| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381 |
- // DownloadTests.swift
- //
- // Copyright (c) 2014–2015 Alamofire Software Foundation (http://alamofire.org/)
- //
- // Permission is hereby granted, free of charge, to any person obtaining a copy
- // of this software and associated documentation files (the "Software"), to deal
- // in the Software without restriction, including without limitation the rights
- // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- // copies of the Software, and to permit persons to whom the Software is
- // furnished to do so, subject to the following conditions:
- //
- // The above copyright notice and this permission notice shall be included in
- // all copies or substantial portions of the Software.
- //
- // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
- // THE SOFTWARE.
- import Alamofire
- import Foundation
- import XCTest
- private struct TestCertificates {
- static let RootCA = TestCertificates.certificateWithFileName("root-ca-disig")
- static let IntermedateCA = TestCertificates.certificateWithFileName("intermediate-ca-disig")
- static let Leaf = TestCertificates.certificateWithFileName("testssl-expire.disig.sk")
- static func certificateWithFileName(fileName: String) -> SecCertificate {
- class Bundle {}
- let filePath = NSBundle(forClass: Bundle.self).pathForResource(fileName, ofType: "cer")!
- let data = NSData(contentsOfFile: filePath)!
- let certificate = SecCertificateCreateWithData(nil, data).takeRetainedValue()
- return certificate
- }
- }
- // MARK: -
- private struct TestPublicKeys {
- static let RootCA = TestPublicKeys.publicKeyForCertificate(TestCertificates.RootCA)
- static let IntermediateCA = TestPublicKeys.publicKeyForCertificate(TestCertificates.IntermedateCA)
- static let Leaf = TestPublicKeys.publicKeyForCertificate(TestCertificates.Leaf)
- static func publicKeyForCertificate(certificate: SecCertificate) -> SecKey {
- let policy = SecPolicyCreateBasicX509().takeRetainedValue()
- var unmanagedTrust: Unmanaged<SecTrust>?
- let trustCreationStatus = SecTrustCreateWithCertificates(certificate, policy, &unmanagedTrust)
- let trust = unmanagedTrust!.takeRetainedValue()
- let publicKey = SecTrustCopyPublicKey(trust).takeRetainedValue()
- return publicKey
- }
- }
- // MARK: -
- class TLSEvaluationExpiredLeafCertificateTestCase: BaseTestCase {
- let URL = "https://testssl-expire.disig.sk/"
- let host = "testssl-expire.disig.sk"
- var configuration: NSURLSessionConfiguration!
- // MARK: Setup and Teardown
- override func setUp() {
- super.setUp()
- self.configuration = NSURLSessionConfiguration.ephemeralSessionConfiguration()
- }
- // MARK: Default Behavior Tests
- func testThatExpiredCertificateRequestFailsWithNoServerTrustPolicy() {
- // Given
- let expectation = expectationWithDescription("\(self.URL)")
- let manager = Manager(configuration: self.configuration)
- var error: NSError?
- // When
- manager.request(.GET, self.URL)
- .response { _, _, _, responseError in
- error = responseError
- expectation.fulfill()
- }
- waitForExpectationsWithTimeout(self.defaultTimeout, handler: nil)
- // Then
- XCTAssertNotNil(error, "error should not be nil")
- XCTAssertEqual(error?.code ?? -1, NSURLErrorServerCertificateUntrusted, "error should be NSURLErrorServerCertificateUntrusted")
- }
- // MARK: Server Trust Policy - Perform Default Tests
- func testThatExpiredCertificateRequestFailsWithDefaultServerTrustPolicy() {
- // Given
- let policies = [self.host: ServerTrustPolicy.PerformDefaultEvaluation(validateHost: true)]
- let manager = Manager(
- configuration: self.configuration,
- serverTrustPolicyManager: ServerTrustPolicyManager(policies: policies)
- )
- let expectation = expectationWithDescription("\(self.URL)")
- var error: NSError?
