| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624 |
- //
- // MultipartFormDataTests.swift
- //
- // Copyright (c) 2014-2016 Alamofire Software Foundation (http://alamofire.org/)
- //
- // Permission is hereby granted, free of charge, to any person obtaining a copy
- // of this software and associated documentation files (the "Software"), to deal
- // in the Software without restriction, including without limitation the rights
- // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- // copies of the Software, and to permit persons to whom the Software is
- // furnished to do so, subject to the following conditions:
- //
- // The above copyright notice and this permission notice shall be included in
- // all copies or substantial portions of the Software.
- //
- // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
- // THE SOFTWARE.
- //
- import Alamofire
- import Foundation
- import XCTest
- private struct TestCertificates {
- // Root Certificates
- static let rootCA = TestCertificates.certificateWithFileName("alamofire-root-ca")
- // Intermediate Certificates
- static let intermediateCA1 = TestCertificates.certificateWithFileName("alamofire-signing-ca1")
- static let intermediateCA2 = TestCertificates.certificateWithFileName("alamofire-signing-ca2")
- // Leaf Certificates - Signed by CA1
- static let leafWildcard = TestCertificates.certificateWithFileName("wildcard.alamofire.org")
- static let leafMultipleDNSNames = TestCertificates.certificateWithFileName("multiple-dns-names")
- static let leafSignedByCA1 = TestCertificates.certificateWithFileName("signed-by-ca1")
- static let leafDNSNameAndURI = TestCertificates.certificateWithFileName("test.alamofire.org")
- // Leaf Certificates - Signed by CA2
- static let leafExpired = TestCertificates.certificateWithFileName("expired")
- static let leafMissingDNSNameAndURI = TestCertificates.certificateWithFileName("missing-dns-name-and-uri")
- static let leafSignedByCA2 = TestCertificates.certificateWithFileName("signed-by-ca2")
- static let leafValidDNSName = TestCertificates.certificateWithFileName("valid-dns-name")
- static let leafValidURI = TestCertificates.certificateWithFileName("valid-uri")
- static func certificateWithFileName(_ fileName: String) -> SecCertificate {
- class Locater {}
- let filePath = Bundle(for: Locater.self).path(forResource: fileName, ofType: "cer")!
- let data = try! Data(contentsOf: URL(fileURLWithPath: filePath))
- let certificate = SecCertificateCreateWithData(nil, data as CFData)!
- return certificate
- }
- }
- // MARK: -
- private struct TestPublicKeys {
- // Root Public Keys
- static let rootCA = TestPublicKeys.publicKey(for: TestCertificates.rootCA)
- // Intermediate Public Keys
- static let intermediateCA1 = TestPublicKeys.publicKey(for: TestCertificates.intermediateCA1)
- static let intermediateCA2 = TestPublicKeys.publicKey(for: TestCertificates.intermediateCA2)
- // Leaf Public Keys - Signed by CA1
- static let leafWildcard = TestPublicKeys.publicKey(for: TestCertificates.leafWildcard)
- static let leafMultipleDNSNames = TestPublicKeys.publicKey(for: TestCertificates.leafMultipleDNSNames)
- static let leafSignedByCA1 = TestPublicKeys.publicKey(for: TestCertificates.leafSignedByCA1)
- static let leafDNSNameAndURI = TestPublicKeys.publicKey(for: TestCertificates.leafDNSNameAndURI)
- // Leaf Public Keys - Signed by CA2
- static let leafExpired = TestPublicKeys.publicKey(for: TestCertificates.leafExpired)
- static let leafMissingDNSNameAndURI = TestPublicKeys.publicKey(for: TestCertificates.leafMissingDNSNameAndURI)
- static let leafSignedByCA2 = TestPublicKeys.publicKey(for: TestCertificates.leafSignedByCA2)
- static let leafValidDNSName = TestPublicKeys.publicKey(for: TestCertificates.leafValidDNSName)
- static let leafValidURI = TestPublicKeys.publicKey(for: TestCertificates.leafValidURI)
- static func publicKey(for certificate: SecCertificate) -> SecKey {
- let policy = SecPolicyCreateBasicX509()
- var trust: SecTrust?
