ServerTrustPolicyTests.swift 53 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424
  1. //
  2. // MultipartFormDataTests.swift
  3. //
  4. // Copyright (c) 2014-2016 Alamofire Software Foundation (http://alamofire.org/)
  5. //
  6. // Permission is hereby granted, free of charge, to any person obtaining a copy
  7. // of this software and associated documentation files (the "Software"), to deal
  8. // in the Software without restriction, including without limitation the rights
  9. // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  10. // copies of the Software, and to permit persons to whom the Software is
  11. // furnished to do so, subject to the following conditions:
  12. //
  13. // The above copyright notice and this permission notice shall be included in
  14. // all copies or substantial portions of the Software.
  15. //
  16. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  17. // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  18. // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  19. // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  20. // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  21. // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  22. // THE SOFTWARE.
  23. //
  24. import Alamofire
  25. import Foundation
  26. import XCTest
  27. private struct TestCertificates {
  28. // Root Certificates
  29. static let rootCA = TestCertificates.certificateWithFileName("alamofire-root-ca")
  30. // Intermediate Certificates
  31. static let intermediateCA1 = TestCertificates.certificateWithFileName("alamofire-signing-ca1")
  32. static let intermediateCA2 = TestCertificates.certificateWithFileName("alamofire-signing-ca2")
  33. // Leaf Certificates - Signed by CA1
  34. static let leafWildcard = TestCertificates.certificateWithFileName("wildcard.alamofire.org")
  35. static let leafMultipleDNSNames = TestCertificates.certificateWithFileName("multiple-dns-names")
  36. static let leafSignedByCA1 = TestCertificates.certificateWithFileName("signed-by-ca1")
  37. static let leafDNSNameAndURI = TestCertificates.certificateWithFileName("test.alamofire.org")
  38. // Leaf Certificates - Signed by CA2
  39. static let leafExpired = TestCertificates.certificateWithFileName("expired")
  40. static let leafMissingDNSNameAndURI = TestCertificates.certificateWithFileName("missing-dns-name-and-uri")
  41. static let leafSignedByCA2 = TestCertificates.certificateWithFileName("signed-by-ca2")
  42. static let leafValidDNSName = TestCertificates.certificateWithFileName("valid-dns-name")
  43. static let leafValidURI = TestCertificates.certificateWithFileName("valid-uri")
  44. static func certificateWithFileName(_ fileName: String) -> SecCertificate {
  45. class Locater {}
  46. let filePath = Bundle(for: Locater.self).path(forResource: fileName, ofType: "cer")!
  47. let data = try! Data(contentsOf: URL(fileURLWithPath: filePath))
  48. let certificate = SecCertificateCreateWithData(nil, data as CFData)!
  49. return certificate
  50. }
  51. }
  52. // MARK: -
  53. private struct TestPublicKeys {
  54. // Root Public Keys
  55. static let rootCA = TestPublicKeys.publicKey(for: TestCertificates.rootCA)
  56. // Intermediate Public Keys
  57. static let intermediateCA1 = TestPublicKeys.publicKey(for: TestCertificates.intermediateCA1)
  58. static let intermediateCA2 = TestPublicKeys.publicKey(for: TestCertificates.intermediateCA2)
  59. // Leaf Public Keys - Signed by CA1
  60. static let leafWildcard = TestPublicKeys.publicKey(for: TestCertificates.leafWildcard)
  61. static let leafMultipleDNSNames = TestPublicKeys.publicKey(for: TestCertificates.leafMultipleDNSNames)
  62. static let leafSignedByCA1 = TestPublicKeys.publicKey(for: TestCertificates.leafSignedByCA1)
  63. static let leafDNSNameAndURI = TestPublicKeys.publicKey(for: TestCertificates.leafDNSNameAndURI)
  64. // Leaf Public Keys - Signed by CA2
  65. static let leafExpired = TestPublicKeys.publicKey(for: TestCertificates.leafExpired)
  66. static let leafMissingDNSNameAndURI = TestPublicKeys.publicKey(for: TestCertificates.leafMissingDNSNameAndURI)
  67. static let leafSignedByCA2 = TestPublicKeys.publicKey(for: TestCertificates.leafSignedByCA2)
  68. static let leafValidDNSName = TestPublicKeys.publicKey(for: TestCertificates.leafValidDNSName)
  69. static let leafValidURI = TestPublicKeys.publicKey(for: TestCertificates.leafValidURI)
  70. static func publicKey(for certificate: SecCertificate) -> SecKey {
  71. let policy = SecPolicyCreateBasicX509()
  72. var trust: SecTrust?
  73. SecTrustCreateWithCertificates(certificate, policy, &trust)
  74. let publicKey = SecTrustCopyPublicKey(trust!)!
