7aea499f91
credentials: return Unavailable instead of Internal for per-RPC creds errors ( #1776 )
...
Or if `PerRPCCredentials` returns a `status` error, honor that instead.
2018-01-03 09:47:07 -08:00
4318e6475c
server: apply deadline to new connections until all handshaking is completed ( #1646 )
2017-11-03 13:53:17 -07:00
1687ce5770
ClientHandshake should get the dialing endpoint as the authority ( #1607 )
2017-10-23 11:40:43 -07:00
faebfcb7bf
Remove single-entry var blocks ( #1589 )
2017-10-18 09:59:23 -07:00
ddbf6c46a6
autofix license notice
2017-06-08 14:42:19 +02:00
7ddf89f9b7
Fix doc
2017-05-04 10:30:28 -07:00
ccdf270424
add document to ClientHandshake about returning temporary error ( #1125 )
2017-03-28 11:12:50 -07:00
4ed348913c
ClientHandshake to return AuthInfo ( #956 )
...
* Initial commit
* Initial commit 2
* minor update
* goimport update
* resolved race condition
* added test for TLSInfo on server side
* Post review updates
* port review changes
debug
debug
* refactoring and added third function
* post review changes
* post review changes
* post review updates
* post review commit
* post review commit
* post review update
* post review update
* post review update
* post review update
* post review commit
* post review update
2017-01-09 13:29:20 -08:00
e63e0d4095
Add Clone() and OverrideServerName() to TransportCredentials
2016-09-26 15:18:51 -07:00
a00cbfeab5
Overwrite authority if creds servername is specified
2016-09-06 11:23:30 -07:00
0c58a17d6f
Add credentials ErrConnDispatch
2016-08-24 16:20:57 -07:00
32bc9f2357
Remove conn.Close() in tlsCred.ServerHandshake()
...
Removes the responsibility from tlsCred.ServerHandshake() of calling Close() on the underlying connection. Returning an error is enough to close the connection: https://github.com/grpc/grpc-go/blob/master/server.go#L370 .
2016-08-08 07:11:07 -05:00
efa105d0d2
Cleanup conn.Close() handling in newHTTP2Client()
...
Removes the need to close the underlying connection in tlsCreds.ClientHandshake().
2016-08-08 03:49:40 -05:00
5c7ed938f9
credentials: plumb cancellation into ClientHandshake
...
This is a minor breaking change to `TransportCredentials`, however
it should not be a problem in practice as not many users are using
custom implementations. In particular, users of `NewTLS` will not
be affected.
This change also replaces the earlier `Timeout` and `Cancel` fields
with a `context.Context`, which is plumbed all the way down from
`grpc.Dial`, laying the ground work for a user-provided context.
Also, support for Go 1.7 is added.
2016-08-01 16:29:56 -04:00
824221d52d
add clone to avoid modifying passed-in tls.Config
2016-07-26 21:21:43 -07:00
9a97937ed3
credentials: don't overwrite ServerName in given config
...
The first endpoint will set the ServerName which will then be used by
the second endpoint, causing the transport to reject the second endpoint
since the server cert won't match the server name.
2016-07-14 11:17:40 -07:00
78e558bbc1
fix Info passes lock by value
2016-06-29 14:08:23 -07:00
74a71a17ac
Fix typo.
2016-06-27 20:52:25 -07:00
69487bb54a
Address comments
2016-06-09 11:44:26 -07:00
59486d9c17
Rename TransportAuthenticator to TransportCredentials
2016-06-08 11:19:25 -07:00
3ffbd8e030
Rename Credentials to PerRPCCredentials
2016-06-06 17:28:10 -07:00
6404c49192
Make TransportAuthenticator not embed Credentials
2016-06-06 16:24:46 -07:00
76515fa9fd
Remove context related functions in credentials
2016-01-06 18:26:33 -08:00
b36c5c6fd9
Expose peer info
2016-01-06 18:20:01 -08:00
a6fe03ae2e
credentials.TLSInfo: export State
2015-09-08 14:30:17 -04:00
cf890d694e
rename audience
2015-08-28 17:32:25 -07:00
6be470f058
Credentials API and jwtAccess implementation tunning
2015-08-28 16:51:45 -07:00
3111577eb2
fix a comment
2015-08-28 13:24:56 -07:00
87c361b5a5
check transport security when using oauth2-based credentials
2015-08-28 13:19:36 -07:00
f49ac9d0df
rename Type()
2015-08-26 13:43:04 -07:00
ef3d58fc04
add test
2015-08-26 13:11:34 -07:00
c0e23d7ef3
make the tests happy
2015-08-26 12:40:24 -07:00
b6d240dcce
add comments
2015-08-26 11:34:35 -07:00
125950284c
separate auth info from normal metadata
2015-08-26 11:30:43 -07:00
cd205234d7
small polish
2015-08-24 12:00:28 -07:00
97574c6499
make the test happy
2015-08-24 11:40:40 -07:00
d12ff72146
allow access of some info of client certificate
2015-08-21 15:49:53 -07:00
075e4a60c3
Switch ALPN/NPN to advertise only h2
2015-07-31 14:21:24 -07:00
aeca1aff71
Remove OAuth support from credentials
...
Fixes #219 .
2015-07-22 22:14:33 -04:00
ffe2c5d7aa
add h2 into ALPN protocol
2015-05-27 17:33:26 -07:00
5e4f3d16f2
cleanup2
2015-05-12 18:04:16 -07:00
3617cd5ab3
revert handshaker changes
2015-05-12 17:59:20 -07:00
5700d19d0e
Fix golint errors for non-generated code
2015-05-08 21:46:16 +02:00
54b06c32f6
rename newly added function
2015-05-01 19:12:23 -07:00
0e38f0687a
provide some info for the gRPC protocol and security protocol
2015-05-01 19:06:46 -07:00
4078563125
fix comments
2015-05-01 18:53:13 -07:00
263a0287c9
fix comments
2015-05-01 18:52:19 -07:00
3b8eba3a28
fix a comment
2015-04-21 17:28:46 -07:00
dfe197d91f
remove dialing work from TransportAuthenticator
2015-04-21 17:22:15 -07:00
2cf2d0871b
remove WithNetwork and add WithDialer to have more flexibility on dialing
2015-04-21 16:19:29 -07:00