| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413 |
- //
- // ServerTrustPolicyTests.swift
- //
- // Copyright (c) 2014-2018 Alamofire Software Foundation (http://alamofire.org/)
- //
- // Permission is hereby granted, free of charge, to any person obtaining a copy
- // of this software and associated documentation files (the "Software"), to deal
- // in the Software without restriction, including without limitation the rights
- // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- // copies of the Software, and to permit persons to whom the Software is
- // furnished to do so, subject to the following conditions:
- //
- // The above copyright notice and this permission notice shall be included in
- // all copies or substantial portions of the Software.
- //
- // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
- // THE SOFTWARE.
- //
- import Alamofire
- import Foundation
- import XCTest
- private struct TestCertificates {
- // Root Certificates
- static let rootCA = TestCertificates.certificate(filename: "alamofire-root-ca")
- // Intermediate Certificates
- static let intermediateCA1 = TestCertificates.certificate(filename: "alamofire-signing-ca1")
- static let intermediateCA2 = TestCertificates.certificate(filename: "alamofire-signing-ca2")
- // Leaf Certificates - Signed by CA1
- static let leafWildcard = TestCertificates.certificate(filename: "wildcard.alamofire.org")
- static let leafMultipleDNSNames = TestCertificates.certificate(filename: "multiple-dns-names")
- static let leafSignedByCA1 = TestCertificates.certificate(filename: "signed-by-ca1")
- static let leafDNSNameAndURI = TestCertificates.certificate(filename: "test.alamofire.org")
- // Leaf Certificates - Signed by CA2
- static let leafExpired = TestCertificates.certificate(filename: "expired")
- static let leafMissingDNSNameAndURI = TestCertificates.certificate(filename: "missing-dns-name-and-uri")
- static let leafSignedByCA2 = TestCertificates.certificate(filename: "signed-by-ca2")
- static let leafValidDNSName = TestCertificates.certificate(filename: "valid-dns-name")
- static let leafValidURI = TestCertificates.certificate(filename: "valid-uri")
- static func certificate(filename: String) -> SecCertificate {
- class Locator {}
- let filePath = Bundle(for: Locator.self).path(forResource: filename, ofType: "cer")!
- let data = try! Data(contentsOf: URL(fileURLWithPath: filePath))
- let certificate = SecCertificateCreateWithData(nil, data as CFData)!
- return certificate
- }
- }
- // MARK: -
- private enum TestTrusts {
- // Leaf Trusts - Signed by CA1
- case leafWildcard
- case leafMultipleDNSNames
- case leafSignedByCA1
- case leafDNSNameAndURI
- // Leaf Trusts - Signed by CA2
- case leafExpired
- case leafMissingDNSNameAndURI
- case leafSignedByCA2
- case leafValidDNSName
- case leafValidURI
- // Invalid Trusts
- case leafValidDNSNameMissingIntermediate
- case leafValidDNSNameWithIncorrectIntermediate
- var trust: SecTrust {
- let trust: SecTrust
- switch self {
- case .leafWildcard:
- trust = TestTrusts.trustWithCertificates([TestCertificates.leafWildcard,
- TestCertificates.intermediateCA1,
- TestCertificates.rootCA])
- case .leafMultipleDNSNames:
- trust = TestTrusts.trustWithCertificates([TestCertificates.leafMultipleDNSNames,
- TestCertificates.intermediateCA1,
- TestCertificates.rootCA])
- case .leafSignedByCA1:
- trust = TestTrusts.trustWithCertificates([TestCertificates.leafSignedByCA1,
- TestCertificates.intermediateCA1,
- TestCertificates.rootCA])
- case .leafDNSNameAndURI:
- trust = TestTrusts.trustWithCertificates([TestCertificates.leafDNSNameAndURI,
- TestCertificates.intermediateCA1,
- TestCertificates.rootCA])
- case .leafExpired:
- trust = TestTrusts.trustWithCertificates([TestCertificates.leafExpired,
- TestCertificates.intermediateCA2,
- TestCertificates.rootCA])
- case .leafMissingDNSNameAndURI:
- trust = TestTrusts.trustWithCertificates([TestCertificates.leafMissingDNSNameAndURI,
- TestCertificates.intermediateCA2,
- TestCertificates.rootCA])
- case .leafSignedByCA2:
- trust = TestTrusts.trustWithCertificates([TestCertificates.leafSignedByCA2,
- TestCertificates.intermediateCA2,
- TestCertificates.rootCA])
- case .leafValidDNSName:
- trust = TestTrusts.trustWithCertificates([TestCertificates.leafValidDNSName,
- TestCertificates.intermediateCA2,
- TestCertificates.rootCA])
- case .leafValidURI:
- trust = TestTrusts.trustWithCertificates([TestCertificates.leafValidURI,
- TestCertificates.intermediateCA2,
- TestCertificates.rootCA])
- case .leafValidDNSNameMissingIntermediate:
- trust = TestTrusts.trustWithCertificates([TestCertificates.leafValidDNSName,
- TestCertificates.rootCA])
- case .leafValidDNSNameWithIncorrectIntermediate:
- trust = TestTrusts.trustWithCertificates([TestCertificates.leafValidDNSName,
- TestCertificates.intermediateCA1,
- TestCertificates.rootCA])
- }
- return trust
- }
- static func trustWithCertificates(_ certificates: [SecCertificate]) -> SecTrust {
- let policy = SecPolicyCreateBasicX509()
- var trust: SecTrust?
