xref: /aosp_15_r20/external/grpc-grpc/src/cpp/client/secure_credentials.cc (revision cc02d7e222339f7a4f6ba5f422e6413f4bd931f2)
1 //
2 //
3 // Copyright 2015 gRPC authors.
4 //
5 // Licensed under the Apache License, Version 2.0 (the "License");
6 // you may not use this file except in compliance with the License.
7 // You may obtain a copy of the License at
8 //
9 //     http://www.apache.org/licenses/LICENSE-2.0
10 //
11 // Unless required by applicable law or agreed to in writing, software
12 // distributed under the License is distributed on an "AS IS" BASIS,
13 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 // See the License for the specific language governing permissions and
15 // limitations under the License.
16 //
17 //
18 
19 #include "src/cpp/client/secure_credentials.h"
20 
21 #include <string.h>
22 
23 #include <map>
24 #include <memory>
25 #include <utility>
26 
27 #include "absl/status/status.h"
28 #include "absl/status/statusor.h"
29 #include "absl/strings/str_join.h"
30 #include "absl/types/optional.h"
31 
32 #include <grpc/event_engine/event_engine.h>
33 #include <grpc/grpc.h>
34 #include <grpc/grpc_security_constants.h>
35 #include <grpc/slice.h>
36 #include <grpc/support/json.h>
37 #include <grpc/support/log.h>
38 #include <grpc/support/string_util.h>
39 #include <grpc/support/time.h>
40 #include <grpcpp/channel.h>
41 #include <grpcpp/impl/grpc_library.h>
42 #include <grpcpp/security/tls_credentials_options.h>
43 #include <grpcpp/support/channel_arguments.h>
44 #include <grpcpp/support/config.h>
45 #include <grpcpp/support/slice.h>
46 #include <grpcpp/support/status.h>
47 
48 #include "src/core/lib/event_engine/default_event_engine.h"
49 #include "src/core/lib/gprpp/env.h"
50 #include "src/core/lib/gprpp/load_file.h"
51 #include "src/core/lib/json/json.h"
52 #include "src/core/lib/json/json_reader.h"
53 #include "src/core/lib/security/util/json_util.h"
54 #include "src/cpp/common/secure_auth_context.h"
55 #include "src/cpp/server/thread_pool_interface.h"
56 
57 namespace grpc {
58 
59 namespace {
60 class WrappedCallCredentials : public CallCredentials {
61  public:
WrappedCallCredentials(grpc_call_credentials * creds)62   explicit WrappedCallCredentials(grpc_call_credentials* creds)
63       : CallCredentials(creds) {}
64 };
65 
WrapCallCredentials(grpc_call_credentials * creds)66 std::shared_ptr<WrappedCallCredentials> WrapCallCredentials(
67     grpc_call_credentials* creds) {
68   return creds == nullptr ? nullptr
69                           : std::make_shared<WrappedCallCredentials>(creds);
70 }
71 
72 class WrappedChannelCredentials final : public ChannelCredentials {
73  public:
WrappedChannelCredentials(grpc_channel_credentials * c_creds)74   explicit WrappedChannelCredentials(grpc_channel_credentials* c_creds)
75       : ChannelCredentials(c_creds) {}
76 };
77 
WrapChannelCredentials(grpc_channel_credentials * creds)78 std::shared_ptr<WrappedChannelCredentials> WrapChannelCredentials(
79     grpc_channel_credentials* creds) {
80   return creds == nullptr ? nullptr
81                           : std::make_shared<WrappedChannelCredentials>(creds);
82 }
83 
84 }  // namespace
85 
GoogleDefaultCredentials()86 std::shared_ptr<ChannelCredentials> GoogleDefaultCredentials() {
87   grpc::internal::GrpcLibrary init;  // To call grpc_init().
88   return WrapChannelCredentials(
89       grpc_google_default_credentials_create(nullptr));
90 }
91 
ExternalAccountCredentials(const grpc::string & json_string,const std::vector<grpc::string> & scopes)92 std::shared_ptr<CallCredentials> ExternalAccountCredentials(
93     const grpc::string& json_string, const std::vector<grpc::string>& scopes) {
94   grpc::internal::GrpcLibrary init;  // To call grpc_init().