- SecTrustCreateWithCertificates(certificate, policy, &trust)
- let publicKey = SecTrustCopyPublicKey(trust!)!
- return publicKey
- }
- }
- // MARK: -
- private enum TestTrusts {
- // Leaf Trusts - Signed by CA1
- case leafWildcard
- case leafMultipleDNSNames
- case leafSignedByCA1
- case leafDNSNameAndURI
- // Leaf Trusts - Signed by CA2
- case leafExpired
- case leafMissingDNSNameAndURI
- case leafSignedByCA2
- case leafValidDNSName
- case leafValidURI
- // Invalid Trusts
- case leafValidDNSNameMissingIntermediate
- case leafValidDNSNameWithIncorrectIntermediate
- var trust: SecTrust {
- let trust: SecTrust
- switch self {
- case .leafWildcard:
- trust = TestTrusts.trustWithCertificates([
- TestCertificates.leafWildcard,
- TestCertificates.intermediateCA1,
- TestCertificates.rootCA
- ])
- case .leafMultipleDNSNames:
- trust = TestTrusts.trustWithCertificates([
- TestCertificates.leafMultipleDNSNames,
- TestCertificates.intermediateCA1,
- TestCertificates.rootCA
- ])
- case .leafSignedByCA1:
- trust = TestTrusts.trustWithCertificates([
- TestCertificates.leafSignedByCA1,
- TestCertificates.intermediateCA1,
- TestCertificates.rootCA
- ])
- case .leafDNSNameAndURI:
- trust = TestTrusts.trustWithCertificates([
- TestCertificates.leafDNSNameAndURI,
- TestCertificates.intermediateCA1,
- TestCertificates.rootCA
- ])
- case .leafExpired:
- trust = TestTrusts.trustWithCertificates([
- TestCertificates.leafExpired,
- TestCertificates.intermediateCA2,
- TestCertificates.rootCA
- ])
- case .leafMissingDNSNameAndURI:
- trust = TestTrusts.trustWithCertificates([
- TestCertificates.leafMissingDNSNameAndURI,
- TestCertificates.intermediateCA2,
- TestCertificates.rootCA
- ])
- case .leafSignedByCA2:
- trust = TestTrusts.trustWithCertificates([
- TestCertificates.leafSignedByCA2,
- TestCertificates.intermediateCA2,
- TestCertificates.rootCA
- ])
- case .leafValidDNSName:
- trust = TestTrusts.trustWithCertificates([
- TestCertificates.leafValidDNSName,
- TestCertificates.intermediateCA2,
- TestCertificates.rootCA
- ])
- case .leafValidURI:
- trust = TestTrusts.trustWithCertificates([
- TestCertificates.leafValidURI,
- TestCertificates.intermediateCA2,
- TestCertificates.rootCA
- ])
- case .leafValidDNSNameMissingIntermediate:
- trust = TestTrusts.trustWithCertificates([
- TestCertificates.leafValidDNSName,
- TestCertificates.rootCA
- ])
- case .leafValidDNSNameWithIncorrectIntermediate:
- trust = TestTrusts.trustWithCertificates([
- TestCertificates.leafValidDNSName,
- TestCertificates.intermediateCA1,
- TestCertificates.rootCA
- ])
- }
- return trust
- }
- static func trustWithCertificates(_ certificates: [SecCertificate]) -> SecTrust {
- let policy = SecPolicyCreateBasicX509()
- var trust: SecTrust?
- SecTrustCreateWithCertificates(certificates as CFTypeRef, policy, &trust)
- return trust!