- SecTrustCreateWithCertificates(certificates as CFTypeRef, policy, &trust)
- return trust!
- }
- }
- // MARK: - Basic X509 and SSL Exploration Tests -
- class ServerTrustPolicyTestCase: BaseTestCase {
- func setRootCertificateAsLoneAnchorCertificateForTrust(_ trust: SecTrust) {
- SecTrustSetAnchorCertificates(trust, [TestCertificates.rootCA] as CFArray)
- SecTrustSetAnchorCertificatesOnly(trust, true)
- }
- }
- // MARK: - SecTrust Extension
- extension SecTrust {
- /// Evaluates `self` and returns `true` if the evaluation succeeds with a value of `.unspecified` or `.proceed`.
- var isValid: Bool {
- var result = SecTrustResultType.invalid
- let status = SecTrustEvaluate(self, &result)
- return (status == errSecSuccess) ? (result == .unspecified || result == .proceed) : false
- }
- }
- // MARK: -
- class ServerTrustPolicyExplorationBasicX509PolicyValidationTestCase: ServerTrustPolicyTestCase {
- func testThatAnchoredRootCertificatePassesBasicX509ValidationWithRootInTrust() {
- // Given
- let trust = TestTrusts.trustWithCertificates([TestCertificates.leafDNSNameAndURI,
- TestCertificates.intermediateCA1,
- TestCertificates.rootCA])
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateBasicX509()]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trust.isValid, "trust should be valid")
- }
- func testThatAnchoredRootCertificatePassesBasicX509ValidationWithoutRootInTrust() {
- // Given
- let trust = TestTrusts.leafDNSNameAndURI.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateBasicX509()]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trust.isValid, "trust should be valid")
- }
- func testThatCertificateMissingDNSNamePassesBasicX509Validation() {
- // Given
- let trust = TestTrusts.leafMissingDNSNameAndURI.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateBasicX509()]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trust.isValid, "trust should be valid")
- }
- func testThatExpiredCertificateFailsBasicX509Validation() {
- // Given
- let trust = TestTrusts.leafExpired.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateBasicX509()]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertFalse(trust.isValid, "trust should not be valid")
- }
- }
- // MARK: -
- class ServerTrustPolicyExplorationSSLPolicyValidationTestCase: ServerTrustPolicyTestCase {
- func testThatAnchoredRootCertificatePassesSSLValidationWithRootInTrust() {
- // Given
- let trust = TestTrusts.trustWithCertificates([TestCertificates.leafDNSNameAndURI,
- TestCertificates.intermediateCA1,
- TestCertificates.rootCA])
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trust.isValid, "trust should be valid")
- }
- func testThatAnchoredRootCertificatePassesSSLValidationWithoutRootInTrust() {
- // Given
- let trust = TestTrusts.leafDNSNameAndURI.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trust.isValid, "trust should be valid")
- }
- func testThatCertificateMissingDNSNameFailsSSLValidation() {
- // Given
- let trust = TestTrusts.leafMissingDNSNameAndURI.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertFalse(trust.isValid, "trust should not be valid")
- }
- func testThatWildcardCertificatePassesSSLValidation() {
- // Given
- let trust = TestTrusts.leafWildcard.trust // *.alamofire.org
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trust.isValid, "trust should be valid")
- }
- func testThatDNSNameCertificatePassesSSLValidation() {
- // Given
- let trust = TestTrusts.leafValidDNSName.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trust.isValid, "trust should be valid")
- }
- func testThatURICertificateFailsSSLValidation() {
- // Given
- let trust = TestTrusts.leafValidURI.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertFalse(trust.isValid, "trust should not be valid")
- }
- func testThatMultipleDNSNamesCertificatePassesSSLValidationForAllEntries() {
- // Given
- let trust = TestTrusts.leafMultipleDNSNames.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString),
- SecPolicyCreateSSL(true, "blog.alamofire.org" as CFString),
- SecPolicyCreateSSL(true, "www.alamofire.org" as CFString)]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trust.isValid, "trust should not be valid")
- }
- func testThatPassingNilForHostParameterAllowsCertificateMissingDNSNameToPassSSLValidation() {
- // Given
- let trust = TestTrusts.leafMissingDNSNameAndURI.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateSSL(true, nil)]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertTrue(trust.isValid, "trust should not be valid")
- }
- func testThatExpiredCertificateFailsSSLValidation() {
- // Given
- let trust = TestTrusts.leafExpired.trust
- setRootCertificateAsLoneAnchorCertificateForTrust(trust)
- // When
- let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
- SecTrustSetPolicies(trust, policies as CFTypeRef)
- // Then
- XCTAssertFalse(trust.isValid, "trust should not be valid")
- }
- }
- // MARK: - Server Trust Policy Tests -
- class ServerTrustPolicyPerformDefaultEvaluationTestCase: ServerTrustPolicyTestCase {
- // MARK: Do NOT Validate Host
- func testThatValidCertificateChainPassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let serverTrustPolicy = DefaultTrustEvaluator(validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatNonAnchoredRootCertificateChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.trustWithCertificates([TestCertificates.leafValidDNSName,
- TestCertificates.intermediateCA2])
- let serverTrustPolicy = DefaultTrustEvaluator(validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatMissingDNSNameLeafCertificatePassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
- let serverTrustPolicy = DefaultTrustEvaluator(validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatExpiredCertificateChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let serverTrustPolicy = DefaultTrustEvaluator(validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatMissingIntermediateCertificateInChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
- let serverTrustPolicy = DefaultTrustEvaluator(validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- // MARK: Validate Host
- func testThatValidCertificateChainPassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let serverTrustPolicy = DefaultTrustEvaluator(validateHost: true)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatNonAnchoredRootCertificateChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.trustWithCertificates([TestCertificates.leafValidDNSName,
