1 //
2 //
3 // Copyright 2015 gRPC authors.
4 //
5 // Licensed under the Apache License, Version 2.0 (the "License");
6 // you may not use this file except in compliance with the License.
7 // You may obtain a copy of the License at
8 //
9 //     http://www.apache.org/licenses/LICENSE-2.0
10 //
11 // Unless required by applicable law or agreed to in writing, software
12 // distributed under the License is distributed on an "AS IS" BASIS,
13 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 // See the License for the specific language governing permissions and
15 // limitations under the License.
16 //
17 //
18 
19 #include "src/cpp/server/secure_server_credentials.h"
20 
21 #include <algorithm>
22 #include <map>
23 #include <memory>
24 #include <utility>
25 #include <vector>
26 
27 #include <grpc/grpc_security_constants.h>
28 #include <grpc/slice.h>
29 #include <grpc/status.h>
30 #include <grpcpp/security/auth_metadata_processor.h>
31 #include <grpcpp/security/tls_credentials_options.h>
32 #include <grpcpp/support/slice.h>
33 #include <grpcpp/support/status.h>
34 #include <grpcpp/support/string_ref.h>
35 
36 #include "src/cpp/common/secure_auth_context.h"
37 
38 namespace grpc {
39 
Destroy(void * wrapper)40 void AuthMetadataProcessorAyncWrapper::Destroy(void* wrapper) {
41   auto* w = static_cast<AuthMetadataProcessorAyncWrapper*>(wrapper);
42   delete w;
43 }
44 
Process(void * wrapper,grpc_auth_context * context,const grpc_metadata * md,size_t num_md,grpc_process_auth_metadata_done_cb cb,void * user_data)45 void AuthMetadataProcessorAyncWrapper::Process(
46     void* wrapper, grpc_auth_context* context, const grpc_metadata* md,
47     size_t num_md, grpc_process_auth_metadata_done_cb cb, void* user_data) {
48   auto* w = static_cast<AuthMetadataProcessorAyncWrapper*>(wrapper);
49   if (!w->processor_) {
50     // Early exit.
51     cb(user_data, nullptr, 0, nullptr, 0, GRPC_STATUS_OK, nullptr);
52     return;
53   }
54   if (w->processor_->IsBlocking()) {
55     w->thread_pool_->Add([w, context, md, num_md, cb, user_data] {
56       w->AuthMetadataProcessorAyncWrapper::InvokeProcessor(context, md, num_md,
57                                                            cb, user_data);
58     });
59   } else {
60     // invoke directly.
61     w->InvokeProcessor(context, md, num_md, cb, user_data);
62   }
63 }
64 
InvokeProcessor(grpc_auth_context * context,const grpc_metadata * md,size_t num_md,grpc_process_auth_metadata_done_cb cb,void * user_data)65 void AuthMetadataProcessorAyncWrapper::InvokeProcessor(
66     grpc_auth_context* context, const grpc_metadata* md, size_t num_md,
67     grpc_process_auth_metadata_done_cb cb, void* user_data) {
68   AuthMetadataProcessor::InputMetadata metadata;
69   for (size_t i = 0; i < num_md; i++) {
70     metadata.insert(std::make_pair(StringRefFromSlice(&md[i].key),
71                                    StringRefFromSlice(&md[i].value)));
72   }
73   SecureAuthContext ctx(context);
74   AuthMetadataProcessor::OutputMetadata consumed_metadata;
75   AuthMetadataProcessor::OutputMetadata response_metadata;
76 
77   Status status = processor_->Process(metadata, &ctx, &consumed_metadata,
78                                       &response_metadata);
79 
80   std::vector<grpc_metadata> consumed_md;
81   for (const auto& consumed : consumed_metadata) {
82     grpc_metadata md_entry;
83     md_entry.key = SliceReferencingString(consumed.first);
84     md_entry.value = SliceReferencingString(consumed.second);
85     consumed_md.push_back(md_entry);
86   }
87   std::vector<grpc_metadata> response_md;
88   for (const auto& response : response_metadata) {
89     grpc_metadata md_entry;
90     md_entry.key = SliceReferencingString(response.first);
