmp(creds->type, GRPC_CALL_CREDENTIALS_TYPE_COMPOSITE) == 0);
nnoble0c475f02014-12-05 15:37:39 -08001063 return &c->inner;
1064}
1065
Julien Boeuf441176d2015-10-09 21:14:07 -07001066grpc_call_credentials *grpc_credentials_contains_type(
1067 grpc_call_credentials *creds, const char *type,
1068 grpc_call_credentials **composite_creds) {
jboeuf6ad120e2015-01-12 17:08:15 -08001069 size_t i;
Craig Tillera82950e2015-09-22 12:33:20 -07001070 if (strcmp(creds->type, type) == 0) {
1071 if (composite_creds != NULL) *composite_creds = NULL;
1072 return creds;
Julien Boeuf441176d2015-10-09 21:14:07 -07001073 } else if (strcmp(creds->type, GRPC_CALL_CREDENTIALS_TYPE_COMPOSITE) == 0) {
1074 const grpc_call_credentials_array *inner_creds_array =
Julien Boeufb73cbc22015-10-20 21:52:54 -07001075 grpc_composite_call_credentials_get_credentials(creds);
Craig Tillera82950e2015-09-22 12:33:20 -07001076 for (i = 0; i < inner_creds_array->num_creds; i++) {
1077 if (strcmp(type, inner_creds_array->creds_array[i]->type) == 0) {
1078 if (composite_creds != NULL) *composite_creds = creds;
1079 return inner_creds_array->creds_array[i];
1080 }
jboeuf6ad120e2015-01-12 17:08:15 -08001081 }
Craig Tillera82950e2015-09-22 12:33:20 -07001082 }
jboeuf6ad120e2015-01-12 17:08:15 -08001083 return NULL;
1084}
1085
nnoble0c475f02014-12-05 15:37:39 -08001086/* -- IAM credentials. -- */
1087
Julien Boeuf441176d2015-10-09 21:14:07 -07001088static void iam_destruct(grpc_call_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -07001089 grpc_google_iam_credentials *c = (grpc_google_iam_credentials *)creds;
1090 grpc_credentials_md_store_unref(c->iam_md);
nnoble0c475f02014-12-05 15:37:39 -08001091}
1092
Julien Boeuf441176d2015-10-09 21:14:07 -07001093static void iam_get_request_metadata(grpc_exec_ctx *exec_ctx,
1094 grpc_call_credentials *creds,
1095 grpc_pollset *pollset,
Julien Boeuf3c957e62015-11-18 21:33:58 -08001096 grpc_auth_metadata_context context,
Julien Boeuf441176d2015-10-09 21:14:07 -07001097 grpc_credentials_metadata_cb cb,
1098 void *user_data) {
Craig Tillera82950e2015-09-22 12:33:20 -07001099 grpc_google_iam_credentials *c = (grpc_google_iam_credentials *)creds;
1100 cb(exec_ctx, user_data, c->iam_md->entries, c->iam_md->num_entries,
1101 GRPC_CREDENTIALS_OK);
nnoble0c475f02014-12-05 15:37:39 -08001102}
1103
Julien Boeuf441176d2015-10-09 21:14:07 -07001104static grpc_call_credentials_vtable iam_vtable = {iam_destruct,
Craig Tillerb1136492015-11-18 11:30:17 -08001105 iam_get_request_metadata};
nnoble0c475f02014-12-05 15:37:39 -08001106
Julien Boeuf441176d2015-10-09 21:14:07 -07001107grpc_call_credentials *grpc_google_iam_credentials_create(
Craig Tillera82950e2015-09-22 12:33:20 -07001108 const char *token, const char *authority_selector, void *reserved) {
Julien Boeuf510a9202015-08-25 21:51:07 -07001109 grpc_google_iam_credentials *c;
Craig Tiller4de3e4f2015-10-05 08:55:50 -07001110 GRPC_API_TRACE(
1111 "grpc_iam_credentials_create(token=%s, authority_selector=%s, "
1112 "reserved=%p)",
1113 3, (token, authority_selector, reserved));
Craig Tillera82950e2015-09-22 12:33:20 -07001114 GPR_ASSERT(reserved == NULL);
1115 GPR_ASSERT(token != NULL);
1116 GPR_ASSERT(authority_selector != NULL);
1117 c = gpr_malloc(sizeof(grpc_google_iam_credentials));
1118 memset(c, 0, sizeof(grpc_google_iam_credentials));
Julien Boeuf441176d2015-10-09 21:14:07 -07001119 c->base.type = GRPC_CALL_CREDENTIALS_TYPE_IAM;
nnoble0c475f02014-12-05 15:37:39 -08001120 c->base.vtable = &iam_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -07001121 gpr_ref_init(&c->base.refcount, 1);
1122 c->iam_md = grpc_credentials_md_store_create(2);
1123 grpc_credentials_md_store_add_cstrings(
