Index: third_party/grpc/src/node/ext/server_credentials.cc |
diff --git a/third_party/grpc/src/node/ext/server_credentials.cc b/third_party/grpc/src/node/ext/server_credentials.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..5285d53df418c2802fe777446ab9a45281992855 |
--- /dev/null |
+++ b/third_party/grpc/src/node/ext/server_credentials.cc |
@@ -0,0 +1,198 @@ |
+/* |
+ * |
+ * Copyright 2015, Google Inc. |
+ * All rights reserved. |
+ * |
+ * Redistribution and use in source and binary forms, with or without |
+ * modification, are permitted provided that the following conditions are |
+ * met: |
+ * |
+ * * Redistributions of source code must retain the above copyright |
+ * notice, this list of conditions and the following disclaimer. |
+ * * Redistributions in binary form must reproduce the above |
+ * copyright notice, this list of conditions and the following disclaimer |
+ * in the documentation and/or other materials provided with the |
+ * distribution. |
+ * * Neither the name of Google Inc. nor the names of its |
+ * contributors may be used to endorse or promote products derived from |
+ * this software without specific prior written permission. |
+ * |
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
+ * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
+ * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
+ * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
+ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
+ * |
+ */ |
+ |
+#include <node.h> |
+ |
+#include "grpc/grpc.h" |
+#include "grpc/grpc_security.h" |
+#include "grpc/support/log.h" |
+#include "server_credentials.h" |
+ |
+namespace grpc { |
+namespace node { |
+ |
+using Nan::Callback; |
+using Nan::EscapableHandleScope; |
+using Nan::HandleScope; |
+using Nan::Maybe; |
+using Nan::MaybeLocal; |
+using Nan::ObjectWrap; |
+using Nan::Persistent; |
+using Nan::Utf8String; |
+ |
+using v8::Array; |
+using v8::Exception; |
+using v8::External; |
+using v8::Function; |
+using v8::FunctionTemplate; |
+using v8::Integer; |
+using v8::Local; |
+using v8::Object; |
+using v8::ObjectTemplate; |
+using v8::String; |
+using v8::Value; |
+ |
+Nan::Callback *ServerCredentials::constructor; |
+Persistent<FunctionTemplate> ServerCredentials::fun_tpl; |
+ |
+ServerCredentials::ServerCredentials(grpc_server_credentials *credentials) |
+ : wrapped_credentials(credentials) {} |
+ |
+ServerCredentials::~ServerCredentials() { |
+ grpc_server_credentials_release(wrapped_credentials); |
+} |
+ |
+void ServerCredentials::Init(Local<Object> exports) { |
+ Nan::HandleScope scope; |
+ Local<FunctionTemplate> tpl = Nan::New<FunctionTemplate>(New); |
+ tpl->SetClassName(Nan::New("ServerCredentials").ToLocalChecked()); |
+ tpl->InstanceTemplate()->SetInternalFieldCount(1); |
+ Local<Function> ctr = tpl->GetFunction(); |
+ Nan::Set(ctr, Nan::New("createSsl").ToLocalChecked(), |
+ Nan::GetFunction( |
+ Nan::New<FunctionTemplate>(CreateSsl)).ToLocalChecked()); |
+ Nan::Set(ctr, Nan::New("createInsecure").ToLocalChecked(), |
+ Nan::GetFunction( |
+ Nan::New<FunctionTemplate>(CreateInsecure)).ToLocalChecked()); |
+ fun_tpl.Reset(tpl); |
+ constructor = new Nan::Callback(ctr); |
+ Nan::Set(exports, Nan::New("ServerCredentials").ToLocalChecked(), ctr); |
+} |
+ |
+bool ServerCredentials::HasInstance(Local<Value> val) { |
+ Nan::HandleScope scope; |
+ return Nan::New(fun_tpl)->HasInstance(val); |
+} |
+ |
+Local<Value> ServerCredentials::WrapStruct( |
+ grpc_server_credentials *credentials) { |
+ Nan::EscapableHandleScope scope; |
+ const int argc = 1; |
+ Local<Value> argv[argc] = { |
+ Nan::New<External>(reinterpret_cast<void *>(credentials))}; |
