s2av2.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354
  1. /*
  2. *
  3. * Copyright 2022 Google LLC
  4. *
  5. * Licensed under the Apache License, Version 2.0 (the "License");
  6. * you may not use this file except in compliance with the License.
  7. * You may obtain a copy of the License at
  8. *
  9. * https://www.apache.org/licenses/LICENSE-2.0
  10. *
  11. * Unless required by applicable law or agreed to in writing, software
  12. * distributed under the License is distributed on an "AS IS" BASIS,
  13. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. * See the License for the specific language governing permissions and
  15. * limitations under the License.
  16. *
  17. */
  18. // Package v2 provides the S2Av2 transport credentials used by a gRPC
  19. // application.
  20. package v2
  21. import (
  22. "context"
  23. "crypto/tls"
  24. "errors"
  25. "net"
  26. "os"
  27. "time"
  28. "github.com/golang/protobuf/proto"
  29. "github.com/google/s2a-go/fallback"
  30. "github.com/google/s2a-go/internal/handshaker/service"
  31. "github.com/google/s2a-go/internal/tokenmanager"
  32. "github.com/google/s2a-go/internal/v2/tlsconfigstore"
  33. "github.com/google/s2a-go/stream"
  34. "google.golang.org/grpc"
  35. "google.golang.org/grpc/credentials"
  36. "google.golang.org/grpc/grpclog"
  37. commonpbv1 "github.com/google/s2a-go/internal/proto/common_go_proto"
  38. s2av2pb "github.com/google/s2a-go/internal/proto/v2/s2a_go_proto"
  39. )
  40. const (
  41. s2aSecurityProtocol = "tls"
  42. defaultS2ATimeout = 3 * time.Second
  43. )
  44. // An environment variable, which sets the timeout enforced on the connection to the S2A service for handshake.
  45. const s2aTimeoutEnv = "S2A_TIMEOUT"
  46. type s2av2TransportCreds struct {
  47. info *credentials.ProtocolInfo
  48. isClient bool
  49. serverName string
  50. s2av2Address string
  51. tokenManager *tokenmanager.AccessTokenManager
  52. // localIdentity should only be used by the client.
  53. localIdentity *commonpbv1.Identity
  54. // localIdentities should only be used by the server.
  55. localIdentities []*commonpbv1.Identity
  56. verificationMode s2av2pb.ValidatePeerCertificateChainReq_VerificationMode
  57. fallbackClientHandshake fallback.ClientHandshake
  58. getS2AStream func(ctx context.Context, s2av2Address string) (stream.S2AStream, error)
  59. serverAuthorizationPolicy []byte
  60. }
  61. // NewClientCreds returns a client-side transport credentials object that uses
  62. // the S2Av2 to establish a secure connection with a server.
  63. func NewClientCreds(s2av2Address string, localIdentity *commonpbv1.Identity, verificationMode s2av2pb.ValidatePeerCertificateChainReq_VerificationMode, fallbackClientHandshakeFunc fallback.ClientHandshake, getS2AStream func(ctx context.Context, s2av2Address string) (stream.S2AStream, error), serverAuthorizationPolicy []byte) (credentials.TransportCredentials, error) {
  64. // Create an AccessTokenManager instance to use to authenticate to S2Av2.
  65. accessTokenManager, err := tokenmanager.NewSingleTokenAccessTokenManager()
  66. creds := &s2av2TransportCreds{
  67. info: &credentials.ProtocolInfo{
  68. SecurityProtocol: s2aSecurityProtocol,
  69. },
  70. isClient: true,
  71. serverName: "",
  72. s2av2Address: s2av2Address,
  73. localIdentity: localIdentity,
  74. verificationMode: verificationMode,
  75. fallbackClientHandshake: fallbackClientHandshakeFunc,
  76. getS2AStream: getS2AStream,
  77. serverAuthorizationPolicy: serverAuthorizationPolicy,
  78. }
  79. if err != nil {
  80. creds.tokenManager = nil
  81. } else {
  82. creds.tokenManager = &accessTokenManager
  83. }
  84. if grpclog.V(1) {
  85. grpclog.Info("Created client S2Av2 transport credentials.")
