blob: 9b907ea3ebad947942837652b011b7379842c8a4 [file] [log] [blame]
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001/*
2 *
Craig Tiller06059952015-02-18 08:34:56 -08003 * Copyright 2015, Google Inc.
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08004 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are
8 * met:
9 *
10 * * Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * * Redistributions in binary form must reproduce the above
13 * copyright notice, this list of conditions and the following disclaimer
14 * in the documentation and/or other materials provided with the
15 * distribution.
16 * * Neither the name of Google Inc. nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
24 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
30 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 *
32 */
33
Nicolas "Pixel" Noble1ff52d52015-03-01 05:24:36 +010034#ifndef GRPC_GRPC_SECURITY_H
35#define GRPC_GRPC_SECURITY_H
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080036
Nicolas "Pixel" Noble1ed15e22015-06-09 02:24:35 +020037#include <grpc/grpc.h>
38#include <grpc/status.h>
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080039
nnoble0c475f02014-12-05 15:37:39 -080040#ifdef __cplusplus
41extern "C" {
42#endif
43
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080044/* --- grpc_credentials object. ---
45
46 A credentials object represents a way to authenticate a client. */
47
48typedef struct grpc_credentials grpc_credentials;
49
50/* Releases a credentials object.
51 The creator of the credentials object is responsible for its release. */
52void grpc_credentials_release(grpc_credentials *creds);
53
Julien Boeufb037bb62015-07-08 14:58:14 -070054/* Environment variable that points to the google default application
55 credentials json key or refresh token. Used in the
56 grpc_google_default_credentials_create function. */
57#define GRPC_GOOGLE_CREDENTIALS_ENV_VAR "GOOGLE_APPLICATION_CREDENTIALS"
58
Julien Boeufc66f2a82015-02-23 13:00:36 -080059/* Creates default credentials to connect to a google gRPC service.
60 WARNING: Do NOT use this credentials to connect to a non-google service as
61 this could result in an oauth2 token leak. */
62grpc_credentials *grpc_google_default_credentials_create(void);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080063
Julien Boeuf026a4172015-02-02 18:36:37 -080064/* Environment variable that points to the default SSL roots file. This file
65 must be a PEM encoded file with all the roots such as the one that can be
66 downloaded from https://pki.google.com/roots.pem. */
67#define GRPC_DEFAULT_SSL_ROOTS_FILE_PATH_ENV_VAR \
68 "GRPC_DEFAULT_SSL_ROOTS_FILE_PATH"
69
Julien Boeuf8fbcc432015-01-15 16:44:13 -080070/* Object that holds a private key / certificate chain pair in PEM format. */
71typedef struct {
72 /* private_key is the NULL-terminated string containing the PEM encoding of
73 the client's private key. */
74 const char *private_key;
75
Julien Boeuf68ad53e2015-01-20 22:37:03 -080076 /* cert_chain is the NULL-terminated string containing the PEM encoding of
77 the client's certificate chain. */
Julien Boeuf8fbcc432015-01-15 16:44:13 -080078 const char *cert_chain;
79} grpc_ssl_pem_key_cert_pair;
80
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080081/* Creates an SSL credentials object.
Julien Boeuf8fbcc432015-01-15 16:44:13 -080082 - pem_roots_cert is the NULL-terminated string containing the PEM encoding
Julien Boeuf3e001792015-02-20 15:02:36 -080083 of the server root certificates. If this parameter is NULL, the
84 implementation will first try to dereference the file pointed by the
85 GRPC_DEFAULT_SSL_ROOTS_FILE_PATH environment variable, and if that fails,
86 get the roots from a well-known place on disk (in the grpc install
87 directory).
Julien Boeuf8fbcc432015-01-15 16:44:13 -080088 - pem_key_cert_pair is a pointer on the object containing client's private
89 key and certificate chain. This parameter can be NULL if the client does
90 not have such a key/cert pair. */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080091grpc_credentials *grpc_ssl_credentials_create(
Julien Boeuf8fbcc432015-01-15 16:44:13 -080092 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pair);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080093
94/* Creates a composite credentials object. */
95grpc_credentials *grpc_composite_credentials_create(grpc_credentials *creds1,
96 grpc_credentials *creds2);
97
Julien Boeufc66f2a82015-02-23 13:00:36 -080098/* Creates a compute engine credentials object.