95   return WrapCallCredentials(grpc_external_account_credentials_create(
96       json_string.c_str(), absl::StrJoin(scopes, ",").c_str()));
97 }
98 
99 // Builds SSL Credentials given SSL specific options
SslCredentials(const SslCredentialsOptions & options)100 std::shared_ptr<ChannelCredentials> SslCredentials(
101     const SslCredentialsOptions& options) {
102   grpc::internal::GrpcLibrary init;  // To call grpc_init().
103   grpc_ssl_pem_key_cert_pair pem_key_cert_pair = {
104       options.pem_private_key.c_str(), options.pem_cert_chain.c_str()};
105   return WrapChannelCredentials(grpc_ssl_credentials_create(
106       options.pem_root_certs.empty() ? nullptr : options.pem_root_certs.c_str(),
107       options.pem_private_key.empty() ? nullptr : &pem_key_cert_pair, nullptr,
108       nullptr));
109 }
110 
111 namespace experimental {
112 
113 namespace {
114 
ClearStsCredentialsOptions(StsCredentialsOptions * options)115 void ClearStsCredentialsOptions(StsCredentialsOptions* options) {
116   if (options == nullptr) return;
117   options->token_exchange_service_uri.clear();
118   options->resource.clear();
119   options->audience.clear();
120   options->scope.clear();
121   options->requested_token_type.clear();
122   options->subject_token_path.clear();
123   options->subject_token_type.clear();
124   options->actor_token_path.clear();
125   options->actor_token_type.clear();
126 }
127 
128 }  // namespace
129 
130 // Builds STS credentials options from JSON.
StsCredentialsOptionsFromJson(const std::string & json_string,StsCredentialsOptions * options)131 grpc::Status StsCredentialsOptionsFromJson(const std::string& json_string,
132                                            StsCredentialsOptions* options) {
133   if (options == nullptr) {
134     return grpc::Status(grpc::StatusCode::INVALID_ARGUMENT,
135                         "options cannot be nullptr.");
136   }
137   ClearStsCredentialsOptions(options);
138   auto json = grpc_core::JsonParse(json_string.c_str());
139   if (!json.ok() || json->type() != grpc_core::Json::Type::kObject) {
140     return grpc::Status(
141         grpc::StatusCode::INVALID_ARGUMENT,
142         absl::StrCat("Invalid json: ", json.status().ToString()));
143   }
144 
145   // Required fields.
146   const char* value = grpc_json_get_string_property(
147       *json, "token_exchange_service_uri", nullptr);
148   if (value == nullptr) {
149     ClearStsCredentialsOptions(options);
150     return grpc::Status(grpc::StatusCode::INVALID_ARGUMENT,
151                         "token_exchange_service_uri must be specified.");
152   }
153   options->token_exchange_service_uri.assign(value);
154   value = grpc_json_get_string_property(*json, "subject_token_path", nullptr);
155   if (value == nullptr) {
156     ClearStsCredentialsOptions(options);
157     return grpc::Status(grpc::StatusCode::INVALID_ARGUMENT,
158                         "subject_token_path must be specified.");
159   }
160   options->subject_token_path.assign(value);
161   value = grpc_json_get_string_property(*json, "subject_token_type", nullptr);
162   if (value == nullptr) {
163     ClearStsCredentialsOptions(options);
164     return grpc::Status(grpc::StatusCode::INVALID_ARGUMENT,
165                         "subject_token_type must be specified.");
166   }
167   options->subject_token_type.assign(value);
168 
169   // Optional fields.
170   value = grpc_json_get_string_property(*json, "resource", nullptr);
171   if (value != nullptr) options->resource.assign(value);
172   value = grpc_json_get_string_property(*json, "audience", nullptr);
173   if (value != nullptr) options->audience.assign(value);
174   value = grpc_json_get_string_property(*json, "scope", nullptr);
175   if (value != nullptr) options->scope.assign(value);
176   value = grpc_json_get_string_property(*json, "requested_token_type", nullptr);
177   if (value != nullptr) options->requested_token_type.assign(value);
178   value = grpc_json_get_string_property(*json, "actor_token_path", nullptr);
179   if (value != nullptr) options->actor_token_path.assign(value);
180   value = grpc_json_get_string_property(*json, "actor_token_type", nullptr);
181   if (value != nullptr) options->actor_token_type.assign(value);
182 
183   return grpc::Status();
184 }
185 
186 // Builds STS credentials Options from the $STS_CREDENTIALS env var.