  75. return publicKey
  76. }
  77. }
  78. // MARK: -
  79. private enum TestTrusts {
  80. // Leaf Trusts - Signed by CA1
  81. case leafWildcard
  82. case leafMultipleDNSNames
  83. case leafSignedByCA1
  84. case leafDNSNameAndURI
  85. // Leaf Trusts - Signed by CA2
  86. case leafExpired
  87. case leafMissingDNSNameAndURI
  88. case leafSignedByCA2
  89. case leafValidDNSName
  90. case leafValidURI
  91. // Invalid Trusts
  92. case leafValidDNSNameMissingIntermediate
  93. case leafValidDNSNameWithIncorrectIntermediate
  94. var trust: SecTrust {
  95. let trust: SecTrust
  96. switch self {
  97. case .leafWildcard:
  98. trust = TestTrusts.trustWithCertificates([
  99. TestCertificates.leafWildcard,
  100. TestCertificates.intermediateCA1,
  101. TestCertificates.rootCA
  102. ])
  103. case .leafMultipleDNSNames:
  104. trust = TestTrusts.trustWithCertificates([
  105. TestCertificates.leafMultipleDNSNames,
  106. TestCertificates.intermediateCA1,
  107. TestCertificates.rootCA
  108. ])
  109. case .leafSignedByCA1:
  110. trust = TestTrusts.trustWithCertificates([
  111. TestCertificates.leafSignedByCA1,
  112. TestCertificates.intermediateCA1,
  113. TestCertificates.rootCA
  114. ])
  115. case .leafDNSNameAndURI:
  116. trust = TestTrusts.trustWithCertificates([
  117. TestCertificates.leafDNSNameAndURI,
  118. TestCertificates.intermediateCA1,
  119. TestCertificates.rootCA
  120. ])
  121. case .leafExpired:
  122. trust = TestTrusts.trustWithCertificates([
  123. TestCertificates.leafExpired,
  124. TestCertificates.intermediateCA2,
  125. TestCertificates.rootCA
  126. ])
  127. case .leafMissingDNSNameAndURI:
  128. trust = TestTrusts.trustWithCertificates([
  129. TestCertificates.leafMissingDNSNameAndURI,
  130. TestCertificates.intermediateCA2,
  131. TestCertificates.rootCA
  132. ])
  133. case .leafSignedByCA2:
  134. trust = TestTrusts.trustWithCertificates([
  135. TestCertificates.leafSignedByCA2,
  136. TestCertificates.intermediateCA2,
  137. TestCertificates.rootCA
  138. ])
  139. case .leafValidDNSName:
  140. trust = TestTrusts.trustWithCertificates([
  141. TestCertificates.leafValidDNSName,
  142. TestCertificates.intermediateCA2,
  143. TestCertificates.rootCA
  144. ])
  145. case .leafValidURI:
  146. trust = TestTrusts.trustWithCertificates([
  147. TestCertificates.leafValidURI,
  148. TestCertificates.intermediateCA2,
  149. TestCertificates.rootCA
  150. ])
  151. case .leafValidDNSNameMissingIntermediate:
  152. trust = TestTrusts.trustWithCertificates([
  153. TestCertificates.leafValidDNSName,
  154. TestCertificates.rootCA
  155. ])
  156. case .leafValidDNSNameWithIncorrectIntermediate:
  157. trust = TestTrusts.trustWithCertificates([
  158. TestCertificates.leafValidDNSName,
  159. TestCertificates.intermediateCA1,
  160. TestCertificates.rootCA
  161. ])
  162. }
  163. return trust
  164. }
  165. static func trustWithCertificates(_ certificates: [SecCertificate]) -> SecTrust {
  166. let policy = SecPolicyCreateBasicX509()
  167. var trust: SecTrust?
  168. SecTrustCreateWithCertificates(certificates as CFTypeRef, policy, &trust)
  169. return trust!
  170. }
  171. }
  172. // MARK: - Basic X509 and SSL Exploration Tests -
  173. class ServerTrustPolicyTestCase: BaseTestCase {
  174. func setRootCertificateAsLoneAnchorCertificateForTrust(_ trust: SecTrust) {
  175. SecTrustSetAnchorCertificates(trust, [TestCertificates.rootCA] as CFArray)
  176. SecTrustSetAnchorCertificatesOnly(trust, true)
  177. }
  178. func trustIsValid(_ trust: SecTrust) -> Bool {
  179. var isValid = false
  180. var result = SecTrustResultType.invalid
  181. let status = SecTrustEvaluate(trust, &result)
  182. if status == errSecSuccess {
  183. let unspecified = SecTrustResultType.unspecified
  184. let proceed = SecTrustResultType.proceed
  185. isValid = result == unspecified || result == proceed
  186. }
  187. return isValid
  188. }
  189. }
  190. // MARK: -
  191. class ServerTrustPolicyExplorationBasicX509PolicyValidationTestCase: ServerTrustPolicyTestCase {
  192. func testThatAnchoredRootCertificatePassesBasicX509ValidationWithRootInTrust() {
  193. // Given
  194. let trust = TestTrusts.trustWithCertificates([
  195. TestCertificates.leafDNSNameAndURI,
  196. TestCertificates.intermediateCA1,
  197. TestCertificates.rootCA
  198. ])
  199. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  200. // When
  201. let policies = [SecPolicyCreateBasicX509()]
  202. SecTrustSetPolicies(trust, policies as CFTypeRef)
  203. // Then
  204. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  205. }
  206. func testThatAnchoredRootCertificatePassesBasicX509ValidationWithoutRootInTrust() {
  207. // Given
  208. let trust = TestTrusts.leafDNSNameAndURI.trust
  209. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  210. // When
  211. let policies = [SecPolicyCreateBasicX509()]
  212. SecTrustSetPolicies(trust, policies as CFTypeRef)
  213. // Then
  214. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  215. }
  216. func testThatCertificateMissingDNSNamePassesBasicX509Validation() {
  217. // Given
  218. let trust = TestTrusts.leafMissingDNSNameAndURI.trust
  219. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  220. // When
  221. let policies = [SecPolicyCreateBasicX509()]
  222. SecTrustSetPolicies(trust, policies as CFTypeRef)
  223. // Then
  224. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  225. }
  226. func testThatExpiredCertificateFailsBasicX509Validation() {
  227. // Given
  228. let trust = TestTrusts.leafExpired.trust
  229. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  230. // When
  231. let policies = [SecPolicyCreateBasicX509()]
  232. SecTrustSetPolicies(trust, policies as CFTypeRef)
  233. // Then
  234. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  235. }
  236. }
  237. // MARK: -
  238. class ServerTrustPolicyExplorationSSLPolicyValidationTestCase: ServerTrustPolicyTestCase {
  239. func testThatAnchoredRootCertificatePassesSSLValidationWithRootInTrust() {
  240. // Given
  241. let trust = TestTrusts.trustWithCertificates([
  242. TestCertificates.leafDNSNameAndURI,
  243. TestCertificates.intermediateCA1,
  244. TestCertificates.rootCA
  245. ])
