blob: 61c0acb0fb30b91fe9d2ef91649d1733ca8c6593 [file] [log] [blame]
//
// Copyright 2021 gRPC authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
#ifndef GRPCPP_SECURITY_TLS_CERTIFICATE_VERIFIER_H
#define GRPCPP_SECURITY_TLS_CERTIFICATE_VERIFIER_H
#include <functional>
#include <map>
#include <memory>
#include <utility>
#include <vector>
#include <grpc/grpc_security_constants.h>
#include <grpc/status.h>
#include <grpc/support/log.h>
#include <grpcpp/impl/grpc_library.h>
#include <grpcpp/impl/sync.h>
#include <grpcpp/support/config.h>
#include <grpcpp/support/status.h>
#include <grpcpp/support/string_ref.h>
// TODO(yihuazhang): remove the forward declaration here and include
// <grpc/grpc_security.h> directly once the insecure builds are cleaned up.
typedef struct grpc_tls_custom_verification_check_request
grpc_tls_custom_verification_check_request;
typedef struct grpc_tls_certificate_verifier grpc_tls_certificate_verifier;
typedef struct grpc_tls_certificate_verifier_external
grpc_tls_certificate_verifier_external;
typedef void (*grpc_tls_on_custom_verification_check_done_cb)(
grpc_tls_custom_verification_check_request* request, void* callback_arg,
grpc_status_code status, const char* error_details);
extern "C" grpc_tls_certificate_verifier*
grpc_tls_certificate_verifier_external_create(
grpc_tls_certificate_verifier_external* external_verifier);
namespace grpc {
namespace experimental {
// Contains the verification-related information associated with a connection
// request. Users should not directly create or destroy this request object, but
// shall interact with it through CertificateVerifier's Verify() and Cancel().
class TlsCustomVerificationCheckRequest {
public:
explicit TlsCustomVerificationCheckRequest(
grpc_tls_custom_verification_check_request* request);
~TlsCustomVerificationCheckRequest() {}
grpc::string_ref target_name() const;
grpc::string_ref peer_cert() const;
grpc::string_ref peer_cert_full_chain() const;
grpc::string_ref common_name() const;
// The subject name of the root certificate used to verify the peer chain
// If verification fails or the peer cert is self-signed, this will be an
// empty string. If verification is successful, it is a comma-separated list,
// where the entries are of the form "FIELD_ABBREVIATION=string"
// ex: "CN=testca,O=Internet Widgits Pty Ltd,ST=Some-State,C=AU"
// ex: "CN=GTS Root R1,O=Google Trust Services LLC,C=US"
grpc::string_ref verified_root_cert_subject() const;
std::vector<grpc::string_ref> uri_names() const;
std::vector<grpc::string_ref> dns_names() const;
std::vector<grpc::string_ref> email_names() const;
std::vector<grpc::string_ref> ip_names() const;
grpc_tls_custom_verification_check_request* c_request() { return c_request_; }
private:
grpc_tls_custom_verification_check_request* c_request_ = nullptr;
};
// The base class of all internal verifier implementations, and the ultimate
// class that all external verifiers will eventually be transformed into.
// To implement a custom verifier, do not extend this class; instead,
// implement a subclass of ExternalCertificateVerifier. Note that custom
// verifier implementations can compose their functionality with existing
// implementations of this interface, such as HostnameVerifier, by delegating
// to an instance of that class.
class CertificateVerifier {
public:
explicit CertificateVerifier(grpc_tls_certificate_verifier* v);
~CertificateVerifier();
// Verifies a connection request, based on the logic specified in an internal
// verifier. The check on each internal verifier could be either synchronous
// or asynchronous, and we will need to use return value to know.
//
// request: the verification information associated with this request
// callback: This will only take effect if the verifier is asynchronous.
// The function that gRPC will invoke when the verifier has already
// completed its asynchronous check. Callers can use this function
// to perform any additional checks. The input parameter of the
// std::function indicates the status of the verifier check.
// sync_status: This will only be useful if the verifier is synchronous.
// The status of the verifier as it has already done it's
// synchronous check.
// return: return true if executed synchronously, otherwise return false
bool Verify(TlsCustomVerificationCheckRequest* request,
std::function<void(grpc::Status)> callback,
grpc::Status* sync_status);
// Cancels a verification request previously started via Verify().
// Used when the connection attempt times out or is cancelled while an async
// verification request is pending.
