blob: 4cfa768619b96b02d77d0e90aa6480af8f803bed [file] [log] [blame]
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08001/*
2 *
Craig Tiller06059952015-02-18 08:34:56 -08003 * Copyright 2015, Google Inc.
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -08004 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are
8 * met:
9 *
10 * * Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * * Redistributions in binary form must reproduce the above
13 * copyright notice, this list of conditions and the following disclaimer
14 * in the documentation and/or other materials provided with the
15 * distribution.
16 * * Neither the name of Google Inc. nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
24 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
30 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 *
32 */
33
Nicolas "Pixel" Noble1ff52d52015-03-01 05:24:36 +010034#ifndef GRPC_GRPC_SECURITY_H
35#define GRPC_GRPC_SECURITY_H
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080036
Nicolas "Pixel" Noble1ed15e22015-06-09 02:24:35 +020037#include <grpc/grpc.h>
38#include <grpc/status.h>
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -080039
nnoble0c475f02014-12-05 15:37:39 -080040#ifdef __cplusplus
41extern "C" {
42#endif
43
Julien Boeufea44bba2015-11-18 15:56:01 -080044/* --- Authentication Context. --- */
45
46#define GRPC_TRANSPORT_SECURITY_TYPE_PROPERTY_NAME "transport_security_type"
47#define GRPC_SSL_TRANSPORT_SECURITY_TYPE "ssl"
48
49#define GRPC_X509_CN_PROPERTY_NAME "x509_common_name"
50#define GRPC_X509_SAN_PROPERTY_NAME "x509_subject_alternative_name"
51
52typedef struct grpc_auth_context grpc_auth_context;
53
54typedef struct grpc_auth_property_iterator {
55 const grpc_auth_context *ctx;
56 size_t index;
57 const char *name;
58} grpc_auth_property_iterator;
59
60/* value, if not NULL, is guaranteed to be NULL terminated. */
61typedef struct grpc_auth_property {
62 char *name;
63 char *value;
64 size_t value_length;
65} grpc_auth_property;
66
67/* Returns NULL when the iterator is at the end. */
Craig Tiller9b426372016-01-29 07:58:22 -080068GRPC_API const grpc_auth_property *grpc_auth_property_iterator_next(
Julien Boeufea44bba2015-11-18 15:56:01 -080069 grpc_auth_property_iterator *it);
70
71/* Iterates over the auth context. */
Craig Tiller9b426372016-01-29 07:58:22 -080072GRPC_API grpc_auth_property_iterator grpc_auth_context_property_iterator(
Julien Boeufea44bba2015-11-18 15:56:01 -080073 const grpc_auth_context *ctx);
74
75/* Gets the peer identity. Returns an empty iterator (first _next will return
76 NULL) if the peer is not authenticated. */
Craig Tiller9b426372016-01-29 07:58:22 -080077GRPC_API grpc_auth_property_iterator grpc_auth_context_peer_identity(
Julien Boeufea44bba2015-11-18 15:56:01 -080078 const grpc_auth_context *ctx);
79
80/* Finds a property in the context. May return an empty iterator (first _next
81 will return NULL) if no property with this name was found in the context. */
Craig Tiller9b426372016-01-29 07:58:22 -080082GRPC_API grpc_auth_property_iterator grpc_auth_context_find_properties_by_name(
Julien Boeufea44bba2015-11-18 15:56:01 -080083 const grpc_auth_context *ctx, const char *name);
84
85/* Gets the name of the property that indicates the peer identity. Will return
86 NULL if the peer is not authenticated. */
Craig Tiller9b426372016-01-29 07:58:22 -080087GRPC_API const char *grpc_auth_context_peer_identity_property_name(
Julien Boeufea44bba2015-11-18 15:56:01 -080088 const grpc_auth_context *ctx);
89
90/* Returns 1 if the peer is authenticated, 0 otherwise. */
Craig Tiller9b426372016-01-29 07:58:22 -080091GRPC_API int grpc_auth_context_peer_is_authenticated(const grpc_auth_context *ctx);
Julien Boeufea44bba2015-11-18 15:56:01 -080092
93/* Gets the auth context from the call. Caller needs to call
94 grpc_auth_context_release on the returned context. */
Craig Tiller9b426372016-01-29 07:58:22 -080095GRPC_API grpc_auth_context *grpc_call_auth_context(grpc_call *call);
Julien Boeufea44bba2015-11-18 15:56:01 -080096
97/* Releases the auth context returned from grpc_call_auth_context. */
Craig Tiller9b426372016-01-29 07:58:22 -080098GRPC_API void grpc_auth_context_release(grpc_auth_context *context);
Julien Boeufea44bba2015-11-18 15:56:01 -080099
100/* --
101 The following auth context methods should only be called by a server metadata
102 processor to set properties extracted from auth metadata.
