Nicolas Noble | b7ebd3b | 2014-11-26 16:33:03 -0800 | [diff] [blame] | 1 | /* |
| 2 | * |
Craig Tiller | 0605995 | 2015-02-18 08:34:56 -0800 | [diff] [blame] | 3 | * Copyright 2015, Google Inc. |
Nicolas Noble | b7ebd3b | 2014-11-26 16:33:03 -0800 | [diff] [blame] | 4 | * All rights reserved. |
| 5 | * |
| 6 | * Redistribution and use in source and binary forms, with or without |
| 7 | * modification, are permitted provided that the following conditions are |
| 8 | * met: |
| 9 | * |
| 10 | * * Redistributions of source code must retain the above copyright |
| 11 | * notice, this list of conditions and the following disclaimer. |
| 12 | * * Redistributions in binary form must reproduce the above |
| 13 | * copyright notice, this list of conditions and the following disclaimer |
| 14 | * in the documentation and/or other materials provided with the |
| 15 | * distribution. |
| 16 | * * Neither the name of Google Inc. nor the names of its |
| 17 | * contributors may be used to endorse or promote products derived from |
| 18 | * this software without specific prior written permission. |
| 19 | * |
| 20 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
| 21 | * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
| 22 | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
| 23 | * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
| 24 | * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| 25 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
| 26 | * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 27 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 28 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 29 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| 30 | * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 31 | * |
| 32 | */ |
| 33 | |
| 34 | #ifndef GRPC_SECURITY_H_ |
| 35 | #define GRPC_SECURITY_H_ |
| 36 | |
| 37 | #include "grpc.h" |
| 38 | #include "status.h" |
| 39 | |
nnoble | 0c475f0 | 2014-12-05 15:37:39 -0800 | [diff] [blame] | 40 | #ifdef __cplusplus |
| 41 | extern "C" { |
| 42 | #endif |
| 43 | |
Nicolas Noble | b7ebd3b | 2014-11-26 16:33:03 -0800 | [diff] [blame] | 44 | /* --- grpc_credentials object. --- |
| 45 | |
| 46 | A credentials object represents a way to authenticate a client. */ |
| 47 | |
| 48 | typedef struct grpc_credentials grpc_credentials; |
| 49 | |
| 50 | /* Releases a credentials object. |
| 51 | The creator of the credentials object is responsible for its release. */ |
| 52 | void grpc_credentials_release(grpc_credentials *creds); |
| 53 | |
Julien Boeuf | c66f2a8 | 2015-02-23 13:00:36 -0800 | [diff] [blame] | 54 | /* Creates default credentials to connect to a google gRPC service. |
| 55 | WARNING: Do NOT use this credentials to connect to a non-google service as |
| 56 | this could result in an oauth2 token leak. */ |
| 57 | grpc_credentials *grpc_google_default_credentials_create(void); |
Nicolas Noble | b7ebd3b | 2014-11-26 16:33:03 -0800 | [diff] [blame] | 58 | |
Julien Boeuf | 026a417 | 2015-02-02 18:36:37 -0800 | [diff] [blame] | 59 | /* Environment variable that points to the default SSL roots file. This file |
| 60 | must be a PEM encoded file with all the roots such as the one that can be |
| 61 | downloaded from https://pki.google.com/roots.pem. */ |
| 62 | #define GRPC_DEFAULT_SSL_ROOTS_FILE_PATH_ENV_VAR \ |
| 63 | "GRPC_DEFAULT_SSL_ROOTS_FILE_PATH" |
| 64 | |
Julien Boeuf | 8fbcc43 | 2015-01-15 16:44:13 -0800 | [diff] [blame] | 65 | /* Object that holds a private key / certificate chain pair in PEM format. */ |
| 66 | typedef struct { |
| 67 | /* private_key is the NULL-terminated string containing the PEM encoding of |
| 68 | the client's private key. */ |
| 69 | const char *private_key; |
| 70 | |
Julien Boeuf | 68ad53e | 2015-01-20 22:37:03 -0800 | [diff] [blame] | 71 | /* cert_chain is the NULL-terminated string containing the PEM encoding of |
| 72 | the client's certificate chain. */ |
Julien Boeuf | 8fbcc43 | 2015-01-15 16:44:13 -0800 | [diff] [blame] | 73 | const char *cert_chain; |
