Class GrpcSecurityHandler
java.lang.Object
io.helidon.security.integration.grpc.GrpcSecurityHandler
- All Implemented Interfaces:
io.grpc.ServerInterceptor
,ServiceDescriptor.Configurer
@Priority(1000)
public class GrpcSecurityHandler
extends Object
implements io.grpc.ServerInterceptor, ServiceDescriptor.Configurer
Handles security for the gRPC server. This handler is registered either by hand on the gRPC routing config,
or automatically from configuration when integration is done through
GrpcSecurity.create(Config)
or GrpcSecurity.create(Security)
.
This class is an implementation of a ServerInterceptor
with a priority of
InterceptorPriorities.CONTEXT
that will add itself to the call context with the key
GrpcSecurity.GRPC_SECURITY_HANDLER
. This will then cause the GrpcSecurity
interceptor that runs later with a priority of InterceptorPriorities.AUTHENTICATION
to use
this instance of the handler.
-
Method Summary
Modifier and TypeMethodDescriptionaudit()
Audit this request for any method.auditEventType
(String eventType) Override for event-type, defaults to "grpcRequest".auditMessageFormat
(String messageFormat) Override for audit message format, defaults to "%2$s %1$s %4$s %5$s requested by %3$s".If called, request will go through authentication process - (authentication is disabled by default - it may be enabled as a side effect of other methods, such asrolesAllowed(String...)
.If called, authentication failure will not abort request and will continue as anonymous (authentication is not optional by default).authenticator
(String explicitAuthenticator) Use a named authenticator (as supported by security - if not defined, default authenticator is used).If called, request will go through authorization process - (authorization is disabled by default - it may be enabled as a side effect of other methods, such asrolesAllowed(String...)
.authorizer
(String explicitAuthorizer) Use a named authorizer (as supported by security - if not defined, default authorizer is used, if none defined, all is permitted).void
configure
(ServiceDescriptor.Rules rules) Modifies aServiceDescriptor.Rules
to add thisGrpcSecurityHandler
.customObject
(Object object) Register a custom object for security request(s).<ReqT,
RespT>
io.grpc.ServerCall.Listener<ReqT>interceptCall
(io.grpc.ServerCall<ReqT, RespT> call, io.grpc.Metadata headers, io.grpc.ServerCallHandler<ReqT, RespT> next) rolesAllowed
(String... roles) An array of allowed roles for this path - must have a security provider supporting roles (either authentication or authorization provider).Disable auditing of this request.If called, request will NOT go through authentication process.Skip authorization for this route.
-
Method Details
-
configure
Modifies aServiceDescriptor.Rules
to add thisGrpcSecurityHandler
.- Specified by:
configure
in interfaceServiceDescriptor.Configurer
- Parameters:
rules
- theServiceDescriptor.Rules
to modify
-
interceptCall
public <ReqT,RespT> io.grpc.ServerCall.Listener<ReqT> interceptCall(io.grpc.ServerCall<ReqT, RespT> call, io.grpc.Metadata headers, io.grpc.ServerCallHandler<ReqT, RespT> next) - Specified by:
interceptCall
in interfaceio.grpc.ServerInterceptor
-
authenticator
Use a named authenticator (as supported by security - if not defined, default authenticator is used). Will enable authentication.- Parameters:
explicitAuthenticator
- name of authenticator as configured inSecurity
- Returns:
- new handler instance with configuration of this instance updated with this method
-
authorizer
Use a named authorizer (as supported by security - if not defined, default authorizer is used, if none defined, all is permitted). Will enable authorization.- Parameters:
explicitAuthorizer
- name of authorizer as configured inSecurity
- Returns:
- new handler instance with configuration of this instance updated with this method
-
rolesAllowed
An array of allowed roles for this path - must have a security provider supporting roles (either authentication or authorization provider). This method enables authentication and authorization (you can disable them again by callingskipAuthorization()
andskipAuthentication()
if needed).- Parameters:
roles
- if subject is any of these roles, allow access- Returns:
- new handler instance with configuration of this instance updated with this method
-
authenticationOptional
If called, authentication failure will not abort request and will continue as anonymous (authentication is not optional by default). Will enable authentication.- Returns:
- new handler instance with configuration of this instance updated with this method
-
authenticate
If called, request will go through authentication process - (authentication is disabled by default - it may be enabled as a side effect of other methods, such asrolesAllowed(String...)
.- Returns:
- new handler instance with configuration of this instance updated with this method
-
skipAuthentication
If called, request will NOT go through authentication process. Use this when another method implies authentication (such asrolesAllowed(String...)
) and yet it is not desired (e.g. everything is handled by authorization).- Returns:
- new handler instance with configuration of this instance updated with this method
-
customObject
Register a custom object for security request(s). This creates a hard dependency on a specific security provider, so use with care.- Parameters:
object
- An object expected by security provider- Returns:
- new handler instance with configuration of this instance updated with this method
-
auditEventType
Override for event-type, defaults to "grpcRequest".- Parameters:
eventType
- audit event type to use- Returns:
- new handler instance with configuration of this instance updated with this method
-
auditMessageFormat
Override for audit message format, defaults to "%2$s %1$s %4$s %5$s requested by %3$s".- Parameters:
messageFormat
- audit message format to use- Returns:
- new handler instance with configuration of this instance updated with this method
-
authorize
If called, request will go through authorization process - (authorization is disabled by default - it may be enabled as a side effect of other methods, such asrolesAllowed(String...)
.- Returns:
- new handler instance with configuration of this instance updated with this method
-
skipAuthorization
Skip authorization for this route. Use this when authorization is implied by another method on this class (e.g.rolesAllowed(String...)
and you want to explicitly forbid it.- Returns:
- new handler instance with configuration of this instance updated with this method
-
audit
Audit this request for any method. Request is audited with event typeDEFAULT_AUDIT_EVENT_TYPE
.By default audit is enabled as follows (based on HTTP methods):
- GET, HEAD - not audited
- PUT, POST, DELETE - audited
- any other method (e.g. custom methods) - audited
- Returns:
- new handler instance with configuration of this instance updated with this method
-
skipAudit
Disable auditing of this request. Will override defaults and disable auditing for all methods this handler is registered for.By default audit is enabled as follows (based on HTTP methods):
- GET, HEAD - not audited
- PUT, POST, DELETE - audited
- any other method (e.g. custom methods) - audited
- Returns:
- new handler instance with configuration of this instance updated with this method
-