- TestCertificates.intermediateCA2])
- let serverTrustPolicy = DefaultTrustEvaluator(validateHost: true)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatMissingDNSNameLeafCertificateFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
- let serverTrustPolicy = DefaultTrustEvaluator(validateHost: true)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatWildcardedLeafCertificateChainPassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafWildcard.trust
- let serverTrustPolicy = DefaultTrustEvaluator(validateHost: true)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatExpiredCertificateChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let serverTrustPolicy = DefaultTrustEvaluator(validateHost: true)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatMissingIntermediateCertificateInChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
- let serverTrustPolicy = DefaultTrustEvaluator(validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- XCTAssertEqual(result.failure?.asAFError?.isServerTrustEvaluationError, true)
- }
- }
- // MARK: -
- class ServerTrustPolicyPerformRevokedEvaluationTestCase: ServerTrustPolicyTestCase {
- // MARK: Do NOT Validate Host
- func testThatValidCertificateChainPassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let serverTrustPolicy = RevocationTrustEvaluator(validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatNonAnchoredRootCertificateChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.trustWithCertificates([TestCertificates.leafValidDNSName,
- TestCertificates.intermediateCA2])
- let serverTrustPolicy = RevocationTrustEvaluator(validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatMissingDNSNameLeafCertificatePassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
- let serverTrustPolicy = RevocationTrustEvaluator(validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatExpiredCertificateChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let serverTrustPolicy = RevocationTrustEvaluator(validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatMissingIntermediateCertificateInChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
- let serverTrustPolicy = RevocationTrustEvaluator(validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- // MARK: Validate Host
- func testThatValidCertificateChainPassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let serverTrustPolicy = RevocationTrustEvaluator()
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatNonAnchoredRootCertificateChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.trustWithCertificates([TestCertificates.leafValidDNSName,
- TestCertificates.intermediateCA2])
- let serverTrustPolicy = RevocationTrustEvaluator()
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatMissingDNSNameLeafCertificateFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
- let serverTrustPolicy = RevocationTrustEvaluator()
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatWildcardedLeafCertificateChainPassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafWildcard.trust
- let serverTrustPolicy = RevocationTrustEvaluator()
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatExpiredCertificateChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let serverTrustPolicy = RevocationTrustEvaluator()
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatMissingIntermediateCertificateInChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
- let serverTrustPolicy = RevocationTrustEvaluator()
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- }
- // MARK: -
- class ServerTrustPolicyPinCertificatesTestCase: ServerTrustPolicyTestCase {
- // MARK: Validate Certificate Chain Without Validating Host
- func testThatPinnedLeafCertificatePassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.leafValidDNSName]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates,
- performDefaultValidation: false,
- validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinnedIntermediateCertificatePassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.intermediateCA2]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates,
- performDefaultValidation: false,
- validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinnedRootCertificatePassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.rootCA]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates,
- performDefaultValidation: false,
- validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinningLeafCertificateNotInCertificateChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.leafSignedByCA2]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates,
- performDefaultValidation: true,
- validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatPinningIntermediateCertificateNotInCertificateChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.intermediateCA1]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatPinningExpiredLeafCertificateFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let certificates = [TestCertificates.leafExpired]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatPinningIntermediateCertificateWithExpiredLeafCertificateFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let certificates = [TestCertificates.intermediateCA2]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- // MARK: Validate Certificate Chain and Host
- func testThatPinnedLeafCertificatePassesEvaluationWithSelfSignedSupportAndHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.leafValidDNSName]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, acceptSelfSignedCertificates: true)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinnedIntermediateCertificatePassesEvaluationWithSelfSignedSupportAndHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.intermediateCA2]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, acceptSelfSignedCertificates: true)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinnedRootCertificatePassesEvaluationWithSelfSignedSupportAndHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.rootCA]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, acceptSelfSignedCertificates: true)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinningLeafCertificateNotInCertificateChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.leafSignedByCA2]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates,