StsCredentialsOptionsFromEnv(StsCredentialsOptions * options)187 grpc::Status StsCredentialsOptionsFromEnv(StsCredentialsOptions* options) {
188   if (options == nullptr) {
189     return grpc::Status(grpc::StatusCode::INVALID_ARGUMENT,
190                         "options cannot be nullptr.");
191   }
192   ClearStsCredentialsOptions(options);
193   auto sts_creds_path = grpc_core::GetEnv("STS_CREDENTIALS");
194   if (!sts_creds_path.has_value()) {
195     return grpc::Status(grpc::StatusCode::NOT_FOUND,
196                         "STS_CREDENTIALS environment variable not set.");
197   }
198   auto json_slice =
199       grpc_core::LoadFile(*sts_creds_path, /*add_null_terminator=*/true);
200   if (!json_slice.ok()) {
201     return grpc::Status(grpc::StatusCode::NOT_FOUND,
202                         json_slice.status().ToString());
203   }
204   return StsCredentialsOptionsFromJson(json_slice->as_string_view().data(),
205                                        options);
206 }
207 
208 // C++ to Core STS Credentials options.
StsCredentialsCppToCoreOptions(const StsCredentialsOptions & options)209 grpc_sts_credentials_options StsCredentialsCppToCoreOptions(
210     const StsCredentialsOptions& options) {
211   grpc_sts_credentials_options opts;
212   memset(&opts, 0, sizeof(opts));
213   opts.token_exchange_service_uri = options.token_exchange_service_uri.c_str();
214   opts.resource = options.resource.c_str();
215   opts.audience = options.audience.c_str();
216   opts.scope = options.scope.c_str();
217   opts.requested_token_type = options.requested_token_type.c_str();
218   opts.subject_token_path = options.subject_token_path.c_str();
219   opts.subject_token_type = options.subject_token_type.c_str();
220   opts.actor_token_path = options.actor_token_path.c_str();
221   opts.actor_token_type = options.actor_token_type.c_str();
222   return opts;
223 }
224 
225 // Builds STS credentials.
StsCredentials(const StsCredentialsOptions & options)226 std::shared_ptr<CallCredentials> StsCredentials(
227     const StsCredentialsOptions& options) {
228   auto opts = StsCredentialsCppToCoreOptions(options);
229   return WrapCallCredentials(grpc_sts_credentials_create(&opts, nullptr));
230 }
231 
232 // Builds ALTS Credentials given ALTS specific options
AltsCredentials(const AltsCredentialsOptions & options)233 std::shared_ptr<ChannelCredentials> AltsCredentials(
234     const AltsCredentialsOptions& options) {
235   grpc::internal::GrpcLibrary init;  // To call grpc_init().
236   grpc_alts_credentials_options* c_options =
237       grpc_alts_credentials_client_options_create();
238   for (const auto& service_account : options.target_service_accounts) {
239     grpc_alts_credentials_client_options_add_target_service_account(
240         c_options, service_account.c_str());
241   }
242   grpc_channel_credentials* c_creds = grpc_alts_credentials_create(c_options);
243   grpc_alts_credentials_options_destroy(c_options);
244   return WrapChannelCredentials(c_creds);
245 }
246 
247 // Builds Local Credentials
LocalCredentials(grpc_local_connect_type type)248 std::shared_ptr<ChannelCredentials> LocalCredentials(
249     grpc_local_connect_type type) {
250   grpc::internal::GrpcLibrary init;  // To call grpc_init().
251   return WrapChannelCredentials(grpc_local_credentials_create(type));
252 }
253 
254 // Builds TLS Credentials given TLS options.
TlsCredentials(const TlsChannelCredentialsOptions & options)255 std::shared_ptr<ChannelCredentials> TlsCredentials(
256     const TlsChannelCredentialsOptions& options) {
257   return WrapChannelCredentials(
258       grpc_tls_credentials_create(options.c_credentials_options()));
259 }
260 
261 }  // namespace experimental
262 
263 // Builds credentials for use when running in GCE
GoogleComputeEngineCredentials()264 std::shared_ptr<CallCredentials> GoogleComputeEngineCredentials() {
265   grpc::internal::GrpcLibrary init;  // To call grpc_init().
