| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356 | /* * * Copyright 2015 gRPC authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * *     http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * */#ifndef GRPCPP_SECURITY_CREDENTIALS_IMPL_H#define GRPCPP_SECURITY_CREDENTIALS_IMPL_H#include <map>#include <memory>#include <vector>#include <grpc/grpc_security_constants.h>#include <grpcpp/channel_impl.h>#include <grpcpp/impl/codegen/client_interceptor.h>#include <grpcpp/impl/codegen/grpc_library.h>#include <grpcpp/security/auth_context.h>#include <grpcpp/security/tls_credentials_options.h>#include <grpcpp/support/channel_arguments_impl.h>#include <grpcpp/support/status.h>#include <grpcpp/support/string_ref.h>struct grpc_call;namespace grpc_impl {class ChannelCredentials;class CallCredentials;class SecureCallCredentials;class SecureChannelCredentials;std::shared_ptr<Channel> CreateCustomChannelImpl(    const std::string& target, const std::shared_ptr<ChannelCredentials>& creds,    const ChannelArguments& args);namespace experimental {std::shared_ptr<Channel> CreateCustomChannelWithInterceptors(    const std::string& target, const std::shared_ptr<ChannelCredentials>& creds,    const ChannelArguments& args,    std::vector<        std::unique_ptr<grpc::experimental::ClientInterceptorFactoryInterface>>        interceptor_creators);}/// A channel credentials object encapsulates all the state needed by a client/// to authenticate with a server for a given channel./// It can make various assertions, e.g., about the client’s identity, role/// for all the calls on that channel.////// \see https://grpc.io/docs/guides/authclass ChannelCredentials : private grpc::GrpcLibraryCodegen { public:  ChannelCredentials();  ~ChannelCredentials(); protected:  friend std::shared_ptr<ChannelCredentials> CompositeChannelCredentials(      const std::shared_ptr<ChannelCredentials>& channel_creds,      const std::shared_ptr<CallCredentials>& call_creds);  virtual SecureChannelCredentials* AsSecureCredentials() = 0; private:  friend std::shared_ptr<Channel> CreateCustomChannelImpl(      const std::string& target,      const std::shared_ptr<ChannelCredentials>& creds,      const ChannelArguments& args);  friend std::shared_ptr<Channel>  grpc_impl::experimental::CreateCustomChannelWithInterceptors(      const std::string& target,      const std::shared_ptr<ChannelCredentials>& creds,      const ChannelArguments& args,      std::vector<std::unique_ptr<          grpc::experimental::ClientInterceptorFactoryInterface>>          interceptor_creators);  virtual std::shared_ptr<Channel> CreateChannelImpl(      const std::string& target, const ChannelArguments& args) = 0;  // This function should have been a pure virtual function, but it is  // implemented as a virtual function so that it does not break API.  virtual std::shared_ptr<Channel> CreateChannelWithInterceptors(      const std::string& /*target*/, const ChannelArguments& /*args*/,      std::vector<std::unique_ptr<          grpc::experimental::ClientInterceptorFactoryInterface>>      /*interceptor_creators*/) {    return nullptr;  }};/// A call credentials object encapsulates the state needed by a client to/// authenticate with a server for a given call on a channel.////// \see https://grpc.io/docs/guides/authclass CallCredentials : private grpc::GrpcLibraryCodegen { public:  CallCredentials();  ~CallCredentials();  /// Apply this instance's credentials to \a call.  virtual bool ApplyToCall(grpc_call* call) = 0;  virtual std::string DebugString() {    return "CallCredentials did not provide a debug string";  } protected:  friend std::shared_ptr<ChannelCredentials> CompositeChannelCredentials(      const std::shared_ptr<ChannelCredentials>& channel_creds,      const std::shared_ptr<CallCredentials>& call_creds);  friend std::shared_ptr<CallCredentials> CompositeCallCredentials(      const std::shared_ptr<CallCredentials>& creds1,      const std::shared_ptr<CallCredentials>& creds2);  virtual SecureCallCredentials* AsSecureCredentials() = 0;};/// Options used to build SslCredentials.struct SslCredentialsOptions {  /// The buffer containing the PEM encoding of the server root certificates. If  /// this parameter is empty, the default roots will be used.  