- }
- }
- // MARK: - Basic X509 and SSL Exploration Tests -
- class ServerTrustPolicyTestCase: BaseTestCase {
- func setRootCertificateAsLoneAnchorCertificateForTrust(_ trust: SecTrust) {
- SecTrustSetAnchorCertificates(trust, [TestCertificates.rootCA] as CFArray)
- SecTrustSetAnchorCertificatesOnly(trust, true)
- }
- func trustIsValid(_ trust: SecTrust) -> Bool {
- var isValid = false
- var result = SecTrustResultType.invalid
- let status = SecTrustEvaluate(trust, &result)
- if status == errSecSuccess {
- let unspecified = SecTrustResultType.unspecified
- let proceed = SecTrustResultType.proceed
- isValid = result == unspecified || result == proceed
- }
- return isValid
- }
- }
- // MARK: -
- class ServerTrustPolicyExplorationBasicX509PolicyValidationTestCase: ServerTrustPolicyTestCase {
- func testThatAnchoredRootCertificatePassesBasicX509ValidationWithRootInTrust() {
- // Given
- let trust = TestTrusts.trustWithCertificates([
- TestCertificates.leafDNSNameAndURI,
- TestCertificates.intermediateCA1,
- TestCertificates.rootCA
- ])
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateBasicX509()]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trustIsValid(trust), "trust should be valid")
- }
- func testThatAnchoredRootCertificatePassesBasicX509ValidationWithoutRootInTrust() {
- // Given
- let trust = TestTrusts.leafDNSNameAndURI.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateBasicX509()]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trustIsValid(trust), "trust should be valid")
- }
- func testThatCertificateMissingDNSNamePassesBasicX509Validation() {
- // Given
- let trust = TestTrusts.leafMissingDNSNameAndURI.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateBasicX509()]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trustIsValid(trust), "trust should be valid")
- }
- func testThatExpiredCertificateFailsBasicX509Validation() {
- // Given
- let trust = TestTrusts.leafExpired.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateBasicX509()]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
- }
- }
- // MARK: -
- class ServerTrustPolicyExplorationSSLPolicyValidationTestCase: ServerTrustPolicyTestCase {
- func testThatAnchoredRootCertificatePassesSSLValidationWithRootInTrust() {
- // Given
- let trust = TestTrusts.trustWithCertificates([
- TestCertificates.leafDNSNameAndURI,
- TestCertificates.intermediateCA1,
- TestCertificates.rootCA
- ])
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trustIsValid(trust), "trust should be valid")
- }
- func testThatAnchoredRootCertificatePassesSSLValidationWithoutRootInTrust() {
- // Given
- let trust = TestTrusts.leafDNSNameAndURI.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trustIsValid(trust), "trust should be valid")
- }
- func testThatCertificateMissingDNSNameFailsSSLValidation() {
- // Given
- let trust = TestTrusts.leafMissingDNSNameAndURI.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
- }
- func testThatWildcardCertificatePassesSSLValidation() {
- // Given
- let trust = TestTrusts.leafWildcard.trust // *.alamofire.org
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trustIsValid(trust), "trust should be valid")
- }
- func testThatDNSNameCertificatePassesSSLValidation() {
- // Given
- let trust = TestTrusts.leafValidDNSName.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trustIsValid(trust), "trust should be valid")
- }
- func testThatURICertificateFailsSSLValidation() {
- // Given
- let trust = TestTrusts.leafValidURI.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
- }
- func testThatMultipleDNSNamesCertificatePassesSSLValidationForAllEntries() {
- // Given
- let trust = TestTrusts.leafMultipleDNSNames.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [
- SecPolicyCreateSSL(true, "test.alamofire.org" as CFString),
- SecPolicyCreateSSL(true, "blog.alamofire.org" as CFString),
- SecPolicyCreateSSL(true, "www.alamofire.org" as CFString)
- ]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trustIsValid(trust), "trust should not be valid")
- }
- func testThatPassingNilForHostParameterAllowsCertificateMissingDNSNameToPassSSLValidation() {
- // Given
- let trust = TestTrusts.leafMissingDNSNameAndURI.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateSSL(true, nil)]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trustIsValid(trust), "trust should not be valid")
- }
- func testThatExpiredCertificateFailsSSLValidation() {
- // Given
- let trust = TestTrusts.leafExpired.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
- }
- }
- // MARK: - Server Trust Policy Tests -
- class ServerTrustPolicyPerformDefaultEvaluationTestCase: ServerTrustPolicyTestCase {
- // MARK: Do NOT Validate Host
- func testThatValidCertificateChainPassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatNonAnchoredRootCertificateChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.trustWithCertificates([
- TestCertificates.leafValidDNSName,
- TestCertificates.intermediateCA2
- ])
- let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: false)
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatMissingDNSNameLeafCertificatePassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
- let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatExpiredCertificateChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatMissingIntermediateCertificateInChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
- let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- // MARK: Validate Host
- func testThatValidCertificateChainPassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatNonAnchoredRootCertificateChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.trustWithCertificates([
- TestCertificates.leafValidDNSName,
- TestCertificates.intermediateCA2
- ])
- let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatMissingDNSNameLeafCertificateFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
- let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatWildcardedLeafCertificateChainPassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafWildcard.trust
