Go to the documentation of this file.
29 #include "absl/status/status.h"
30 #include "absl/strings/str_cat.h"
31 #include "absl/strings/str_format.h"
32 #include "absl/strings/string_view.h"
62 const char* peer_name,
const tsi_peer* peer,
71 absl::StrCat(
"Peer name ", peer_name,
" is not in peer certificate"));
78 class grpc_ssl_channel_security_connector final
81 grpc_ssl_channel_security_connector(
85 const char* overridden_target_name)
88 std::
move(request_metadata_creds)),
89 overridden_target_name_(
90 overridden_target_name == nullptr ?
"" : overridden_target_name),
91 verify_options_(&
config->verify_options) {
98 ~grpc_ssl_channel_security_connector()
override {
106 bool has_key_cert_pair =
107 config->pem_key_cert_pair !=
nullptr &&
108 config->pem_key_cert_pair->private_key !=
nullptr &&
109 config->pem_key_cert_pair->cert_chain !=
nullptr;
113 options.root_store = root_store;
116 if (has_key_cert_pair) {
120 options.session_cache = ssl_session_cache;
125 &
options, &client_handshaker_factory_);
141 client_handshaker_factory_,
142 overridden_target_name_.empty() ? target_name_.c_str()
143 : overridden_target_name_.c_str(),
158 const char* target_name = overridden_target_name_.empty()
159 ? target_name_.c_str()
160 : overridden_target_name_.c_str();
163 verify_options_->verify_peer_callback !=
nullptr) {
168 "Cannot check peer: missing pem cert property.");
170 char* peer_pem =
static_cast<char*
>(
gpr_malloc(
p->value.length + 1));
171 memcpy(peer_pem,
p->value.data,
p->value.length);
172 peer_pem[
p->value.length] =
'\0';
173 int callback_status = verify_options_->verify_peer_callback(
174 target_name, peer_pem,
175 verify_options_->verify_peer_callback_userdata);
177 if (callback_status) {
179 "Verify peer callback returned a failure (%d)", callback_status));
194 reinterpret_cast<const grpc_ssl_channel_security_connector*
>(other_sc);
196 if (
c != 0)
return c;
197 c = target_name_.compare(other->target_name_);
198 if (
c != 0)
return c;
199 return overridden_target_name_.compare(other->overridden_target_name_);
206 overridden_target_name_.c_str(), auth_context));
216 class grpc_ssl_server_security_connector
219 explicit grpc_ssl_server_security_connector(
224 ~grpc_ssl_server_security_connector()
override {
228 bool has_cert_config_fetcher()
const {
230 ->has_cert_config_fetcher();
234 return server_handshaker_factory_;
238 if (has_cert_config_fetcher()) {
240 if (!try_fetch_ssl_server_credentials()) {
242 "Failed loading SSL server credentials from fetcher.");
246 auto* server_credentials =
248 size_t num_alpn_protocols = 0;
249 const char** alpn_protocol_strings =
253 server_credentials->config().pem_key_cert_pairs;
255 server_credentials->config().num_key_cert_pairs;
256 options.pem_client_root_certs =
257 server_credentials->config().pem_root_certs;
258 options.client_certificate_request =
260 server_credentials->config().client_certificate_request);
262 options.alpn_protocols = alpn_protocol_strings;
263 options.num_alpn_protocols =
static_cast<uint16_t>(num_alpn_protocols);
265 server_credentials->config().min_tls_version);
267 server_credentials->config().max_tls_version);
270 &
options, &server_handshaker_factory_);
285 try_fetch_ssl_server_credentials();
288 server_handshaker_factory_, 0,
321 bool try_fetch_ssl_server_credentials() {
324 if (!has_cert_config_fetcher())
return false;
335 status = try_replace_server_handshaker_factory(certificate_config);