The default  /// roots can be overridden using the \a GRPC_DEFAULT_SSL_ROOTS_FILE_PATH  /// environment variable pointing to a file on the file system containing the  /// roots.  std::string pem_root_certs;  /// The buffer containing the PEM encoding of the client's private key. This  /// parameter can be empty if the client does not have a private key.  std::string pem_private_key;  /// The buffer containing the PEM encoding of the client's certificate chain.  /// This parameter can be empty if the client does not have a certificate  /// chain.  std::string pem_cert_chain;};// Factories for building different types of Credentials The functions may// return empty shared_ptr when credentials cannot be created. If a// Credentials pointer is returned, it can still be invalid when used to create// a channel. A lame channel will be created then and all rpcs will fail on it./// Builds credentials with reasonable defaults.////// \warning Only use these credentials when connecting to a Google endpoint./// Using these credentials to connect to any other service may result in this/// service being able to impersonate your client for requests to Google/// services.std::shared_ptr<ChannelCredentials> GoogleDefaultCredentials();/// Builds SSL Credentials given SSL specific optionsstd::shared_ptr<ChannelCredentials> SslCredentials(    const SslCredentialsOptions& options);/// Builds credentials for use when running in GCE////// \warning Only use these credentials when connecting to a Google endpoint./// Using these credentials to connect to any other service may result in this/// service being able to impersonate your client for requests to Google/// services.std::shared_ptr<CallCredentials> GoogleComputeEngineCredentials();constexpr long kMaxAuthTokenLifetimeSecs = 3600;/// Builds Service Account JWT Access credentials./// json_key is the JSON key string containing the client's private key./// token_lifetime_seconds is the lifetime in seconds of each Json Web Token/// (JWT) created with this credentials. It should not exceed/// \a kMaxAuthTokenLifetimeSecs or will be cropped to this value.std::shared_ptr<CallCredentials> ServiceAccountJWTAccessCredentials(    const std::string& json_key,    long token_lifetime_seconds = grpc_impl::kMaxAuthTokenLifetimeSecs);/// Builds refresh token credentials./// json_refresh_token is the JSON string containing the refresh token along/// with a client_id and client_secret.////// \warning Only use these credentials when connecting to a Google endpoint./// Using these credentials to connect to any other service may result in this/// service being able to impersonate your client for requests to Google/// services.std::shared_ptr<CallCredentials> GoogleRefreshTokenCredentials(    const std::string& json_refresh_token);/// Builds access token credentials./// access_token is an oauth2 access token that was fetched using an out of band/// mechanism.////// \warning Only use these credentials when connecting to a Google endpoint./// Using these credentials to connect to any other service may result in this/// service being able to impersonate your client for requests to Google/// services.std::shared_ptr<CallCredentials> AccessTokenCredentials(    const std::string& access_token);/// Builds IAM credentials.////// \warning Only use these credentials when connecting to a Google endpoint./// Using these credentials to connect to any other service may result in this/// service being able to impersonate your client for requests to Google/// services.std::shared_ptr<CallCredentials> GoogleIAMCredentials(    const std::string& authorization_token,    const std::string& authority_selector);/// Combines a channel credentials and a call credentials into a composite/// channel credentials.std::shared_ptr<ChannelCredentials> CompositeChannelCredentials(    const std::shared_ptr<ChannelCredentials>& channel_creds,    const std::shared_ptr<CallCredentials>& call_creds);/// Combines two call credentials objects into a composite call credentials.std::shared_ptr<CallCredentials> CompositeCallCredentials(    const std::shared_ptr<CallCredentials>& creds1,    const std::shared_ptr<CallCredentials>& creds2);/// Credentials for an unencrypted, unauthenticated channelstd::shared_ptr<ChannelCredentials> InsecureChannelCredentials();/// User defined metadata credentials.class MetadataCredentialsPlugin { public:  virtual ~MetadataCredentialsPlugin() {}  /// If this method returns true, the Process function will be scheduled in  /// a different thread from the one processing the call.  virtual bool IsBlocking() const { return true; }  /// Type of credentials this plugin is implementing.  