  246. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  247. // When
  248. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  249. SecTrustSetPolicies(trust, policies as CFTypeRef)
  250. // Then
  251. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  252. }
  253. func testThatAnchoredRootCertificatePassesSSLValidationWithoutRootInTrust() {
  254. // Given
  255. let trust = TestTrusts.leafDNSNameAndURI.trust
  256. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  257. // When
  258. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  259. SecTrustSetPolicies(trust, policies as CFTypeRef)
  260. // Then
  261. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  262. }
  263. func testThatCertificateMissingDNSNameFailsSSLValidation() {
  264. // Given
  265. let trust = TestTrusts.leafMissingDNSNameAndURI.trust
  266. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  267. // When
  268. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  269. SecTrustSetPolicies(trust, policies as CFTypeRef)
  270. // Then
  271. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  272. }
  273. func testThatWildcardCertificatePassesSSLValidation() {
  274. // Given
  275. let trust = TestTrusts.leafWildcard.trust // *.alamofire.org
  276. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  277. // When
  278. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  279. SecTrustSetPolicies(trust, policies as CFTypeRef)
  280. // Then
  281. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  282. }
  283. func testThatDNSNameCertificatePassesSSLValidation() {
  284. // Given
  285. let trust = TestTrusts.leafValidDNSName.trust
  286. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  287. // When
  288. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  289. SecTrustSetPolicies(trust, policies as CFTypeRef)
  290. // Then
  291. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  292. }
  293. func testThatURICertificateFailsSSLValidation() {
  294. // Given
  295. let trust = TestTrusts.leafValidURI.trust
  296. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  297. // When
  298. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  299. SecTrustSetPolicies(trust, policies as CFTypeRef)
  300. // Then
  301. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  302. }
  303. func testThatMultipleDNSNamesCertificatePassesSSLValidationForAllEntries() {
  304. // Given
  305. let trust = TestTrusts.leafMultipleDNSNames.trust
  306. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  307. // When
  308. let policies = [
  309. SecPolicyCreateSSL(true, "test.alamofire.org" as CFString),
  310. SecPolicyCreateSSL(true, "blog.alamofire.org" as CFString),
  311. SecPolicyCreateSSL(true, "www.alamofire.org" as CFString)
  312. ]
  313. SecTrustSetPolicies(trust, policies as CFTypeRef)
  314. // Then
  315. XCTAssertTrue(trustIsValid(trust), "trust should not be valid")
  316. }
  317. func testThatPassingNilForHostParameterAllowsCertificateMissingDNSNameToPassSSLValidation() {
  318. // Given
  319. let trust = TestTrusts.leafMissingDNSNameAndURI.trust
  320. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  321. // When
  322. let policies = [SecPolicyCreateSSL(true, nil)]
  323. SecTrustSetPolicies(trust, policies as CFTypeRef)
  324. // Then
  325. XCTAssertTrue(trustIsValid(trust), "trust should not be valid")
  326. }
  327. func testThatExpiredCertificateFailsSSLValidation() {
  328. // Given
  329. let trust = TestTrusts.leafExpired.trust
  330. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  331. // When
  332. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  333. SecTrustSetPolicies(trust, policies as CFTypeRef)
  334. // Then
  335. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  336. }
  337. }
  338. // MARK: - Server Trust Policy Tests -
  339. class ServerTrustPolicyPerformDefaultEvaluationTestCase: ServerTrustPolicyTestCase {
  340. // MARK: Do NOT Validate Host
  341. func testThatValidCertificateChainPassesEvaluationWithoutHostValidation() {
  342. // Given
  343. let host = "test.alamofire.org"
  344. let serverTrust = TestTrusts.leafValidDNSName.trust
  345. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: false)
  346. // When
  347. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  348. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  349. // Then
  350. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  351. }
  352. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithoutHostValidation() {
  353. // Given
  354. let host = "test.alamofire.org"
  355. let serverTrust = TestTrusts.trustWithCertificates([
  356. TestCertificates.leafValidDNSName,
  357. TestCertificates.intermediateCA2
  358. ])
  359. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: false)
  360. // When
  361. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  362. // Then
  363. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  364. }
  365. func testThatMissingDNSNameLeafCertificatePassesEvaluationWithoutHostValidation() {
  366. // Given
  367. let host = "test.alamofire.org"
  368. let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
  369. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: false)
  370. // When
  371. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  372. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  373. // Then
  374. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  375. }
  376. func testThatExpiredCertificateChainFailsEvaluationWithoutHostValidation() {
  377. // Given
  378. let host = "test.alamofire.org"
  379. let serverTrust = TestTrusts.leafExpired.trust
  380. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: false)
  381. // When
  382. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  383. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  384. // Then
  385. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  386. }
  387. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithoutHostValidation() {
  388. // Given
  389. let host = "test.alamofire.org"
  390. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  391. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: false)
  392. // When