91     md_entry.value = SliceReferencingString(response.second);
92     response_md.push_back(md_entry);
93   }
94   auto consumed_md_data = consumed_md.empty() ? nullptr : &consumed_md[0];
95   auto response_md_data = response_md.empty() ? nullptr : &response_md[0];
96   cb(user_data, consumed_md_data, consumed_md.size(), response_md_data,
97      response_md.size(), static_cast<grpc_status_code>(status.error_code()),
98      status.error_message().c_str());
99 }
100 
AddPortToServer(const std::string & addr,grpc_server * server)101 int SecureServerCredentials::AddPortToServer(const std::string& addr,
102                                              grpc_server* server) {
103   return grpc_server_add_http2_port(server, addr.c_str(), creds_);
104 }
105 
SetAuthMetadataProcessor(const std::shared_ptr<grpc::AuthMetadataProcessor> & processor)106 void SecureServerCredentials::SetAuthMetadataProcessor(
107     const std::shared_ptr<grpc::AuthMetadataProcessor>& processor) {
108   auto* wrapper = new grpc::AuthMetadataProcessorAyncWrapper(processor);
109   grpc_server_credentials_set_auth_metadata_processor(
110       creds_, {grpc::AuthMetadataProcessorAyncWrapper::Process,
111                grpc::AuthMetadataProcessorAyncWrapper::Destroy, wrapper});
112 }
113 
SslServerCredentials(const grpc::SslServerCredentialsOptions & options)114 std::shared_ptr<ServerCredentials> SslServerCredentials(
115     const grpc::SslServerCredentialsOptions& options) {
116   std::vector<grpc_ssl_pem_key_cert_pair> pem_key_cert_pairs;
117   for (const auto& key_cert_pair : options.pem_key_cert_pairs) {
118     grpc_ssl_pem_key_cert_pair p = {key_cert_pair.private_key.c_str(),
119                                     key_cert_pair.cert_chain.c_str()};
120     pem_key_cert_pairs.push_back(p);
121   }
122   grpc_server_credentials* c_creds = grpc_ssl_server_credentials_create_ex(
123       options.pem_root_certs.empty() ? nullptr : options.pem_root_certs.c_str(),
124       pem_key_cert_pairs.empty() ? nullptr : &pem_key_cert_pairs[0],
125       pem_key_cert_pairs.size(),
126       options.force_client_auth
127           ? GRPC_SSL_REQUEST_AND_REQUIRE_CLIENT_CERTIFICATE_AND_VERIFY
128           : options.client_certificate_request,
129       nullptr);
130   return std::shared_ptr<ServerCredentials>(
131       new SecureServerCredentials(c_creds));
132 }
133 
134 namespace experimental {
135 
AltsServerCredentials(const AltsServerCredentialsOptions &)136 std::shared_ptr<ServerCredentials> AltsServerCredentials(
137     const AltsServerCredentialsOptions& /* options */) {
138   grpc_alts_credentials_options* c_options =
139       grpc_alts_credentials_server_options_create();
140   grpc_server_credentials* c_creds =
141       grpc_alts_server_credentials_create(c_options);
142   grpc_alts_credentials_options_destroy(c_options);
143   return std::shared_ptr<ServerCredentials>(
144       new SecureServerCredentials(c_creds));
145 }
146 
LocalServerCredentials(grpc_local_connect_type type)147 std::shared_ptr<ServerCredentials> LocalServerCredentials(
148     grpc_local_connect_type type) {
149   return std::shared_ptr<ServerCredentials>(
150       new SecureServerCredentials(grpc_local_server_credentials_create(type)));
151 }
152 
TlsServerCredentials(const grpc::experimental::TlsServerCredentialsOptions & options)153 std::shared_ptr<ServerCredentials> TlsServerCredentials(
154     const grpc::experimental::TlsServerCredentialsOptions& options) {
155   return std::shared_ptr<ServerCredentials>(new SecureServerCredentials(
156       grpc_tls_server_credentials_create(options.c_credentials_options())));
157 }
158 
159 }  // namespace experimental
160 }  // namespace grpc
161