92 Commits

Author SHA1 Message Date
8124abf74e credentials/alts: Remove the enable_untrusted_alts flag (#1931) 2018-03-19 18:27:44 -07:00
211a7b7ec0 credentials/alts: Update ALTS "New" APIs (#1921) 2018-03-19 09:07:54 -07:00
efcc755fd5 credentials/alts: change ALTS protos to match the golden version (#1908) 2018-03-08 12:12:55 -08:00
0843fd0ee0 credentials/alts: fix infinite recursion bug [in custom error type] (#1906) 2018-03-07 13:50:30 -08:00
5190b068e2 ALTS: Simplify "New" APIs (#1895)
ALTS NewClientALTS and NewServerALTS APIs are in the grpc/credentials/alts package. Having the term ALTS in the API names is redundant. This PR removes it.
2018-03-07 09:14:47 -08:00
a1de3b2bd6 alts: Change ALTS proto package name (#1886) 2018-02-26 18:05:53 -08:00
2e7e633fea Add ALTS code (#1865) 2018-02-26 17:02:59 -08:00
7aea499f91 credentials: return Unavailable instead of Internal for per-RPC creds errors (#1776)
Or if `PerRPCCredentials` returns a `status` error, honor that instead.
2018-01-03 09:47:07 -08:00
4318e6475c server: apply deadline to new connections until all handshaking is completed (#1646) 2017-11-03 13:53:17 -07:00
1687ce5770 ClientHandshake should get the dialing endpoint as the authority (#1607) 2017-10-23 11:40:43 -07:00
faebfcb7bf Remove single-entry var blocks (#1589) 2017-10-18 09:59:23 -07:00
956d689a24 Use Type() method for OAuth tokens instead of accessing TokenType field. (#1537)
This covers the case where the TokenType field is empty, and thus
calling the Type() method will return "Bearer".
2017-09-25 11:38:05 -07:00
59cb69e66d Fix misspells (#1531) 2017-09-20 14:55:57 -07:00
ca9e0c3458 Add testdata package and unify testdata to only one dir (#1297) 2017-07-25 10:24:45 -07:00
ddbf6c46a6 autofix license notice 2017-06-08 14:42:19 +02:00
3419b42955 Reuse Token for serviceAccount credentials (#1238) 2017-05-16 12:37:36 -07:00
7ddf89f9b7 Fix doc 2017-05-04 10:30:28 -07:00
ccdf270424 add document to ClientHandshake about returning temporary error (#1125) 2017-03-28 11:12:50 -07:00
2e56e83e3a Use tls.Config.Clone() for go1.8
go1.8 now has native support for tls.Clone() so for 1.8+ use that for
credentials.cloneTLSConfig.
2017-02-21 12:03:28 -08:00
50955793b0 Debugging tests for AuthInfo (#1046)
* debug

* fix
2017-01-11 11:10:52 -08:00
4ed348913c ClientHandshake to return AuthInfo (#956)
* Initial commit

* Initial commit 2

* minor update

* goimport update

* resolved race condition

* added test for TLSInfo on server side

* Post review updates

* port review changes

debug

debug

* refactoring and added third function

* post review changes

* post review changes

* post review updates

* post review commit

* post review commit

* post review update

* post review update

* post review update

* post review update

* post review commit

* post review update
2017-01-09 13:29:20 -08:00
0dd919209f Fix a spelling mistake. 2016-10-31 19:53:00 -07:00
e63e0d4095 Add Clone() and OverrideServerName() to TransportCredentials 2016-09-26 15:18:51 -07:00
a00cbfeab5 Overwrite authority if creds servername is specified 2016-09-06 11:23:30 -07:00
0c58a17d6f Add credentials ErrConnDispatch 2016-08-24 16:20:57 -07:00
32bc9f2357 Remove conn.Close() in tlsCred.ServerHandshake()
Removes the responsibility from tlsCred.ServerHandshake() of calling Close() on the underlying connection. Returning an error is enough to close the connection: https://github.com/grpc/grpc-go/blob/master/server.go#L370.
2016-08-08 07:11:07 -05:00
efa105d0d2 Cleanup conn.Close() handling in newHTTP2Client()
Removes the need to close the underlying connection in tlsCreds.ClientHandshake().
2016-08-08 03:49:40 -05:00
5c7ed938f9 credentials: plumb cancellation into ClientHandshake
This is a minor breaking change to `TransportCredentials`, however
it should not be a problem in practice as not many users are using
custom implementations. In particular, users of `NewTLS` will not
be affected.

This change also replaces the earlier `Timeout` and `Cancel` fields
with a `context.Context`, which is plumbed all the way down from
`grpc.Dial`, laying the ground work for a user-provided context.

Also, support for Go 1.7 is added.
2016-08-01 16:29:56 -04:00
824221d52d add clone to avoid modifying passed-in tls.Config 2016-07-26 21:21:43 -07:00
9a97937ed3 credentials: don't overwrite ServerName in given config
The first endpoint will set the ServerName which will then be used by
the second endpoint, causing the transport to reject the second endpoint
since the server cert won't match the server name.
2016-07-14 11:17:40 -07:00
78e558bbc1 fix Info passes lock by value 2016-06-29 14:08:23 -07:00
74a71a17ac Fix typo. 2016-06-27 20:52:25 -07:00
d32f94c75e credentials/oauth: default to Bearer token type 2016-06-24 10:39:34 -07:00
69487bb54a Address comments 2016-06-09 11:44:26 -07:00
59486d9c17 Rename TransportAuthenticator to TransportCredentials 2016-06-08 11:19:25 -07:00
3ffbd8e030 Rename Credentials to PerRPCCredentials 2016-06-06 17:28:10 -07:00
6404c49192 Make TransportAuthenticator not embed Credentials 2016-06-06 16:24:46 -07:00
76515fa9fd Remove context related functions in credentials 2016-01-06 18:26:33 -08:00
b36c5c6fd9 Expose peer info 2016-01-06 18:20:01 -08:00
a6fe03ae2e credentials.TLSInfo: export State 2015-09-08 14:30:17 -04:00
cf890d694e rename audience 2015-08-28 17:32:25 -07:00
ca129f5e97 gofmt -w 2015-08-28 17:08:48 -07:00
6be470f058 Credentials API and jwtAccess implementation tunning 2015-08-28 16:51:45 -07:00
3af5617830 fix build 2015-08-28 14:07:28 -07:00
3111577eb2 fix a comment 2015-08-28 13:24:56 -07:00
87c361b5a5 check transport security when using oauth2-based credentials 2015-08-28 13:19:36 -07:00
f49ac9d0df rename Type() 2015-08-26 13:43:04 -07:00
ef3d58fc04 add test 2015-08-26 13:11:34 -07:00
c0e23d7ef3 make the tests happy 2015-08-26 12:40:24 -07:00
b6d240dcce add comments 2015-08-26 11:34:35 -07:00