mirror of https://github.com/grpc/grpc-node.git
205 lines
7.1 KiB
C++
205 lines
7.1 KiB
C++
/*
|
|
*
|
|
* Copyright 2015, Google Inc.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions are
|
|
* met:
|
|
*
|
|
* * Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* * Redistributions in binary form must reproduce the above
|
|
* copyright notice, this list of conditions and the following disclaimer
|
|
* in the documentation and/or other materials provided with the
|
|
* distribution.
|
|
* * Neither the name of Google Inc. nor the names of its
|
|
* contributors may be used to endorse or promote products derived from
|
|
* this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*
|
|
*/
|
|
|
|
#include <node.h>
|
|
|
|
#include "grpc/grpc.h"
|
|
#include "grpc/grpc_security.h"
|
|
#include "grpc/support/log.h"
|
|
#include "channel_credentials.h"
|
|
#include "call_credentials.h"
|
|
#include "call.h"
|
|
|
|
namespace grpc {
|
|
namespace node {
|
|
|
|
using Nan::Callback;
|
|
using Nan::EscapableHandleScope;
|
|
using Nan::HandleScope;
|
|
using Nan::Maybe;
|
|
using Nan::MaybeLocal;
|
|
using Nan::ObjectWrap;
|
|
using Nan::Persistent;
|
|
using Nan::Utf8String;
|
|
|
|
using v8::Exception;
|
|
using v8::External;
|
|
using v8::Function;
|
|
using v8::FunctionTemplate;
|
|
using v8::Integer;
|
|
using v8::Local;
|
|
using v8::Object;
|
|
using v8::ObjectTemplate;
|
|
using v8::Value;
|
|
|
|
Nan::Callback *ChannelCredentials::constructor;
|
|
Persistent<FunctionTemplate> ChannelCredentials::fun_tpl;
|
|
|
|
ChannelCredentials::ChannelCredentials(grpc_channel_credentials *credentials)
|
|
: wrapped_credentials(credentials) {}
|
|
|
|
ChannelCredentials::~ChannelCredentials() {
|
|
grpc_channel_credentials_release(wrapped_credentials);
|
|
}
|
|
|
|
void ChannelCredentials::Init(Local<Object> exports) {
|
|
HandleScope scope;
|
|
Local<FunctionTemplate> tpl = Nan::New<FunctionTemplate>(New);
|
|
tpl->SetClassName(Nan::New("ChannelCredentials").ToLocalChecked());
|
|
tpl->InstanceTemplate()->SetInternalFieldCount(1);
|
|
Nan::SetPrototypeMethod(tpl, "compose", Compose);
|
|
fun_tpl.Reset(tpl);
|
|
Local<Function> ctr = Nan::GetFunction(tpl).ToLocalChecked();
|
|
Nan::Set(ctr, Nan::New("createSsl").ToLocalChecked(),
|
|
Nan::GetFunction(
|
|
Nan::New<FunctionTemplate>(CreateSsl)).ToLocalChecked());
|
|
Nan::Set(ctr, Nan::New("createInsecure").ToLocalChecked(),
|
|
Nan::GetFunction(
|
|
Nan::New<FunctionTemplate>(CreateInsecure)).ToLocalChecked());
|
|
Nan::Set(exports, Nan::New("ChannelCredentials").ToLocalChecked(), ctr);
|
|
constructor = new Nan::Callback(ctr);
|
|
}
|
|
|
|
bool ChannelCredentials::HasInstance(Local<Value> val) {
|
|
HandleScope scope;
|
|
return Nan::New(fun_tpl)->HasInstance(val);
|
|
}
|
|
|
|
Local<Value> ChannelCredentials::WrapStruct(
|
|
grpc_channel_credentials *credentials) {
|
|
EscapableHandleScope scope;
|
|
const int argc = 1;
|
|
Local<Value> argv[argc] = {
|
|
Nan::New<External>(reinterpret_cast<void *>(credentials))};
|
|
MaybeLocal<Object> maybe_instance = Nan::NewInstance(
|
|
constructor->GetFunction(), argc, argv);
|
|
if (maybe_instance.IsEmpty()) {
|
|
return scope.Escape(Nan::Null());
|
|
} else {
|
|
return scope.Escape(maybe_instance.ToLocalChecked());
|
|
}
|
|
}
|
|
|
|
grpc_channel_credentials *ChannelCredentials::GetWrappedCredentials() {