  86. }
  87. return creds, nil
  88. }
  89. // NewServerCreds returns a server-side transport credentials object that uses
  90. // the S2Av2 to establish a secure connection with a client.
  91. func NewServerCreds(s2av2Address string, localIdentities []*commonpbv1.Identity, verificationMode s2av2pb.ValidatePeerCertificateChainReq_VerificationMode, getS2AStream func(ctx context.Context, s2av2Address string) (stream.S2AStream, error)) (credentials.TransportCredentials, error) {
  92. // Create an AccessTokenManager instance to use to authenticate to S2Av2.
  93. accessTokenManager, err := tokenmanager.NewSingleTokenAccessTokenManager()
  94. creds := &s2av2TransportCreds{
  95. info: &credentials.ProtocolInfo{
  96. SecurityProtocol: s2aSecurityProtocol,
  97. },
  98. isClient: false,
  99. s2av2Address: s2av2Address,
  100. localIdentities: localIdentities,
  101. verificationMode: verificationMode,
  102. getS2AStream: getS2AStream,
  103. }
  104. if err != nil {
  105. creds.tokenManager = nil
  106. } else {
  107. creds.tokenManager = &accessTokenManager
  108. }
  109. if grpclog.V(1) {
  110. grpclog.Info("Created server S2Av2 transport credentials.")
  111. }
  112. return creds, nil
  113. }
  114. // ClientHandshake performs a client-side mTLS handshake using the S2Av2.
  115. func (c *s2av2TransportCreds) ClientHandshake(ctx context.Context, serverAuthority string, rawConn net.Conn) (net.Conn, credentials.AuthInfo, error) {
  116. if !c.isClient {
  117. return nil, nil, errors.New("client handshake called using server transport credentials")
  118. }
  119. // Remove the port from serverAuthority.
  120. serverName := removeServerNamePort(serverAuthority)
  121. timeoutCtx, cancel := context.WithTimeout(ctx, GetS2ATimeout())
  122. defer cancel()
  123. s2AStream, err := createStream(timeoutCtx, c.s2av2Address, c.getS2AStream)
  124. if err != nil {
  125. grpclog.Infof("Failed to connect to S2Av2: %v", err)
  126. if c.fallbackClientHandshake != nil {
  127. return c.fallbackClientHandshake(ctx, serverAuthority, rawConn, err)
  128. }
  129. return nil, nil, err
  130. }
  131. defer s2AStream.CloseSend()
  132. if grpclog.V(1) {
  133. grpclog.Infof("Connected to S2Av2.")
  134. }
  135. var config *tls.Config
  136. var tokenManager tokenmanager.AccessTokenManager
  137. if c.tokenManager == nil {
  138. tokenManager = nil
  139. } else {
  140. tokenManager = *c.tokenManager
  141. }
  142. if c.serverName == "" {
  143. config, err = tlsconfigstore.GetTLSConfigurationForClient(serverName, s2AStream, tokenManager, c.localIdentity, c.verificationMode, c.serverAuthorizationPolicy)
  144. if err != nil {
  145. grpclog.Info("Failed to get client TLS config from S2Av2: %v", err)
  146. if c.fallbackClientHandshake != nil {
  147. return c.fallbackClientHandshake(ctx, serverAuthority, rawConn, err)
  148. }
  149. return nil, nil, err
  150. }
  151. } else {
  152. config, err = tlsconfigstore.GetTLSConfigurationForClient(c.serverName, s2AStream, tokenManager, c.localIdentity, c.verificationMode, c.serverAuthorizationPolicy)
  153. if err != nil {
  154. grpclog.Info("Failed to get client TLS config from S2Av2: %v", err)
  155. if c.fallbackClientHandshake != nil {
  156. return c.fallbackClientHandshake(ctx, serverAuthority, rawConn, err)
  157. }
  158. return nil, nil, err
  159. }
  160. }
  161. if grpclog.V(1) {
  162. grpclog.Infof("Got client TLS config from S2Av2.")