103 -- */
104
105/* Add a property. */
Craig Tiller9b426372016-01-29 07:58:22 -0800106GRPC_API void grpc_auth_context_add_property(grpc_auth_context *ctx, const char *name,
Julien Boeufea44bba2015-11-18 15:56:01 -0800107 const char *value, size_t value_length);
108
109/* Add a C string property. */
Craig Tiller9b426372016-01-29 07:58:22 -0800110GRPC_API void grpc_auth_context_add_cstring_property(grpc_auth_context *ctx,
Julien Boeufea44bba2015-11-18 15:56:01 -0800111 const char *name,
112 const char *value);
113
114/* Sets the property name. Returns 1 if successful or 0 in case of failure
115 (which means that no property with this name exists). */
Craig Tiller9b426372016-01-29 07:58:22 -0800116GRPC_API int grpc_auth_context_set_peer_identity_property_name(grpc_auth_context *ctx,
Julien Boeufea44bba2015-11-18 15:56:01 -0800117 const char *name);
118
Julien Boeufacd835f2015-10-09 15:20:57 -0700119/* --- grpc_channel_credentials object. ---
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800120
Julien Boeufacd835f2015-10-09 15:20:57 -0700121 A channel credentials object represents a way to authenticate a client on a
122 channel. */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800123
Julien Boeufacd835f2015-10-09 15:20:57 -0700124typedef struct grpc_channel_credentials grpc_channel_credentials;
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800125
Julien Boeufacd835f2015-10-09 15:20:57 -0700126/* Releases a channel credentials object.
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800127 The creator of the credentials object is responsible for its release. */
Craig Tiller9b426372016-01-29 07:58:22 -0800128GRPC_API void grpc_channel_credentials_release(grpc_channel_credentials *creds);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800129
Julien Boeufb037bb62015-07-08 14:58:14 -0700130/* Environment variable that points to the google default application
131 credentials json key or refresh token. Used in the
132 grpc_google_default_credentials_create function. */
133#define GRPC_GOOGLE_CREDENTIALS_ENV_VAR "GOOGLE_APPLICATION_CREDENTIALS"
134
Julien Boeufc66f2a82015-02-23 13:00:36 -0800135/* Creates default credentials to connect to a google gRPC service.
136 WARNING: Do NOT use this credentials to connect to a non-google service as
137 this could result in an oauth2 token leak. */
Craig Tiller9b426372016-01-29 07:58:22 -0800138GRPC_API grpc_channel_credentials *grpc_google_default_credentials_create(void);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800139
Julien Boeuf026a4172015-02-02 18:36:37 -0800140/* Environment variable that points to the default SSL roots file. This file
141 must be a PEM encoded file with all the roots such as the one that can be
142 downloaded from https://pki.google.com/roots.pem. */
143#define GRPC_DEFAULT_SSL_ROOTS_FILE_PATH_ENV_VAR \
144 "GRPC_DEFAULT_SSL_ROOTS_FILE_PATH"
145
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800146/* Object that holds a private key / certificate chain pair in PEM format. */
147typedef struct {
148 /* private_key is the NULL-terminated string containing the PEM encoding of
149 the client's private key. */
150 const char *private_key;
151
Julien Boeuf68ad53e2015-01-20 22:37:03 -0800152 /* cert_chain is the NULL-terminated string containing the PEM encoding of
153 the client's certificate chain. */
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800154 const char *cert_chain;
155} grpc_ssl_pem_key_cert_pair;
156
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800157/* Creates an SSL credentials object.