266   return WrapCallCredentials(
267       grpc_google_compute_engine_credentials_create(nullptr));
268 }
269 
270 // Builds JWT credentials.
ServiceAccountJWTAccessCredentials(const std::string & json_key,long token_lifetime_seconds)271 std::shared_ptr<CallCredentials> ServiceAccountJWTAccessCredentials(
272     const std::string& json_key, long token_lifetime_seconds) {
273   grpc::internal::GrpcLibrary init;  // To call grpc_init().
274   if (token_lifetime_seconds <= 0) {
275     gpr_log(GPR_ERROR,
276             "Trying to create JWTCredentials with non-positive lifetime");
277     return WrapCallCredentials(nullptr);
278   }
279   gpr_timespec lifetime =
280       gpr_time_from_seconds(token_lifetime_seconds, GPR_TIMESPAN);
281   return WrapCallCredentials(grpc_service_account_jwt_access_credentials_create(
282       json_key.c_str(), lifetime, nullptr));
283 }
284 
285 // Builds refresh token credentials.
GoogleRefreshTokenCredentials(const std::string & json_refresh_token)286 std::shared_ptr<CallCredentials> GoogleRefreshTokenCredentials(
287     const std::string& json_refresh_token) {
288   grpc::internal::GrpcLibrary init;  // To call grpc_init().
289   return WrapCallCredentials(grpc_google_refresh_token_credentials_create(
290       json_refresh_token.c_str(), nullptr));
291 }
292 
293 // Builds access token credentials.
AccessTokenCredentials(const std::string & access_token)294 std::shared_ptr<CallCredentials> AccessTokenCredentials(
295     const std::string& access_token) {
296   grpc::internal::GrpcLibrary init;  // To call grpc_init().
297   return WrapCallCredentials(
298       grpc_access_token_credentials_create(access_token.c_str(), nullptr));
299 }
300 
301 // Builds IAM credentials.
GoogleIAMCredentials(const std::string & authorization_token,const std::string & authority_selector)302 std::shared_ptr<CallCredentials> GoogleIAMCredentials(
303     const std::string& authorization_token,
304     const std::string& authority_selector) {
305   grpc::internal::GrpcLibrary init;  // To call grpc_init().
306   return WrapCallCredentials(grpc_google_iam_credentials_create(
307       authorization_token.c_str(), authority_selector.c_str(), nullptr));
308 }
309 
310 // Combines one channel credentials and one call credentials into a channel
311 // composite credentials.
CompositeChannelCredentials(const std::shared_ptr<ChannelCredentials> & channel_creds,const std::shared_ptr<CallCredentials> & call_creds)312 std::shared_ptr<ChannelCredentials> CompositeChannelCredentials(
313     const std::shared_ptr<ChannelCredentials>& channel_creds,
314     const std::shared_ptr<CallCredentials>& call_creds) {
315   // Note that we are not saving shared_ptrs to the two credentials passed in
316   // here. This is OK because the underlying C objects (i.e., channel_creds and
317   // call_creds) into grpc_composite_credentials_create will see their refcounts
318   // incremented.