339 "Failed fetching new server credentials, continuing to "
340 "use previously-loaded credentials.");
344 if (certificate_config !=
nullptr) {
354 bool try_replace_server_handshaker_factory(
358 "Server certificate config callback returned invalid (NULL) "
364 size_t num_alpn_protocols = 0;
365 const char** alpn_protocol_strings =
373 config->pem_key_cert_pairs,
config->num_key_cert_pairs);
376 options.client_certificate_request =
380 options.alpn_protocols = alpn_protocol_strings;
381 options.num_alpn_protocols =
static_cast<uint16_t>(num_alpn_protocols);
383 &
options, &new_handshaker_factory);
394 set_server_handshaker_factory(new_handshaker_factory);
398 void set_server_handshaker_factory(
400 if (server_handshaker_factory_) {
403 server_handshaker_factory_ = new_factory;
416 const char* overridden_target_name,
418 if (
config ==
nullptr || target_name ==
nullptr) {
425 if (
config->pem_root_certs ==
nullptr) {
435 root_store =
nullptr;
439 grpc_core::MakeRefCounted<grpc_ssl_channel_security_connector>(
441 target_name, overridden_target_name);
455 grpc_core::MakeRefCounted<grpc_ssl_server_security_connector>(
tsi_result tsi_create_ssl_server_handshaker_factory_with_options(const tsi_ssl_server_handshaker_options *options, tsi_ssl_server_handshaker_factory **factory)
const char ** grpc_fill_alpn_protocol_strings(size_t *num_alpn_protocols)
virtual void check_peer(tsi_peer peer, grpc_endpoint *ep, grpc_core::RefCountedPtr< grpc_auth_context > *auth_context, grpc_closure *on_peer_checked)=0
std::string StrCat(const AlphaNum &a, const AlphaNum &b)
tsi_result tsi_create_ssl_client_handshaker_factory_with_options(const tsi_ssl_client_handshaker_options *options, tsi_ssl_client_handshaker_factory **factory)
ABSL_MUST_USE_RESULT std::string StrFormat(const FormatSpec< Args... > &format, const Args &... args)
#define GPR_DEBUG_ASSERT(x)
virtual void add_handshakers(const grpc_channel_args *args, grpc_pollset_set *interested_parties, grpc_core::HandshakeManager *handshake_mgr)=0
static char * pem_root_certs
RefCountedPtr< Handshaker > SecurityHandshakerCreate(tsi_handshaker *handshaker, grpc_security_connector *connector, const grpc_channel_args *args)
Creates a security handshaker using handshaker.
grpc_core::RefCountedPtr< grpc_auth_context > grpc_ssl_peer_to_auth_context(const tsi_peer *peer, const char *transport_security_type)
const grpc_ssl_server_config & config() const
struct grpc_pollset_set grpc_pollset_set
grpc_ssl_certificate_config_reload_status
void tsi_ssl_client_handshaker_factory_unref(tsi_ssl_client_handshaker_factory *factory)
GPRAPI void gpr_free(void *ptr)
#define GRPC_SSL_TRANSPORT_SECURITY_TYPE
GPRAPI void * gpr_malloc(size_t size)
bool SplitHostPort(absl::string_view name, absl::string_view *host, absl::string_view *port)
static const char * GetPemRootCerts()
static const tsi_ssl_root_certs_store * GetRootStore()
virtual void cancel_check_peer(grpc_closure *on_peer_checked, grpc_error_handle error)=0
memcpy(mem, inblock.get(), min(CONTAINING_RECORD(inblock.get(), MEMBLOCK, data) ->size, size))
constexpr absl::remove_reference_t< T > && move(T &&t) noexcept
grpc_core::RefCountedPtr< grpc_server_security_connector > grpc_ssl_server_security_connector_create(grpc_core::RefCountedPtr< grpc_server_credentials > server_credentials)
virtual grpc_core::ArenaPromise< absl::Status > CheckCallHost(absl::string_view host, grpc_auth_context *auth_context)=0
