Index: third_party/grpc/src/cpp/server/secure_server_credentials.cc |
diff --git a/third_party/grpc/src/cpp/server/secure_server_credentials.cc b/third_party/grpc/src/cpp/server/secure_server_credentials.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..d472667a7eec32971936d6d15da54630ce1bbfe4 |
--- /dev/null |
+++ b/third_party/grpc/src/cpp/server/secure_server_credentials.cc |
@@ -0,0 +1,141 @@ |
+/* |
+ * |
+ * Copyright 2015, Google Inc. |
+ * All rights reserved. |
+ * |
+ * Redistribution and use in source and binary forms, with or without |
+ * modification, are permitted provided that the following conditions are |
+ * met: |
+ * |
+ * * Redistributions of source code must retain the above copyright |
+ * notice, this list of conditions and the following disclaimer. |
+ * * Redistributions in binary form must reproduce the above |
+ * copyright notice, this list of conditions and the following disclaimer |
+ * in the documentation and/or other materials provided with the |
+ * distribution. |
+ * * Neither the name of Google Inc. nor the names of its |
+ * contributors may be used to endorse or promote products derived from |
+ * this software without specific prior written permission. |
+ * |
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
+ * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
+ * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
+ * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
+ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
+ * |
+ */ |
+ |
+#include <functional> |
+#include <map> |
+#include <memory> |
+ |
+#include "src/cpp/common/secure_auth_context.h" |
+#include "src/cpp/server/secure_server_credentials.h" |
+ |
+#include <grpc++/security/auth_metadata_processor.h> |
+ |
+namespace grpc { |
+ |
+void AuthMetadataProcessorAyncWrapper::Destroy(void* wrapper) { |
+ auto* w = reinterpret_cast<AuthMetadataProcessorAyncWrapper*>(wrapper); |
+ delete w; |
+} |
+ |
+void AuthMetadataProcessorAyncWrapper::Process( |
+ void* wrapper, grpc_auth_context* context, const grpc_metadata* md, |
+ size_t num_md, grpc_process_auth_metadata_done_cb cb, void* user_data) { |
+ auto* w = reinterpret_cast<AuthMetadataProcessorAyncWrapper*>(wrapper); |
+ if (!w->processor_) { |
+ // Early exit. |
+ cb(user_data, nullptr, 0, nullptr, 0, GRPC_STATUS_OK, nullptr); |
+ return; |
+ } |
+ if (w->processor_->IsBlocking()) { |
+ w->thread_pool_->Add( |
+ std::bind(&AuthMetadataProcessorAyncWrapper::InvokeProcessor, w, |
+ context, md, num_md, cb, user_data)); |
+ } else { |
+ // invoke directly. |
+ w->InvokeProcessor(context, md, num_md, cb, user_data); |
+ } |
+} |
+ |
+void AuthMetadataProcessorAyncWrapper::InvokeProcessor( |
+ grpc_auth_context* ctx, const grpc_metadata* md, size_t num_md, |
+ grpc_process_auth_metadata_done_cb cb, void* user_data) { |
+ AuthMetadataProcessor::InputMetadata metadata; |
+ for (size_t i = 0; i < num_md; i++) { |
+ metadata.insert(std::make_pair( |
+ md[i].key, grpc::string_ref(md[i].value, md[i].value_length))); |
+ } |
+ SecureAuthContext context(ctx, false); |
+ AuthMetadataProcessor::OutputMetadata consumed_metadata; |
+ AuthMetadataProcessor::OutputMetadata response_metadata; |
+ |
+ Status status = processor_->Process(metadata, &context, &consumed_metadata, |
+ &response_metadata); |
+ |
+ std::vector<grpc_metadata> consumed_md; |
+ for (auto it = consumed_metadata.begin(); it != consumed_metadata.end(); |
+ ++it) { |
+ grpc_metadata md_entry; |
+ md_entry.key = it->first.c_str(); |
+ md_entry.value = it->second.data(); |
+ md_entry.value_length = it->second.size(); |
+ md_entry.flags = 0; |
+ consumed_md.push_back(md_entry); |
+ } |
+ std::vector<grpc_metadata> response_md; |
+ for (auto it = response_metadata.begin(); it != response_metadata.end(); |
+ ++it) { |
+ grpc_metadata md_entry; |
+ md_entry.key = it->first.c_str(); |
+ md_entry.value = it->second.data(); |
+ md_entry.value_length = it->second.size(); |
+ md_entry.flags = 0; |
+ response_md.push_back(md_entry); |
+ } |
+ auto consumed_md_data = consumed_md.empty() ? nullptr : &consumed_md[0]; |
+ auto response_md_data = response_md.empty() ? nullptr : &response_md[0]; |
+ cb(user_data, consumed_md_data, consumed_md.size(), response_md_data, |
+ response_md.size(), static_cast<grpc_status_code>(status.error_code()), |
+ status.error_message().c_str()); |
+} |
+ |
+int SecureServerCredentials::AddPortToServer(const grpc::string& addr, |
+ grpc_server* server) { |
+ return grpc_server_add_secure_http2_port(server, addr.c_str(), creds_); |
+} |
+ |
+void SecureServerCredentials::SetAuthMetadataProcessor( |
+ const std::shared_ptr<AuthMetadataProcessor>& processor) { |
+ auto* wrapper = new AuthMetadataProcessorAyncWrapper(processor); |
+ grpc_server_credentials_set_auth_metadata_processor( |
+ creds_, {AuthMetadataProcessorAyncWrapper::Process, |
+ AuthMetadataProcessorAyncWrapper::Destroy, wrapper}); |
+} |
+ |
+std::shared_ptr<ServerCredentials> SslServerCredentials( |
+ const SslServerCredentialsOptions& options) { |
+ std::vector<grpc_ssl_pem_key_cert_pair> pem_key_cert_pairs; |
+ for (auto key_cert_pair = options.pem_key_cert_pairs.begin(); |
+ key_cert_pair != options.pem_key_cert_pairs.end(); key_cert_pair++) { |
+ grpc_ssl_pem_key_cert_pair p = {key_cert_pair->private_key.c_str(), |
+ key_cert_pair->cert_chain.c_str()}; |
+ pem_key_cert_pairs.push_back(p); |
+ } |
+ grpc_server_credentials* c_creds = grpc_ssl_server_credentials_create( |
+ options.pem_root_certs.empty() ? nullptr : options.pem_root_certs.c_str(), |
+ pem_key_cert_pairs.empty() ? nullptr : &pem_key_cert_pairs[0], |
+ pem_key_cert_pairs.size(), options.force_client_auth, nullptr); |
+ return std::shared_ptr<ServerCredentials>( |
+ new SecureServerCredentials(c_creds)); |
+} |
+ |
+} // namespace grpc |