NIOSSL+GRPC.swift 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238
  1. /*
  2. * Copyright 2024, gRPC Authors All rights reserved.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. internal import GRPCCore
  17. package import GRPCNIOTransportCore
  18. internal import NIOCertificateReloading
  19. internal import NIOSSL
  20. extension NIOSSLSerializationFormats {
  21. fileprivate init(_ format: TLSConfig.SerializationFormat) {
  22. switch format.wrapped {
  23. case .pem:
  24. self = .pem
  25. case .der:
  26. self = .der
  27. }
  28. }
  29. }
  30. extension Sequence<TLSConfig.CertificateSource> {
  31. func sslCertificateSources() throws -> [NIOSSLCertificateSource] {
  32. var certificateSources: [NIOSSLCertificateSource] = []
  33. for source in self {
  34. switch source.wrapped {
  35. case .bytes(let bytes, let serializationFormat):
  36. switch serializationFormat.wrapped {
  37. case .der:
  38. certificateSources.append(
  39. .certificate(try NIOSSLCertificate(bytes: bytes, format: .der))
  40. )
  41. case .pem:
  42. let certificates = try NIOSSLCertificate.fromPEMBytes(bytes).map {
  43. NIOSSLCertificateSource.certificate($0)
  44. }
  45. certificateSources.append(contentsOf: certificates)
  46. }
  47. case .file(let path, let serializationFormat):
  48. switch serializationFormat.wrapped {
  49. case .der:
  50. certificateSources.append(
  51. .certificate(try NIOSSLCertificate(file: path, format: .der))
  52. )
  53. case .pem:
  54. let certificates = try NIOSSLCertificate.fromPEMFile(path).map {
  55. NIOSSLCertificateSource.certificate($0)
  56. }
  57. certificateSources.append(contentsOf: certificates)
  58. }
  59. case .transportSpecific(let specific):
  60. if let source = specific.wrapped as? NIOSSLCertificateSource {
  61. certificateSources.append(source)
  62. } else {
  63. fatalError("Invalid certificate source of type \(type(of: specific.wrapped))")
  64. }
  65. }
  66. }
  67. return certificateSources
  68. }
  69. }
  70. extension TLSConfig.PrivateKeySource {
  71. enum _NIOSSLPrivateKeySource: TransportSpecific {
  72. case customPrivateKey(any (NIOSSLCustomPrivateKey & Hashable))
  73. case privateKey(NIOSSLPrivateKeySource)
  74. }
  75. static func nioSSLSpecific(_ source: _NIOSSLPrivateKeySource) -> Self {
  76. .transportSpecific(source)
  77. }
  78. }
  79. extension NIOSSLPrivateKey {
  80. fileprivate static func makePrivateKey(
  81. from source: TLSConfig.PrivateKeySource
  82. ) throws -> NIOSSLPrivateKey {
  83. switch source.wrapped {
  84. case .file(let path, let serializationFormat):
  85. return try self.init(
  86. file: path,
  87. format: NIOSSLSerializationFormats(serializationFormat)
  88. )
  89. case .bytes(let bytes, let serializationFormat):
  90. return try self.init(
  91. bytes: bytes,
  92. format: NIOSSLSerializationFormats(serializationFormat)
  93. )
  94. case .transportSpecific(let extraSource):
  95. guard let source = extraSource as? TLSConfig.PrivateKeySource._NIOSSLPrivateKeySource else {
  96. fatalError("Invalid private key source of type \(type(of: extraSource))")
  97. }
  98. switch source {
  99. case .customPrivateKey(let privateKey):
  100. return self.init(customPrivateKey: privateKey)
  101. case .privateKey(.privateKey(let key)):
  102. return key
  103. case .privateKey(.file(let path)):
  104. switch path.split(separator: ".").last {
  105. case "pem":
  106. return try NIOSSLPrivateKey(file: path, format: .pem)
  107. case "der", "key":
  108. return try NIOSSLPrivateKey(file: path, format: .der)
  109. default:
  110. throw RPCError(
  111. code: .invalidArgument,
  112. message: "Couldn't load private key from \(path)."