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800158 - pem_roots_cert is the NULL-terminated string containing the PEM encoding
Julien Boeuf3e001792015-02-20 15:02:36 -0800159 of the server root certificates. If this parameter is NULL, the
160 implementation will first try to dereference the file pointed by the
161 GRPC_DEFAULT_SSL_ROOTS_FILE_PATH environment variable, and if that fails,
162 get the roots from a well-known place on disk (in the grpc install
163 directory).
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800164 - pem_key_cert_pair is a pointer on the object containing client's private
165 key and certificate chain. This parameter can be NULL if the client does
Julien Boeuf5029b302015-07-21 23:02:16 -0700166 not have such a key/cert pair. */
Craig Tiller9b426372016-01-29 07:58:22 -0800167GRPC_API grpc_channel_credentials *grpc_ssl_credentials_create(
Julien Boeuf8b78c282015-08-14 13:39:19 -0700168 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pair,
169 void *reserved);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800170
Julien Boeufacd835f2015-10-09 15:20:57 -0700171/* --- grpc_call_credentials object.
172
173 A call credentials object represents a way to authenticate on a particular
174 call. These credentials can be composed with a channel credentials object
175 so that they are sent with every call on this channel. */
176
177typedef struct grpc_call_credentials grpc_call_credentials;
178
Julien Boeuf441176d2015-10-09 21:14:07 -0700179/* Releases a call credentials object.
180 The creator of the credentials object is responsible for its release. */
Craig Tiller9b426372016-01-29 07:58:22 -0800181GRPC_API void grpc_call_credentials_release(grpc_call_credentials *creds);
Julien Boeuf441176d2015-10-09 21:14:07 -0700182
Julien Boeufacd835f2015-10-09 15:20:57 -0700183/* Creates a composite channel credentials object. */
Craig Tiller9b426372016-01-29 07:58:22 -0800184GRPC_API grpc_channel_credentials *grpc_composite_channel_credentials_create(
Julien Boeufacd835f2015-10-09 15:20:57 -0700185 grpc_channel_credentials *channel_creds, grpc_call_credentials *call_creds,
186 void *reserved);
187
188/* Creates a composite call credentials object. */
Craig Tiller9b426372016-01-29 07:58:22 -0800189GRPC_API grpc_call_credentials *grpc_composite_call_credentials_create(
Julien Boeufacd835f2015-10-09 15:20:57 -0700190 grpc_call_credentials *creds1, grpc_call_credentials *creds2,
191 void *reserved);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800192
Julien Boeuf510a9202015-08-25 21:51:07 -0700193/* Creates a compute engine credentials object for connecting to Google.
Julien Boeufc66f2a82015-02-23 13:00:36 -0800194 WARNING: Do NOT use this credentials to connect to a non-google service as
195 this could result in an oauth2 token leak. */
Craig Tiller9b426372016-01-29 07:58:22 -0800196GRPC_API grpc_call_credentials *grpc_google_compute_engine_credentials_create(
Julien Boeufacd835f2015-10-09 15:20:57 -0700197 void *reserved);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800198
jboeufab4f9142014-12-16 16:32:39 -0800199extern const gpr_timespec grpc_max_auth_token_lifetime;
jboeufbefd2652014-12-12 15:39:47 -0800200
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800201/* Creates a JWT credentials object. May return NULL if the input is invalid.
202 - json_key is the JSON key string containing the client's private key.
203 - token_lifetime is the lifetime of each Json Web Token (JWT) created with
204 this credentials. It should not exceed grpc_max_auth_token_lifetime or
205 will be cropped to this value. */
Craig Tiller9b426372016-01-29 07:58:22 -0800206GRPC_API grpc_call_credentials *grpc_service_account_jwt_access_credentials_create(
Julien Boeuf8b78c282015-08-14 13:39:19 -0700207 const char *json_key, gpr_timespec token_lifetime, void *reserved);
Julien Boeuff47a5cb2015-02-18 12:24:08 -0800208
Julien Boeuf510a9202015-08-25 21:51:07 -0700209/* Creates an Oauth2 Refresh Token credentials object for connecting to Google.
