| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237 | /* * * Copyright 2015, Google Inc. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are * met: * *     * Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. *     * Redistributions in binary form must reproduce the above * copyright notice, this list of conditions and the following disclaimer * in the documentation and/or other materials provided with the * distribution. *     * Neither the name of Google Inc. nor the names of its * contributors may be used to endorse or promote products derived from * this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * */#include <grpc++/channel.h>#include <grpc++/impl/grpc_library.h>#include <grpc++/support/channel_arguments.h>#include <grpc/support/log.h>#include "src/cpp/client/create_channel_internal.h"#include "src/cpp/client/secure_credentials.h"#include "src/cpp/common/secure_auth_context.h"namespace grpc {SecureChannelCredentials::SecureChannelCredentials(    grpc_channel_credentials* c_creds)    : c_creds_(c_creds) {  internal::g_gli_initializer.summon();}std::shared_ptr<grpc::Channel> SecureChannelCredentials::CreateChannel(    const string& target, const grpc::ChannelArguments& args) {  grpc_channel_args channel_args;  args.SetChannelArgs(&channel_args);  return CreateChannelInternal(      args.GetSslTargetNameOverride(),      grpc_secure_channel_create(c_creds_, target.c_str(), &channel_args,                                 nullptr));}SecureCallCredentials::SecureCallCredentials(grpc_call_credentials* c_creds)    : c_creds_(c_creds) {  internal::GrpcLibraryInitializer gli_initializer;  gli_initializer.summon();}bool SecureCallCredentials::ApplyToCall(grpc_call* call) {  return grpc_call_set_credentials(call, c_creds_) == GRPC_CALL_OK;}namespace {std::shared_ptr<ChannelCredentials> WrapChannelCredentials(    grpc_channel_credentials* creds) {  return creds == nullptr ? nullptr : std::shared_ptr<ChannelCredentials>(                                          new SecureChannelCredentials(creds));}std::shared_ptr<CallCredentials> WrapCallCredentials(    grpc_call_credentials* creds) {  return creds == nullptr ? nullptr : std::shared_ptr<CallCredentials>(                                          new SecureCallCredentials(creds));}}  // namespacestd::shared_ptr<ChannelCredentials> GoogleDefaultCredentials() {  GrpcLibrary init;  // To call grpc_init().  return WrapChannelCredentials(grpc_google_default_credentials_create());}// Builds SSL Credentials given SSL specific optionsstd::shared_ptr<ChannelCredentials> SslCredentials(    const SslCredentialsOptions& options) {  GrpcLibrary init;  // To call grpc_init().  grpc_ssl_pem_key_cert_pair pem_key_cert_pair = {      options.pem_private_key.c_str(), options.pem_cert_chain.c_str()};  grpc_channel_credentials* c_creds = grpc_ssl_credentials_create(      options.pem_root_certs.empty() ? nullptr : options.pem_root_certs.c_str(),      options.pem_private_key.empty() ? nullptr : &pem_key_cert_pair, nullptr);  return WrapChannelCredentials(c_creds);}// Builds credentials for use when running in GCEstd::shared_ptr<CallCredentials> GoogleComputeEngineCredentials() {  GrpcLibrary init;  // To call grpc_init().  return WrapCallCredentials(      grpc_google_compute_engine_credentials_create(nullptr));}// Builds JWT credentials.std::shared_ptr<CallCredentials> ServiceAccountJWTAccessCredentials(    const grpc::string& json_key, long token_lifetime_seconds) {  GrpcLibrary init;  // To call grpc_init().  if (token_lifetime_seconds <= 0) {    gpr_log(GPR_ERROR,            "Trying to create JWTCredentials with non-positive lifetime");    return WrapCallCredentials(nullptr);  }  gpr_timespec lifetime =      gpr_time_from_seconds(token_lifetime_seconds, GPR_TIMESPAN);  return WrapCallCredentials(grpc_service_account_jwt_access_credentials_create(      json_key.c_str(), lifetime, nullptr));}// Builds refresh token credentials.std::shared_ptr<CallCredentials> GoogleRefreshTokenCredentials(    const grpc::string& json_refresh_token) {  GrpcLibrary init;  // To call grpc_init().  