| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245 | /* * * Copyright 2015, Google Inc. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are * met: * *     * Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. *     * Redistributions in binary form must reproduce the above * copyright notice, this list of conditions and the following disclaimer * in the documentation and/or other materials provided with the * distribution. *     * Neither the name of Google Inc. nor the names of its * contributors may be used to endorse or promote products derived from * this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * */#include "src/core/security/credentials.h"#include <string.h>#include <grpc/support/alloc.h>#include <grpc/support/log.h>#include <grpc/support/sync.h>#include "src/core/httpcli/httpcli.h"#include "src/core/support/env.h"#include "src/core/support/file.h"#include "src/core/surface/api_trace.h"/* -- Constants. -- */#define GRPC_COMPUTE_ENGINE_DETECTION_HOST "metadata.google.internal"/* -- Default credentials. -- */static grpc_channel_credentials *default_credentials = NULL;static int compute_engine_detection_done = 0;static gpr_mu g_mu;static gpr_once g_once = GPR_ONCE_INIT;static void init_default_credentials(void) { gpr_mu_init(&g_mu); }typedef struct {  grpc_pollset pollset;  int is_done;  int success;} compute_engine_detector;static void on_compute_engine_detection_http_response(    grpc_exec_ctx *exec_ctx, void *user_data,    const grpc_httpcli_response *response) {  compute_engine_detector *detector = (compute_engine_detector *)user_data;  if (response != NULL && response->status == 200 && response->hdr_count > 0) {    /* Internet providers can return a generic response to all requests, so       it is necessary to check that metadata header is present also. */    size_t i;    for (i = 0; i < response->hdr_count; i++) {      grpc_httpcli_header *header = &response->hdrs[i];      if (strcmp(header->key, "Metadata-Flavor") == 0 &&          strcmp(header->value, "Google") == 0) {        detector->success = 1;        break;      }    }  }  gpr_mu_lock(GRPC_POLLSET_MU(&detector->pollset));  detector->is_done = 1;  grpc_pollset_kick(&detector->pollset, NULL);  gpr_mu_unlock(GRPC_POLLSET_MU(&detector->pollset));}static void destroy_pollset(grpc_exec_ctx *exec_ctx, void *p, int s) {  grpc_pollset_destroy(p);}static int is_stack_running_on_compute_engine(void) {  compute_engine_detector detector;  grpc_httpcli_request request;  grpc_httpcli_context context;  grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;  grpc_closure destroy_closure;  /* The http call is local. If it takes more than one sec, it is for sure not     on compute engine. */  gpr_timespec max_detection_delay = gpr_time_from_seconds(1, GPR_TIMESPAN);  grpc_pollset_init(&detector.pollset);  detector.is_done = 0;  detector.success = 0;  memset(&request, 0, sizeof(grpc_httpcli_request));  request.host = GRPC_COMPUTE_ENGINE_DETECTION_HOST;  request.path = "/";  grpc_httpcli_context_init(&context);  grpc_httpcli_get(      &exec_ctx, &context, &detector.pollset, &request,      gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), max_detection_delay),      on_compute_engine_detection_http_response, &detector);  grpc_exec_ctx_finish(&exec_ctx);  /* Block until we get the response. This is not ideal but this should only be     called once for the lifetime of the process by the default credentials. */  gpr_mu_lock(GRPC_POLLSET_MU(&detector.pollset));  while (!detector.is_done) {    grpc_pollset_worker worker;    grpc_pollset_work(&exec_ctx, &detector.pollset, &worker,                      gpr_now(GPR_CLOCK_MONOTONIC),                      gpr_inf_future(GPR_CLOCK_MONOTONIC));  }  