210 May return NULL if the input is invalid.
Julien Boeuf9835cf02015-03-09 16:56:44 -0700211 WARNING: Do NOT use this credentials to connect to a non-google service as
212 this could result in an oauth2 token leak.
213 - json_refresh_token is the JSON string containing the refresh token itself
214 along with a client_id and client_secret. */
Craig Tiller9b426372016-01-29 07:58:22 -0800215GRPC_API grpc_call_credentials *grpc_google_refresh_token_credentials_create(
Julien Boeuf8b78c282015-08-14 13:39:19 -0700216 const char *json_refresh_token, void *reserved);
Julien Boeuf9835cf02015-03-09 16:56:44 -0700217
Julien Boeuf2805be12015-07-01 02:47:18 -0700218/* Creates an Oauth2 Access Token credentials with an access token that was
219 aquired by an out of band mechanism. */
Craig Tiller9b426372016-01-29 07:58:22 -0800220GRPC_API grpc_call_credentials *grpc_access_token_credentials_create(
Julien Boeufacd835f2015-10-09 15:20:57 -0700221 const char *access_token, void *reserved);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800222
Julien Boeuf510a9202015-08-25 21:51:07 -0700223/* Creates an IAM credentials object for connecting to Google. */
Craig Tiller9b426372016-01-29 07:58:22 -0800224GRPC_API grpc_call_credentials *grpc_google_iam_credentials_create(
Julien Boeuf510a9202015-08-25 21:51:07 -0700225 const char *authorization_token, const char *authority_selector,
226 void *reserved);
nnoble0c475f02014-12-05 15:37:39 -0800227
Julien Boeuf8b5bb272015-08-31 13:25:21 -0700228/* Callback function to be called by the metadata credentials plugin
Julien Boeuf97f80fa2015-09-15 16:17:31 -0700229 implementation when the metadata is ready.
230 - user_data is the opaque pointer that was passed in the get_metadata method
231 of the grpc_metadata_credentials_plugin (see below).
232 - creds_md is an array of credentials metadata produced by the plugin. It
233 may be set to NULL in case of an error.
234 - num_creds_md is the number of items in the creds_md array.
235 - status must be GRPC_STATUS_OK in case of success or another specific error
236 code otherwise.
237 - error_details contains details about the error if any. In case of success
238 it should be NULL and will be otherwise ignored. */
Julien Boeuf8b5bb272015-08-31 13:25:21 -0700239typedef void (*grpc_credentials_plugin_metadata_cb)(
240 void *user_data, const grpc_metadata *creds_md, size_t num_creds_md,
241 grpc_status_code status, const char *error_details);
242
Julien Boeufea44bba2015-11-18 15:56:01 -0800243/* Context that can be used by metadata credentials plugin in order to create
244 auth related metadata. */
245typedef struct {
246 /* The fully qualifed service url. */
247 const char *service_url;
248
Julien Boeuf3c957e62015-11-18 21:33:58 -0800249 /* The method name of the RPC being called (not fully qualified).
Julien Boeufeb029c92015-11-25 13:47:56 -0800250 The fully qualified method name can be built from the service_url:
251 full_qualified_method_name = ctx->service_url + '/' + ctx->method_name. */
Julien Boeufea44bba2015-11-18 15:56:01 -0800252 const char *method_name;
253
254 /* The auth_context of the channel which gives the server's identity. */
255 const grpc_auth_context *channel_auth_context;
256
257 /* Reserved for future use. */
258 void *reserved;
259} grpc_auth_metadata_context;
260
Julien Boeuf97f80fa2015-09-15 16:17:31 -0700261/* grpc_metadata_credentials plugin is an API user provided structure used to
262 create grpc_credentials objects that can be set on a channel (composed) or
263 a call. See grpc_credentials_metadata_create_from_plugin below.
264 The grpc client stack will call the get_metadata method of the plugin for
265 every call in scope for the credentials created from it. */
Julien Boeuf8b5bb272015-08-31 13:25:21 -0700266typedef struct {
267 /* The implementation of this method has to be non-blocking.