99 WARNING: Do NOT use this credentials to connect to a non-google service as
100 this could result in an oauth2 token leak. */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800101grpc_credentials *grpc_compute_engine_credentials_create(void);
102
jboeufab4f9142014-12-16 16:32:39 -0800103extern const gpr_timespec grpc_max_auth_token_lifetime;
jboeufbefd2652014-12-12 15:39:47 -0800104
105/* Creates a service account credentials object. May return NULL if the input is
jboeufab4f9142014-12-16 16:32:39 -0800106 invalid.
Julien Boeufc66f2a82015-02-23 13:00:36 -0800107 WARNING: Do NOT use this credentials to connect to a non-google service as
108 this could result in an oauth2 token leak.
jboeufab4f9142014-12-16 16:32:39 -0800109 - json_key is the JSON key string containing the client's private key.
110 - scope is a space-delimited list of the requested permissions.
111 - token_lifetime is the lifetime of each token acquired through this service
112 account credentials. It should not exceed grpc_max_auth_token_lifetime
113 or will be cropped to this value. */
114grpc_credentials *grpc_service_account_credentials_create(
115 const char *json_key, const char *scope, gpr_timespec token_lifetime);
jboeufbefd2652014-12-12 15:39:47 -0800116
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800117/* Creates a JWT credentials object. May return NULL if the input is invalid.
118 - json_key is the JSON key string containing the client's private key.
119 - token_lifetime is the lifetime of each Json Web Token (JWT) created with
120 this credentials. It should not exceed grpc_max_auth_token_lifetime or
121 will be cropped to this value. */
122grpc_credentials *grpc_jwt_credentials_create(const char *json_key,
123 gpr_timespec token_lifetime);
124
Eric Dobsona6124ec2015-06-08 11:17:42 -0700125/* Creates an Oauth2 Refresh Token credentials object. May return NULL if the
Julien Boeuf9835cf02015-03-09 16:56:44 -0700126 input is invalid.
127 WARNING: Do NOT use this credentials to connect to a non-google service as
128 this could result in an oauth2 token leak.
129 - json_refresh_token is the JSON string containing the refresh token itself
130 along with a client_id and client_secret. */
131grpc_credentials *grpc_refresh_token_credentials_create(
132 const char *json_refresh_token);
133
Julien Boeuf2805be12015-07-01 02:47:18 -0700134/* Creates an Oauth2 Access Token credentials with an access token that was
135 aquired by an out of band mechanism. */
136grpc_credentials *grpc_access_token_credentials_create(
137 const char *access_token);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800138
nnoble0c475f02014-12-05 15:37:39 -0800139/* Creates an IAM credentials object. */
140grpc_credentials *grpc_iam_credentials_create(const char *authorization_token,
141 const char *authority_selector);
142
Julien Boeuf2805be12015-07-01 02:47:18 -0700143/* Creates a fake transport security credentials object for testing. */
144grpc_credentials *grpc_fake_transport_security_credentials_create(void);
145
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800146/* --- Secure channel creation. --- */
147
148/* The caller of the secure_channel_create functions may override the target
149 name used for SSL host name checking using this channel argument which is of
150 type GRPC_ARG_STRING. This *should* be used for testing only.
151 If this argument is not specified, the name used for SSL host name checking
152 will be the target parameter (assuming that the secure channel is an SSL
153 channel). If this parameter is specified and the underlying is not an SSL
154 channel, it will just be ignored. */
155#define GRPC_SSL_TARGET_NAME_OVERRIDE_ARG "grpc.ssl_target_name_override"
156
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800157/* Creates a secure channel using the passed-in credentials. */
158grpc_channel *grpc_secure_channel_create(grpc_credentials *creds,
159 const char *target,
160 const grpc_channel_args *args);
161
162/* --- grpc_server_credentials object. ---
163
164 A server credentials object represents a way to authenticate a server. */
165
166typedef struct grpc_server_credentials grpc_server_credentials;
167
168/* Releases a server_credentials object.
