#region Copyright notice and license // Copyright 2015 gRPC authors. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. #endregion using System; using System.Collections.Generic; using System.Threading.Tasks; using Grpc.Core.Internal; using Grpc.Core.Utils; namespace Grpc.Core { /// /// Client-side channel credentials. Used for creation of a secure channel. /// public abstract class ChannelCredentials { static readonly ChannelCredentials InsecureInstance = new InsecureCredentialsImpl(); readonly Lazy cachedNativeCredentials; /// /// Creates a new instance of channel credentials /// public ChannelCredentials() { // Native credentials object need to be kept alive once initialized for subchannel sharing to work correctly // with secure connections. See https://github.com/grpc/grpc/issues/15207. // We rely on finalizer to clean up the native portion of ChannelCredentialsSafeHandle after the ChannelCredentials // instance becomes unused. this.cachedNativeCredentials = new Lazy(() => CreateNativeCredentials()); } /// /// Returns instance of credentials that provides no security and /// will result in creating an unsecure channel with no encryption whatsoever. /// public static ChannelCredentials Insecure { get { return InsecureInstance; } } /// /// Creates a new instance of ChannelCredentials class by composing /// given channel credentials with call credentials. /// /// Channel credentials. /// Call credentials. /// The new composite ChannelCredentials public static ChannelCredentials Create(ChannelCredentials channelCredentials, CallCredentials callCredentials) { return new CompositeChannelCredentials(channelCredentials, callCredentials); } /// /// Gets native object for the credentials, creating one if it already doesn't exist. May return null if insecure channel /// should be created. Caller must not call Dispose() on the returned native credentials as their lifetime /// is managed by this class (and instances of native credentials are cached). /// /// The native credentials. internal ChannelCredentialsSafeHandle GetNativeCredentials() { return cachedNativeCredentials.Value; } /// /// Creates a new native object for the credentials. May return null if insecure channel /// should be created. For internal use only, use instead. /// /// The native credentials. internal abstract ChannelCredentialsSafeHandle CreateNativeCredentials(); /// /// Returns true if this credential type allows being composed by CompositeCredentials. /// internal virtual bool IsComposable { get { return false; } } private sealed class InsecureCredentialsImpl : ChannelCredentials { internal override ChannelCredentialsSafeHandle CreateNativeCredentials() { return null; } } } /// /// Client-side SSL credentials. /// public sealed class SslCredentials : ChannelCredentials { readonly string rootCertificates; readonly KeyCertificatePair keyCertificatePair; /// /// Creates client-side SSL credentials loaded from /// disk file pointed to by the GRPC_DEFAULT_SSL_ROOTS_FILE_PATH environment variable. /// If that fails, gets the roots certificates from a well known place on disk. /// public SslCredentials() : this(null, null) { } /// /// Creates client-side SSL credentials from /// a string containing PEM encoded root certificates. /// public SslCredentials(string rootCertificates) : this(rootCertificates, null) { } /// /// Creates client-side SSL credentials. /// /// string containing PEM encoded server root certificates. /// a key certificate pair. public SslCredentials(string rootCertificates, KeyCertificatePair keyCertificatePair) { this.rootCertificates = rootCertificates; this.keyCertificatePair = keyCertificatePair; } /// /// PEM encoding of the server root certificates. /// public string RootCertificates { get { return this.rootCertificates; } } /// /// Client side key and certificate pair. /// If null, client will not use key and certificate pair. /// public KeyCertificatePair KeyCertificatePair { get { return this.keyCertificatePair; } } // Composing composite makes no sense. internal override bool IsComposable { get { return true; } } internal override ChannelCredentialsSafeHandle CreateNativeCredentials() { return ChannelCredentialsSafeHandle.CreateSslCredentials(rootCertificates, keyCertificatePair); } } /// /// Credentials that allow composing one object and /// one or more objects into a single . /// internal sealed class CompositeChannelCredentials : ChannelCredentials { readonly ChannelCredentials channelCredentials; readonly CallCredentials callCredentials; /// /// Initializes a new instance of CompositeChannelCredentials class. /// The resulting credentials object will be composite of all the credentials specified as parameters. /// /// channelCredentials to compose /// channelCredentials to compose public CompositeChannelCredentials(ChannelCredentials channelCredentials, CallCredentials callCredentials) { this.channelCredentials = GrpcPreconditions.CheckNotNull(channelCredentials); this.callCredentials = GrpcPreconditions.CheckNotNull(callCredentials); GrpcPreconditions.CheckArgument(channelCredentials.IsComposable, "Supplied channel credentials do not allow composition."); } internal override ChannelCredentialsSafeHandle CreateNativeCredentials() { using (var callCreds = callCredentials.ToNativeCredentials()) { var nativeComposite = ChannelCredentialsSafeHandle.CreateComposite(channelCredentials.GetNativeCredentials(), callCreds); if (nativeComposite.IsInvalid) { throw new ArgumentException("Error creating native composite credentials. Likely, this is because you are trying to compose incompatible credentials."); } return nativeComposite; } } } }