319   return channel_creds->c_creds_ == nullptr
320              ? nullptr
321              : WrapChannelCredentials(grpc_composite_channel_credentials_create(
322                    channel_creds->c_creds_, call_creds->c_creds_, nullptr));
323 }
324 
325 class CompositeCallCredentialsImpl : public CallCredentials {
326  public:
CompositeCallCredentialsImpl(const std::shared_ptr<CallCredentials> & creds1,const std::shared_ptr<CallCredentials> & creds2)327   CompositeCallCredentialsImpl(const std::shared_ptr<CallCredentials>& creds1,
328                                const std::shared_ptr<CallCredentials>& creds2)
329       : CallCredentials(grpc_composite_call_credentials_create(
330             creds1->c_creds_, creds2->c_creds_, nullptr)) {}
331 };
332 
CompositeCallCredentials(const std::shared_ptr<CallCredentials> & creds1,const std::shared_ptr<CallCredentials> & creds2)333 std::shared_ptr<CallCredentials> CompositeCallCredentials(
334     const std::shared_ptr<CallCredentials>& creds1,
335     const std::shared_ptr<CallCredentials>& creds2) {
336   return std::make_shared<CompositeCallCredentialsImpl>(creds1, creds2);
337 }
338 
339 namespace {
340 
UnrefMetadata(const std::vector<grpc_metadata> & md)341 void UnrefMetadata(const std::vector<grpc_metadata>& md) {
342   for (const auto& metadatum : md) {
343     grpc_slice_unref(metadatum.key);
344     grpc_slice_unref(metadatum.value);
345   }
346 }
347 
348 class MetadataCredentialsPluginWrapper final : private internal::GrpcLibrary {
349  public:
Destroy(void * wrapper)350   static void Destroy(void* wrapper) {
351     if (wrapper == nullptr) return;
352     grpc_event_engine::experimental::GetDefaultEventEngine()->Run([wrapper] {
353       grpc_core::ApplicationCallbackExecCtx callback_exec_ctx;
354       grpc_core::ExecCtx exec_ctx;
355       delete static_cast<MetadataCredentialsPluginWrapper*>(wrapper);
356     });
357   }
358 
GetMetadata(void * wrapper,grpc_auth_metadata_context context,grpc_credentials_plugin_metadata_cb cb,void * user_data,grpc_metadata creds_md[GRPC_METADATA_CREDENTIALS_PLUGIN_SYNC_MAX],size_t * num_creds_md,grpc_status_code * status,const char ** error_details)359   static int GetMetadata(
360       void* wrapper, grpc_auth_metadata_context context,
361       grpc_credentials_plugin_metadata_cb cb, void* user_data,
362       grpc_metadata creds_md[GRPC_METADATA_CREDENTIALS_PLUGIN_SYNC_MAX],
363       size_t* num_creds_md, grpc_status_code* status,
364       const char** error_details) {
365     GPR_ASSERT(wrapper);
366     MetadataCredentialsPluginWrapper* w =
367         static_cast<MetadataCredentialsPluginWrapper*>(wrapper);
368     if (!w->plugin_) {
369       *num_creds_md = 0;
370       *status = GRPC_STATUS_OK;
371       *error_details = nullptr;
372       return 1;
373     }
374     if (w->plugin_->IsBlocking()) {
375       // The internals of context may be destroyed if GetMetadata is cancelled.
376       // Make a copy for InvokePlugin.
377       grpc_auth_metadata_context context_copy = grpc_auth_metadata_context();
378       grpc_auth_metadata_context_copy(&context, &context_copy);
379       // Asynchronous return.
380       // TODO(hork): replace with EventEngine::Run
381       w->thread_pool_->Add([w, context_copy, cb, user_data]() mutable {
382         w->MetadataCredentialsPluginWrapper::InvokePlugin(
383             context_copy, cb, user_data, nullptr, nullptr, nullptr, nullptr);
384         grpc_auth_metadata_context_reset(&context_copy);
385       });
386       return 0;
387     } else {
388       // Synchronous return.
389       w->InvokePlugin(context, cb, user_data, creds_md, num_creds_md, status,
390                       error_details);
391       return 1;
392     }
393   }
394 
DebugString(void * wrapper)395   static char* DebugString(void* wrapper) {
396     GPR_ASSERT(wrapper);
397     MetadataCredentialsPluginWrapper* w =
398         static_cast<MetadataCredentialsPluginWrapper*>(wrapper);
399     return gpr_strdup(w->plugin_->DebugString().c_str());
400   }
401 
MetadataCredentialsPluginWrapper(std::unique_ptr<MetadataCredentialsPlugin> plugin)402   explicit MetadataCredentialsPluginWrapper(
403       std::unique_ptr<MetadataCredentialsPlugin> plugin)
404       : plugin_(std::move(plugin)) {
405     if (plugin_->IsBlocking()) {
406       thread_pool_.reset(CreateDefaultThreadPool());
407     }
408   }
409 
410  private:
InvokePlugin(grpc_auth_metadata_context context,grpc_credentials_plugin_metadata_cb cb,void * user_data,grpc_metadata creds_md[GRPC_METADATA_CREDENTIALS_PLUGIN_SYNC_MAX],size_t * num_creds_md,grpc_status_code * status_code,const char ** error_details)411   void InvokePlugin(
412       grpc_auth_metadata_context context,
413       grpc_credentials_plugin_metadata_cb cb, void* user_data,
414       grpc_metadata creds_md[GRPC_METADATA_CREDENTIALS_PLUGIN_SYNC_MAX],
415       size_t* num_creds_md, grpc_status_code* status_code,
416       const char** error_details) {
417     std::multimap<std::string, std::string> metadata;
418 
419     // const_cast is safe since the SecureAuthContext only inc/dec the refcount
420     // and the object is passed as a const ref to plugin_->GetMetadata.