  393. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  394. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  395. // Then
  396. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  397. }
  398. // MARK: Validate Host
  399. func testThatValidCertificateChainPassesEvaluationWithHostValidation() {
  400. // Given
  401. let host = "test.alamofire.org"
  402. let serverTrust = TestTrusts.leafValidDNSName.trust
  403. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
  404. // When
  405. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  406. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  407. // Then
  408. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  409. }
  410. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithHostValidation() {
  411. // Given
  412. let host = "test.alamofire.org"
  413. let serverTrust = TestTrusts.trustWithCertificates([
  414. TestCertificates.leafValidDNSName,
  415. TestCertificates.intermediateCA2
  416. ])
  417. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
  418. // When
  419. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  420. // Then
  421. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  422. }
  423. func testThatMissingDNSNameLeafCertificateFailsEvaluationWithHostValidation() {
  424. // Given
  425. let host = "test.alamofire.org"
  426. let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
  427. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
  428. // When
  429. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  430. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  431. // Then
  432. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  433. }
  434. func testThatWildcardedLeafCertificateChainPassesEvaluationWithHostValidation() {
  435. // Given
  436. let host = "test.alamofire.org"
  437. let serverTrust = TestTrusts.leafWildcard.trust
  438. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
  439. // When
  440. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  441. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  442. // Then
  443. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  444. }
  445. func testThatExpiredCertificateChainFailsEvaluationWithHostValidation() {
  446. // Given
  447. let host = "test.alamofire.org"
  448. let serverTrust = TestTrusts.leafExpired.trust
  449. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
  450. // When
  451. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  452. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  453. // Then
  454. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  455. }
  456. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithHostValidation() {
  457. // Given
  458. let host = "test.alamofire.org"
  459. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  460. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
  461. // When
  462. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  463. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  464. // Then
  465. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  466. }
  467. }
  468. // MARK: -
  469. class ServerTrustPolicyPinCertificatesTestCase: ServerTrustPolicyTestCase {
  470. // MARK: Validate Certificate Chain Without Validating Host
  471. func testThatPinnedLeafCertificatePassesEvaluationWithoutHostValidation() {
  472. // Given
  473. let host = "test.alamofire.org"
  474. let serverTrust = TestTrusts.leafValidDNSName.trust
  475. let certificates = [TestCertificates.leafValidDNSName]
  476. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  477. certificates: certificates,
  478. validateCertificateChain: true,
  479. validateHost: false
  480. )
  481. // When
  482. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  483. // Then
  484. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  485. }
  486. func testThatPinnedIntermediateCertificatePassesEvaluationWithoutHostValidation() {
  487. // Given
  488. let host = "test.alamofire.org"
  489. let serverTrust = TestTrusts.leafValidDNSName.trust
  490. let certificates = [TestCertificates.intermediateCA2]
  491. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  492. certificates: certificates,
  493. validateCertificateChain: true,
  494. validateHost: false
  495. )
  496. // When
  497. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  498. // Then
  499. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  500. }
  501. func testThatPinnedRootCertificatePassesEvaluationWithoutHostValidation() {
  502. // Given
  503. let host = "test.alamofire.org"
  504. let serverTrust = TestTrusts.leafValidDNSName.trust
  505. let certificates = [TestCertificates.rootCA]
  506. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  507. certificates: certificates,
  508. validateCertificateChain: true,
  509. validateHost: false
  510. )
  511. // When
  512. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  513. // Then
  514. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  515. }
  516. func testThatPinningLeafCertificateNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  517. // Given
  518. let host = "test.alamofire.org"
  519. let serverTrust = TestTrusts.leafValidDNSName.trust
  520. let certificates = [TestCertificates.leafSignedByCA2]
  521. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  522. certificates: certificates,
  523. validateCertificateChain: true,
  524. validateHost: false
  525. )
  526. // When
  527. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  528. // Then
  529. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  530. }
  531. func testThatPinningIntermediateCertificateNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  532. // Given
  533. let host = "test.alamofire.org"
  534. let serverTrust = TestTrusts.leafValidDNSName.trust
  535. let certificates = [TestCertificates.intermediateCA1]
  536. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  537. certificates: certificates,
  538. validateCertificateChain: true,
  539. validateHost: false
  540. )
  541. // When
  542. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  543. // Then
  544. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  545. }
  546. func testThatPinningExpiredLeafCertificateFailsEvaluationWithoutHostValidation() {