- let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatExpiredCertificateChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatMissingIntermediateCertificateInChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
- let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- }
- // MARK: -
- class ServerTrustPolicyPerformRevokedEvaluationTestCase: ServerTrustPolicyTestCase {
- // MARK: Do NOT Validate Host
- func testThatValidCertificateChainPassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
- validateHost: false,
- revocationFlags: kSecRevocationUseAnyAvailableMethod
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatNonAnchoredRootCertificateChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.trustWithCertificates([
- TestCertificates.leafValidDNSName,
- TestCertificates.intermediateCA2
- ])
- let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
- validateHost: false,
- revocationFlags: kSecRevocationUseAnyAvailableMethod
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatMissingDNSNameLeafCertificatePassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
- let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
- validateHost: false,
- revocationFlags: kSecRevocationUseAnyAvailableMethod
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatExpiredCertificateChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
- validateHost: false,
- revocationFlags: kSecRevocationUseAnyAvailableMethod
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatMissingIntermediateCertificateInChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
- let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
- validateHost: false,
- revocationFlags: kSecRevocationUseAnyAvailableMethod
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- // MARK: Validate Host
- func testThatValidCertificateChainPassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
- validateHost: true,
- revocationFlags: kSecRevocationUseAnyAvailableMethod
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatNonAnchoredRootCertificateChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.trustWithCertificates([
- TestCertificates.leafValidDNSName,
- TestCertificates.intermediateCA2
- ])
- let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
- validateHost: true,
- revocationFlags: kSecRevocationUseAnyAvailableMethod
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatMissingDNSNameLeafCertificateFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
- let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
- validateHost: true,
- revocationFlags: kSecRevocationUseAnyAvailableMethod
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatWildcardedLeafCertificateChainPassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafWildcard.trust
- let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
- validateHost: true,
- revocationFlags: kSecRevocationUseAnyAvailableMethod
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatExpiredCertificateChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
- validateHost: true,
- revocationFlags: kSecRevocationUseAnyAvailableMethod
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatMissingIntermediateCertificateInChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
- let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
- validateHost: true,
- revocationFlags: kSecRevocationUseAnyAvailableMethod
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- }
- // MARK: -
- class ServerTrustPolicyPinCertificatesTestCase: ServerTrustPolicyTestCase {
- // MARK: Validate Certificate Chain Without Validating Host
- func testThatPinnedLeafCertificatePassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.leafValidDNSName]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: true,
- validateHost: false
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinnedIntermediateCertificatePassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.intermediateCA2]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: true,
- validateHost: false
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinnedRootCertificatePassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.rootCA]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: true,
- validateHost: false
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinningLeafCertificateNotInCertificateChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.leafSignedByCA2]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: true,
- validateHost: false
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatPinningIntermediateCertificateNotInCertificateChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.intermediateCA1]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: true,
- validateHost: false
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatPinningExpiredLeafCertificateFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let certificates = [TestCertificates.leafExpired]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: true,
- validateHost: false
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatPinningIntermediateCertificateWithExpiredLeafCertificateFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let certificates = [TestCertificates.intermediateCA2]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: true,
- validateHost: false
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- // MARK: Validate Certificate Chain and Host
- func testThatPinnedLeafCertificatePassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.leafValidDNSName]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: true,
- validateHost: true
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinnedIntermediateCertificatePassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.intermediateCA2]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: true,
- validateHost: true
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinnedRootCertificatePassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.rootCA]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: true,
