| Index: third_party/grpc/src/core/security/google_default_credentials.c
|
| diff --git a/third_party/grpc/src/core/security/google_default_credentials.c b/third_party/grpc/src/core/security/google_default_credentials.c
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..1f4f3e4aa52ef8dc3758db6dac08097859ad5560
|
| --- /dev/null
|
| +++ b/third_party/grpc/src/core/security/google_default_credentials.c
|
| @@ -0,0 +1,265 @@
|
| +/*
|
| + *
|
| + * Copyright 2015-2016, Google Inc.
|
| + * All rights reserved.
|
| + *
|
| + * Redistribution and use in source and binary forms, with or without
|
| + * modification, are permitted provided that the following conditions are
|
| + * met:
|
| + *
|
| + * * Redistributions of source code must retain the above copyright
|
| + * notice, this list of conditions and the following disclaimer.
|
| + * * Redistributions in binary form must reproduce the above
|
| + * copyright notice, this list of conditions and the following disclaimer
|
| + * in the documentation and/or other materials provided with the
|
| + * distribution.
|
| + * * Neither the name of Google Inc. nor the names of its
|
| + * contributors may be used to endorse or promote products derived from
|
| + * this software without specific prior written permission.
|
| + *
|
| + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
| + * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
| + * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
| + * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
| + * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
| + * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
| + * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
| + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
| + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
| + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
| + * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
| + *
|
| + */
|
| +
|
| +#include "src/core/security/credentials.h"
|
| +
|
| +#include <string.h>
|
| +
|
| +#include <grpc/support/alloc.h>
|
| +#include <grpc/support/log.h>
|
| +#include <grpc/support/sync.h>
|
| +
|
| +#include "src/core/httpcli/httpcli.h"
|
| +#include "src/core/support/env.h"
|
| +#include "src/core/support/load_file.h"
|
| +#include "src/core/surface/api_trace.h"
|
| +
|
| +/* -- Constants. -- */
|
| +
|
| +#define GRPC_COMPUTE_ENGINE_DETECTION_HOST "metadata.google.internal"
|
| +
|
| +/* -- Default credentials. -- */
|
| +
|
| +static grpc_channel_credentials *default_credentials = NULL;
|
| +static int compute_engine_detection_done = 0;
|
| +static gpr_mu g_state_mu;
|
| +static gpr_mu *g_polling_mu;
|
| +static gpr_once g_once = GPR_ONCE_INIT;
|
| +
|
| +static void init_default_credentials(void) { gpr_mu_init(&g_state_mu); }
|
| +
|
| +typedef struct {
|
| + grpc_pollset *pollset;
|
| + int is_done;
|
| + int success;
|
| +} compute_engine_detector;
|
| +
|
| +static void on_compute_engine_detection_http_response(
|
| + grpc_exec_ctx *exec_ctx, void *user_data,
|
| + const grpc_httpcli_response *response) {
|
| + compute_engine_detector *detector = (compute_engine_detector *)user_data;
|
| + if (response != NULL && response->status == 200 && response->hdr_count > 0) {
|
| + /* Internet providers can return a generic response to all requests, so
|
| + it is necessary to check that metadata header is present also. */
|
| + size_t i;
|
| + for (i = 0; i < response->hdr_count; i++) {
