NIOSSL+GRPC.swift 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245
  1. /*
  2. * Copyright 2024, gRPC Authors All rights reserved.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. internal import GRPCCore
  17. package import GRPCNIOTransportCore
  18. internal import NIOCertificateReloading
  19. internal import NIOSSL
  20. @available(gRPCSwiftNIOTransport 1.0, *)
  21. extension NIOSSLSerializationFormats {
  22. fileprivate init(_ format: TLSConfig.SerializationFormat) {
  23. switch format.wrapped {
  24. case .pem:
  25. self = .pem
  26. case .der:
  27. self = .der
  28. }
  29. }
  30. }
  31. @available(gRPCSwiftNIOTransport 1.0, *)
  32. extension Sequence<TLSConfig.CertificateSource> {
  33. func sslCertificateSources() throws -> [NIOSSLCertificateSource] {
  34. var certificateSources: [NIOSSLCertificateSource] = []
  35. for source in self {
  36. switch source.wrapped {
  37. case .bytes(let bytes, let serializationFormat):
  38. switch serializationFormat.wrapped {
  39. case .der:
  40. certificateSources.append(
  41. .certificate(try NIOSSLCertificate(bytes: bytes, format: .der))
  42. )
  43. case .pem:
  44. let certificates = try NIOSSLCertificate.fromPEMBytes(bytes).map {
  45. NIOSSLCertificateSource.certificate($0)
  46. }
  47. certificateSources.append(contentsOf: certificates)
  48. }
  49. case .file(let path, let serializationFormat):
  50. switch serializationFormat.wrapped {
  51. case .der:
  52. certificateSources.append(
  53. .certificate(try NIOSSLCertificate(file: path, format: .der))
  54. )
  55. case .pem:
  56. let certificates = try NIOSSLCertificate.fromPEMFile(path).map {
  57. NIOSSLCertificateSource.certificate($0)
  58. }
  59. certificateSources.append(contentsOf: certificates)
  60. }
  61. case .transportSpecific(let specific):
  62. if let source = specific.wrapped as? NIOSSLCertificateSource {
  63. certificateSources.append(source)
  64. } else {
  65. fatalError("Invalid certificate source of type \(type(of: specific.wrapped))")
  66. }
  67. }
  68. }
  69. return certificateSources
  70. }
  71. }
  72. @available(gRPCSwiftNIOTransport 1.2, *)
  73. extension TLSConfig.PrivateKeySource {
  74. enum _NIOSSLPrivateKeySource: TransportSpecific {
  75. case customPrivateKey(any (NIOSSLCustomPrivateKey & Hashable))
  76. case privateKey(NIOSSLPrivateKeySource)
  77. }
  78. static func nioSSLSpecific(_ source: _NIOSSLPrivateKeySource) -> Self {
  79. .transportSpecific(source)
  80. }
  81. }
  82. @available(gRPCSwiftNIOTransport 1.0, *)
  83. extension NIOSSLPrivateKey {
  84. fileprivate static func makePrivateKey(
  85. from source: TLSConfig.PrivateKeySource
  86. ) throws -> NIOSSLPrivateKey {
  87. switch source.wrapped {
  88. case .file(let path, let serializationFormat):
  89. return try self.init(
  90. file: path,
  91. format: NIOSSLSerializationFormats(serializationFormat)
  92. )
  93. case .bytes(let bytes, let serializationFormat):
  94. return try self.init(
  95. bytes: bytes,
  96. format: NIOSSLSerializationFormats(serializationFormat)
  97. )
  98. case .transportSpecific(let extraSource):
  99. guard let source = extraSource as? TLSConfig.PrivateKeySource._NIOSSLPrivateKeySource else {
  100. fatalError("Invalid private key source of type \(type(of: extraSource))")
  101. }
  102. switch source {
  103. case .customPrivateKey(let privateKey):
  104. return self.init(customPrivateKey: privateKey)
  105. case .privateKey(.privateKey(let key)):
  106. return key
  107. case .privateKey(.file(let path)):
  108. switch path.split(separator: ".").last {
  109. case "pem":
  110. return try NIOSSLPrivateKey(file: path, format: .pem)
  111. case "der", "key":
  112. return try NIOSSLPrivateKey(file: path, format: .der)
  113. default:
  114. throw RPCError(
  115. code: .invalidArgument,
  116. message: "Couldn't load private key from \(path)."