|
|
return wrapped_credentials;
|
|
}
|
|
|
|
NAN_METHOD(ChannelCredentials::New) {
|
|
if (info.IsConstructCall()) {
|
|
if (!info[0]->IsExternal()) {
|
|
return Nan::ThrowTypeError(
|
|
"ChannelCredentials can only be created with the provided functions");
|
|
}
|
|
Local<External> ext = info[0].As<External>();
|
|
grpc_channel_credentials *creds_value =
|
|
reinterpret_cast<grpc_channel_credentials *>(ext->Value());
|
|
ChannelCredentials *credentials = new ChannelCredentials(creds_value);
|
|
credentials->Wrap(info.This());
|
|
info.GetReturnValue().Set(info.This());
|
|
return;
|
|
} else {
|
|
// This should never be called directly
|
|
return Nan::ThrowTypeError(
|
|
"ChannelCredentials can only be created with the provided functions");
|
|
}
|
|
}
|
|
|
|
NAN_METHOD(ChannelCredentials::CreateSsl) {
|
|
char *root_certs = NULL;
|
|
grpc_ssl_pem_key_cert_pair key_cert_pair = {NULL, NULL};
|
|
if (::node::Buffer::HasInstance(info[0])) {
|
|
root_certs = ::node::Buffer::Data(info[0]);
|
|
} else if (!(info[0]->IsNull() || info[0]->IsUndefined())) {
|
|
return Nan::ThrowTypeError("createSsl's first argument must be a Buffer");
|
|
}
|
|
if (::node::Buffer::HasInstance(info[1])) {
|
|
key_cert_pair.private_key = ::node::Buffer::Data(info[1]);
|
|
} else if (!(info[1]->IsNull() || info[1]->IsUndefined())) {
|
|
return Nan::ThrowTypeError(
|
|
"createSSl's second argument must be a Buffer if provided");
|
|
}
|
|
if (::node::Buffer::HasInstance(info[2])) {
|
|
key_cert_pair.cert_chain = ::node::Buffer::Data(info[2]);
|
|
} else if (!(info[2]->IsNull() || info[2]->IsUndefined())) {
|
|
return Nan::ThrowTypeError(
|
|
"createSSl's third argument must be a Buffer if provided");
|
|
}
|
|
if ((key_cert_pair.private_key == NULL) !=
|
|
(key_cert_pair.cert_chain == NULL)) {
|
|
return Nan::ThrowError(
|
|
"createSsl's second and third arguments must be"
|
|
" provided or omitted together");
|
|
}
|
|
grpc_channel_credentials *creds = grpc_ssl_credentials_create(
|
|
root_certs, key_cert_pair.private_key == NULL ? NULL : &key_cert_pair,
|
|
NULL);
|
|
if (creds == NULL) {
|
|
info.GetReturnValue().SetNull();
|
|
} else {
|
|
info.GetReturnValue().Set(WrapStruct(creds));
|
|
}
|
|
}
|
|
|
|
NAN_METHOD(ChannelCredentials::Compose) {
|
|
if (!ChannelCredentials::HasInstance(info.This())) {
|
|
return Nan::ThrowTypeError(
|
|
"compose can only be called on ChannelCredentials objects");
|
|
}
|
|
if (!CallCredentials::HasInstance(info[0])) {
|
|
return Nan::ThrowTypeError(
|
|
"compose's first argument must be a CallCredentials object");
|
|
}
|
|
ChannelCredentials *self = ObjectWrap::Unwrap<ChannelCredentials>(
|
|
info.This());
|
|
if (self->wrapped_credentials == NULL) {
|
|
return Nan::ThrowTypeError(
|
|
"Cannot compose insecure credential");
|
|
}
|
|
CallCredentials *other = ObjectWrap::Unwrap<CallCredentials>(
|
|
Nan::To<Object>(info[0]).ToLocalChecked());
|
|
grpc_channel_credentials *creds = grpc_composite_channel_credentials_create(
|
|
self->wrapped_credentials, other->GetWrappedCredentials(), NULL);
|
|
if (creds == NULL) {
|
|
info.GetReturnValue().SetNull();
|
|
} else {
|
|
info.GetReturnValue().Set(WrapStruct(creds));
|
|
}
|
|
}
|
|
|
|
NAN_METHOD(ChannelCredentials::CreateInsecure) {
|
|
info.GetReturnValue().Set(WrapStruct(NULL));
|
|
}
|
|
|
|
} // namespace node
|
|
} // namespace grpc
|