  547. // Given
  548. let host = "test.alamofire.org"
  549. let serverTrust = TestTrusts.leafExpired.trust
  550. let certificates = [TestCertificates.leafExpired]
  551. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  552. certificates: certificates,
  553. validateCertificateChain: true,
  554. validateHost: false
  555. )
  556. // When
  557. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  558. // Then
  559. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  560. }
  561. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateFailsEvaluationWithoutHostValidation() {
  562. // Given
  563. let host = "test.alamofire.org"
  564. let serverTrust = TestTrusts.leafExpired.trust
  565. let certificates = [TestCertificates.intermediateCA2]
  566. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  567. certificates: certificates,
  568. validateCertificateChain: true,
  569. validateHost: false
  570. )
  571. // When
  572. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  573. // Then
  574. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  575. }
  576. // MARK: Validate Certificate Chain and Host
  577. func testThatPinnedLeafCertificatePassesEvaluationWithHostValidation() {
  578. // Given
  579. let host = "test.alamofire.org"
  580. let serverTrust = TestTrusts.leafValidDNSName.trust
  581. let certificates = [TestCertificates.leafValidDNSName]
  582. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  583. certificates: certificates,
  584. validateCertificateChain: true,
  585. validateHost: true
  586. )
  587. // When
  588. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  589. // Then
  590. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  591. }
  592. func testThatPinnedIntermediateCertificatePassesEvaluationWithHostValidation() {
  593. // Given
  594. let host = "test.alamofire.org"
  595. let serverTrust = TestTrusts.leafValidDNSName.trust
  596. let certificates = [TestCertificates.intermediateCA2]
  597. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  598. certificates: certificates,
  599. validateCertificateChain: true,
  600. validateHost: true
  601. )
  602. // When
  603. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  604. // Then
  605. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  606. }
  607. func testThatPinnedRootCertificatePassesEvaluationWithHostValidation() {
  608. // Given
  609. let host = "test.alamofire.org"
  610. let serverTrust = TestTrusts.leafValidDNSName.trust
  611. let certificates = [TestCertificates.rootCA]
  612. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  613. certificates: certificates,
  614. validateCertificateChain: true,
  615. validateHost: true
  616. )
  617. // When
  618. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  619. // Then
  620. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  621. }
  622. func testThatPinningLeafCertificateNotInCertificateChainFailsEvaluationWithHostValidation() {
  623. // Given
  624. let host = "test.alamofire.org"
  625. let serverTrust = TestTrusts.leafValidDNSName.trust
  626. let certificates = [TestCertificates.leafSignedByCA2]
  627. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  628. certificates: certificates,
  629. validateCertificateChain: true,
  630. validateHost: true
  631. )
  632. // When
  633. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  634. // Then
  635. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  636. }
  637. func testThatPinningIntermediateCertificateNotInCertificateChainFailsEvaluationWithHostValidation() {
  638. // Given
  639. let host = "test.alamofire.org"
  640. let serverTrust = TestTrusts.leafValidDNSName.trust
  641. let certificates = [TestCertificates.intermediateCA1]
  642. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  643. certificates: certificates,
  644. validateCertificateChain: true,
  645. validateHost: true
  646. )
  647. // When
  648. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  649. // Then
  650. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  651. }
  652. func testThatPinningExpiredLeafCertificateFailsEvaluationWithHostValidation() {
  653. // Given
  654. let host = "test.alamofire.org"
  655. let serverTrust = TestTrusts.leafExpired.trust
  656. let certificates = [TestCertificates.leafExpired]
  657. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  658. certificates: certificates,
  659. validateCertificateChain: true,
  660. validateHost: true
  661. )
  662. // When
  663. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  664. // Then
  665. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  666. }
  667. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateFailsEvaluationWithHostValidation() {
  668. // Given
  669. let host = "test.alamofire.org"
  670. let serverTrust = TestTrusts.leafExpired.trust
  671. let certificates = [TestCertificates.intermediateCA2]
  672. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  673. certificates: certificates,
  674. validateCertificateChain: true,
  675. validateHost: true
  676. )
  677. // When
  678. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  679. // Then
  680. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  681. }
  682. // MARK: Do NOT Validate Certificate Chain or Host
  683. func testThatPinnedLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  684. // Given
  685. let host = "test.alamofire.org"
  686. let serverTrust = TestTrusts.leafValidDNSName.trust
  687. let certificates = [TestCertificates.leafValidDNSName]
  688. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  689. certificates: certificates,
  690. validateCertificateChain: false,
  691. validateHost: false
  692. )
  693. // When
  694. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  695. // Then
  696. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  697. }
  698. func testThatPinnedIntermediateCertificateWithoutCertificateChainValidationPassesEvaluation() {
  699. // Given
  700. let host = "test.alamofire.org"
  701. let serverTrust = TestTrusts.leafValidDNSName.trust
  702. let certificates = [TestCertificates.intermediateCA2]
  703. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  704. certificates: certificates,