169 The creator of the server_credentials object is responsible for its release.
170 */
171void grpc_server_credentials_release(grpc_server_credentials *creds);
172
173/* Creates an SSL server_credentials object.
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800174 - pem_roots_cert is the NULL-terminated string containing the PEM encoding of
175 the client root certificates. This parameter may be NULL if the server does
176 not want the client to be authenticated with SSL.
177 - pem_key_cert_pairs is an array private key / certificate chains of the
178 server. This parameter cannot be NULL.
179 - num_key_cert_pairs indicates the number of items in the private_key_files
180 and cert_chain_files parameters. It should be at least 1. */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800181grpc_server_credentials *grpc_ssl_server_credentials_create(
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800182 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs,
183 size_t num_key_cert_pairs);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800184
185/* Creates a fake server transport security credentials object for testing. */
186grpc_server_credentials *grpc_fake_transport_security_server_credentials_create(
187 void);
188
Jan Tattermuschb0829eb2015-03-03 09:30:55 -0800189/* --- Server-side secure ports. --- */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800190
Craig Tillerd251ab92015-02-17 17:22:14 -0800191/* Add a HTTP2 over an encrypted link over tcp listener.
Craig Tillerd251ab92015-02-17 17:22:14 -0800192 Returns bound port number on success, 0 on failure.
193 REQUIRES: server not started */
Craig Tiller759026c2015-02-22 23:09:45 -0800194int grpc_server_add_secure_http2_port(grpc_server *server, const char *addr,
195 grpc_server_credentials *creds);
Craig Tillerd251ab92015-02-17 17:22:14 -0800196
Julien Boeuf9f218dd2015-04-23 10:24:02 -0700197/* --- Call specific credentials. --- */
198
199/* Sets a credentials to a call. Can only be called on the client side before
200 grpc_call_start_batch. */
201grpc_call_error grpc_call_set_credentials(grpc_call *call,
202 grpc_credentials *creds);
203
Julien Boeuf84d964a2015-04-29 11:31:06 -0700204/* --- Authentication Context. --- */
205
Craig Tiller9a576332015-06-17 10:21:49 -0700206#define GRPC_TRANSPORT_SECURITY_TYPE_PROPERTY_NAME "transport_security_type"
Julien Boeuf84d964a2015-04-29 11:31:06 -0700207#define GRPC_FAKE_TRANSPORT_SECURITY_TYPE "fake"
208#define GRPC_SSL_TRANSPORT_SECURITY_TYPE "ssl"
209
210#define GRPC_X509_CN_PROPERTY_NAME "x509_common_name"
211#define GRPC_X509_SAN_PROPERTY_NAME "x509_subject_alternative_name"
212
213typedef struct grpc_auth_context grpc_auth_context;
Julien Boeuf83b02972015-05-20 22:50:34 -0700214
215typedef struct grpc_auth_property_iterator {
216 const grpc_auth_context *ctx;
217 size_t index;
218 const char *name;
219} grpc_auth_property_iterator;
Julien Boeuf84d964a2015-04-29 11:31:06 -0700220
221/* value, if not NULL, is guaranteed to be NULL terminated. */
222typedef struct grpc_auth_property {
223 char *name;
224 char *value;
225 size_t value_length;
226} grpc_auth_property;
227
228/* Returns NULL when the iterator is at the end. */
229const grpc_auth_property *grpc_auth_property_iterator_next(
230 grpc_auth_property_iterator *it);
Julien Boeuf84d964a2015-04-29 11:31:06 -0700231
Julien Boeuf83b02972015-05-20 22:50:34 -0700232/* Iterates over the auth context. */
233grpc_auth_property_iterator grpc_auth_context_property_iterator(
Julien Boeuf84d964a2015-04-29 11:31:06 -0700234 const grpc_auth_context *ctx);
235
Julien Boeuf83b02972015-05-20 22:50:34 -0700236/* Gets the peer identity. Returns an empty iterator (first _next will return