//
// request: the verification information associated with this request
void Cancel(TlsCustomVerificationCheckRequest* request);
// Gets the core verifier used internally.
grpc_tls_certificate_verifier* c_verifier() { return verifier_; }
private:
static void AsyncCheckDone(
grpc_tls_custom_verification_check_request* request, void* callback_arg,
grpc_status_code status, const char* error_details);
grpc_tls_certificate_verifier* verifier_ = nullptr;
grpc::internal::Mutex mu_;
std::map<grpc_tls_custom_verification_check_request*,
std::function<void(grpc::Status)>>
request_map_ ABSL_GUARDED_BY(mu_);
};
// The base class of all external, user-specified verifiers. Users should
// inherit this class to implement a custom verifier.
// Note that while implementing the custom verifier that extends this class, it
// is possible to compose an existing ExternalCertificateVerifier or
// CertificateVerifier, inside the Verify() and Cancel() function of the new
// custom verifier.
class ExternalCertificateVerifier {
public:
// A factory method for creating a |CertificateVerifier| from this class. All
// the user-implemented verifiers should use this function to be converted to
// verifiers compatible with |TlsCredentialsOptions|.
// The resulting CertificateVerifier takes ownership of the newly instantiated
// Subclass.
template <typename Subclass, typename... Args>
static std::shared_ptr<CertificateVerifier> Create(Args&&... args) {
auto* external_verifier = new Subclass(std::forward<Args>(args)...);
return std::make_shared<CertificateVerifier>(
grpc_tls_certificate_verifier_external_create(
external_verifier->base_));
}
// The verification logic that will be performed after the TLS handshake
// completes. Implementers can choose to do their checks synchronously or
// asynchronously.
//
// request: the verification information associated with this request
// callback: This should only be used if your check is done asynchronously.
// When the asynchronous work is done, invoke this callback function
// with the proper status, indicating the success or the failure of
// the check. The implementer MUST NOT invoke this |callback| in the
// same thread before Verify() returns, otherwise it can lead to
// deadlocks.
// sync_status: This should only be used if your check is done synchronously.
// Modifies this value to indicate the success or the failure of
// the check.
// return: return true if your check is done synchronously, otherwise return
// false
virtual bool Verify(TlsCustomVerificationCheckRequest* request,
std::function<void(grpc::Status)> callback,
grpc::Status* sync_status) = 0;
// Cancels a verification request previously started via Verify().
// Used when the connection attempt times out or is cancelled while an async
// verification request is pending. The implementation should abort whatever
// async operation it is waiting for and quickly invoke the callback that was
// passed to Verify() with a status indicating the cancellation.
//
// request: the verification information associated with this request
virtual void Cancel(TlsCustomVerificationCheckRequest* request) = 0;
protected:
ExternalCertificateVerifier();
virtual ~ExternalCertificateVerifier();
private:
struct AsyncRequestState {
AsyncRequestState(grpc_tls_on_custom_verification_check_done_cb cb,
void* arg,
grpc_tls_custom_verification_check_request* request)
: callback(cb), callback_arg(arg), cpp_request(request) {}
grpc_tls_on_custom_verification_check_done_cb callback;
void* callback_arg;
TlsCustomVerificationCheckRequest cpp_request;
};
static int VerifyInCoreExternalVerifier(
void* user_data, grpc_tls_custom_verification_check_request* request,
grpc_tls_on_custom_verification_check_done_cb callback,
void* callback_arg, grpc_status_code* sync_status,
char** sync_error_details);
static void CancelInCoreExternalVerifier(
void* user_data, grpc_tls_custom_verification_check_request* request);
static void DestructInCoreExternalVerifier(void* user_data);
// TODO(yihuazhang): after the insecure build is removed, make this an object
// member instead of a pointer.
grpc_tls_certificate_verifier_external* base_ = nullptr;
grpc::internal::Mutex mu_;
std::map<grpc_tls_custom_verification_check_request*, AsyncRequestState>
request_map_ ABSL_GUARDED_BY(mu_);
};
// A CertificateVerifier that doesn't perform any additional checks other than
// certificate verification, if specified.
// Note: using this solely without any other authentication mechanisms on the
// peer identity will leave your applications to the MITM(Man-In-The-Middle)
// attacks. Users should avoid doing so in production environments.
class NoOpCertificateVerifier : public CertificateVerifier {
public:
NoOpCertificateVerifier();
};
// A CertificateVerifier that will perform hostname verification, to see if the
// target name set from the client side matches the identity information
// specified on the server's certificate.
class HostNameCertificateVerifier : public CertificateVerifier {
public:
HostNameCertificateVerifier();
};
} // namespace experimental
} // namespace grpc
#endif // GRPCPP_SECURITY_TLS_CERTIFICATE_VERIFIER_H