  705. validateCertificateChain: false,
  706. validateHost: false
  707. )
  708. // When
  709. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  710. // Then
  711. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  712. }
  713. func testThatPinnedRootCertificateWithoutCertificateChainValidationPassesEvaluation() {
  714. // Given
  715. let host = "test.alamofire.org"
  716. let serverTrust = TestTrusts.leafValidDNSName.trust
  717. let certificates = [TestCertificates.rootCA]
  718. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  719. certificates: certificates,
  720. validateCertificateChain: false,
  721. validateHost: false
  722. )
  723. // When
  724. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  725. // Then
  726. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  727. }
  728. func testThatPinningLeafCertificateNotInCertificateChainWithoutCertificateChainValidationFailsEvaluation() {
  729. // Given
  730. let host = "test.alamofire.org"
  731. let serverTrust = TestTrusts.leafValidDNSName.trust
  732. let certificates = [TestCertificates.leafSignedByCA2]
  733. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  734. certificates: certificates,
  735. validateCertificateChain: false,
  736. validateHost: false
  737. )
  738. // When
  739. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  740. // Then
  741. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  742. }
  743. func testThatPinningIntermediateCertificateNotInCertificateChainWithoutCertificateChainValidationFailsEvaluation() {
  744. // Given
  745. let host = "test.alamofire.org"
  746. let serverTrust = TestTrusts.leafValidDNSName.trust
  747. let certificates = [TestCertificates.intermediateCA1]
  748. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  749. certificates: certificates,
  750. validateCertificateChain: false,
  751. validateHost: false
  752. )
  753. // When
  754. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  755. // Then
  756. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  757. }
  758. func testThatPinningExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  759. // Given
  760. let host = "test.alamofire.org"
  761. let serverTrust = TestTrusts.leafExpired.trust
  762. let certificates = [TestCertificates.leafExpired]
  763. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  764. certificates: certificates,
  765. validateCertificateChain: false,
  766. validateHost: false
  767. )
  768. // When
  769. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  770. // Then
  771. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  772. }
  773. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  774. // Given
  775. let host = "test.alamofire.org"
  776. let serverTrust = TestTrusts.leafExpired.trust
  777. let certificates = [TestCertificates.intermediateCA2]
  778. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  779. certificates: certificates,
  780. validateCertificateChain: false,
  781. validateHost: false
  782. )
  783. // When
  784. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  785. // Then
  786. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  787. }
  788. func testThatPinningRootCertificateWithExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  789. // Given
  790. let host = "test.alamofire.org"
  791. let serverTrust = TestTrusts.leafExpired.trust
  792. let certificates = [TestCertificates.rootCA]
  793. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  794. certificates: certificates,
  795. validateCertificateChain: false,
  796. validateHost: false
  797. )
  798. // When
  799. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  800. // Then
  801. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  802. }
  803. func testThatPinningMultipleCertificatesWithoutCertificateChainValidationPassesEvaluation() {
  804. // Given
  805. let host = "test.alamofire.org"
  806. let serverTrust = TestTrusts.leafExpired.trust
  807. let certificates = [
  808. TestCertificates.leafMultipleDNSNames, // not in certificate chain
  809. TestCertificates.leafSignedByCA1, // not in certificate chain
  810. TestCertificates.leafExpired, // in certificate chain 👍🏼👍🏼
  811. TestCertificates.leafWildcard, // not in certificate chain
  812. TestCertificates.leafDNSNameAndURI, // not in certificate chain
  813. ]
  814. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  815. certificates: certificates,
  816. validateCertificateChain: false,
  817. validateHost: false
  818. )
  819. // When
  820. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  821. // Then
  822. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  823. }
  824. }
  825. // MARK: -
  826. class ServerTrustPolicyPinPublicKeysTestCase: ServerTrustPolicyTestCase {
  827. // MARK: Validate Certificate Chain Without Validating Host
  828. func testThatPinningLeafKeyPassesEvaluationWithoutHostValidation() {
  829. // Given
  830. let host = "test.alamofire.org"
  831. let serverTrust = TestTrusts.leafValidDNSName.trust
  832. let publicKeys = [TestPublicKeys.leafValidDNSName]
  833. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  834. publicKeys: publicKeys,
  835. validateCertificateChain: true,
  836. validateHost: false
  837. )
  838. // When
  839. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  840. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  841. // Then
  842. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  843. }
  844. func testThatPinningIntermediateKeyPassesEvaluationWithoutHostValidation() {
  845. // Given
  846. let host = "test.alamofire.org"
  847. let serverTrust = TestTrusts.leafValidDNSName.trust
  848. let publicKeys = [TestPublicKeys.intermediateCA2]
  849. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  850. publicKeys: publicKeys,
  851. validateCertificateChain: true,
  852. validateHost: false
  853. )
  854. // When
  855. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  856. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  857. // Then
  858. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  859. }
  860. func testThatPinningRootKeyPassesEvaluationWithoutHostValidation() {
  861. // Given
  862. let host = "test.alamofire.org"