return WrapCallCredentials(grpc_google_refresh_token_credentials_create(      json_refresh_token.c_str(), nullptr));}// Builds access token credentials.std::shared_ptr<CallCredentials> AccessTokenCredentials(    const grpc::string& access_token) {  GrpcLibrary init;  // To call grpc_init().  return WrapCallCredentials(      grpc_access_token_credentials_create(access_token.c_str(), nullptr));}// Builds IAM credentials.std::shared_ptr<CallCredentials> GoogleIAMCredentials(    const grpc::string& authorization_token,    const grpc::string& authority_selector) {  GrpcLibrary init;  // To call grpc_init().  return WrapCallCredentials(grpc_google_iam_credentials_create(      authorization_token.c_str(), authority_selector.c_str(), nullptr));}// Combines one channel credentials and one call credentials into a channel// composite credentials.std::shared_ptr<ChannelCredentials> CompositeChannelCredentials(    const std::shared_ptr<ChannelCredentials>& channel_creds,    const std::shared_ptr<CallCredentials>& call_creds) {  // Note that we are not saving shared_ptrs to the two credentials passed in  // here. This is OK because the underlying C objects (i.e., channel_creds and  // call_creds) into grpc_composite_credentials_create will see their refcounts  // incremented.  SecureChannelCredentials* s_channel_creds =      channel_creds->AsSecureCredentials();  SecureCallCredentials* s_call_creds = call_creds->AsSecureCredentials();  if (s_channel_creds && s_call_creds) {    return WrapChannelCredentials(grpc_composite_channel_credentials_create(        s_channel_creds->GetRawCreds(), s_call_creds->GetRawCreds(), nullptr));  }  return nullptr;}void MetadataCredentialsPluginWrapper::Destroy(void* wrapper) {  if (wrapper == nullptr) return;  MetadataCredentialsPluginWrapper* w =      reinterpret_cast<MetadataCredentialsPluginWrapper*>(wrapper);  delete w;}void MetadataCredentialsPluginWrapper::GetMetadata(    void* wrapper, grpc_auth_metadata_context context,    grpc_credentials_plugin_metadata_cb cb, void* user_data) {  GPR_ASSERT(wrapper);  MetadataCredentialsPluginWrapper* w =      reinterpret_cast<MetadataCredentialsPluginWrapper*>(wrapper);  if (!w->plugin_) {    cb(user_data, NULL, 0, GRPC_STATUS_OK, NULL);    return;  }  if (w->plugin_->IsBlocking()) {    w->thread_pool_->Add(        std::bind(&MetadataCredentialsPluginWrapper::InvokePlugin, w, context,                  cb, user_data));  } else {    w->InvokePlugin(context, cb, user_data);  }}void MetadataCredentialsPluginWrapper::InvokePlugin(    grpc_auth_metadata_context context, grpc_credentials_plugin_metadata_cb cb,    void* user_data) {  std::multimap<grpc::string, grpc::string> metadata;  // const_cast is safe since the SecureAuthContext does not take owndership and  // the object is passed as a const ref to plugin_->GetMetadata.  SecureAuthContext cpp_channel_auth_context(      const_cast<grpc_auth_context*>(context.channel_auth_context), false);  Status status = plugin_->GetMetadata(context.service_url, context.method_name,                                       cpp_channel_auth_context, &metadata);  std::vector<grpc_metadata> md;  for (auto it = metadata.begin(); it != metadata.end(); ++it) {    grpc_metadata md_entry;    md_entry.key = it->first.c_str();    md_entry.value = it->second.data();    md_entry.value_length = it->second.size();    md_entry.flags = 0;    md.push_back(md_entry);  }  cb(user_data, md.empty() ? nullptr : &md[0], md.size(),     static_cast<grpc_status_code>(status.error_code()),     status.error_message().c_str());}MetadataCredentialsPluginWrapper::MetadataCredentialsPluginWrapper(    std::unique_ptr<MetadataCredentialsPlugin> plugin)    : thread_pool_(CreateDefaultThreadPool()), plugin_(std::move(plugin)) {}std::shared_ptr<CallCredentials> MetadataCredentialsFromPlugin(    std::unique_ptr<MetadataCredentialsPlugin> plugin) {  GrpcLibrary init;  // To call grpc_init().  const char* type = plugin->GetType();  MetadataCredentialsPluginWrapper* wrapper =      new MetadataCredentialsPluginWrapper(std::move(plugin));  grpc_metadata_credentials_plugin c_plugin = {      MetadataCredentialsPluginWrapper::GetMetadata,      MetadataCredentialsPluginWrapper::Destroy, wrapper, type};  return WrapCallCredentials(      grpc_metadata_credentials_create_from_plugin(c_plugin, nullptr));}}  // namespace grpc
 |