void grpc_tsi_ssl_pem_key_cert_pairs_destroy(tsi_ssl_pem_key_cert_pair *kp, size_t num_key_cert_pairs)
@ GRPC_SSL_CERTIFICATE_CONFIG_RELOAD_UNCHANGED
#define TSI_X509_PEM_CERT_PROPERTY
GPRAPI void gpr_log(const char *file, int line, gpr_log_severity severity, const char *format,...) GPR_PRINT_FORMAT_CHECK(4
@ GRPC_SSL_CERTIFICATE_CONFIG_RELOAD_NEW
grpc_error_handle grpc_ssl_check_alpn(const tsi_peer *peer)
absl::Status SslCheckCallHost(absl::string_view host, absl::string_view target_name, absl::string_view overridden_target_name, grpc_auth_context *auth_context)
void Add(RefCountedPtr< Handshaker > handshaker)
const char * grpc_get_ssl_cipher_suites(void)
tsi_result tsi_ssl_server_handshaker_factory_create_handshaker(tsi_ssl_server_handshaker_factory *factory, size_t network_bio_buf_size, size_t ssl_bio_buf_size, tsi_handshaker **handshaker)
const tsi_peer_property * tsi_peer_get_property_by_name(const tsi_peer *peer, const char *name)
virtual void add_handshakers(const grpc_channel_args *args, grpc_pollset_set *interested_parties, grpc_core::HandshakeManager *handshake_mgr)=0
Registers handshakers with handshake_mgr.
grpc_ssl_client_certificate_request_type client_certificate_request
tsi_ssl_pem_key_cert_pair * grpc_convert_grpc_to_tsi_cert_pairs(const grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs, size_t num_key_cert_pairs)
#define GRPC_ERROR_CREATE_FROM_STATIC_STRING(desc)
int channel_security_connector_cmp(const grpc_channel_security_connector *other) const
grpc_ssl_certificate_config_reload_status FetchCertConfig(grpc_ssl_server_certificate_config **config)
void tsi_ssl_server_handshaker_factory_unref(tsi_ssl_server_handshaker_factory *factory)
grpc_core::RefCountedPtr< grpc_channel_security_connector > grpc_ssl_channel_security_connector_create(grpc_core::RefCountedPtr< grpc_channel_credentials > channel_creds, grpc_core::RefCountedPtr< grpc_call_credentials > request_metadata_creds, const grpc_ssl_config *config, const char *target_name, const char *overridden_target_name, tsi_ssl_session_cache *ssl_session_cache)
struct tsi_ssl_session_cache tsi_ssl_session_cache
const char * tsi_result_to_string(tsi_result result)
int grpc_ssl_host_matches_name(const tsi_peer *peer, absl::string_view peer_name)
#define GRPC_ERROR_CREATE_FROM_CPP_STRING(desc)
#define GRPC_ERROR_UNREF(err)
static void Run(const DebugLocation &location, grpc_closure *closure, grpc_error_handle error)
tsi_tls_version grpc_get_tsi_tls_version(grpc_tls_version tls_version)
tsi_client_certificate_request_type grpc_get_tsi_client_certificate_request_type(grpc_ssl_client_certificate_request_type grpc_request_type)
promise_detail::Immediate< T > Immediate(T value)
grpc_server_credentials * mutable_server_creds()
const grpc_server_credentials * server_creds() const
#define GRPC_SSL_URL_SCHEME
virtual int cmp(const grpc_security_connector *other) const =0
void tsi_peer_destruct(tsi_peer *self)
GRPCAPI void grpc_ssl_server_certificate_config_destroy(grpc_ssl_server_certificate_config *config)
tsi_result tsi_ssl_client_handshaker_factory_create_handshaker(tsi_ssl_client_handshaker_factory *factory, const char *server_name_indication, size_t network_bio_buf_size, size_t ssl_bio_buf_size, tsi_handshaker **handshaker)
int server_security_connector_cmp(const grpc_server_security_connector *other) const
#define GRPC_ERROR_IS_NONE(err)
grpc
Author(s):
autogenerated on Fri May 16 2025 03:00:16