gpr_mu_unlock(GRPC_POLLSET_MU(&detector.pollset));  grpc_httpcli_context_destroy(&context);  grpc_closure_init(&destroy_closure, destroy_pollset, &detector.pollset);  grpc_pollset_shutdown(&exec_ctx, &detector.pollset, &destroy_closure);  grpc_exec_ctx_finish(&exec_ctx);  return detector.success;}/* Takes ownership of creds_path if not NULL. */static grpc_call_credentials *create_default_creds_from_path(char *creds_path) {  grpc_json *json = NULL;  grpc_auth_json_key key;  grpc_auth_refresh_token token;  grpc_call_credentials *result = NULL;  gpr_slice creds_data = gpr_empty_slice();  int file_ok = 0;  if (creds_path == NULL) goto end;  creds_data = gpr_load_file(creds_path, 0, &file_ok);  if (!file_ok) goto end;  json = grpc_json_parse_string_with_len(      (char *)GPR_SLICE_START_PTR(creds_data), GPR_SLICE_LENGTH(creds_data));  if (json == NULL) goto end;  /* First, try an auth json key. */  key = grpc_auth_json_key_create_from_json(json);  if (grpc_auth_json_key_is_valid(&key)) {    result =        grpc_service_account_jwt_access_credentials_create_from_auth_json_key(            key, grpc_max_auth_token_lifetime);    goto end;  }  /* Then try a refresh token if the auth json key was invalid. */  token = grpc_auth_refresh_token_create_from_json(json);  if (grpc_auth_refresh_token_is_valid(&token)) {    result =        grpc_refresh_token_credentials_create_from_auth_refresh_token(token);    goto end;  }end:  if (creds_path != NULL) gpr_free(creds_path);  gpr_slice_unref(creds_data);  if (json != NULL) grpc_json_destroy(json);  return result;}grpc_channel_credentials *grpc_google_default_credentials_create(void) {  grpc_channel_credentials *result = NULL;  grpc_call_credentials *call_creds = NULL;  GRPC_API_TRACE("grpc_google_default_credentials_create(void)", 0, ());  gpr_once_init(&g_once, init_default_credentials);  gpr_mu_lock(&g_mu);  if (default_credentials != NULL) {    result = grpc_channel_credentials_ref(default_credentials);    goto end;  }  /* First, try the environment variable. */  call_creds = create_default_creds_from_path(      gpr_getenv(GRPC_GOOGLE_CREDENTIALS_ENV_VAR));  if (call_creds != NULL) goto end;  /* Then the well-known file. */  call_creds = create_default_creds_from_path(      grpc_get_well_known_google_credentials_file_path());  if (call_creds != NULL) goto end;  /* At last try to see if we're on compute engine (do the detection only once     since it requires a network test). */  if (!compute_engine_detection_done) {    int need_compute_engine_creds = is_stack_running_on_compute_engine();    compute_engine_detection_done = 1;    if (need_compute_engine_creds) {      call_creds = grpc_google_compute_engine_credentials_create(NULL);    }  }end:  if (result == NULL) {    if (call_creds != NULL) {      /* Blend with default ssl credentials and add a global reference so that         it         can be cached and re-served. */      grpc_channel_credentials *ssl_creds =          grpc_ssl_credentials_create(NULL, NULL, NULL);      default_credentials = grpc_channel_credentials_ref(          grpc_composite_channel_credentials_create(ssl_creds, call_creds,                                                    NULL));      GPR_ASSERT(default_credentials != NULL);      grpc_channel_credentials_unref(ssl_creds);      grpc_call_credentials_unref(call_creds);      result = default_credentials;    } else {      gpr_log(GPR_ERROR, "Could not create google default credentials.");    }  }  gpr_mu_unlock(&g_mu);  return result;}void grpc_flush_cached_google_default_credentials(void) {  gpr_once_init(&g_once, init_default_credentials);  gpr_mu_lock(&g_mu);  if (default_credentials != NULL) {    grpc_channel_credentials_unref(default_credentials);    default_credentials = NULL;  }  gpr_mu_unlock(&g_mu);}
 |