- // When
- manager.request(.GET, self.URL)
- .response { _, _, _, responseError in
- error = responseError
- expectation.fulfill()
- }
- waitForExpectationsWithTimeout(self.defaultTimeout, handler: nil)
- // Then
- XCTAssertNotNil(error, "error should not be nil")
- XCTAssertEqual(error?.code ?? -1, NSURLErrorCancelled, "error should be NSURLErrorCancelled")
- }
- // MARK: Server Trust Policy - Certificate Pinning Tests
- func testThatExpiredCertificateRequestFailsWhenPinningLeafCertificate() {
- // Given
- let certificates = [TestCertificates.Leaf]
- let policies = [self.host: ServerTrustPolicy.PinCertificates(certificates: certificates, validateHost: true)]
- let manager = Manager(
- configuration: self.configuration,
- serverTrustPolicyManager: ServerTrustPolicyManager(policies: policies)
- )
- let expectation = expectationWithDescription("\(self.URL)")
- var error: NSError?
- // When
- manager.request(.GET, self.URL)
- .response { _, _, _, responseError in
- error = responseError
- expectation.fulfill()
- }
- waitForExpectationsWithTimeout(self.defaultTimeout, handler: nil)
- // Then
- XCTAssertNotNil(error, "error should not be nil")
- XCTAssertEqual(error?.code ?? -1, NSURLErrorCancelled, "error should be NSURLErrorCancelled")
- }
- func testThatExpiredCertificateRequestFailsWhenPinningAllCertificates() {
- // Given
- let certificates = [TestCertificates.Leaf, TestCertificates.IntermedateCA, TestCertificates.RootCA]
- let policies = [self.host: ServerTrustPolicy.PinCertificates(certificates: certificates, validateHost: true)]
- let manager = Manager(
- configuration: self.configuration,
- serverTrustPolicyManager: ServerTrustPolicyManager(policies: policies)
- )
- let expectation = expectationWithDescription("\(self.URL)")
- var error: NSError?
- // When
- manager.request(.GET, self.URL)
- .response { _, _, _, responseError in
- error = responseError
- expectation.fulfill()
- }
- waitForExpectationsWithTimeout(self.defaultTimeout, handler: nil)
- // Then
- XCTAssertNotNil(error, "error should not be nil")
- XCTAssertEqual(error?.code ?? -1, NSURLErrorCancelled, "error should be NSURLErrorCancelled")
- }
- // MARK: Server Trust Policy - Public Key Pinning Tests
- func testThatExpiredCertificateRequestFailsWhenPinningLeafPublicKeyWhileNotAllowingInvalidCertificates() {
- // Given
- let publicKeys = [TestPublicKeys.Leaf]
- let policies: [String: ServerTrustPolicy] = [
- self.host: .PinPublicKeys(publicKeys: publicKeys, validateHost: true, allowInvalidCertificates: false)
- ]
- let manager = Manager(
- configuration: self.configuration,
- serverTrustPolicyManager: ServerTrustPolicyManager(policies: policies)
- )
- let expectation = expectationWithDescription("\(self.URL)")
- var error: NSError?
- // When
- manager.request(.GET, self.URL)
- .response { _, _, _, responseError in
- error = responseError
- expectation.fulfill()
- }
- waitForExpectationsWithTimeout(self.defaultTimeout, handler: nil)
- // Then
- XCTAssertNotNil(error, "error should not be nil")
- XCTAssertEqual(error?.code ?? -1, NSURLErrorCancelled, "error should be NSURLErrorCancelled")
- }
- func testThatExpiredCertificateRequestSucceedsWhenPinningLeafPublicKeyAndAllowingInvalidCertificates() {
- // Given
- let publicKeys = [TestPublicKeys.Leaf]
- let policies: [String: ServerTrustPolicy] = [
- self.host: .PinPublicKeys(publicKeys: publicKeys, validateHost: true, allowInvalidCertificates: true)
- ]
- let manager = Manager(
- configuration: self.configuration,
- serverTrustPolicyManager: ServerTrustPolicyManager(policies: policies)
- )
- let expectation = expectationWithDescription("\(self.URL)")
- var error: NSError?
- // When
- manager.request(.GET, self.URL)
- .response { _, _, _, responseError in
- error = responseError
- expectation.fulfill()
- }
- waitForExpectationsWithTimeout(self.defaultTimeout, handler: nil)
- // Then
- XCTAssertNil(error, "error should be nil")
- }
- func testThatExpiredCertificateRequestSucceedsWhenPinningIntermediateCAPublicKeyAndAllowingInvalidCertificates() {
- // Given
- let publicKeys = [TestPublicKeys.IntermediateCA]
- let policies: [String: ServerTrustPolicy] = [
- self.host: .PinPublicKeys(publicKeys: publicKeys, validateHost: true, allowInvalidCertificates: true)
- ]
- let manager = Manager(
- configuration: self.configuration,
- serverTrustPolicyManager: ServerTrustPolicyManager(policies: policies)
- )
- let expectation = expectationWithDescription("\(self.URL)")
- var error: NSError?
