#region Copyright notice and license
// Copyright 2015 gRPC authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#endregion
using System;
using System.Collections.Generic;
using Grpc.Core.Internal;
using Grpc.Core.Utils;
namespace Grpc.Core
{
///
/// Server side credentials.
///
public abstract class ServerCredentials
{
static readonly ServerCredentials InsecureInstance = new InsecureServerCredentialsImpl();
///
/// Returns instance of credential that provides no security and
/// will result in creating an unsecure server port with no encryption whatsoever.
///
public static ServerCredentials Insecure
{
get
{
return InsecureInstance;
}
}
///
/// Creates native object for the credentials.
///
/// The native credentials.
internal abstract ServerCredentialsSafeHandle ToNativeCredentials();
private sealed class InsecureServerCredentialsImpl : ServerCredentials
{
internal override ServerCredentialsSafeHandle ToNativeCredentials()
{
return null;
}
}
}
///
/// Server-side SSL credentials.
///
public class SslServerCredentials : ServerCredentials
{
readonly IList keyCertificatePairs;
readonly string rootCertificates;
readonly bool forceClientAuth;
///
/// Creates server-side SSL credentials.
///
/// Key-certificates to use.
/// PEM encoded client root certificates used to authenticate client.
/// If true, client will be rejected unless it proves its unthenticity using against rootCertificates.
public SslServerCredentials(IEnumerable keyCertificatePairs, string rootCertificates, bool forceClientAuth)
{
this.keyCertificatePairs = new List(keyCertificatePairs).AsReadOnly();
GrpcPreconditions.CheckArgument(this.keyCertificatePairs.Count > 0,
"At least one KeyCertificatePair needs to be provided.");
if (forceClientAuth)
{
GrpcPreconditions.CheckNotNull(rootCertificates,
"Cannot force client authentication unless you provide rootCertificates.");
}
this.rootCertificates = rootCertificates;
this.forceClientAuth = forceClientAuth;
}
///
/// Creates server-side SSL credentials.
/// This constructor should be use if you do not wish to autheticate client
/// using client root certificates.
///
/// Key-certificates to use.
public SslServerCredentials(IEnumerable keyCertificatePairs) : this(keyCertificatePairs, null, false)
{
}
///
/// Key-certificate pairs.
///
public IList KeyCertificatePairs
{
get
{
return this.keyCertificatePairs;
}
}
///
/// PEM encoded client root certificates.
///
public string RootCertificates
{
get
{
return this.rootCertificates;
}
}
///
/// If true, the authenticity of client check will be enforced.
///
public bool ForceClientAuthentication
{
get
{
return this.forceClientAuth;
}
}
internal override ServerCredentialsSafeHandle ToNativeCredentials()
{
int count = keyCertificatePairs.Count;
string[] certChains = new string[count];
string[] keys = new string[count];
for (int i = 0; i < count; i++)
{
certChains[i] = keyCertificatePairs[i].CertificateChain;
keys[i] = keyCertificatePairs[i].PrivateKey;
}
return ServerCredentialsSafeHandle.CreateSslCredentials(rootCertificates, certChains, keys, forceClientAuth);
}
}
}