virtual const char* GetType() const { return ""; }  /// Gets the auth metatada produced by this plugin.  /// The fully qualified method name is:  /// service_url + "/" + method_name.  /// The channel_auth_context contains (among other things), the identity of  /// the server.  virtual grpc::Status GetMetadata(      grpc::string_ref service_url, grpc::string_ref method_name,      const grpc::AuthContext& channel_auth_context,      std::multimap<std::string, std::string>* metadata) = 0;  virtual std::string DebugString() {    return "MetadataCredentialsPlugin did not provide a debug string";  }};std::shared_ptr<CallCredentials> MetadataCredentialsFromPlugin(    std::unique_ptr<MetadataCredentialsPlugin> plugin);namespace experimental {/// Options for creating STS Oauth Token Exchange credentials following the IETF/// draft https://tools.ietf.org/html/draft-ietf-oauth-token-exchange-16./// Optional fields may be set to empty string. It is the responsibility of the/// caller to ensure that the subject and actor tokens are refreshed on disk at/// the specified paths.struct StsCredentialsOptions {  std::string token_exchange_service_uri;  // Required.  std::string resource;                    // Optional.  std::string audience;                    // Optional.  std::string scope;                       // Optional.  std::string requested_token_type;        // Optional.  std::string subject_token_path;          // Required.  std::string subject_token_type;          // Required.  std::string actor_token_path;            // Optional.  std::string actor_token_type;            // Optional.};/// Creates STS Options from a JSON string. The JSON schema is as follows:/// {///   "title": "STS Credentials Config",///   "type": "object",///   "required": ["token_exchange_service_uri", "subject_token_path",///                "subject_token_type"],///    "properties": {///      "token_exchange_service_uri": {///        "type": "string"///     },///     "resource": {///       "type": "string"///     },///     "audience": {///       "type": "string"///     },///     "scope": {///       "type": "string"///     },///     "requested_token_type": {///       "type": "string"///     },///     "subject_token_path": {///       "type": "string"///     },///     "subject_token_type": {///     "type": "string"///     },///     "actor_token_path" : {///       "type": "string"///     },///     "actor_token_type": {///       "type": "string"///     }///   }/// }grpc::Status StsCredentialsOptionsFromJson(const std::string& json_string,                                           StsCredentialsOptions* options);/// Creates STS credentials options from the $STS_CREDENTIALS environment/// variable. This environment variable points to the path of a JSON file/// comforming to the schema described above.grpc::Status StsCredentialsOptionsFromEnv(StsCredentialsOptions* options);std::shared_ptr<CallCredentials> StsCredentials(    const StsCredentialsOptions& options);std::shared_ptr<CallCredentials> MetadataCredentialsFromPlugin(    std::unique_ptr<MetadataCredentialsPlugin> plugin,    grpc_security_level min_security_level);/// Options used to build AltsCredentials.struct AltsCredentialsOptions {  /// service accounts of target endpoint that will be acceptable  /// by the client. If service accounts are provided and none of them matches  /// that of the server, authentication will fail.  std::vector<std::string> target_service_accounts;};/// Builds ALTS Credentials given ALTS specific optionsstd::shared_ptr<ChannelCredentials> AltsCredentials(    const AltsCredentialsOptions& options);/// Builds Local Credentials.std::shared_ptr<ChannelCredentials> LocalCredentials(    grpc_local_connect_type type);/// Builds TLS Credentials given TLS options.std::shared_ptr<ChannelCredentials> TlsCredentials(    const TlsCredentialsOptions& options);}  // namespace experimental}  // namespace grpc_impl#endif  // GRPCPP_SECURITY_CREDENTIALS_IMPL_H
 |