- // When
- manager.request(.GET, self.URL)
- .response { _, _, _, responseError in
- error = responseError
- expectation.fulfill()
- }
- waitForExpectationsWithTimeout(self.defaultTimeout, handler: nil)
- // Then
- XCTAssertNil(error, "error should be nil")
- }
- func testThatExpiredCertificateRequestSucceedsWhenPinningRootCAPublicKeyAndAllowingInvalidCertificates() {
- // Given
- let publicKeys = [TestPublicKeys.RootCA]
- let policies: [String: ServerTrustPolicy] = [
- self.host: .PinPublicKeys(publicKeys: publicKeys, validateHost: true, allowInvalidCertificates: true)
- ]
- let manager = Manager(
- configuration: self.configuration,
- serverTrustPolicyManager: ServerTrustPolicyManager(policies: policies)
- )
- let expectation = expectationWithDescription("\(self.URL)")
- var error: NSError?
- // When
- manager.request(.GET, self.URL)
- .response { _, _, _, responseError in
- error = responseError
- expectation.fulfill()
- }
- waitForExpectationsWithTimeout(self.defaultTimeout, handler: nil)
- // Then
- XCTAssertNil(error, "error should be nil")
- }
- // MARK: Server Trust Policy - Disabling Evaluation Tests
- func testThatExpiredCertificateRequestSucceedsWhenDisablingEvaluation() {
- // Given
- let policies = [self.host: ServerTrustPolicy.DisableEvaluation]
- let manager = Manager(
- configuration: self.configuration,
- serverTrustPolicyManager: ServerTrustPolicyManager(policies: policies)
- )
- let expectation = expectationWithDescription("\(self.URL)")
- var error: NSError?
- // When
- manager.request(.GET, self.URL)
- .response { _, _, _, responseError in
- error = responseError
- expectation.fulfill()
- }
- waitForExpectationsWithTimeout(self.defaultTimeout, handler: nil)
- // Then
- XCTAssertNil(error, "error should be nil")
- }
- // MARK: Server Trust Policy - Custom Evaluation Tests
- func testThatExpiredCertificateRequestSucceedsWhenCustomEvaluationReturnsTrue() {
- // Given
- let policies = [
- self.host: ServerTrustPolicy.CustomEvaluation { _, _ in
- // Implement a custom evaluation routine here...
- return true
- }
- ]
- let manager = Manager(
- configuration: self.configuration,
- serverTrustPolicyManager: ServerTrustPolicyManager(policies: policies)
- )
- let expectation = expectationWithDescription("\(self.URL)")
- var error: NSError?
- // When
- manager.request(.GET, self.URL)
- .response { _, _, _, responseError in
- error = responseError
- expectation.fulfill()
- }
- waitForExpectationsWithTimeout(self.defaultTimeout, handler: nil)
- // Then
- XCTAssertNil(error, "error should be nil")
- }
- func testThatExpiredCertificateRequestFailsWhenCustomEvaluationReturnsFalse() {
- // Given
- let policies = [
- self.host: ServerTrustPolicy.CustomEvaluation { _, _ in
- // Implement a custom evaluation routine here...
- return false
- }
- ]
- let manager = Manager(
- configuration: self.configuration,
- serverTrustPolicyManager: ServerTrustPolicyManager(policies: policies)
- )
- let expectation = expectationWithDescription("\(self.URL)")
- var error: NSError?
- // When
- manager.request(.GET, self.URL)
- .response { _, _, _, responseError in
- error = responseError
- expectation.fulfill()
- }
- waitForExpectationsWithTimeout(self.defaultTimeout, handler: nil)
- // Then
- XCTAssertNotNil(error, "error should not be nil")
- XCTAssertEqual(error?.code ?? -1, NSURLErrorCancelled, "error should be NSURLErrorCancelled")
- }
- }
|