  117. )
  118. }
  119. }
  120. }
  121. }
  122. }
  123. @available(gRPCSwiftNIOTransport 1.0, *)
  124. extension NIOSSLTrustRoots {
  125. fileprivate init(_ trustRoots: TLSConfig.TrustRootsSource) throws {
  126. switch trustRoots.wrapped {
  127. case .certificates(let certificateSources):
  128. let certificates = try certificateSources.map { source in
  129. switch source.wrapped {
  130. case .bytes(let bytes, let serializationFormat):
  131. return try NIOSSLCertificate(
  132. bytes: bytes,
  133. format: NIOSSLSerializationFormats(serializationFormat)
  134. )
  135. case .file(let path, let serializationFormat):
  136. return try NIOSSLCertificate(
  137. file: path,
  138. format: NIOSSLSerializationFormats(serializationFormat)
  139. )
  140. case .transportSpecific(let specific):
  141. guard let source = specific.wrapped as? NIOSSLCertificateSource else {
  142. fatalError("Invalid certificate source of type \(type(of: specific.wrapped))")
  143. }
  144. switch source {
  145. case .certificate(let certificate):
  146. return certificate
  147. case .file(let path):
  148. switch path.split(separator: ".").last {
  149. case "pem":
  150. return try NIOSSLCertificate(file: path, format: .pem)
  151. case "der":
  152. return try NIOSSLCertificate(file: path, format: .der)
  153. default:
  154. throw RPCError(
  155. code: .invalidArgument,
  156. message: "Couldn't load certificate from \(path)."
  157. )
  158. }
  159. }
  160. }
  161. }
  162. self = .certificates(certificates)
  163. case .systemDefault:
  164. self = .default
  165. }
  166. }
  167. }
  168. @available(gRPCSwiftNIOTransport 1.0, *)
  169. extension CertificateVerification {
  170. fileprivate init(
  171. _ verificationMode: TLSConfig.CertificateVerification
  172. ) {
  173. switch verificationMode.wrapped {
  174. case .doNotVerify:
  175. self = .none
  176. case .fullVerification:
  177. self = .fullVerification
  178. case .noHostnameVerification:
  179. self = .noHostnameVerification
  180. }
  181. }
  182. }
  183. @available(gRPCSwiftNIOTransport 1.0, *)
  184. extension TLSConfiguration {
  185. package init(_ tlsConfig: HTTP2ServerTransport.Posix.TransportSecurity.TLS) throws {
  186. let certificateChain = try tlsConfig.certificateChain.sslCertificateSources()
  187. let privateKey = try NIOSSLPrivateKey.makePrivateKey(from: tlsConfig.privateKey)
  188. self = TLSConfiguration.makeServerConfiguration(
  189. certificateChain: certificateChain,
  190. privateKey: .privateKey(privateKey)
  191. )
  192. self.minimumTLSVersion = .tlsv12
  193. self.certificateVerification = CertificateVerification(tlsConfig.clientCertificateVerification)
  194. self.trustRoots = try NIOSSLTrustRoots(tlsConfig.trustRoots)
  195. self.applicationProtocols = ["grpc-exp", "h2"]
  196. if let reloader = tlsConfig.certificateReloader {
  197. self.setCertificateReloader(reloader)
  198. }
  199. }
  200. package init(_ tlsConfig: HTTP2ClientTransport.Posix.TransportSecurity.TLS) throws {
  201. self = TLSConfiguration.makeClientConfiguration()
  202. self.certificateChain = try tlsConfig.certificateChain.sslCertificateSources()
  203. if let privateKey = tlsConfig.privateKey {
  204. let privateKeySource = try NIOSSLPrivateKey.makePrivateKey(from: privateKey)
  205. self.privateKey = .privateKey(privateKeySource)
  206. }
  207. self.minimumTLSVersion = .tlsv12
  208. self.certificateVerification = CertificateVerification(tlsConfig.serverCertificateVerification)
  209. self.trustRoots = try NIOSSLTrustRoots(tlsConfig.trustRoots)
  210. self.applicationProtocols = ["grpc-exp", "h2"]
  211. if let reloader = tlsConfig.certificateReloader {
  212. self.setCertificateReloader(reloader)
  213. }
  214. }
  215. }