- validateHost: true
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinningLeafCertificateNotInCertificateChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.leafSignedByCA2]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: true,
- validateHost: true
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatPinningIntermediateCertificateNotInCertificateChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.intermediateCA1]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: true,
- validateHost: true
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatPinningExpiredLeafCertificateFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let certificates = [TestCertificates.leafExpired]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: true,
- validateHost: true
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatPinningIntermediateCertificateWithExpiredLeafCertificateFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let certificates = [TestCertificates.intermediateCA2]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: true,
- validateHost: true
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- // MARK: Do NOT Validate Certificate Chain or Host
- func testThatPinnedLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.leafValidDNSName]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: false,
- validateHost: false
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinnedIntermediateCertificateWithoutCertificateChainValidationPassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.intermediateCA2]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: false,
- validateHost: false
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinnedRootCertificateWithoutCertificateChainValidationPassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.rootCA]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: false,
- validateHost: false
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinningLeafCertificateNotInCertificateChainWithoutCertificateChainValidationFailsEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.leafSignedByCA2]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: false,
- validateHost: false
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatPinningIntermediateCertificateNotInCertificateChainWithoutCertificateChainValidationFailsEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.intermediateCA1]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: false,
- validateHost: false
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatPinningExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let certificates = [TestCertificates.leafExpired]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: false,
- validateHost: false
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinningIntermediateCertificateWithExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let certificates = [TestCertificates.intermediateCA2]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: false,
- validateHost: false
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinningRootCertificateWithExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let certificates = [TestCertificates.rootCA]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: false,
- validateHost: false
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinningMultipleCertificatesWithoutCertificateChainValidationPassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let certificates = [
- TestCertificates.leafMultipleDNSNames, // not in certificate chain
- TestCertificates.leafSignedByCA1, // not in certificate chain
- TestCertificates.leafExpired, // in certificate chain 👍🏼👍🏼
- TestCertificates.leafWildcard, // not in certificate chain
- TestCertificates.leafDNSNameAndURI, // not in certificate chain
- ]
- let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
- certificates: certificates,
- validateCertificateChain: false,
- validateHost: false
- )
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- }
- // MARK: -
- class ServerTrustPolicyPinPublicKeysTestCase: ServerTrustPolicyTestCase {
- // MARK: Validate Certificate Chain Without Validating Host
- func testThatPinningLeafKeyPassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let publicKeys = [TestPublicKeys.leafValidDNSName]
- let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
- publicKeys: publicKeys,
- validateCertificateChain: true,
- validateHost: false
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinningIntermediateKeyPassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let publicKeys = [TestPublicKeys.intermediateCA2]
- let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
- publicKeys: publicKeys,
- validateCertificateChain: true,
- validateHost: false
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinningRootKeyPassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let publicKeys = [TestPublicKeys.rootCA]
- let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
- publicKeys: publicKeys,
- validateCertificateChain: true,
- validateHost: false
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinningKeyNotInCertificateChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let publicKeys = [TestPublicKeys.leafSignedByCA2]
- let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
- publicKeys: publicKeys,
- validateCertificateChain: true,
- validateHost: false
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatPinningBackupKeyPassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let publicKeys = [TestPublicKeys.leafSignedByCA1, TestPublicKeys.intermediateCA1, TestPublicKeys.leafValidDNSName]
- let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
- publicKeys: publicKeys,
- validateCertificateChain: true,
- validateHost: false
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- // MARK: Validate Certificate Chain and Host
- func testThatPinningLeafKeyPassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let publicKeys = [TestPublicKeys.leafValidDNSName]
- let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
- publicKeys: publicKeys,
