|
|
|
@ -31,20 +31,140 @@ |
|
|
|
|
* |
|
|
|
|
*/ |
|
|
|
|
|
|
|
|
|
#include <string.h> |
|
|
|
|
|
|
|
|
|
#include "src/core/security/auth_filters.h" |
|
|
|
|
#include "src/core/security/security_connector.h" |
|
|
|
|
#include "src/core/security/security_context.h" |
|
|
|
|
|
|
|
|
|
#include <grpc/support/alloc.h> |
|
|
|
|
#include <grpc/support/log.h> |
|
|
|
|
|
|
|
|
|
typedef struct call_data { |
|
|
|
|
int unused; /* C89 requires at least one struct element */ |
|
|
|
|
gpr_uint8 got_client_metadata; |
|
|
|
|
grpc_stream_op_buffer *recv_ops; |
|
|
|
|
/* Closure to call when finished with the auth_on_recv hook. */ |
|
|
|
|
grpc_iomgr_closure *on_done_recv; |
|
|
|
|
/* Receive closures are chained: we inject this closure as the on_done_recv
|
|
|
|
|
up-call on transport_op, and remember to call our on_done_recv member after |
|
|
|
|
handling it. */ |
|
|
|
|
grpc_iomgr_closure auth_on_recv; |
|
|
|
|
grpc_transport_stream_op transport_op; |
|
|
|
|
const grpc_metadata *consumed_md; |
|
|
|
|
size_t num_consumed_md; |
|
|
|
|
grpc_stream_op *md_op; |
|
|
|
|
grpc_auth_context *auth_context; |
|
|
|
|
} call_data; |
|
|
|
|
|
|
|
|
|
typedef struct channel_data { |
|
|
|
|
grpc_security_connector *security_connector; |
|
|
|
|
grpc_auth_metadata_processor processor; |
|
|
|
|
grpc_mdctx *mdctx; |
|
|
|
|
} channel_data; |
|
|
|
|
|
|
|
|
|
static grpc_metadata_array metadata_batch_to_md_array( |
|
|
|
|
const grpc_metadata_batch *batch) { |
|
|
|
|
grpc_linked_mdelem *l; |
|
|
|
|
grpc_metadata_array result; |
|
|
|
|
grpc_metadata_array_init(&result); |
|
|
|
|
for (l = batch->list.head; l != NULL; l = l->next) { |
|
|
|
|
grpc_metadata *usr_md = NULL; |
|
|
|
|
grpc_mdelem *md = l->md; |
|
|
|
|
grpc_mdstr *key = md->key; |
|
|
|
|
grpc_mdstr *value = md->value; |
|
|
|
|
if (result.count == result.capacity) { |
|
|
|
|
result.capacity = GPR_MAX(result.capacity + 8, result.capacity * 2); |
|
|
|
|
result.metadata = |
|
|
|
|
gpr_realloc(result.metadata, result.capacity * sizeof(grpc_metadata)); |
|
|
|
|
} |
|
|
|
|
usr_md = &result.metadata[result.count++]; |
|
|
|
|
usr_md->key = grpc_mdstr_as_c_string(key); |
|
|
|
|
usr_md->value = grpc_mdstr_as_c_string(value); |
|
|
|
|
usr_md->value_length = GPR_SLICE_LENGTH(value->slice); |
|
|
|
|
} |
|
|
|
|
return result; |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
static grpc_mdelem *remove_consumed_md(void *user_data, grpc_mdelem *md) { |
|
|
|
|
grpc_call_element *elem = user_data; |
|
|
|
|
call_data *calld = elem->call_data; |
|
|
|
|
size_t i; |
|
|
|
|
for (i = 0; i < calld->num_consumed_md; i++) { |
|
|
|
|
/* Maybe we could do a pointer comparison but we do not have any guarantee
|
|
|
|
|
that the metadata processor used the same pointers for consumed_md in the |
|
|
|
|
callback. */ |
|
|
|
|
if (memcmp(GPR_SLICE_START_PTR(md->key->slice), calld->consumed_md[i].key, |
|
|
|
|
GPR_SLICE_LENGTH(md->key->slice)) == 0 && |
|
|
|
|
memcmp(GPR_SLICE_START_PTR(md->value->slice), |
|
|
|
|
calld->consumed_md[i].value, |
|
|
|
|
GPR_SLICE_LENGTH(md->value->slice)) == 0) { |
