// // Copyright 2021 gRPC authors. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // #include #include "src/core/ext/filters/rbac/rbac_filter.h" #include #include #include #include "absl/status/status.h" #include #include "src/core/ext/filters/rbac/rbac_service_config_parser.h" #include "src/core/lib/channel/channel_args.h" #include "src/core/lib/channel/channel_stack.h" #include "src/core/lib/channel/context.h" #include "src/core/lib/config/core_configuration.h" #include "src/core/lib/iomgr/error.h" #include "src/core/lib/promise/context.h" #include "src/core/lib/promise/promise.h" #include "src/core/lib/security/authorization/authorization_engine.h" #include "src/core/lib/security/authorization/grpc_authorization_engine.h" #include "src/core/lib/security/context/security_context.h" #include "src/core/lib/transport/metadata_batch.h" #include "src/core/lib/transport/transport.h" #include "src/core/service_config/service_config_call_data.h" namespace grpc_core { const NoInterceptor RbacFilter::Call::OnServerInitialMetadata; const NoInterceptor RbacFilter::Call::OnServerTrailingMetadata; const NoInterceptor RbacFilter::Call::OnClientToServerMessage; const NoInterceptor RbacFilter::Call::OnServerToClientMessage; const NoInterceptor RbacFilter::Call::OnFinalize; absl::Status RbacFilter::Call::OnClientInitialMetadata(ClientMetadata& md, RbacFilter* filter) { // Fetch and apply the rbac policy from the service config. auto* service_config_call_data = static_cast( GetContext< grpc_call_context_element>()[GRPC_CONTEXT_SERVICE_CONFIG_CALL_DATA] .value); auto* method_params = static_cast( service_config_call_data->GetMethodParsedConfig( filter->service_config_parser_index_)); if (method_params == nullptr) { return absl::PermissionDeniedError("No RBAC policy found."); } else { auto* authorization_engine = method_params->authorization_engine(filter->index_); if (authorization_engine ->Evaluate(EvaluateArgs(&md, &filter->per_channel_evaluate_args_)) .type == AuthorizationEngine::Decision::Type::kDeny) { return absl::PermissionDeniedError("Unauthorized RPC rejected"); } } return absl::OkStatus(); } const grpc_channel_filter RbacFilter::kFilterVtable = MakePromiseBasedFilter("rbac_filter"); RbacFilter::RbacFilter(size_t index, EvaluateArgs::PerChannelArgs per_channel_evaluate_args) : index_(index), service_config_parser_index_(RbacServiceConfigParser::ParserIndex()), per_channel_evaluate_args_(std::move(per_channel_evaluate_args)) {} absl::StatusOr RbacFilter::Create(const ChannelArgs& args, ChannelFilter::Args filter_args) { auto* auth_context = args.GetObject(); if (auth_context == nullptr) { return GRPC_ERROR_CREATE("No auth context found"); } return RbacFilter(grpc_channel_stack_filter_instance_number( filter_args.channel_stack(), filter_args.uninitialized_channel_element()), EvaluateArgs::PerChannelArgs(auth_context, args)); } void RbacFilterRegister(CoreConfiguration::Builder* builder) { RbacServiceConfigParser::Register(builder); } } // namespace grpc_core