|
| + grpc_httpcli_header *header = &response->hdrs[i];
|
| + if (strcmp(header->key, "Metadata-Flavor") == 0 &&
|
| + strcmp(header->value, "Google") == 0) {
|
| + detector->success = 1;
|
| + break;
|
| + }
|
| + }
|
| + }
|
| + gpr_mu_lock(g_polling_mu);
|
| + detector->is_done = 1;
|
| + grpc_pollset_kick(detector->pollset, NULL);
|
| + gpr_mu_unlock(g_polling_mu);
|
| +}
|
| +
|
| +static void destroy_pollset(grpc_exec_ctx *exec_ctx, void *p, bool s) {
|
| + grpc_pollset_destroy(p);
|
| +}
|
| +
|
| +static int is_stack_running_on_compute_engine(void) {
|
| + compute_engine_detector detector;
|
| + grpc_httpcli_request request;
|
| + grpc_httpcli_context context;
|
| + grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT;
|
| + grpc_closure destroy_closure;
|
| +
|
| + /* The http call is local. If it takes more than one sec, it is for sure not
|
| + on compute engine. */
|
| + gpr_timespec max_detection_delay = gpr_time_from_seconds(1, GPR_TIMESPAN);
|
| +
|
| + detector.pollset = gpr_malloc(grpc_pollset_size());
|
| + grpc_pollset_init(detector.pollset, &g_polling_mu);
|
| + detector.is_done = 0;
|
| + detector.success = 0;
|
| +
|
| + memset(&request, 0, sizeof(grpc_httpcli_request));
|
| + request.host = GRPC_COMPUTE_ENGINE_DETECTION_HOST;
|
| + request.path = "/";
|
| +
|
| + grpc_httpcli_context_init(&context);
|
| +
|
| + grpc_httpcli_get(
|
| + &exec_ctx, &context, detector.pollset, &request,
|
| + gpr_time_add(gpr_now(GPR_CLOCK_REALTIME), max_detection_delay),
|
| + on_compute_engine_detection_http_response, &detector);
|
| +
|
| + grpc_exec_ctx_finish(&exec_ctx);
|
| +
|
| + /* Block until we get the response. This is not ideal but this should only be
|
| + called once for the lifetime of the process by the default credentials. */
|
| + gpr_mu_lock(g_polling_mu);
|
| + while (!detector.is_done) {
|
| + grpc_pollset_worker *worker = NULL;
|
| + grpc_pollset_work(&exec_ctx, detector.pollset, &worker,
|
| + gpr_now(GPR_CLOCK_MONOTONIC),
|
| + gpr_inf_future(GPR_CLOCK_MONOTONIC));
|
| + }
|
| + gpr_mu_unlock(g_polling_mu);
|
| +
|
| + grpc_httpcli_context_destroy(&context);
|
| + grpc_closure_init(&destroy_closure, destroy_pollset, detector.pollset);
|
| + grpc_pollset_shutdown(&exec_ctx, detector.pollset, &destroy_closure);
|
| + grpc_exec_ctx_finish(&exec_ctx);
|
| + g_polling_mu = NULL;
|
| +
|
| + gpr_free(detector.pollset);
|
| +
|
| + return detector.success;
|
| +}
|
| +
|
| +/* Takes ownership of creds_path if not NULL. */
|
| +static grpc_call_credentials *create_default_creds_from_path(char *creds_path) {
|
| + grpc_json *json = NULL;
|
| + grpc_auth_json_key key;
|
| + grpc_auth_refresh_token token;
|
| + grpc_call_credentials *result = NULL;
|
| + gpr_slice creds_data = gpr_empty_slice();
|
| + int file_ok = 0;
|
| + if (creds_path == NULL) goto end;
|
| + creds_data = gpr_load_file(creds_path, 0, &file_ok);
|
| + if (!file_ok) goto end;
|
| + json = grpc_json_parse_string_with_len(
|
| + (char *)GPR_SLICE_START_PTR(creds_data), GPR_SLICE_LENGTH(creds_data));
|
| + if (json == NULL) goto end;
|
| +
|
| + /* First, try an auth json key. */
|
| + key = grpc_auth_json_key_create_from_json(json);
|
| + if (grpc_auth_json_key_is_valid(&key)) {
|
| + result =
|
| + grpc_service_account_jwt_access_credentials_create_from_auth_json_key(
|
| + key, grpc_max_auth_token_lifetime());
|
| + goto end;
|
| + }
|
| +
|