|
|
|
|
return NULL; /* Delete. */ |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
return md; |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
static void on_md_processing_done(void *user_data, |
|
|
|
|
const grpc_metadata *consumed_md, |
|
|
|
|
size_t num_consumed_md, int success) { |
|
|
|
|
grpc_call_element *elem = user_data; |
|
|
|
|
call_data *calld = elem->call_data; |
|
|
|
|
|
|
|
|
|
if (success) { |
|
|
|
|
calld->consumed_md = consumed_md; |
|
|
|
|
calld->num_consumed_md = num_consumed_md; |
|
|
|
|
grpc_metadata_batch_filter(&calld->md_op->data.metadata, remove_consumed_md, |
|
|
|
|
elem); |
|
|
|
|
calld->on_done_recv->cb(calld->on_done_recv->cb_arg, success); |
|
|
|
|
} else { |
|
|
|
|
gpr_slice message = gpr_slice_from_copied_string( |
|
|
|
|
"Authentication metadata processing failed."); |
|
|
|
|
grpc_sopb_reset(calld->recv_ops); |
|
|
|
|
grpc_transport_stream_op_add_close(&calld->transport_op, |
|
|
|
|
GRPC_STATUS_UNAUTHENTICATED, &message); |
|
|
|
|
grpc_call_next_op(elem, &calld->transport_op); |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
static void auth_on_recv(void *user_data, int success) { |
|
|
|
|
grpc_call_element *elem = user_data; |
|
|
|
|
call_data *calld = elem->call_data; |
|
|
|
|
channel_data *chand = elem->channel_data; |
|
|
|
|
if (success) { |
|
|
|
|
size_t i; |
|
|
|
|
size_t nops = calld->recv_ops->nops; |
|
|
|
|
grpc_stream_op *ops = calld->recv_ops->ops; |
|
|
|
|
for (i = 0; i < nops; i++) { |
|
|
|
|
grpc_metadata_array md_array; |
|
|
|
|
grpc_stream_op *op = &ops[i]; |
|
|
|
|
if (op->type != GRPC_OP_METADATA || calld->got_client_metadata) continue; |
|
|
|
|
calld->got_client_metadata = 1; |
|
|
|
|
if (chand->processor.process == NULL) continue; |
|
|
|
|
calld->md_op = op; |
|
|
|
|
md_array = metadata_batch_to_md_array(&op->data.metadata); |
|
|
|
|
chand->processor.process(chand->processor.state, calld->auth_context, |
|
|
|
|
md_array.metadata, md_array.count, |
|
|
|
|
on_md_processing_done, elem); |
|
|
|
|
grpc_metadata_array_destroy(&md_array); |
|
|
|
|
return; |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
calld->on_done_recv->cb(calld->on_done_recv->cb_arg, success); |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
static void set_recv_ops_md_callbacks(grpc_call_element *elem, |
|
|
|
|
grpc_transport_stream_op *op) { |
|
|
|
|
call_data *calld = elem->call_data; |
|
|
|
|
|
|
|
|
|
if (op->recv_ops && !calld->got_client_metadata) { |
|
|
|
|
/* substitute our callback for the higher callback */ |
|
|
|
|
calld->recv_ops = op->recv_ops; |
|
|
|
|
calld->on_done_recv = op->on_done_recv; |
|
|
|
|
op->on_done_recv = &calld->auth_on_recv; |
|
|
|
|
calld->transport_op = *op; |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
/* Called either:
|
|
|
|
|
- in response to an API call (or similar) from above, to send something |
|
|
|
|
- a network event (or similar) from below, to receive something |
|
|
|
@ -52,9 +172,7 @@ typedef struct channel_data { |
|
|
|
|
that is being sent or received. */ |
|
|
|
|
static void auth_start_transport_op(grpc_call_element *elem, |
