Class GrpcSecurityHandler
java.lang.Object
io.helidon.security.integration.grpc.GrpcSecurityHandler
- All Implemented Interfaces:
- io.grpc.ServerInterceptor,- ServiceDescriptor.Configurer
@Priority(1000)
public class GrpcSecurityHandler
extends Object
implements io.grpc.ServerInterceptor, ServiceDescriptor.Configurer
Handles security for the gRPC server. This handler is registered either by hand on the gRPC routing config,
 or automatically from configuration when integration is done through 
GrpcSecurity.create(Config)
 or GrpcSecurity.create(Security).
 
 This class is an implementation of a ServerInterceptor with a priority of
 InterceptorPriorities.CONTEXT that will add itself to the call context with the key
 GrpcSecurity.GRPC_SECURITY_HANDLER. This will then cause the GrpcSecurity
 interceptor that runs later with a priority of InterceptorPriorities.AUTHENTICATION to use
 this instance of the handler.
- 
Method SummaryModifier and TypeMethodDescriptionaudit()Audit this request for any method.auditEventType(String eventType) Override for event-type, defaults to "grpcRequest".auditMessageFormat(String messageFormat) Override for audit message format, defaults to "%2$s %1$s %4$s %5$s requested by %3$s".If called, request will go through authentication process - (authentication is disabled by default - it may be enabled as a side effect of other methods, such asrolesAllowed(String...).If called, authentication failure will not abort request and will continue as anonymous (authentication is not optional by default).authenticator(String explicitAuthenticator) Use a named authenticator (as supported by security - if not defined, default authenticator is used).If called, request will go through authorization process - (authorization is disabled by default - it may be enabled as a side effect of other methods, such asrolesAllowed(String...).authorizer(String explicitAuthorizer) Use a named authorizer (as supported by security - if not defined, default authorizer is used, if none defined, all is permitted).voidconfigure(ServiceDescriptor.Rules rules) Modifies aServiceDescriptor.Rulesto add thisGrpcSecurityHandler.customObject(Object object) Register a custom object for security request(s).<ReqT,RespT> 
 io.grpc.ServerCall.Listener<ReqT>interceptCall(io.grpc.ServerCall<ReqT, RespT> call, io.grpc.Metadata headers, io.grpc.ServerCallHandler<ReqT, RespT> next) rolesAllowed(String... roles) An array of allowed roles for this path - must have a security provider supporting roles (either authentication or authorization provider).Disable auditing of this request.If called, request will NOT go through authentication process.Skip authorization for this route.
- 
Method Details- 
configureModifies aServiceDescriptor.Rulesto add thisGrpcSecurityHandler.- Specified by:
- configurein interface- ServiceDescriptor.Configurer
- Parameters:
- rules- the- ServiceDescriptor.Rulesto modify
 
- 
interceptCallpublic <ReqT,RespT> io.grpc.ServerCall.Listener<ReqT> interceptCall(io.grpc.ServerCall<ReqT, RespT> call, io.grpc.Metadata headers, io.grpc.ServerCallHandler<ReqT, RespT> next) - Specified by:
- interceptCallin interface- io.grpc.ServerInterceptor
 
- 
authenticatorUse a named authenticator (as supported by security - if not defined, default authenticator is used). Will enable authentication.- Parameters:
- explicitAuthenticator- name of authenticator as configured in- Security
- Returns:
- new handler instance with configuration of this instance updated with this method
 
- 
authorizerUse a named authorizer (as supported by security - if not defined, default authorizer is used, if none defined, all is permitted). Will enable authorization.- Parameters:
- explicitAuthorizer- name of authorizer as configured in- Security
- Returns:
- new handler instance with configuration of this instance updated with this method
 
- 
rolesAllowedAn array of allowed roles for this path - must have a security provider supporting roles (either authentication or authorization provider). This method enables authentication and authorization (you can disable them again by callingskipAuthorization()andskipAuthentication()if needed).- Parameters:
- roles- if subject is any of these roles, allow access
- Returns:
- new handler instance with configuration of this instance updated with this method
 
- 
authenticationOptionalIf called, authentication failure will not abort request and will continue as anonymous (authentication is not optional by default). Will enable authentication.- Returns:
- new handler instance with configuration of this instance updated with this method
 
- 
authenticateIf called, request will go through authentication process - (authentication is disabled by default - it may be enabled as a side effect of other methods, such asrolesAllowed(String...).- Returns:
- new handler instance with configuration of this instance updated with this method
 
- 
skipAuthenticationIf called, request will NOT go through authentication process. Use this when another method implies authentication (such asrolesAllowed(String...)) and yet it is not desired (e.g. everything is handled by authorization).- Returns:
- new handler instance with configuration of this instance updated with this method
 
- 
customObjectRegister a custom object for security request(s). This creates a hard dependency on a specific security provider, so use with care.- Parameters:
- object- An object expected by security provider
- Returns:
- new handler instance with configuration of this instance updated with this method
 
- 
auditEventTypeOverride for event-type, defaults to "grpcRequest".- Parameters:
- eventType- audit event type to use
- Returns:
- new handler instance with configuration of this instance updated with this method
 
- 
auditMessageFormatOverride for audit message format, defaults to "%2$s %1$s %4$s %5$s requested by %3$s".- Parameters:
- messageFormat- audit message format to use
- Returns:
- new handler instance with configuration of this instance updated with this method
 
- 
authorizeIf called, request will go through authorization process - (authorization is disabled by default - it may be enabled as a side effect of other methods, such asrolesAllowed(String...).- Returns:
- new handler instance with configuration of this instance updated with this method
 
- 
skipAuthorizationSkip authorization for this route. Use this when authorization is implied by another method on this class (e.g.rolesAllowed(String...)and you want to explicitly forbid it.- Returns:
- new handler instance with configuration of this instance updated with this method
 
- 
auditAudit this request for any method. Request is audited with event typeDEFAULT_AUDIT_EVENT_TYPE.By default audit is enabled as follows (based on HTTP methods): - GET, HEAD - not audited
- PUT, POST, DELETE - audited
- any other method (e.g. custom methods) - audited
 - Returns:
- new handler instance with configuration of this instance updated with this method
 
- 
skipAuditDisable auditing of this request. Will override defaults and disable auditing for all methods this handler is registered for.By default audit is enabled as follows (based on HTTP methods): - GET, HEAD - not audited
- PUT, POST, DELETE - audited
- any other method (e.g. custom methods) - audited
 - Returns:
- new handler instance with configuration of this instance updated with this method
 
 
-