| + /* Then try a refresh token if the auth json key was invalid. */
|
| + token = grpc_auth_refresh_token_create_from_json(json);
|
| + if (grpc_auth_refresh_token_is_valid(&token)) {
|
| + result =
|
| + grpc_refresh_token_credentials_create_from_auth_refresh_token(token);
|
| + goto end;
|
| + }
|
| +
|
| +end:
|
| + if (creds_path != NULL) gpr_free(creds_path);
|
| + gpr_slice_unref(creds_data);
|
| + if (json != NULL) grpc_json_destroy(json);
|
| + return result;
|
| +}
|
| +
|
| +grpc_channel_credentials *grpc_google_default_credentials_create(void) {
|
| + grpc_channel_credentials *result = NULL;
|
| + grpc_call_credentials *call_creds = NULL;
|
| +
|
| + GRPC_API_TRACE("grpc_google_default_credentials_create(void)", 0, ());
|
| +
|
| + gpr_once_init(&g_once, init_default_credentials);
|
| +
|
| + gpr_mu_lock(&g_state_mu);
|
| +
|
| + if (default_credentials != NULL) {
|
| + result = grpc_channel_credentials_ref(default_credentials);
|
| + goto end;
|
| + }
|
| +
|
| + /* First, try the environment variable. */
|
| + call_creds = create_default_creds_from_path(
|
| + gpr_getenv(GRPC_GOOGLE_CREDENTIALS_ENV_VAR));
|
| + if (call_creds != NULL) goto end;
|
| +
|
| + /* Then the well-known file. */
|
| + call_creds = create_default_creds_from_path(
|
| + grpc_get_well_known_google_credentials_file_path());
|
| + if (call_creds != NULL) goto end;
|
| +
|
| + /* At last try to see if we're on compute engine (do the detection only once
|
| + since it requires a network test). */
|
| + if (!compute_engine_detection_done) {
|
| + int need_compute_engine_creds = is_stack_running_on_compute_engine();
|
| + compute_engine_detection_done = 1;
|
| + if (need_compute_engine_creds) {
|
| + call_creds = grpc_google_compute_engine_credentials_create(NULL);
|
| + }
|
| + }
|
| +
|
| +end:
|
| + if (result == NULL) {
|
| + if (call_creds != NULL) {
|
| + /* Blend with default ssl credentials and add a global reference so that
|
| + it
|
| + can be cached and re-served. */
|
| + grpc_channel_credentials *ssl_creds =
|
| + grpc_ssl_credentials_create(NULL, NULL, NULL);
|
| + default_credentials = grpc_channel_credentials_ref(
|
| + grpc_composite_channel_credentials_create(ssl_creds, call_creds,
|
| + NULL));
|
| + GPR_ASSERT(default_credentials != NULL);
|
| + grpc_channel_credentials_unref(ssl_creds);
|
| + grpc_call_credentials_unref(call_creds);
|
| + result = default_credentials;
|
| + } else {
|
| + gpr_log(GPR_ERROR, "Could not create google default credentials.");
|
| + }
|
| + }
|
| + gpr_mu_unlock(&g_state_mu);
|
| + return result;
|
| +}
|
| +
|
| +void grpc_flush_cached_google_default_credentials(void) {
|
| + gpr_once_init(&g_once, init_default_credentials);
|
| + gpr_mu_lock(&g_state_mu);
|
| + if (default_credentials != NULL) {
|
| + grpc_channel_credentials_unref(default_credentials);
|
| + default_credentials = NULL;
|
| + }
|
| + compute_engine_detection_done = 0;
|
| + gpr_mu_unlock(&g_state_mu);
|
| +}
|
| +
|
| +/* -- Well known credentials path. -- */
|
| +
|
| +static grpc_well_known_credentials_path_getter creds_path_getter = NULL;
|
| +
|
| +char *grpc_get_well_known_google_credentials_file_path(void) {
|
| + if (creds_path_getter != NULL) return creds_path_getter();
|
| + return grpc_get_well_known_google_credentials_file_path_impl();
|
| +}
|
| +
|
| +void grpc_override_well_known_credentials_path_getter(
|
| + grpc_well_known_credentials_path_getter getter) {
|
| + creds_path_getter = getter;
|
| +}
|
|
|