test_credentials_provider.cc 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183
  1. /*
  2. *
  3. * Copyright 2016 gRPC authors.
  4. *
  5. * Licensed under the Apache License, Version 2.0 (the "License");
  6. * you may not use this file except in compliance with the License.
  7. * You may obtain a copy of the License at
  8. *
  9. * http://www.apache.org/licenses/LICENSE-2.0
  10. *
  11. * Unless required by applicable law or agreed to in writing, software
  12. * distributed under the License is distributed on an "AS IS" BASIS,
  13. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. * See the License for the specific language governing permissions and
  15. * limitations under the License.
  16. *
  17. */
  18. #include "test/cpp/util/test_credentials_provider.h"
  19. #include <cstdio>
  20. #include <fstream>
  21. #include <iostream>
  22. #include <mutex>
  23. #include <unordered_map>
  24. #include "absl/flags/flag.h"
  25. #include <grpc/support/log.h>
  26. #include <grpc/support/sync.h>
  27. #include <grpcpp/security/server_credentials.h>
  28. #include "test/core/end2end/data/ssl_test_data.h"
  29. ABSL_FLAG(std::string, tls_cert_file, "",
  30. "The TLS cert file used when --use_tls=true");
  31. ABSL_FLAG(std::string, tls_key_file, "",
  32. "The TLS key file used when --use_tls=true");
  33. namespace grpc {
  34. namespace testing {
  35. namespace {
  36. std::string ReadFile(const std::string& src_path) {
  37. std::ifstream src;
  38. src.open(src_path, std::ifstream::in | std::ifstream::binary);
  39. std::string contents;
  40. src.seekg(0, std::ios::end);
  41. contents.reserve(src.tellg());
  42. src.seekg(0, std::ios::beg);
  43. contents.assign((std::istreambuf_iterator<char>(src)),
  44. (std::istreambuf_iterator<char>()));
  45. return contents;
  46. }
  47. class DefaultCredentialsProvider : public CredentialsProvider {
  48. public:
  49. DefaultCredentialsProvider() {
  50. if (!absl::GetFlag(FLAGS_tls_key_file).empty()) {
  51. custom_server_key_ = ReadFile(absl::GetFlag(FLAGS_tls_key_file));
  52. }
  53. if (!absl::GetFlag(FLAGS_tls_cert_file).empty()) {
  54. custom_server_cert_ = ReadFile(absl::GetFlag(FLAGS_tls_cert_file));
  55. }
  56. }
  57. ~DefaultCredentialsProvider() override {}
  58. void AddSecureType(
  59. const std::string& type,
  60. std::unique_ptr<CredentialTypeProvider> type_provider) override {
  61. // This clobbers any existing entry for type, except the defaults, which
  62. // can't be clobbered.