| 74 | } grpc_ssl_pem_key_cert_pair; |
| 75 | |
Nicolas Noble | b7ebd3b | 2014-11-26 16:33:03 -0800 | [diff] [blame] | 76 | /* Creates an SSL credentials object. |
Julien Boeuf | 8fbcc43 | 2015-01-15 16:44:13 -0800 | [diff] [blame] | 77 | - pem_roots_cert is the NULL-terminated string containing the PEM encoding |
Julien Boeuf | 3e00179 | 2015-02-20 15:02:36 -0800 | [diff] [blame] | 78 | of the server root certificates. If this parameter is NULL, the |
| 79 | implementation will first try to dereference the file pointed by the |
| 80 | GRPC_DEFAULT_SSL_ROOTS_FILE_PATH environment variable, and if that fails, |
| 81 | get the roots from a well-known place on disk (in the grpc install |
| 82 | directory). |
Julien Boeuf | 8fbcc43 | 2015-01-15 16:44:13 -0800 | [diff] [blame] | 83 | - pem_key_cert_pair is a pointer on the object containing client's private |
| 84 | key and certificate chain. This parameter can be NULL if the client does |
| 85 | not have such a key/cert pair. */ |
Nicolas Noble | b7ebd3b | 2014-11-26 16:33:03 -0800 | [diff] [blame] | 86 | grpc_credentials *grpc_ssl_credentials_create( |
Julien Boeuf | 8fbcc43 | 2015-01-15 16:44:13 -0800 | [diff] [blame] | 87 | const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pair); |
Nicolas Noble | b7ebd3b | 2014-11-26 16:33:03 -0800 | [diff] [blame] | 88 | |
| 89 | /* Creates a composite credentials object. */ |
| 90 | grpc_credentials *grpc_composite_credentials_create(grpc_credentials *creds1, |
| 91 | grpc_credentials *creds2); |
| 92 | |
Julien Boeuf | c66f2a8 | 2015-02-23 13:00:36 -0800 | [diff] [blame] | 93 | /* Creates a compute engine credentials object. |
| 94 | WARNING: Do NOT use this credentials to connect to a non-google service as |
| 95 | this could result in an oauth2 token leak. */ |
Nicolas Noble | b7ebd3b | 2014-11-26 16:33:03 -0800 | [diff] [blame] | 96 | grpc_credentials *grpc_compute_engine_credentials_create(void); |
| 97 | |
jboeuf | ab4f914 | 2014-12-16 16:32:39 -0800 | [diff] [blame] | 98 | extern const gpr_timespec grpc_max_auth_token_lifetime; |
jboeuf | befd265 | 2014-12-12 15:39:47 -0800 | [diff] [blame] | 99 | |
| 100 | /* Creates a service account credentials object. May return NULL if the input is |
jboeuf | ab4f914 | 2014-12-16 16:32:39 -0800 | [diff] [blame] | 101 | invalid. |
Julien Boeuf | c66f2a8 | 2015-02-23 13:00:36 -0800 | [diff] [blame] | 102 | WARNING: Do NOT use this credentials to connect to a non-google service as |
| 103 | this could result in an oauth2 token leak. |
jboeuf | ab4f914 | 2014-12-16 16:32:39 -0800 | [diff] [blame] | 104 | - json_key is the JSON key string containing the client's private key. |
| 105 | - scope is a space-delimited list of the requested permissions. |
| 106 | - token_lifetime is the lifetime of each token acquired through this service |
| 107 | account credentials. It should not exceed grpc_max_auth_token_lifetime |
| 108 | or will be cropped to this value. */ |
| 109 | grpc_credentials *grpc_service_account_credentials_create( |
| 110 | const char *json_key, const char *scope, gpr_timespec token_lifetime); |
jboeuf | befd265 | 2014-12-12 15:39:47 -0800 | [diff] [blame] | 111 | |
Julien Boeuf | f47a5cb | 2015-02-18 12:24:08 -0800 | [diff] [blame] | 112 | /* Creates a JWT credentials object. May return NULL if the input is invalid. |
| 113 | - json_key is the JSON key string containing the client's private key. |
| 114 | - token_lifetime is the lifetime of each Json Web Token (JWT) created with |
| 115 | this credentials. It should not exceed grpc_max_auth_token_lifetime or |
| 116 | will be cropped to this value. */ |
| 117 | grpc_credentials *grpc_jwt_credentials_create(const char *json_key, |
| 118 | gpr_timespec token_lifetime); |
| 119 | |
Nicolas Noble | b7ebd3b | 2014-11-26 16:33:03 -0800 | [diff] [blame] | 120 | /* Creates a fake transport security credentials object for testing. */ |
| 121 | grpc_credentials *grpc_fake_transport_security_credentials_create(void); |
| 122 | |