Julien Boeufea44bba2015-11-18 15:56:01 -0800268 - context is the information that can be used by the plugin to create auth
269 metadata.
Julien Boeuf8b5bb272015-08-31 13:25:21 -0700270 - cb is the callback that needs to be called when the metadata is ready.
271 - user_data needs to be passed as the first parameter of the callback. */
Julien Boeufea44bba2015-11-18 15:56:01 -0800272 void (*get_metadata)(void *state, grpc_auth_metadata_context context,
Julien Boeuf8b5bb272015-08-31 13:25:21 -0700273 grpc_credentials_plugin_metadata_cb cb, void *user_data);
274
275 /* Destroys the plugin state. */
276 void (*destroy)(void *state);
277
278 /* State that will be set as the first parameter of the methods above. */
279 void *state;
Julien Boeufcaf99352015-11-19 22:00:30 -0800280
281 /* Type of credentials that this plugin is implementing. */
282 const char *type;
Julien Boeuf8b5bb272015-08-31 13:25:21 -0700283} grpc_metadata_credentials_plugin;
284
Julien Boeuf29ee3f42015-08-31 13:27:33 -0700285/* Creates a credentials object from a plugin. */
Craig Tiller9b426372016-01-29 07:58:22 -0800286GRPC_API grpc_call_credentials *grpc_metadata_credentials_create_from_plugin(
Julien Boeuf8b5bb272015-08-31 13:25:21 -0700287 grpc_metadata_credentials_plugin plugin, void *reserved);
288
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800289/* --- Secure channel creation. --- */
290
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800291/* Creates a secure channel using the passed-in credentials. */
Craig Tiller9b426372016-01-29 07:58:22 -0800292GRPC_API grpc_channel *grpc_secure_channel_create(grpc_channel_credentials *creds,
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800293 const char *target,
Julien Boeuf8b78c282015-08-14 13:39:19 -0700294 const grpc_channel_args *args,
295 void *reserved);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800296
297/* --- grpc_server_credentials object. ---
298
299 A server credentials object represents a way to authenticate a server. */
300
301typedef struct grpc_server_credentials grpc_server_credentials;
302
303/* Releases a server_credentials object.
304 The creator of the server_credentials object is responsible for its release.
305 */
Craig Tiller9b426372016-01-29 07:58:22 -0800306GRPC_API void grpc_server_credentials_release(grpc_server_credentials *creds);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800307
308/* Creates an SSL server_credentials object.
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800309 - pem_roots_cert is the NULL-terminated string containing the PEM encoding of
310 the client root certificates. This parameter may be NULL if the server does
311 not want the client to be authenticated with SSL.
312 - pem_key_cert_pairs is an array private key / certificate chains of the
313 server. This parameter cannot be NULL.
314 - num_key_cert_pairs indicates the number of items in the private_key_files
Julien Boeuf5029b302015-07-21 23:02:16 -0700315 and cert_chain_files parameters. It should be at least 1.
316 - force_client_auth, if set to non-zero will force the client to authenticate
317 with an SSL cert. Note that this option is ignored if pem_root_certs is
318 NULL. */
Craig Tiller9b426372016-01-29 07:58:22 -0800319GRPC_API grpc_server_credentials *grpc_ssl_server_credentials_create(
Julien Boeuf8fbcc432015-01-15 16:44:13 -0800320 const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs,
Julien Boeuf8b78c282015-08-14 13:39:19 -0700321 size_t num_key_cert_pairs, int force_client_auth, void *reserved);
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800322
Jan Tattermuschb0829eb2015-03-03 09:30:55 -0800323/* --- Server-side secure ports. --- */
Nicolas Nobleb7ebd3b2014-11-26 16:33:03 -0800324
Craig Tillerd251ab92015-02-17 17:22:14 -0800325/* Add a HTTP2 over an encrypted link over tcp listener.
Craig Tillerd251ab92015-02-17 17:22:14 -0800326 Returns bound port number on success, 0 on failure.