  63. std::unique_lock<std::mutex> lock(mu_);
  64. auto it = std::find(added_secure_type_names_.begin(),
  65. added_secure_type_names_.end(), type);
  66. if (it == added_secure_type_names_.end()) {
  67. added_secure_type_names_.push_back(type);
  68. added_secure_type_providers_.push_back(std::move(type_provider));
  69. } else {
  70. added_secure_type_providers_[it - added_secure_type_names_.begin()] =
  71. std::move(type_provider);
  72. }
  73. }
  74. std::shared_ptr<ChannelCredentials> GetChannelCredentials(
  75. const std::string& type, ChannelArguments* args) override {
  76. if (type == grpc::testing::kInsecureCredentialsType) {
  77. return InsecureChannelCredentials();
  78. } else if (type == grpc::testing::kAltsCredentialsType) {
  79. grpc::experimental::AltsCredentialsOptions alts_opts;
  80. return grpc::experimental::AltsCredentials(alts_opts);
  81. } else if (type == grpc::testing::kTlsCredentialsType) {
  82. SslCredentialsOptions ssl_opts = {test_root_cert, "", ""};
  83. args->SetSslTargetNameOverride("foo.test.google.fr");
  84. return grpc::SslCredentials(ssl_opts);
  85. } else if (type == grpc::testing::kGoogleDefaultCredentialsType) {
  86. return grpc::GoogleDefaultCredentials();
  87. } else {
  88. std::unique_lock<std::mutex> lock(mu_);
  89. auto it(std::find(added_secure_type_names_.begin(),
  90. added_secure_type_names_.end(), type));
  91. if (it == added_secure_type_names_.end()) {
  92. gpr_log(GPR_ERROR, "Unsupported credentials type %s.", type.c_str());
  93. return nullptr;
  94. }
  95. return added_secure_type_providers_[it - added_secure_type_names_.begin()]
  96. ->GetChannelCredentials(args);
  97. }
  98. }
  99. std::shared_ptr<ServerCredentials> GetServerCredentials(
  100. const std::string& type) override {
  101. if (type == grpc::testing::kInsecureCredentialsType) {
  102. return InsecureServerCredentials();
  103. } else if (type == grpc::testing::kAltsCredentialsType) {
  104. grpc::experimental::AltsServerCredentialsOptions alts_opts;
  105. return grpc::experimental::AltsServerCredentials(alts_opts);
  106. } else if (type == grpc::testing::kTlsCredentialsType) {
  107. SslServerCredentialsOptions ssl_opts;
  108. ssl_opts.pem_root_certs = "";
  109. if (!custom_server_key_.empty() && !custom_server_cert_.empty()) {
  110. SslServerCredentialsOptions::PemKeyCertPair pkcp = {
  111. custom_server_key_, custom_server_cert_};
  112. ssl_opts.pem_key_cert_pairs.push_back(pkcp);
  113. } else {
  114. SslServerCredentialsOptions::PemKeyCertPair pkcp = {test_server1_key,
  115. test_server1_cert};
  116. ssl_opts.pem_key_cert_pairs.push_back(pkcp);
  117. }
  118. return SslServerCredentials(ssl_opts);
  119. } else {
  120. std::unique_lock<std::mutex> lock(mu_);
  121. auto it(std::find(added_secure_type_names_.begin(),
  122. added_secure_type_names_.end(), type));
  123. if (it == added_secure_type_names_.end()) {
  124. gpr_log(GPR_ERROR, "Unsupported credentials type %s.", type.c_str());
  125. return nullptr;
  126. }
  127. return added_secure_type_providers_[it - added_secure_type_names_.begin()]
  128. ->GetServerCredentials();
  129. }
  130. }
  131. std::vector<std::string> GetSecureCredentialsTypeList() override {
  132. std::vector<std::string> types;
  133. types.push_back(grpc::testing::kTlsCredentialsType);
  134. std::unique_lock<std::mutex> lock(mu_);
  135. for (auto it = added_secure_type_names_.begin();
  136. it != added_secure_type_names_.end(); it++) {
  137. types.push_back(*it);
  138. }
  139. return types;
  140. }
  141. private:
  142. std::mutex mu_;
  143. std::vector<std::string> added_secure_type_names_;
  144. std::vector<std::unique_ptr<CredentialTypeProvider>>
  145. added_secure_type_providers_;
  146. std::string custom_server_key_;
  147. std::string custom_server_cert_;
  148. };
  149. CredentialsProvider* g_provider = nullptr;
  150. } // namespace
  151. CredentialsProvider* GetCredentialsProvider() {
  152. if (g_provider == nullptr) {
  153. g_provider = new DefaultCredentialsProvider;
  154. }
  155. return g_provider;
  156. }
  157. void SetCredentialsProvider(CredentialsProvider* provider) {
  158. // For now, forbids overriding provider.
  159. GPR_ASSERT(g_provider == nullptr);
  160. g_provider = provider;
  161. }
  162. } // namespace testing
  163. } // namespace grpc