  863. let serverTrust = TestTrusts.leafValidDNSName.trust
  864. let publicKeys = [TestPublicKeys.rootCA]
  865. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  866. publicKeys: publicKeys,
  867. validateCertificateChain: true,
  868. validateHost: false
  869. )
  870. // When
  871. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  872. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  873. // Then
  874. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  875. }
  876. func testThatPinningKeyNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  877. // Given
  878. let host = "test.alamofire.org"
  879. let serverTrust = TestTrusts.leafValidDNSName.trust
  880. let publicKeys = [TestPublicKeys.leafSignedByCA2]
  881. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  882. publicKeys: publicKeys,
  883. validateCertificateChain: true,
  884. validateHost: false
  885. )
  886. // When
  887. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  888. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  889. // Then
  890. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  891. }
  892. func testThatPinningBackupKeyPassesEvaluationWithoutHostValidation() {
  893. // Given
  894. let host = "test.alamofire.org"
  895. let serverTrust = TestTrusts.leafValidDNSName.trust
  896. let publicKeys = [TestPublicKeys.leafSignedByCA1, TestPublicKeys.intermediateCA1, TestPublicKeys.leafValidDNSName]
  897. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  898. publicKeys: publicKeys,
  899. validateCertificateChain: true,
  900. validateHost: false
  901. )
  902. // When
  903. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  904. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  905. // Then
  906. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  907. }
  908. // MARK: Validate Certificate Chain and Host
  909. func testThatPinningLeafKeyPassesEvaluationWithHostValidation() {
  910. // Given
  911. let host = "test.alamofire.org"
  912. let serverTrust = TestTrusts.leafValidDNSName.trust
  913. let publicKeys = [TestPublicKeys.leafValidDNSName]
  914. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  915. publicKeys: publicKeys,
  916. validateCertificateChain: true,
  917. validateHost: true
  918. )
  919. // When
  920. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  921. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  922. // Then
  923. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  924. }
  925. func testThatPinningIntermediateKeyPassesEvaluationWithHostValidation() {
  926. // Given
  927. let host = "test.alamofire.org"
  928. let serverTrust = TestTrusts.leafValidDNSName.trust
  929. let publicKeys = [TestPublicKeys.intermediateCA2]
  930. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  931. publicKeys: publicKeys,
  932. validateCertificateChain: true,
  933. validateHost: true
  934. )
  935. // When
  936. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  937. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  938. // Then
  939. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  940. }
  941. func testThatPinningRootKeyPassesEvaluationWithHostValidation() {
  942. // Given
  943. let host = "test.alamofire.org"
  944. let serverTrust = TestTrusts.leafValidDNSName.trust
  945. let publicKeys = [TestPublicKeys.rootCA]
  946. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  947. publicKeys: publicKeys,
  948. validateCertificateChain: true,
  949. validateHost: true
  950. )
  951. // When
  952. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  953. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  954. // Then
  955. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  956. }
  957. func testThatPinningKeyNotInCertificateChainFailsEvaluationWithHostValidation() {
  958. // Given
  959. let host = "test.alamofire.org"
  960. let serverTrust = TestTrusts.leafValidDNSName.trust
  961. let publicKeys = [TestPublicKeys.leafSignedByCA2]
  962. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  963. publicKeys: publicKeys,
  964. validateCertificateChain: true,
  965. validateHost: true
  966. )
  967. // When
  968. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  969. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  970. // Then
  971. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  972. }
  973. func testThatPinningBackupKeyPassesEvaluationWithHostValidation() {
  974. // Given
  975. let host = "test.alamofire.org"
  976. let serverTrust = TestTrusts.leafValidDNSName.trust
  977. let publicKeys = [TestPublicKeys.leafSignedByCA1, TestPublicKeys.intermediateCA1, TestPublicKeys.leafValidDNSName]
  978. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  979. publicKeys: publicKeys,
  980. validateCertificateChain: true,
  981. validateHost: true
  982. )
  983. // When
  984. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  985. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  986. // Then
  987. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  988. }
  989. // MARK: Do NOT Validate Certificate Chain or Host
  990. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithMissingIntermediateCertificate() {
  991. // Given
  992. let host = "test.alamofire.org"
  993. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  994. let publicKeys = [TestPublicKeys.leafValidDNSName]
  995. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  996. publicKeys: publicKeys,
  997. validateCertificateChain: false,
  998. validateHost: false
  999. )
  1000. // When
  1001. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1002. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1003. // Then
  1004. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1005. }
  1006. func testThatPinningRootKeyWithoutCertificateChainValidationFailsEvaluationWithMissingIntermediateCertificate() {
  1007. // Given
  1008. let host = "test.alamofire.org"
  1009. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  1010. let publicKeys = [TestPublicKeys.rootCA]
  1011. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1012. publicKeys: publicKeys,
  1013. validateCertificateChain: false,
  1014. validateHost: false
  1015. )
  1016. // When