  163. }
  164. creds := credentials.NewTLS(config)
  165. conn, authInfo, err := creds.ClientHandshake(ctx, serverName, rawConn)
  166. if err != nil {
  167. grpclog.Infof("Failed to do client handshake using S2Av2: %v", err)
  168. if c.fallbackClientHandshake != nil {
  169. return c.fallbackClientHandshake(ctx, serverAuthority, rawConn, err)
  170. }
  171. return nil, nil, err
  172. }
  173. grpclog.Infof("Successfully done client handshake using S2Av2 to: %s", serverName)
  174. return conn, authInfo, err
  175. }
  176. // ServerHandshake performs a server-side mTLS handshake using the S2Av2.
  177. func (c *s2av2TransportCreds) ServerHandshake(rawConn net.Conn) (net.Conn, credentials.AuthInfo, error) {
  178. if c.isClient {
  179. return nil, nil, errors.New("server handshake called using client transport credentials")
  180. }
  181. ctx, cancel := context.WithTimeout(context.Background(), GetS2ATimeout())
  182. defer cancel()
  183. s2AStream, err := createStream(ctx, c.s2av2Address, c.getS2AStream)
  184. if err != nil {
  185. grpclog.Infof("Failed to connect to S2Av2: %v", err)
  186. return nil, nil, err
  187. }
  188. defer s2AStream.CloseSend()
  189. if grpclog.V(1) {
  190. grpclog.Infof("Connected to S2Av2.")
  191. }
  192. var tokenManager tokenmanager.AccessTokenManager
  193. if c.tokenManager == nil {
  194. tokenManager = nil
  195. } else {
  196. tokenManager = *c.tokenManager
  197. }
  198. config, err := tlsconfigstore.GetTLSConfigurationForServer(s2AStream, tokenManager, c.localIdentities, c.verificationMode)
  199. if err != nil {
  200. grpclog.Infof("Failed to get server TLS config from S2Av2: %v", err)
  201. return nil, nil, err
  202. }
  203. if grpclog.V(1) {
  204. grpclog.Infof("Got server TLS config from S2Av2.")
  205. }
  206. creds := credentials.NewTLS(config)
  207. return creds.ServerHandshake(rawConn)
  208. }
  209. // Info returns protocol info of s2av2TransportCreds.
  210. func (c *s2av2TransportCreds) Info() credentials.ProtocolInfo {
  211. return *c.info
  212. }
  213. // Clone makes a deep copy of s2av2TransportCreds.
  214. func (c *s2av2TransportCreds) Clone() credentials.TransportCredentials {
  215. info := *c.info
  216. serverName := c.serverName
  217. fallbackClientHandshake := c.fallbackClientHandshake
  218. s2av2Address := c.s2av2Address
  219. var tokenManager tokenmanager.AccessTokenManager
  220. if c.tokenManager == nil {
  221. tokenManager = nil
  222. } else {
  223. tokenManager = *c.tokenManager
  224. }
  225. verificationMode := c.verificationMode
  226. var localIdentity *commonpbv1.Identity
  227. if c.localIdentity != nil {
  228. localIdentity = proto.Clone(c.localIdentity).(*commonpbv1.Identity)
  229. }
  230. var localIdentities []*commonpbv1.Identity
  231. if c.localIdentities != nil {
  232. localIdentities = make([]*commonpbv1.Identity, len(c.localIdentities))
  233. for i, localIdentity := range c.localIdentities {
  234. localIdentities[i] = proto.Clone(localIdentity).(*commonpbv1.Identity)
  235. }
  236. }
  237. creds := &s2av2TransportCreds{
  238. info: &info,
  239. isClient: c.isClient,
  240. serverName: serverName,
  241. fallbackClientHandshake: fallbackClientHandshake,
  242. s2av2Address: s2av2Address,
  243. localIdentity: localIdentity,
  244. localIdentities: localIdentities,
  245. verificationMode: verificationMode,
  246. }
  247. if c.tokenManager == nil {
  248. creds.tokenManager = nil
  249. } else {
  250. creds.tokenManager = &tokenManager
  251. }
  252. return creds
  253. }
  254. // NewClientTLSConfig returns a tls.Config instance that uses S2Av2 to establish a TLS connection as
  255. // a client. The tls.Config MUST only be used to establish a single TLS connection.