|
|
|
|
grpc_transport_stream_op *op) { |
|
|
|
|
/* TODO(jboeuf): Get the metadata and get a new context from it. */ |
|
|
|
|
|
|
|
|
|
/* pass control down the stack */ |
|
|
|
|
set_recv_ops_md_callbacks(elem, op); |
|
|
|
|
grpc_call_next_op(elem, op); |
|
|
|
|
} |
|
|
|
|
|
|
|
|
@ -68,7 +186,8 @@ static void init_call_elem(grpc_call_element *elem, |
|
|
|
|
grpc_server_security_context *server_ctx = NULL; |
|
|
|
|
|
|
|
|
|
/* initialize members */ |
|
|
|
|
calld->unused = 0; |
|
|
|
|
memset(calld, 0, sizeof(*calld)); |
|
|
|
|
grpc_iomgr_closure_init(&calld->auth_on_recv, auth_on_recv, elem); |
|
|
|
|
|
|
|
|
|
GPR_ASSERT(initial_op && initial_op->context != NULL && |
|
|
|
|
initial_op->context[GRPC_CONTEXT_SECURITY].value == NULL); |
|
|
|
@ -80,21 +199,29 @@ static void init_call_elem(grpc_call_element *elem, |
|
|
|
|
initial_op->context[GRPC_CONTEXT_SECURITY].value); |
|
|
|
|
} |
|
|
|
|
server_ctx = grpc_server_security_context_create(); |
|
|
|
|
server_ctx->auth_context = GRPC_AUTH_CONTEXT_REF( |
|
|
|
|
chand->security_connector->auth_context, "server_security_context"); |
|
|
|
|
server_ctx->auth_context = |
|
|
|
|
grpc_auth_context_create(chand->security_connector->auth_context); |
|
|
|
|
server_ctx->auth_context->pollset = initial_op->bind_pollset; |
|
|
|
|
initial_op->context[GRPC_CONTEXT_SECURITY].value = server_ctx; |
|
|
|
|
initial_op->context[GRPC_CONTEXT_SECURITY].destroy = |
|
|
|
|
grpc_server_security_context_destroy; |
|
|
|
|
calld->auth_context = server_ctx->auth_context; |
|
|
|
|
|
|
|
|
|
/* Set the metadata callbacks. */ |
|
|
|
|
set_recv_ops_md_callbacks(elem, initial_op); |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
/* Destructor for call_data */ |
|
|
|
|
static void destroy_call_elem(grpc_call_element *elem) {} |
|
|
|
|
static void destroy_call_elem(grpc_call_element *elem) { |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
/* Constructor for channel_data */ |
|
|
|
|
static void init_channel_elem(grpc_channel_element *elem, grpc_channel *master, |
|
|
|
|
const grpc_channel_args *args, grpc_mdctx *mdctx, |
|
|
|
|
int is_first, int is_last) { |
|
|
|
|
grpc_security_connector *sc = grpc_find_security_connector_in_args(args); |
|
|
|
|
grpc_auth_metadata_processor *processor = |
|
|
|
|
grpc_find_auth_metadata_processor_in_args(args); |
|
|
|
|
/* grab pointers to our data from the channel element */ |
|
|
|
|
channel_data *chand = elem->channel_data; |
|
|
|
|
|
|
|
|
@ -104,11 +231,14 @@ static void init_channel_elem(grpc_channel_element *elem, grpc_channel *master, |
|
|
|
|
GPR_ASSERT(!is_first); |
|
|
|
|
GPR_ASSERT(!is_last); |
|
|
|
|
GPR_ASSERT(sc != NULL); |
|
|
|
|
GPR_ASSERT(processor != NULL); |
|
|
|
|
|
|
|
|
|
/* initialize members */ |
|
|
|
|
GPR_ASSERT(!sc->is_client_side); |
|
|
|
|
chand->security_connector = |
|
|
|
|
GRPC_SECURITY_CONNECTOR_REF(sc, "server_auth_filter"); |
|
|
|
|
chand->mdctx = mdctx; |
|
|
|
|
chand->processor = *processor; |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
/* Destructor for channel data */ |
|
|
|
|