aboutsummaryrefslogtreecommitdiffstats
path: root/contrib/libs/grpc/src/cpp/common/alts_util.cc
blob: 4bd7e339c0247e602c56e3f87324dd02b66e982c (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
/* 
 * 
 * Copyright 2019 gRPC authors. 
 * 
 * Licensed under the Apache License, Version 2.0 (the "License"); 
 * you may not use this file except in compliance with the License. 
 * You may obtain a copy of the License at 
 * 
 *     http://www.apache.org/licenses/LICENSE-2.0 
 * 
 * Unless required by applicable law or agreed to in writing, software 
 * distributed under the License is distributed on an "AS IS" BASIS, 
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 
 * See the License for the specific language governing permissions and 
 * limitations under the License. 
 * 
 */ 
 
#include "upb/upb.hpp" 
 
#include <grpc/grpc_security.h> 
#include <grpc/support/log.h> 
#include <grpcpp/security/alts_context.h> 
#include <grpcpp/security/alts_util.h> 
 
#include "src/core/lib/gprpp/memory.h" 
#include "src/core/tsi/alts/handshaker/alts_tsi_handshaker.h" 
#include "src/cpp/common/secure_auth_context.h" 
#include "src/proto/grpc/gcp/altscontext.upb.h" 
 
namespace grpc { 
namespace experimental { 
 
std::unique_ptr<AltsContext> GetAltsContextFromAuthContext( 
    const std::shared_ptr<const AuthContext>& auth_context) { 
  if (auth_context == nullptr) { 
    gpr_log(GPR_ERROR, "auth_context is nullptr."); 
    return nullptr; 
  } 
  std::vector<string_ref> ctx_vector = 
      auth_context->FindPropertyValues(TSI_ALTS_CONTEXT); 
  if (ctx_vector.size() != 1) { 
    gpr_log(GPR_ERROR, "contains zero or more than one ALTS context."); 
    return nullptr; 
  } 
  upb::Arena context_arena; 
  grpc_gcp_AltsContext* ctx = grpc_gcp_AltsContext_parse( 
      ctx_vector[0].data(), ctx_vector[0].size(), context_arena.ptr()); 
  if (ctx == nullptr) { 
    gpr_log(GPR_ERROR, "fails to parse ALTS context."); 
    return nullptr; 
  } 
  if (grpc_gcp_AltsContext_security_level(ctx) < GRPC_SECURITY_MIN || 
      grpc_gcp_AltsContext_security_level(ctx) > GRPC_SECURITY_MAX) { 
    gpr_log(GPR_ERROR, "security_level is invalid."); 
    return nullptr; 
  } 
  return y_absl::make_unique<AltsContext>(AltsContext(ctx)); 
} 
 
grpc::Status AltsClientAuthzCheck( 
    const std::shared_ptr<const AuthContext>& auth_context, 
    const std::vector<TString>& expected_service_accounts) { 
  std::unique_ptr<AltsContext> alts_ctx = 
      GetAltsContextFromAuthContext(auth_context); 
  if (alts_ctx == nullptr) { 
    return grpc::Status(grpc::StatusCode::PERMISSION_DENIED, 
                        "fails to parse ALTS context."); 
  } 
  if (std::find(expected_service_accounts.begin(), 
                expected_service_accounts.end(), 
                alts_ctx->peer_service_account()) != 
      expected_service_accounts.end()) { 
    return grpc::Status::OK; 
  } 
  return grpc::Status( 
      grpc::StatusCode::PERMISSION_DENIED, 
      "client " + alts_ctx->peer_service_account() + " is not authorized."); 
} 
 
}  // namespace experimental 
}  // namespace grpc