421     SecureAuthContext cpp_channel_auth_context(
422         const_cast<grpc_auth_context*>(context.channel_auth_context));
423 
424     Status status =
425         plugin_->GetMetadata(context.service_url, context.method_name,
426                              cpp_channel_auth_context, &metadata);
427     std::vector<grpc_metadata> md;
428     for (auto& metadatum : metadata) {
429       grpc_metadata md_entry;
430       md_entry.key = SliceFromCopiedString(metadatum.first);
431       md_entry.value = SliceFromCopiedString(metadatum.second);
432       md.push_back(md_entry);
433     }
434     if (creds_md != nullptr) {
435       // Synchronous return.
436       if (md.size() > GRPC_METADATA_CREDENTIALS_PLUGIN_SYNC_MAX) {
437         *num_creds_md = 0;
438         *status_code = GRPC_STATUS_INTERNAL;
439         *error_details = gpr_strdup(
440             "blocking plugin credentials returned too many metadata keys");
441         UnrefMetadata(md);
442       } else {
443         for (const auto& elem : md) {
444           creds_md[*num_creds_md].key = elem.key;
445           creds_md[*num_creds_md].value = elem.value;
446           ++(*num_creds_md);
447         }
448         *status_code = static_cast<grpc_status_code>(status.error_code());
449         *error_details =
450             status.ok() ? nullptr : gpr_strdup(status.error_message().c_str());
451       }
452     } else {
453       // Asynchronous return.
454       cb(user_data, md.empty() ? nullptr : &md[0], md.size(),
455          static_cast<grpc_status_code>(status.error_code()),
456          status.error_message().c_str());
457       UnrefMetadata(md);
458     }
459   }
460 
461   std::unique_ptr<ThreadPoolInterface> thread_pool_;
462   std::unique_ptr<MetadataCredentialsPlugin> plugin_;
463 };
464 
465 }  // namespace
466 
467 namespace experimental {
MetadataCredentialsFromPlugin(std::unique_ptr<MetadataCredentialsPlugin> plugin,grpc_security_level min_security_level)468 std::shared_ptr<CallCredentials> MetadataCredentialsFromPlugin(
469     std::unique_ptr<MetadataCredentialsPlugin> plugin,
470     grpc_security_level min_security_level) {
471   grpc::internal::GrpcLibrary init;  // To call grpc_init().
472   const char* type = plugin->GetType();
473   MetadataCredentialsPluginWrapper* wrapper =
474       new MetadataCredentialsPluginWrapper(std::move(plugin));
475   grpc_metadata_credentials_plugin c_plugin = {
476       MetadataCredentialsPluginWrapper::GetMetadata,
477       MetadataCredentialsPluginWrapper::DebugString,
478       MetadataCredentialsPluginWrapper::Destroy, wrapper, type};
479   return WrapCallCredentials(grpc_metadata_credentials_create_from_plugin(
480       c_plugin, min_security_level, nullptr));
481 }
482 
483 }  // namespace experimental
484 
MetadataCredentialsFromPlugin(std::unique_ptr<MetadataCredentialsPlugin> plugin)485 std::shared_ptr<CallCredentials> MetadataCredentialsFromPlugin(
486     std::unique_ptr<MetadataCredentialsPlugin> plugin) {
487   return experimental::MetadataCredentialsFromPlugin(
488       std::move(plugin), GRPC_PRIVACY_AND_INTEGRITY);
489 }
490 
491 }  // namespace grpc
492