327 REQUIRES: server not started */
Craig Tiller9b426372016-01-29 07:58:22 -0800328GRPC_API int grpc_server_add_secure_http2_port(grpc_server *server, const char *addr,
Craig Tiller759026c2015-02-22 23:09:45 -0800329 grpc_server_credentials *creds);
Craig Tillerd251ab92015-02-17 17:22:14 -0800330
Julien Boeuf9f218dd2015-04-23 10:24:02 -0700331/* --- Call specific credentials. --- */
332
333/* Sets a credentials to a call. Can only be called on the client side before
334 grpc_call_start_batch. */
Craig Tiller9b426372016-01-29 07:58:22 -0800335GRPC_API grpc_call_error grpc_call_set_credentials(grpc_call *call,
Julien Boeufacd835f2015-10-09 15:20:57 -0700336 grpc_call_credentials *creds);
Julien Boeuf9f218dd2015-04-23 10:24:02 -0700337
Julien Boeufea456fc2015-07-07 15:23:30 -0700338/* --- Auth Metadata Processing --- */
339
Julien Boeufea456fc2015-07-07 15:23:30 -0700340/* Callback function that is called when the metadata processing is done.
Julien Boeufee3dbb02015-08-19 22:17:03 -0700341 - Consumed metadata will be removed from the set of metadata available on the
342 call. consumed_md may be NULL if no metadata has been consumed.
343 - Response metadata will be set on the response. response_md may be NULL.
344 - status is GRPC_STATUS_OK for success or a specific status for an error.
345 Common error status for auth metadata processing is either
346 GRPC_STATUS_UNAUTHENTICATED in case of an authentication failure or
347 GRPC_STATUS PERMISSION_DENIED in case of an authorization failure.
348 - error_details gives details about the error. May be NULL. */
Julien Boeufea456fc2015-07-07 15:23:30 -0700349typedef void (*grpc_process_auth_metadata_done_cb)(
350 void *user_data, const grpc_metadata *consumed_md, size_t num_consumed_md,
Julien Boeufee3dbb02015-08-19 22:17:03 -0700351 const grpc_metadata *response_md, size_t num_response_md,
352 grpc_status_code status, const char *error_details);
Julien Boeufea456fc2015-07-07 15:23:30 -0700353
Julien Boeuf77a7b872015-08-05 20:11:02 -0700354/* Pluggable server-side metadata processor object. */
Julien Boeufa87d6c22015-07-17 15:51:46 -0700355typedef struct {
Julien Boeuf77a7b872015-08-05 20:11:02 -0700356 /* The context object is read/write: it contains the properties of the
357 channel peer and it is the job of the process function to augment it with
Julien Boeufbf25bb02015-08-14 12:36:11 -0700358 properties derived from the passed-in metadata.
359 The lifetime of these objects is guaranteed until cb is invoked. */
Julien Boeuf77a7b872015-08-05 20:11:02 -0700360 void (*process)(void *state, grpc_auth_context *context,
Julien Boeufbf25bb02015-08-14 12:36:11 -0700361 const grpc_metadata *md, size_t num_md,
Julien Boeuf77a7b872015-08-05 20:11:02 -0700362 grpc_process_auth_metadata_done_cb cb, void *user_data);
Julien Boeuf0c711ad2015-08-28 14:10:58 -0700363 void (*destroy)(void *state);
Julien Boeufa87d6c22015-07-17 15:51:46 -0700364 void *state;
365} grpc_auth_metadata_processor;
Julien Boeufea456fc2015-07-07 15:23:30 -0700366
Craig Tiller9b426372016-01-29 07:58:22 -0800367GRPC_API void grpc_server_credentials_set_auth_metadata_processor(
Julien Boeuf6bdc9b42015-07-19 21:56:02 -0700368 grpc_server_credentials *creds, grpc_auth_metadata_processor processor);
Julien Boeufea456fc2015-07-07 15:23:30 -0700369
nnoble0c475f02014-12-05 15:37:39 -0800370#ifdef __cplusplus
371}
372#endif
373
Craig Tiller9a576332015-06-17 10:21:49 -0700374#endif /* GRPC_GRPC_SECURITY_H */