#region Copyright notice and license // Copyright 2015 gRPC authors. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. #endregion using System; using System.Collections.Generic; using Grpc.Core.Internal; using Grpc.Core.Utils; namespace Grpc.Core { /// /// Server side credentials. /// public abstract class ServerCredentials { static readonly ServerCredentials InsecureInstance = new InsecureServerCredentialsImpl(); /// /// Returns instance of credential that provides no security and /// will result in creating an unsecure server port with no encryption whatsoever. /// public static ServerCredentials Insecure { get { return InsecureInstance; } } /// /// Creates native object for the credentials. /// /// The native credentials. internal abstract ServerCredentialsSafeHandle ToNativeCredentials(); private sealed class InsecureServerCredentialsImpl : ServerCredentials { internal override ServerCredentialsSafeHandle ToNativeCredentials() { return null; } } } /// /// Server-side SSL credentials. /// public class SslServerCredentials : ServerCredentials { readonly IList keyCertificatePairs; readonly string rootCertificates; readonly bool forceClientAuth; /// /// Creates server-side SSL credentials. /// /// Key-certificates to use. /// PEM encoded client root certificates used to authenticate client. /// If true, client will be rejected unless it proves its unthenticity using against rootCertificates. public SslServerCredentials(IEnumerable keyCertificatePairs, string rootCertificates, bool forceClientAuth) { this.keyCertificatePairs = new List(keyCertificatePairs).AsReadOnly(); GrpcPreconditions.CheckArgument(this.keyCertificatePairs.Count > 0, "At least one KeyCertificatePair needs to be provided."); if (forceClientAuth) { GrpcPreconditions.CheckNotNull(rootCertificates, "Cannot force client authentication unless you provide rootCertificates."); } this.rootCertificates = rootCertificates; this.forceClientAuth = forceClientAuth; } /// /// Creates server-side SSL credentials. /// This constructor should be use if you do not wish to autheticate client /// using client root certificates. /// /// Key-certificates to use. public SslServerCredentials(IEnumerable keyCertificatePairs) : this(keyCertificatePairs, null, false) { } /// /// Key-certificate pairs. /// public IList KeyCertificatePairs { get { return this.keyCertificatePairs; } } /// /// PEM encoded client root certificates. /// public string RootCertificates { get { return this.rootCertificates; } } /// /// If true, the authenticity of client check will be enforced. /// public bool ForceClientAuthentication { get { return this.forceClientAuth; } } internal override ServerCredentialsSafeHandle ToNativeCredentials() { int count = keyCertificatePairs.Count; string[] certChains = new string[count]; string[] keys = new string[count]; for (int i = 0; i < count; i++) { certChains[i] = keyCertificatePairs[i].CertificateChain; keys[i] = keyCertificatePairs[i].PrivateKey; } return ServerCredentialsSafeHandle.CreateSslCredentials(rootCertificates, certChains, keys, forceClientAuth); } } }