- validateCertificateChain: true,
- validateHost: true
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinningIntermediateKeyPassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let publicKeys = [TestPublicKeys.intermediateCA2]
- let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
- publicKeys: publicKeys,
- validateCertificateChain: true,
- validateHost: true
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinningRootKeyPassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let publicKeys = [TestPublicKeys.rootCA]
- let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
- publicKeys: publicKeys,
- validateCertificateChain: true,
- validateHost: true
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinningKeyNotInCertificateChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let publicKeys = [TestPublicKeys.leafSignedByCA2]
- let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
- publicKeys: publicKeys,
- validateCertificateChain: true,
- validateHost: true
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatPinningBackupKeyPassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let publicKeys = [TestPublicKeys.leafSignedByCA1, TestPublicKeys.intermediateCA1, TestPublicKeys.leafValidDNSName]
- let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
- publicKeys: publicKeys,
- validateCertificateChain: true,
- validateHost: true
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- // MARK: Do NOT Validate Certificate Chain or Host
- func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithMissingIntermediateCertificate() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
- let publicKeys = [TestPublicKeys.leafValidDNSName]
- let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
- publicKeys: publicKeys,
- validateCertificateChain: false,
- validateHost: false
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinningRootKeyWithoutCertificateChainValidationFailsEvaluationWithMissingIntermediateCertificate() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
- let publicKeys = [TestPublicKeys.rootCA]
- let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
- publicKeys: publicKeys,
- validateCertificateChain: false,
- validateHost: false
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithIncorrectIntermediateCertificate() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSNameWithIncorrectIntermediate.trust
- let publicKeys = [TestPublicKeys.leafValidDNSName]
- let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
- publicKeys: publicKeys,
- validateCertificateChain: false,
- validateHost: false
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let publicKeys = [TestPublicKeys.leafExpired]
- let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
- publicKeys: publicKeys,
- validateCertificateChain: false,
- validateHost: false
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinningIntermediateKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let publicKeys = [TestPublicKeys.intermediateCA2]
- let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
- publicKeys: publicKeys,
- validateCertificateChain: false,
- validateHost: false
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatPinningRootKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let publicKeys = [TestPublicKeys.rootCA]
- let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
- publicKeys: publicKeys,
- validateCertificateChain: false,
- validateHost: false
- )
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- }
- // MARK: -
- class ServerTrustPolicyDisableEvaluationTestCase: ServerTrustPolicyTestCase {
- func testThatCertificateChainMissingIntermediateCertificatePassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
- let serverTrustPolicy = ServerTrustPolicy.disableEvaluation
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatExpiredLeafCertificatePassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let serverTrustPolicy = ServerTrustPolicy.disableEvaluation
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- }
- // MARK: -
- class ServerTrustPolicyCustomEvaluationTestCase: ServerTrustPolicyTestCase {
- func testThatReturningTrueFromClosurePassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let serverTrustPolicy = ServerTrustPolicy.customEvaluation { _, _ in
- return true
- }
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
- }
- func testThatReturningFalseFromClosurePassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let serverTrustPolicy = ServerTrustPolicy.customEvaluation { _, _ in
- return false
- }
- // When
- let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
- // Then
- XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
- }
- }
- // MARK: -
- class ServerTrustPolicyCertificatesInBundleTestCase: ServerTrustPolicyTestCase {
- func testOnlyValidCertificatesAreDetected() {
- // Given
- // Files present in bundle in the form of type+encoding+extension [key|cert][DER|PEM].[cer|crt|der|key|pem]
- // certDER.cer: DER-encoded well-formed certificate
- // certDER.crt: DER-encoded well-formed certificate
- // certDER.der: DER-encoded well-formed certificate
- // certPEM.*: PEM-encoded well-formed certificates, expected to fail: Apple API only handles DER encoding
- // devURandomGibberish.crt: Random data, should fail
- // keyDER.der: DER-encoded key, not a certificate, should fail
- // When
- let certificates = ServerTrustPolicy.certificates(
- in: Bundle(for: ServerTrustPolicyCertificatesInBundleTestCase.self)
- )
- // Then
- // Expectation: 19 well-formed certificates in the test bundle plus 4 invalid certificates.
- #if os(macOS)
- // For some reason, macOS is allowing all certificates to be considered valid. Need to file a
- // rdar demonstrating this behavior.
- if #available(OSX 10.12, *) {
- XCTAssertEqual(certificates.count, 19, "Expected 19 well-formed certificates")
- } else {
- XCTAssertEqual(certificates.count, 23, "Expected 23 well-formed certificates")
- }
- #else
- XCTAssertEqual(certificates.count, 19, "Expected 19 well-formed certificates")
- #endif
- }
- }
|