  1017. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1018. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1019. // Then
  1020. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  1021. }
  1022. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithIncorrectIntermediateCertificate() {
  1023. // Given
  1024. let host = "test.alamofire.org"
  1025. let serverTrust = TestTrusts.leafValidDNSNameWithIncorrectIntermediate.trust
  1026. let publicKeys = [TestPublicKeys.leafValidDNSName]
  1027. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1028. publicKeys: publicKeys,
  1029. validateCertificateChain: false,
  1030. validateHost: false
  1031. )
  1032. // When
  1033. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1034. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1035. // Then
  1036. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1037. }
  1038. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1039. // Given
  1040. let host = "test.alamofire.org"
  1041. let serverTrust = TestTrusts.leafExpired.trust
  1042. let publicKeys = [TestPublicKeys.leafExpired]
  1043. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1044. publicKeys: publicKeys,
  1045. validateCertificateChain: false,
  1046. validateHost: false
  1047. )
  1048. // When
  1049. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1050. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1051. // Then
  1052. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1053. }
  1054. func testThatPinningIntermediateKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1055. // Given
  1056. let host = "test.alamofire.org"
  1057. let serverTrust = TestTrusts.leafExpired.trust
  1058. let publicKeys = [TestPublicKeys.intermediateCA2]
  1059. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1060. publicKeys: publicKeys,
  1061. validateCertificateChain: false,
  1062. validateHost: false
  1063. )
  1064. // When
  1065. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1066. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1067. // Then
  1068. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1069. }
  1070. func testThatPinningRootKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1071. // Given
  1072. let host = "test.alamofire.org"
  1073. let serverTrust = TestTrusts.leafExpired.trust
  1074. let publicKeys = [TestPublicKeys.rootCA]
  1075. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1076. publicKeys: publicKeys,
  1077. validateCertificateChain: false,
  1078. validateHost: false
  1079. )
  1080. // When
  1081. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1082. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1083. // Then
  1084. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1085. }
  1086. }
  1087. // MARK: -
  1088. class ServerTrustPolicyDisableEvaluationTestCase: ServerTrustPolicyTestCase {
  1089. func testThatCertificateChainMissingIntermediateCertificatePassesEvaluation() {
  1090. // Given
  1091. let host = "test.alamofire.org"
  1092. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  1093. let serverTrustPolicy = ServerTrustPolicy.disableEvaluation
  1094. // When
  1095. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1096. // Then
  1097. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1098. }
  1099. func testThatExpiredLeafCertificatePassesEvaluation() {
  1100. // Given
  1101. let host = "test.alamofire.org"
  1102. let serverTrust = TestTrusts.leafExpired.trust
  1103. let serverTrustPolicy = ServerTrustPolicy.disableEvaluation
  1104. // When
  1105. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1106. // Then
  1107. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1108. }
  1109. }
  1110. // MARK: -
  1111. class ServerTrustPolicyCustomEvaluationTestCase: ServerTrustPolicyTestCase {
  1112. func testThatReturningTrueFromClosurePassesEvaluation() {
  1113. // Given
  1114. let host = "test.alamofire.org"
  1115. let serverTrust = TestTrusts.leafValidDNSName.trust
  1116. let serverTrustPolicy = ServerTrustPolicy.customEvaluation { _, _ in
  1117. return true
  1118. }
  1119. // When
  1120. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1121. // Then
  1122. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1123. }
  1124. func testThatReturningFalseFromClosurePassesEvaluation() {
  1125. // Given
  1126. let host = "test.alamofire.org"
  1127. let serverTrust = TestTrusts.leafValidDNSName.trust
  1128. let serverTrustPolicy = ServerTrustPolicy.customEvaluation { _, _ in
  1129. return false
  1130. }
  1131. // When
  1132. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1133. // Then
  1134. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  1135. }
  1136. }
  1137. // MARK: -
  1138. class ServerTrustPolicyCertificatesInBundleTestCase: ServerTrustPolicyTestCase {
  1139. func testOnlyValidCertificatesAreDetected() {
  1140. // Given
  1141. // Files present in bundle in the form of type+encoding+extension [key|cert][DER|PEM].[cer|crt|der|key|pem]
  1142. // certDER.cer: DER-encoded well-formed certificate
  1143. // certDER.crt: DER-encoded well-formed certificate
  1144. // certDER.der: DER-encoded well-formed certificate
  1145. // certPEM.*: PEM-encoded well-formed certificates, expected to fail: Apple API only handles DER encoding
  1146. // devURandomGibberish.crt: Random data, should fail
  1147. // keyDER.der: DER-encoded key, not a certificate, should fail
  1148. // When
  1149. let certificates = ServerTrustPolicy.certificates(
  1150. in: Bundle(for: ServerTrustPolicyCertificatesInBundleTestCase.self)
  1151. )
  1152. // Then
  1153. // Expectation: 19 well-formed certificates in the test bundle plus 4 invalid certificates.
  1154. #if os(macOS)
  1155. // For some reason, macOS is allowing all certificates to be considered valid. Need to file a
  1156. // rdar demonstrating this behavior.
  1157. if #available(OSX 10.12, *) {
  1158. XCTAssertEqual(certificates.count, 19, "Expected 19 well-formed certificates")
  1159. } else {
  1160. XCTAssertEqual(certificates.count, 23, "Expected 23 well-formed certificates")
  1161. }
  1162. #else
  1163. XCTAssertEqual(certificates.count, 19, "Expected 19 well-formed certificates")
  1164. #endif
  1165. }
  1166. }