1124 c->iam_md, GRPC_IAM_AUTHORIZATION_TOKEN_METADATA_KEY, token);
1125 grpc_credentials_md_store_add_cstrings(
1126 c->iam_md, GRPC_IAM_AUTHORITY_SELECTOR_METADATA_KEY, authority_selector);
nnoble0c475f02014-12-05 15:37:39 -08001127 return &c->base;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001128}
Julien Boeuf2d041182015-08-31 20:30:09 -07001129
1130/* -- Plugin credentials. -- */
1131
Craig Tillera82950e2015-09-22 12:33:20 -07001132typedef struct {
Julien Boeuf2d041182015-08-31 20:30:09 -07001133 void *user_data;
1134 grpc_credentials_metadata_cb cb;
1135} grpc_metadata_plugin_request;
1136
Julien Boeuf441176d2015-10-09 21:14:07 -07001137static void plugin_destruct(grpc_call_credentials *creds) {
Craig Tillera82950e2015-09-22 12:33:20 -07001138 grpc_plugin_credentials *c = (grpc_plugin_credentials *)creds;
1139 if (c->plugin.state != NULL && c->plugin.destroy != NULL) {
1140 c->plugin.destroy(c->plugin.state);
1141 }
Julien Boeuf2d041182015-08-31 20:30:09 -07001142}
1143
Craig Tillera82950e2015-09-22 12:33:20 -07001144static void plugin_md_request_metadata_ready(void *request,
1145 const grpc_metadata *md,
1146 size_t num_md,
1147 grpc_status_code status,
1148 const char *error_details) {
Craig Tiller10ee2742015-09-22 09:25:57 -07001149 /* called from application code */
Craig Tillerf5768a62015-09-22 10:54:34 -07001150 grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
Craig Tillera82950e2015-09-22 12:33:20 -07001151 grpc_metadata_plugin_request *r = (grpc_metadata_plugin_request *)request;
1152 if (status != GRPC_STATUS_OK) {
1153 if (error_details != NULL) {
1154 gpr_log(GPR_ERROR, "Getting metadata from plugin failed with error: %s",
1155 error_details);
Julien Boeuf2d041182015-08-31 20:30:09 -07001156 }
Craig Tillera82950e2015-09-22 12:33:20 -07001157 r->cb(&exec_ctx, r->user_data, NULL, 0, GRPC_CREDENTIALS_ERROR);
1158 } else {
1159 size_t i;
1160 grpc_credentials_md *md_array = NULL;
1161 if (num_md > 0) {
1162 md_array = gpr_malloc(num_md * sizeof(grpc_credentials_md));
1163 for (i = 0; i < num_md; i++) {
1164 md_array[i].key = gpr_slice_from_copied_string(md[i].key);
1165 md_array[i].value =
1166 gpr_slice_from_copied_buffer(md[i].value, md[i].value_length);
1167 }
Julien Boeuf2d041182015-08-31 20:30:09 -07001168 }
Craig Tillera82950e2015-09-22 12:33:20 -07001169 r->cb(&exec_ctx, r->user_data, md_array, num_md, GRPC_CREDENTIALS_OK);
1170 if (md_array != NULL) {
1171 for (i = 0; i < num_md; i++) {
1172 gpr_slice_unref(md_array[i].key);
1173 gpr_slice_unref(md_array[i].value);
1174 }
1175 gpr_free(md_array);
1176 }
1177 }
1178 gpr_free(r);
Craig Tiller80183f32015-09-23 12:33:59 -07001179 grpc_exec_ctx_finish(&exec_ctx);
Julien Boeuf2d041182015-08-31 20:30:09 -07001180}
1181
Julien Boeuf441176d2015-10-09 21:14:07 -07001182static void plugin_get_request_metadata(grpc_exec_ctx *exec_ctx,
1183 grpc_call_credentials *creds,
1184 grpc_pollset *pollset,
Julien Boeuf3c957e62015-11-18 21:33:58 -08001185 grpc_auth_metadata_context context,
Julien Boeuf441176d2015-10-09 21:14:07 -07001186 grpc_credentials_metadata_cb cb,
1187 void *user_data) {
Craig Tillera82950e2015-09-22 12:33:20 -07001188 grpc_plugin_credentials *c = (grpc_plugin_credentials *)creds;
1189 if (c->plugin.get_metadata != NULL) {
1190 grpc_metadata_plugin_request *request = gpr_malloc(sizeof(*request));
1191 memset(request, 0, sizeof(*request));
1192 request->user_data = user_data;
1193 request->cb = cb;
Julien Boeuf3c957e62015-11-18 21:33:58 -08001194 c->plugin.get_metadata(c->plugin.state, context,
Craig Tillera82950e2015-09-22 12:33:20 -07001195 plugin_md_request_metadata_ready, request);
1196 } else {
1197 cb(exec_ctx, user_data, NULL, 0, GRPC_CREDENTIALS_OK);
1198 }
Julien Boeuf2d041182015-08-31 20:30:09 -07001199}