nnoble | 0c475f0 | 2014-12-05 15:37:39 -0800 | [diff] [blame] | 123 | /* Creates an IAM credentials object. */ |
| 124 | grpc_credentials *grpc_iam_credentials_create(const char *authorization_token, |
| 125 | const char *authority_selector); |
| 126 | |
Nicolas Noble | b7ebd3b | 2014-11-26 16:33:03 -0800 | [diff] [blame] | 127 | /* --- Secure channel creation. --- */ |
| 128 | |
| 129 | /* The caller of the secure_channel_create functions may override the target |
| 130 | name used for SSL host name checking using this channel argument which is of |
| 131 | type GRPC_ARG_STRING. This *should* be used for testing only. |
| 132 | If this argument is not specified, the name used for SSL host name checking |
| 133 | will be the target parameter (assuming that the secure channel is an SSL |
| 134 | channel). If this parameter is specified and the underlying is not an SSL |
| 135 | channel, it will just be ignored. */ |
| 136 | #define GRPC_SSL_TARGET_NAME_OVERRIDE_ARG "grpc.ssl_target_name_override" |
| 137 | |
Nicolas Noble | b7ebd3b | 2014-11-26 16:33:03 -0800 | [diff] [blame] | 138 | /* Creates a secure channel using the passed-in credentials. */ |
| 139 | grpc_channel *grpc_secure_channel_create(grpc_credentials *creds, |
| 140 | const char *target, |
| 141 | const grpc_channel_args *args); |
| 142 | |
| 143 | /* --- grpc_server_credentials object. --- |
| 144 | |
| 145 | A server credentials object represents a way to authenticate a server. */ |
| 146 | |
| 147 | typedef struct grpc_server_credentials grpc_server_credentials; |
| 148 | |
| 149 | /* Releases a server_credentials object. |
| 150 | The creator of the server_credentials object is responsible for its release. |
| 151 | */ |
| 152 | void grpc_server_credentials_release(grpc_server_credentials *creds); |
| 153 | |
| 154 | /* Creates an SSL server_credentials object. |
Julien Boeuf | 8fbcc43 | 2015-01-15 16:44:13 -0800 | [diff] [blame] | 155 | - pem_roots_cert is the NULL-terminated string containing the PEM encoding of |
| 156 | the client root certificates. This parameter may be NULL if the server does |
| 157 | not want the client to be authenticated with SSL. |
| 158 | - pem_key_cert_pairs is an array private key / certificate chains of the |
| 159 | server. This parameter cannot be NULL. |
| 160 | - num_key_cert_pairs indicates the number of items in the private_key_files |
| 161 | and cert_chain_files parameters. It should be at least 1. */ |
Nicolas Noble | b7ebd3b | 2014-11-26 16:33:03 -0800 | [diff] [blame] | 162 | grpc_server_credentials *grpc_ssl_server_credentials_create( |
Julien Boeuf | 8fbcc43 | 2015-01-15 16:44:13 -0800 | [diff] [blame] | 163 | const char *pem_root_certs, grpc_ssl_pem_key_cert_pair *pem_key_cert_pairs, |
| 164 | size_t num_key_cert_pairs); |
Nicolas Noble | b7ebd3b | 2014-11-26 16:33:03 -0800 | [diff] [blame] | 165 | |
| 166 | /* Creates a fake server transport security credentials object for testing. */ |
| 167 | grpc_server_credentials *grpc_fake_transport_security_server_credentials_create( |
| 168 | void); |
| 169 | |
Nicolas Noble | b7ebd3b | 2014-11-26 16:33:03 -0800 | [diff] [blame] | 170 | /* --- Secure server creation. --- */ |
| 171 | |
Craig Tiller | d251ab9 | 2015-02-17 17:22:14 -0800 | [diff] [blame] | 172 | /* Add a HTTP2 over an encrypted link over tcp listener. |
| 173 | Server must have been created with grpc_secure_server_create. |
| 174 | Returns bound port number on success, 0 on failure. |
| 175 | REQUIRES: server not started */ |
Craig Tiller | 759026c | 2015-02-22 23:09:45 -0800 | [diff] [blame] | 176 | int grpc_server_add_secure_http2_port(grpc_server *server, const char *addr, |
| 177 | grpc_server_credentials *creds); |
Craig Tiller | d251ab9 | 2015-02-17 17:22:14 -0800 | [diff] [blame] | 178 | |
nnoble | 0c475f0 | 2014-12-05 15:37:39 -0800 | [diff] [blame] | 179 | #ifdef __cplusplus |
| 180 | } |
| 181 | #endif |
| 182 | |
Craig Tiller | 190d360 | 2015-02-18 09:23:38 -0800 | [diff] [blame] | 183 | #endif /* GRPC_SECURITY_H_ */ |