  113. )
  114. }
  115. }
  116. }
  117. }
  118. }
  119. extension NIOSSLTrustRoots {
  120. fileprivate init(_ trustRoots: TLSConfig.TrustRootsSource) throws {
  121. switch trustRoots.wrapped {
  122. case .certificates(let certificateSources):
  123. let certificates = try certificateSources.map { source in
  124. switch source.wrapped {
  125. case .bytes(let bytes, let serializationFormat):
  126. return try NIOSSLCertificate(
  127. bytes: bytes,
  128. format: NIOSSLSerializationFormats(serializationFormat)
  129. )
  130. case .file(let path, let serializationFormat):
  131. return try NIOSSLCertificate(
  132. file: path,
  133. format: NIOSSLSerializationFormats(serializationFormat)
  134. )
  135. case .transportSpecific(let specific):
  136. guard let source = specific.wrapped as? NIOSSLCertificateSource else {
  137. fatalError("Invalid certificate source of type \(type(of: specific.wrapped))")
  138. }
  139. switch source {
  140. case .certificate(let certificate):
  141. return certificate
  142. case .file(let path):
  143. switch path.split(separator: ".").last {
  144. case "pem":
  145. return try NIOSSLCertificate(file: path, format: .pem)
  146. case "der":
  147. return try NIOSSLCertificate(file: path, format: .der)
  148. default:
  149. throw RPCError(
  150. code: .invalidArgument,
  151. message: "Couldn't load certificate from \(path)."
  152. )
  153. }
  154. }
  155. }
  156. }
  157. self = .certificates(certificates)
  158. case .systemDefault:
  159. self = .default
  160. }
  161. }
  162. }
  163. extension CertificateVerification {
  164. fileprivate init(
  165. _ verificationMode: TLSConfig.CertificateVerification
  166. ) {
  167. switch verificationMode.wrapped {
  168. case .doNotVerify:
  169. self = .none
  170. case .fullVerification:
  171. self = .fullVerification
  172. case .noHostnameVerification:
  173. self = .noHostnameVerification
  174. }
  175. }
  176. }
  177. extension TLSConfiguration {
  178. package init(_ tlsConfig: HTTP2ServerTransport.Posix.TransportSecurity.TLS) throws {
  179. let certificateChain = try tlsConfig.certificateChain.sslCertificateSources()
  180. let privateKey = try NIOSSLPrivateKey.makePrivateKey(from: tlsConfig.privateKey)
  181. self = TLSConfiguration.makeServerConfiguration(
  182. certificateChain: certificateChain,
  183. privateKey: .privateKey(privateKey)
  184. )
  185. self.minimumTLSVersion = .tlsv12
  186. self.certificateVerification = CertificateVerification(tlsConfig.clientCertificateVerification)
  187. self.trustRoots = try NIOSSLTrustRoots(tlsConfig.trustRoots)
  188. self.applicationProtocols = ["grpc-exp", "h2"]
  189. if let reloader = tlsConfig.certificateReloader {
  190. self.setCertificateReloader(reloader)
  191. }
  192. }
  193. package init(_ tlsConfig: HTTP2ClientTransport.Posix.TransportSecurity.TLS) throws {
  194. self = TLSConfiguration.makeClientConfiguration()
  195. self.certificateChain = try tlsConfig.certificateChain.sslCertificateSources()
  196. if let privateKey = tlsConfig.privateKey {
  197. let privateKeySource = try NIOSSLPrivateKey.makePrivateKey(from: privateKey)
  198. self.privateKey = .privateKey(privateKeySource)
  199. }
  200. self.minimumTLSVersion = .tlsv12
  201. self.certificateVerification = CertificateVerification(tlsConfig.serverCertificateVerification)
  202. self.trustRoots = try NIOSSLTrustRoots(tlsConfig.trustRoots)
  203. self.applicationProtocols = ["grpc-exp", "h2"]
  204. if let reloader = tlsConfig.certificateReloader {
  205. self.setCertificateReloader(reloader)
  206. }
  207. }
  208. }