blob: 7fe3f4b4872f3aa97534985c6a5644b832b08f8c [file] [log] [blame]
// Copyright (c) 2023 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef QUICHE_BLIND_SIGN_AUTH_BLIND_SIGN_AUTH_INTERFACE_H_
#define QUICHE_BLIND_SIGN_AUTH_BLIND_SIGN_AUTH_INTERFACE_H_
#include <optional>
#include <string>
#include "absl/status/statusor.h"
#include "absl/strings/string_view.h"
#include "absl/time/time.h"
#include "absl/types/span.h"
#include "anonymous_tokens/cpp/privacy_pass/token_encodings.h"
#include "quiche/common/platform/api/quiche_export.h"
#include "quiche/common/quiche_callbacks.h"
namespace quiche {
using ::anonymous_tokens::GeoHint;
// ProxyLayer indicates which proxy layer that tokens will be used with.
enum class ProxyLayer : int {
kProxyA,
kProxyB,
kTerminalLayer,
};
// BlindSignAuthServiceType indicates which service that tokens will be
// authenticated with.
enum class BlindSignAuthServiceType {
kChromeIpBlinding,
kCronetIpBlinding,
kWebviewIpBlinding,
kPrivateAratea,
};
// A BlindSignToken is used to authenticate a request to a privacy proxy.
// The token string contains a serialized SpendTokenData proto.
// The token cannot be successfully redeemed after the expiration time.
struct QUICHE_EXPORT BlindSignToken {
std::string token;
absl::Time expiration;
GeoHint geo_hint;
};
using SignedTokenCallback =
SingleUseCallback<void(absl::StatusOr<absl::Span<BlindSignToken>>)>;
// AttestationDataCallback returns a serialized
// privacy::ppn::PrepareAttestationData proto, which contains an attestation
// challenge from the issuer server.
// If the request fails, the callback will return an appropriate error based on
// the response's HTTP status code.
// If the request succeeds but the server does not issue a challenge, the
// callback will return an absl::InternalError.
using AttestationDataCallback =
SingleUseCallback<void(absl::StatusOr<absl::string_view>)>;
// BlindSignAuth provides signed, unblinded tokens to callers.
class QUICHE_EXPORT BlindSignAuthInterface {
public:
virtual ~BlindSignAuthInterface() = default;
// Returns signed unblinded tokens in a callback. Tokens are single-use.
virtual void GetTokens(std::optional<std::string> oauth_token, int num_tokens,
ProxyLayer proxy_layer,
BlindSignAuthServiceType service_type,
SignedTokenCallback callback) = 0;
// Returns an attestation challenge in a callback.
// GetAttestationTokens callbacks will run on the same thread as the
// BlindSignMessageInterface callbacks.
// Callers can make multiple concurrent requests to GetTokens.
// ProxyLayer must be either ProxyB or TerminalLayer, NOT ProxyA.
// AttestationDataCallback should call AttestAndSign with a separate callback
// in order to complete the token issuance protocol.
virtual void GetAttestationTokens(int num_tokens, ProxyLayer layer,
AttestationDataCallback callback) = 0;
// Returns signed unblinded tokens and their expiration time in a callback.
// Tokens are single-use and restricted to the PI use case.
// The GetTokens callback will run on the same thread as the
// BlindSignMessageInterface callbacks.
// This function should be called after the caller has generated
// AttestationData using Keystore and the challenge returned in
// AttestationDataCallback. If a token challenge is provided, it will be used
// in creating the token. Otherwise a default challenge will be used
// containing the issuer hostname.
virtual void AttestAndSign(int num_tokens, ProxyLayer layer,
std::string attestation_data,
std::optional<std::string> token_challenge,
SignedTokenCallback callback) = 0;
};
} // namespace quiche
#endif // QUICHE_BLIND_SIGN_AUTH_BLIND_SIGN_AUTH_INTERFACE_H_