237 NULL) if the peer is not authenticated. */
238grpc_auth_property_iterator grpc_auth_context_peer_identity(
Julien Boeuf84d964a2015-04-29 11:31:06 -0700239 const grpc_auth_context *ctx);
240
Julien Boeuf83b02972015-05-20 22:50:34 -0700241/* Finds a property in the context. May return an empty iterator (first _next
242 will return NULL) if no property with this name was found in the context. */
243grpc_auth_property_iterator grpc_auth_context_find_properties_by_name(
Julien Boeuf84d964a2015-04-29 11:31:06 -0700244 const grpc_auth_context *ctx, const char *name);
245
246/* Gets the name of the property that indicates the peer identity. Will return
247 NULL if the peer is not authenticated. */
248const char *grpc_auth_context_peer_identity_property_name(
249 const grpc_auth_context *ctx);
250
Julien Boeuf83b02972015-05-20 22:50:34 -0700251/* Returns 1 if the peer is authenticated, 0 otherwise. */
252int grpc_auth_context_peer_is_authenticated(const grpc_auth_context *ctx);
253
yang-gf9e8e592015-07-09 12:32:15 -0700254/* Gets the auth context from the call. Caller needs to call
255 grpc_auth_context_release on the returned context. */
256grpc_auth_context *grpc_call_auth_context(grpc_call *call);
257
258/* Releases the auth context returned from grpc_call_auth_context. */
259void grpc_auth_context_release(grpc_auth_context *context);
Julien Boeuf84d964a2015-04-29 11:31:06 -0700260
Julien Boeufea456fc2015-07-07 15:23:30 -0700261/* --
262 The following auth context methods should only be called by a server metadata
263 processor that will augment the channel auth context (see below).
264 -- */
265
266/* Creates a new auth context based off a chained context. */
267grpc_auth_context *grpc_auth_context_create(grpc_auth_context *chained);
268
269/* Add a property. */
270void grpc_auth_context_add_property(grpc_auth_context *ctx, const char *name,
271 const char *value, size_t value_length);
272
273/* Add a C string property. */
274void grpc_auth_context_add_cstring_property(grpc_auth_context *ctx,
275 const char *name,
276 const char *value);
277
278/* Sets the property name. Returns 1 if successful or 0 in case of failure
279 (which means that no property with this name exists). */
280int grpc_auth_context_set_peer_identity_property_name(grpc_auth_context *ctx,
281 const char *name);
282
283/* --- Auth Metadata Processing --- */
284
285/* Opaque data structure useful for processors defined in core. */
286typedef struct grpc_auth_ticket grpc_auth_ticket;
287
288/* Callback function that is called when the metadata processing is done.
289 success is 1 if processing succeeded, 0 otherwise. */
290typedef void (*grpc_process_auth_metadata_done_cb)(
291 void *user_data, const grpc_metadata *consumed_md, size_t num_consumed_md,
292 int success, grpc_auth_context *result);
293
Julien Boeufa87d6c22015-07-17 15:51:46 -0700294/* Pluggable server-side metadata processor object */
295typedef struct {
296 void (*process)(void *state, grpc_auth_ticket *ticket,
297 grpc_auth_context *channel_ctx, const grpc_metadata *md,
298 size_t md_count, grpc_process_auth_metadata_done_cb cb,
299 void *user_data);
300 void *state;
301} grpc_auth_metadata_processor;
Julien Boeufea456fc2015-07-07 15:23:30 -0700302
Julien Boeuf6bdc9b42015-07-19 21:56:02 -0700303void grpc_server_credentials_set_auth_metadata_processor(
304 grpc_server_credentials *creds, grpc_auth_metadata_processor processor);
Julien Boeufea456fc2015-07-07 15:23:30 -0700305
nnoble0c475f02014-12-05 15:37:39 -0800306#ifdef __cplusplus
307}
308#endif
309
Craig Tiller9a576332015-06-17 10:21:49 -0700310#endif /* GRPC_GRPC_SECURITY_H */