1200
Julien Boeuf441176d2015-10-09 21:14:07 -07001201static grpc_call_credentials_vtable plugin_vtable = {
1202 plugin_destruct, plugin_get_request_metadata};
Julien Boeuf2d041182015-08-31 20:30:09 -07001203
Julien Boeuf441176d2015-10-09 21:14:07 -07001204grpc_call_credentials *grpc_metadata_credentials_create_from_plugin(
Craig Tillera82950e2015-09-22 12:33:20 -07001205 grpc_metadata_credentials_plugin plugin, void *reserved) {
1206 grpc_plugin_credentials *c = gpr_malloc(sizeof(*c));
Julien Boeufb73cbc22015-10-20 21:52:54 -07001207 GRPC_API_TRACE("grpc_metadata_credentials_create_from_plugin(reserved=%p)", 1,
1208 (reserved));
Craig Tillera82950e2015-09-22 12:33:20 -07001209 GPR_ASSERT(reserved == NULL);
1210 memset(c, 0, sizeof(*c));
Julien Boeufcaf99352015-11-19 22:00:30 -08001211 c->base.type = plugin.type;
Julien Boeuf2d041182015-08-31 20:30:09 -07001212 c->base.vtable = &plugin_vtable;
Craig Tillera82950e2015-09-22 12:33:20 -07001213 gpr_ref_init(&c->base.refcount, 1);
Julien Boeuf2d041182015-08-31 20:30:09 -07001214 c->plugin = plugin;
1215 return &c->base;
1216}
Julien Boeufb73cbc22015-10-20 21:52:54 -07001217
1218/* -- Composite channel credentials. -- */
1219
1220static void composite_channel_destruct(grpc_channel_credentials *creds) {
1221 grpc_composite_channel_credentials *c =
1222 (grpc_composite_channel_credentials *)creds;
1223 grpc_channel_credentials_unref(c->inner_creds);
1224 grpc_call_credentials_unref(c->call_creds);
1225}
1226
1227static grpc_security_status composite_channel_create_security_connector(
1228 grpc_channel_credentials *creds, grpc_call_credentials *call_creds,
1229 const char *target, const grpc_channel_args *args,
1230 grpc_channel_security_connector **sc, grpc_channel_args **new_args) {
1231 grpc_composite_channel_credentials *c =
1232 (grpc_composite_channel_credentials *)creds;
1233 grpc_security_status status = GRPC_SECURITY_ERROR;
1234
1235 GPR_ASSERT(c->inner_creds != NULL && c->call_creds != NULL &&
1236 c->inner_creds->vtable != NULL &&
1237 c->inner_creds->vtable->create_security_connector != NULL);
1238 /* If we are passed a call_creds, create a call composite to pass it
1239 downstream. */
1240 if (call_creds != NULL) {
1241 grpc_call_credentials *composite_call_creds =
1242 grpc_composite_call_credentials_create(c->call_creds, call_creds, NULL);
1243 status = c->inner_creds->vtable->create_security_connector(
1244 c->inner_creds, composite_call_creds, target, args, sc, new_args);
1245 grpc_call_credentials_unref(composite_call_creds);
1246 } else {
1247 status = c->inner_creds->vtable->create_security_connector(
1248 c->inner_creds, c->call_creds, target, args, sc, new_args);
1249 }
1250 return status;
1251}
1252
1253static grpc_channel_credentials_vtable composite_channel_credentials_vtable = {
1254 composite_channel_destruct, composite_channel_create_security_connector};
1255
1256grpc_channel_credentials *grpc_composite_channel_credentials_create(
1257 grpc_channel_credentials *channel_creds, grpc_call_credentials *call_creds,
1258 void *reserved) {
1259 grpc_composite_channel_credentials *c = gpr_malloc(sizeof(*c));
1260 memset(c, 0, sizeof(*c));
1261 GPR_ASSERT(channel_creds != NULL && call_creds != NULL && reserved == NULL);
1262 GRPC_API_TRACE(
1263 "grpc_composite_channel_credentials_create(channel_creds=%p, "
1264 "call_creds=%p, reserved=%p)",
1265 3, (channel_creds, call_creds, reserved));
1266 c->base.type = channel_creds->type;
1267 c->base.vtable = &composite_channel_credentials_vtable;
1268 gpr_ref_init(&c->base.refcount, 1);
1269 c->inner_creds = grpc_channel_credentials_ref(channel_creds);
1270 c->call_creds = grpc_call_credentials_ref(call_creds);
1271 return &c->base;
1272}