| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181 | 
/* * * Copyright 2016 gRPC authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * *     http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * */#include "test/cpp/util/test_credentials_provider.h"#include <cstdio>#include <fstream>#include <iostream>#include <mutex>#include <unordered_map>#include <gflags/gflags.h>#include <grpc/support/log.h>#include <grpc/support/sync.h>#include <grpcpp/security/server_credentials.h>#include "test/core/end2end/data/ssl_test_data.h"DEFINE_string(tls_cert_file, "", "The TLS cert file used when --use_tls=true");DEFINE_string(tls_key_file, "", "The TLS key file used when --use_tls=true");namespace grpc {namespace testing {namespace {grpc::string ReadFile(const grpc::string& src_path) {  std::ifstream src;  src.open(src_path, std::ifstream::in | std::ifstream::binary);  grpc::string contents;  src.seekg(0, std::ios::end);  contents.reserve(src.tellg());  src.seekg(0, std::ios::beg);  contents.assign((std::istreambuf_iterator<char>(src)),                  (std::istreambuf_iterator<char>()));  return contents;}class DefaultCredentialsProvider : public CredentialsProvider { public:  DefaultCredentialsProvider() {    if (!FLAGS_tls_key_file.empty()) {      custom_server_key_ = ReadFile(FLAGS_tls_key_file);    }    if (!FLAGS_tls_cert_file.empty()) {      custom_server_cert_ = ReadFile(FLAGS_tls_cert_file);    }  }  ~DefaultCredentialsProvider() override {}  void AddSecureType(      const grpc::string& type,      std::unique_ptr<CredentialTypeProvider> type_provider) override {    // This clobbers any existing entry for type, except the defaults, which    // can't be clobbered.    std::unique_lock<std::mutex> lock(mu_);    auto it = std::find(added_secure_type_names_.begin(),                        added_secure_type_names_.end(), type);    if (it == added_secure_type_names_.end()) {      added_secure_type_names_.push_back(type);      added_secure_type_providers_.push_back(std::move(type_provider));    } else {      added_secure_type_providers_[it - added_secure_type_names_.begin()] =          std::move(type_provider);    }  }  std::shared_ptr<ChannelCredentials> GetChannelCredentials(      const grpc::string& type, ChannelArguments* args) override {    if (type == grpc::testing::kInsecureCredentialsType) {      return InsecureChannelCredentials();    } else if (type == grpc::testing::kAltsCredentialsType) {      grpc::experimental::AltsCredentialsOptions alts_opts;      return grpc::experimental::AltsCredentials(alts_opts);    } else if (type == grpc::testing::kTlsCredentialsType) {      SslCredentialsOptions ssl_opts = {test_root_cert, "", ""};      args->SetSslTargetNameOverride("foo.test.google.fr");      return grpc::SslCredentials(ssl_opts);    } else if (type == grpc::testing::kGoogleDefaultCredentialsType) {      return grpc::GoogleDefaultCredentials();    } else {      std::unique_lock<std::mutex> lock(mu_);      auto it(std::find(added_secure_type_names_.begin(),                        added_secure_type_names_.end(), type));      if (it == added_secure_type_names_.end()) {        gpr_log(GPR_ERROR, "Unsupported credentials type %s.", type.c_str());        return nullptr;      }      return added_secure_type_providers_[it - added_secure_type_names_.begin()]          ->GetChannelCredentials(args);    }  }  std::shared_ptr<ServerCredentials> GetServerCredentials(      const grpc::string& type) override {    if (type == grpc::testing::kInsecureCredentialsType) {      return InsecureServerCredentials();    } else if (type == grpc::testing::kAltsCredentialsType) {      grpc::experimental::AltsServerCredentialsOptions alts_opts;      return grpc::experimental::AltsServerCredentials(alts_opts);    } else if (type == grpc::testing::kTlsCredentialsType) {      SslServerCredentialsOptions ssl_opts;      ssl_opts.pem_root_certs = "";      if (!custom_server_key_.empty() && !custom_server_cert_.empty()) {        SslServerCredentialsOptions::PemKeyCertPair pkcp = {            custom_server_key_, custom_server_cert_};        ssl_opts.pem_key_cert_pairs.push_back(pkcp);      } else {        SslServerCredentialsOptions::PemKeyCertPair pkcp = {test_server1_key,                                                            test_server1_cert};        ssl_opts.pem_key_cert_pairs.push_back(pkcp);      }      return SslServerCredentials(ssl_opts);    } else {      std::unique_lock<std::mutex> lock(mu_);      auto it(std::find(added_secure_type_names_.begin(),                        added_secure_type_names_.end(), type));      if (it == added_secure_type_names_.end()) {        gpr_log(GPR_ERROR, "Unsupported credentials type %s.", type.c_str());        return nullptr;      }      return added_secure_type_providers_[it - added_secure_type_names_.begin()]          ->GetServerCredentials();    }  }  std::vector<grpc::string> GetSecureCredentialsTypeList() override {    std::vector<grpc::string> types;    types.push_back(grpc::testing::kTlsCredentialsType);    std::unique_lock<std::mutex> lock(mu_);    for (auto it = added_secure_type_names_.begin();         it != added_secure_type_names_.end(); it++) {      types.push_back(*it);    }    return types;  } private:  std::mutex mu_;  std::vector<grpc::string> added_secure_type_names_;  std::vector<std::unique_ptr<CredentialTypeProvider>>      added_secure_type_providers_;  grpc::string custom_server_key_;  grpc::string custom_server_cert_;};CredentialsProvider* g_provider = nullptr;}  // namespaceCredentialsProvider* GetCredentialsProvider() {  if (g_provider == nullptr) {    g_provider = new DefaultCredentialsProvider;  }  return g_provider;}void SetCredentialsProvider(CredentialsProvider* provider) {  // For now, forbids overriding provider.  GPR_ASSERT(g_provider == nullptr);  g_provider = provider;}}  // namespace testing}  // namespace grpc
 |