chromium/third_party/grpc/src/include/grpcpp/security/binder_security_policy.h

// Copyright 2021 gRPC authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
//     http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

#ifndef GRPCPP_SECURITY_BINDER_SECURITY_POLICY_H
#define GRPCPP_SECURITY_BINDER_SECURITY_POLICY_H

#include <memory>

#ifdef GPR_ANDROID

#include <jni.h>

#endif

namespace grpc {
namespace experimental {
namespace binder {

// EXPERIMENTAL Determinines if a connection is allowed to be
// established on Android. See https://source.android.com/security/app-sandbox
// for more info about UID.
class SecurityPolicy {};

// EXPERIMENTAL Allows all connection. Anything on the Android device will be
// able to connect, use with caution!
class UntrustedSecurityPolicy : public SecurityPolicy {};

// EXPERIMENTAL Only allows the connections from processes with the same UID. In
// most cases this means "from the same APK".
class InternalOnlySecurityPolicy : public SecurityPolicy {};

#ifdef GPR_ANDROID

// EXPERIMENTAL Only allows the connections from the APK that have the same
// signature.
class SameSignatureSecurityPolicy : public SecurityPolicy {
 public:
  // `context` is required for getting PackageManager Java class
  SameSignatureSecurityPolicy(JavaVM* jvm, jobject context);
  ~SameSignatureSecurityPolicy() override;
  bool IsAuthorized(int uid) override;

 private:
  JavaVM* jvm_;
  jobject context_;
};

#endif

}  // namespace binder
}  // namespace experimental
}  // namespace grpc

#endif  // GRPCPP_SECURITY_BINDER_SECURITY_POLICY_H