  256. func NewClientTLSConfig(
  257. ctx context.Context,
  258. s2av2Address string,
  259. tokenManager tokenmanager.AccessTokenManager,
  260. verificationMode s2av2pb.ValidatePeerCertificateChainReq_VerificationMode,
  261. serverName string,
  262. serverAuthorizationPolicy []byte) (*tls.Config, error) {
  263. s2AStream, err := createStream(ctx, s2av2Address, nil)
  264. if err != nil {
  265. grpclog.Infof("Failed to connect to S2Av2: %v", err)
  266. return nil, err
  267. }
  268. return tlsconfigstore.GetTLSConfigurationForClient(removeServerNamePort(serverName), s2AStream, tokenManager, nil, verificationMode, serverAuthorizationPolicy)
  269. }
  270. // OverrideServerName sets the ServerName in the s2av2TransportCreds protocol
  271. // info. The ServerName MUST be a hostname.
  272. func (c *s2av2TransportCreds) OverrideServerName(serverNameOverride string) error {
  273. serverName := removeServerNamePort(serverNameOverride)
  274. c.info.ServerName = serverName
  275. c.serverName = serverName
  276. return nil
  277. }
  278. // Remove the trailing port from server name.
  279. func removeServerNamePort(serverName string) string {
  280. name, _, err := net.SplitHostPort(serverName)
  281. if err != nil {
  282. name = serverName
  283. }
  284. return name
  285. }
  286. type s2AGrpcStream struct {
  287. stream s2av2pb.S2AService_SetUpSessionClient
  288. }
  289. func (x s2AGrpcStream) Send(m *s2av2pb.SessionReq) error {
  290. return x.stream.Send(m)
  291. }
  292. func (x s2AGrpcStream) Recv() (*s2av2pb.SessionResp, error) {
  293. return x.stream.Recv()
  294. }
  295. func (x s2AGrpcStream) CloseSend() error {
  296. return x.stream.CloseSend()
  297. }
  298. func createStream(ctx context.Context, s2av2Address string, getS2AStream func(ctx context.Context, s2av2Address string) (stream.S2AStream, error)) (stream.S2AStream, error) {
  299. if getS2AStream != nil {
  300. return getS2AStream(ctx, s2av2Address)
  301. }
  302. // TODO(rmehta19): Consider whether to close the connection to S2Av2.
  303. conn, err := service.Dial(s2av2Address)
  304. if err != nil {
  305. return nil, err
  306. }
  307. client := s2av2pb.NewS2AServiceClient(conn)
  308. gRPCStream, err := client.SetUpSession(ctx, []grpc.CallOption{}...)
  309. if err != nil {
  310. return nil, err
  311. }
  312. return &s2AGrpcStream{
  313. stream: gRPCStream,
  314. }, nil
  315. }
  316. // GetS2ATimeout returns the timeout enforced on the connection to the S2A service for handshake.
  317. func GetS2ATimeout() time.Duration {
  318. timeout, err := time.ParseDuration(os.Getenv(s2aTimeoutEnv))
  319. if err != nil {
  320. return defaultS2ATimeout
  321. }
  322. return timeout
  323. }