+ MaybeLocal<Object> maybe_instance = Nan::NewInstance( |
+ constructor->GetFunction(), argc, argv); |
+ if (maybe_instance.IsEmpty()) { |
+ return scope.Escape(Nan::Null()); |
+ } else { |
+ return scope.Escape(maybe_instance.ToLocalChecked()); |
+ } |
+} |
+ |
+grpc_server_credentials *ServerCredentials::GetWrappedServerCredentials() { |
+ return wrapped_credentials; |
+} |
+ |
+NAN_METHOD(ServerCredentials::New) { |
+ if (info.IsConstructCall()) { |
+ if (!info[0]->IsExternal()) { |
+ return Nan::ThrowTypeError( |
+ "ServerCredentials can only be created with the provided functions"); |
+ } |
+ Local<External> ext = info[0].As<External>(); |
+ grpc_server_credentials *creds_value = |
+ reinterpret_cast<grpc_server_credentials *>(ext->Value()); |
+ ServerCredentials *credentials = new ServerCredentials(creds_value); |
+ credentials->Wrap(info.This()); |
+ info.GetReturnValue().Set(info.This()); |
+ } else { |
+ // This should never be called directly |
+ return Nan::ThrowTypeError( |
+ "ServerCredentials can only be created with the provided functions"); |
+ } |
+} |
+ |
+NAN_METHOD(ServerCredentials::CreateSsl) { |
+ Nan::HandleScope scope; |
+ char *root_certs = NULL; |
+ if (::node::Buffer::HasInstance(info[0])) { |
+ root_certs = ::node::Buffer::Data(info[0]); |
+ } else if (!(info[0]->IsNull() || info[0]->IsUndefined())) { |
+ return Nan::ThrowTypeError( |
+ "createSSl's first argument must be a Buffer if provided"); |
+ } |
+ if (!info[1]->IsArray()) { |
+ return Nan::ThrowTypeError( |
+ "createSsl's second argument must be a list of objects"); |
+ } |
+ int force_client_auth = 0; |
+ if (info[2]->IsBoolean()) { |
+ force_client_auth = (int)Nan::To<bool>(info[2]).FromJust(); |
+ } else if (!(info[2]->IsUndefined() || info[2]->IsNull())) { |
+ return Nan::ThrowTypeError( |
+ "createSsl's third argument must be a boolean if provided"); |
+ } |
+ Local<Array> pair_list = Local<Array>::Cast(info[1]); |
+ uint32_t key_cert_pair_count = pair_list->Length(); |
+ grpc_ssl_pem_key_cert_pair *key_cert_pairs = new grpc_ssl_pem_key_cert_pair[ |
+ key_cert_pair_count]; |
+ |
+ Local<String> key_key = Nan::New("private_key").ToLocalChecked(); |
+ Local<String> cert_key = Nan::New("cert_chain").ToLocalChecked(); |
+ |
+ for(uint32_t i = 0; i < key_cert_pair_count; i++) { |
+ Local<Value> pair_val = Nan::Get(pair_list, i).ToLocalChecked(); |
+ if (!pair_val->IsObject()) { |
+ delete key_cert_pairs; |
+ return Nan::ThrowTypeError("Key/cert pairs must be objects"); |
+ } |
+ Local<Object> pair_obj = Nan::To<Object>(pair_val).ToLocalChecked(); |
+ Local<Value> maybe_key = Nan::Get(pair_obj, key_key).ToLocalChecked(); |
+ Local<Value> maybe_cert = Nan::Get(pair_obj, cert_key).ToLocalChecked(); |
+ if (!::node::Buffer::HasInstance(maybe_key)) { |
+ delete key_cert_pairs; |
+ return Nan::ThrowTypeError("private_key must be a Buffer"); |
+ } |
+ if (!::node::Buffer::HasInstance(maybe_cert)) { |
+ delete key_cert_pairs; |
+ return Nan::ThrowTypeError("cert_chain must be a Buffer"); |
+ } |
+ key_cert_pairs[i].private_key = ::node::Buffer::Data(maybe_key); |
+ key_cert_pairs[i].cert_chain = ::node::Buffer::Data(maybe_cert); |
+ } |
+ grpc_server_credentials *creds = grpc_ssl_server_credentials_create( |
+ root_certs, key_cert_pairs, key_cert_pair_count, force_client_auth, NULL); |
+ delete key_cert_pairs; |
+ if (creds == NULL) { |
+ info.GetReturnValue().SetNull(); |
+ } else { |
+ info.GetReturnValue().Set(WrapStruct(creds)); |
+ } |
+} |
+ |
+NAN_METHOD(ServerCredentials::CreateInsecure) { |
+ info.GetReturnValue().Set(WrapStruct(NULL)); |
+} |
+ |
+} // namespace node |
+} // namespace grpc |