Skip to content
Snippets Groups Projects
Select Git revision
  • b9df2760ed15930429305f01407914db106510d5
  • master default protected
  • arm-aarch-platform
  • arm-platform
  • vjpai-patch-3
  • vjpai-patch-1
  • v1.27.x
  • jtattermusch-patch-2
  • jtattermusch-patch-1
  • update-java-worker-example-in-performance-docs
  • revert-21805-revert-21797-reintroduce_21527
  • revert-21804-tls-credentials-1
  • zhen_cleanup_namecheck
  • revert-21806-revert-21767-revert-21725-revert-21680-cq_ordering
  • vjpai-patch-2
  • revert-21766-tls-credentials-1
  • revert-21640-change_local_tcp_security_level
  • revert-21680-cq_ordering
  • revert-21527-unify_boringssl_deps2
  • revert-20803-grpclb_stabilization
  • fix-kokoro-rvm-key
  • v1.27.0
  • v1.27.0-pre2
  • v1.27.0-pre1
  • v1.26.0
  • v1.26.0-pre1
  • v1.25.0
  • v1.25.0-pre1
  • v1.24.3
  • v1.24.2
  • v1.24.1
  • v1.23.1
  • v1.24.0
  • v1.24.0-pre2
  • v1.24.0-pre1
  • v1.22.1
  • v1.23.0
  • v1.23.0-pre1
  • v1.22.0
  • v1.22.0-pre1
  • v1.21.4
41 results

client_unary_call.h

Blame
  • test_credentials_provider.cc 6.13 KiB
    
    /*
     *
     * Copyright 2016, Google Inc.
     * All rights reserved.
     *
     * Redistribution and use in source and binary forms, with or without
     * modification, are permitted provided that the following conditions are
     * met:
     *
     *     * Redistributions of source code must retain the above copyright
     * notice, this list of conditions and the following disclaimer.
     *     * Redistributions in binary form must reproduce the above
     * copyright notice, this list of conditions and the following disclaimer
     * in the documentation and/or other materials provided with the
     * distribution.
     *     * Neither the name of Google Inc. nor the names of its
     * contributors may be used to endorse or promote products derived from
     * this software without specific prior written permission.
     *
     * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
     * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
     * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
     * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
     * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
     * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
     * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
     * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
     * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
     * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
     * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     *
     */
    
    #include "test/cpp/util/test_credentials_provider.h"
    
    #include <unordered_map>
    
    #include <grpc++/impl/sync.h>
    #include <grpc/support/sync.h>
    
    #include "test/core/end2end/data/ssl_test_data.h"
    
    namespace {
    
    using grpc::ChannelArguments;
    using grpc::ChannelCredentials;
    using grpc::InsecureChannelCredentials;
    using grpc::InsecureServerCredentials;
    using grpc::ServerCredentials;
    using grpc::SslCredentialsOptions;
    using grpc::SslServerCredentialsOptions;
    using grpc::testing::CredentialTypeProvider;
    
    // Provide test credentials. Thread-safe.
    class CredentialsProvider {
     public:
      virtual ~CredentialsProvider() {}
    
      virtual void AddSecureType(
          const grpc::string& type,
          std::unique_ptr<CredentialTypeProvider> type_provider) = 0;
      virtual std::shared_ptr<ChannelCredentials> GetChannelCredentials(
          const grpc::string& type, ChannelArguments* args) = 0;
      virtual std::shared_ptr<ServerCredentials> GetServerCredentials(
          const grpc::string& type) = 0;
      virtual std::vector<grpc::string> GetSecureCredentialsTypeList() = 0;
    };
    
    class DefaultCredentialsProvider : public CredentialsProvider {
     public:
      ~DefaultCredentialsProvider() override {}
    
      void AddSecureType(
          const grpc::string& type,
          std::unique_ptr<CredentialTypeProvider> type_provider) override {
        // This clobbers any existing entry for type, except the defaults, which
        // can't be clobbered.
        grpc::unique_lock<grpc::mutex> lock(mu_);
        added_secure_types_[type] = std::move(type_provider);
      }
    
      std::shared_ptr<ChannelCredentials> GetChannelCredentials(
          const grpc::string& type, ChannelArguments* args) override {
        if (type == grpc::testing::kInsecureCredentialsType) {
          return InsecureChannelCredentials();
        } else if (type == grpc::testing::kTlsCredentialsType) {
          SslCredentialsOptions ssl_opts = {test_root_cert, "", ""};
          args->SetSslTargetNameOverride("foo.test.google.fr");
          return SslCredentials(ssl_opts);
        } else {
          grpc::unique_lock<grpc::mutex> lock(mu_);
          auto it(added_secure_types_.find(type));
          if (it == added_secure_types_.end()) {
            gpr_log(GPR_ERROR, "Unsupported credentials type %s.", type.c_str());
            return nullptr;
          }
          return it->second->GetChannelCredentials(args);
        }
      }
    
      std::shared_ptr<ServerCredentials> GetServerCredentials(
          const grpc::string& type) override {
        if (type == grpc::testing::kInsecureCredentialsType) {
          return InsecureServerCredentials();
        } else if (type == grpc::testing::kTlsCredentialsType) {
          SslServerCredentialsOptions::PemKeyCertPair pkcp = {test_server1_key,
                                                              test_server1_cert};
          SslServerCredentialsOptions ssl_opts;
          ssl_opts.pem_root_certs = "";
          ssl_opts.pem_key_cert_pairs.push_back(pkcp);
          return SslServerCredentials(ssl_opts);
        } else {
          grpc::unique_lock<grpc::mutex> lock(mu_);
          auto it(added_secure_types_.find(type));
          if (it == added_secure_types_.end()) {
            gpr_log(GPR_ERROR, "Unsupported credentials type %s.", type.c_str());
            return nullptr;
          }
          return it->second->GetServerCredentials();
        }
      }
      std::vector<grpc::string> GetSecureCredentialsTypeList() override {
        std::vector<grpc::string> types;
        types.push_back(grpc::testing::kTlsCredentialsType);
        grpc::unique_lock<grpc::mutex> lock(mu_);
        for (const auto& type_pair : added_secure_types_) {
          types.push_back(type_pair.first);
        }
        return types;
      }
    
     private:
      grpc::mutex mu_;
      std::unordered_map<grpc::string, std::unique_ptr<CredentialTypeProvider> >
          added_secure_types_;
    };
    
    gpr_once g_once_init_provider = GPR_ONCE_INIT;
    CredentialsProvider* g_provider = nullptr;
    
    void CreateDefaultProvider() { g_provider = new DefaultCredentialsProvider; }
    
    CredentialsProvider* GetProvider() {
      gpr_once_init(&g_once_init_provider, &CreateDefaultProvider);
      return g_provider;
    }
    
    }  // namespace
    
    namespace grpc {
    namespace testing {
    
    void AddSecureType(const grpc::string& type,
                       std::unique_ptr<CredentialTypeProvider> type_provider) {
      GetProvider()->AddSecureType(type, std::move(type_provider));
    }
    
    std::shared_ptr<ChannelCredentials> GetChannelCredentials(
        const grpc::string& type, ChannelArguments* args) {
      return GetProvider()->GetChannelCredentials(type, args);
    }
    
    std::shared_ptr<ServerCredentials> GetServerCredentials(
        const grpc::string& type) {
      return GetProvider()->GetServerCredentials(type);
    }
    
    std::vector<grpc::string> GetSecureCredentialsTypeList() {
      return GetProvider()->GetSecureCredentialsTypeList();
    }
    
    }  // namespace testing
    }  // namespace grpc