- performDefaultValidation: true,
- validateHost: true)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatPinningIntermediateCertificateNotInCertificateChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.intermediateCA1]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatPinningExpiredLeafCertificateFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let certificates = [TestCertificates.leafExpired]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatPinningIntermediateCertificateWithExpiredLeafCertificateFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let certificates = [TestCertificates.intermediateCA2]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- // MARK: Do NOT Validate Certificate Chain or Host
- func testThatPinnedLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.leafValidDNSName]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates,
- performDefaultValidation: false,
- validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinnedIntermediateCertificateWithoutCertificateChainValidationPassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.intermediateCA2]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates,
- performDefaultValidation: false,
- validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinnedRootCertificateWithoutCertificateChainValidationPassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.rootCA]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates,
- performDefaultValidation: false,
- validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinningLeafCertificateNotInCertificateChainWithoutCertificateChainValidationFailsEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.leafSignedByCA2]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates,
- performDefaultValidation: false,
- validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatPinningIntermediateCertificateNotInCertificateChainWithoutCertificateChainValidationFailsEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let certificates = [TestCertificates.intermediateCA1]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates,
- performDefaultValidation: false,
- validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatPinningExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let certificates = [TestCertificates.leafExpired]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates,
- performDefaultValidation: false,
- validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinningIntermediateCertificateWithExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let certificates = [TestCertificates.intermediateCA2]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates,
- performDefaultValidation: false,
- validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinningRootCertificateWithExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let certificates = [TestCertificates.rootCA]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates,
- performDefaultValidation: false,
- validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinningMultipleCertificatesWithoutCertificateChainValidationPassesEvaluation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let certificates = [TestCertificates.leafMultipleDNSNames, // not in certificate chain
- TestCertificates.leafSignedByCA1, // not in certificate chain
- TestCertificates.leafExpired, // in certificate chain 👍🏼👍🏼
- TestCertificates.leafWildcard, // not in certificate chain
- TestCertificates.leafDNSNameAndURI // not in certificate chain
- ]
- let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates,
- performDefaultValidation: false,
- validateHost: false)
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- }
- // MARK: -
- class ServerTrustPolicyPinPublicKeysTestCase: ServerTrustPolicyTestCase {
- // MARK: Validate Certificate Chain Without Validating Host
- func testThatPinningLeafKeyPassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let keys = [TestCertificates.leafValidDNSName].af.publicKeys
- let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys, validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinningIntermediateKeyPassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let keys = [TestCertificates.intermediateCA2].af.publicKeys
- let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys, validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinningRootKeyPassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let keys = [TestCertificates.rootCA].af.publicKeys
- let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys, validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinningKeyNotInCertificateChainFailsEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let keys = [TestCertificates.leafSignedByCA2].af.publicKeys
- let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys, validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatPinningBackupKeyPassesEvaluationWithoutHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let keys = [TestCertificates.leafSignedByCA1, TestCertificates.intermediateCA1, TestCertificates.leafValidDNSName].af.publicKeys
- let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys, validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- // MARK: Validate Certificate Chain and Host
- func testThatPinningLeafKeyPassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let keys = [TestCertificates.leafValidDNSName].af.publicKeys
- let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinningIntermediateKeyPassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let keys = [TestCertificates.intermediateCA2].af.publicKeys
- let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinningRootKeyPassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let keys = [TestCertificates.rootCA].af.publicKeys
- let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinningKeyNotInCertificateChainFailsEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let keys = [TestCertificates.leafSignedByCA2].af.publicKeys
- let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatPinningBackupKeyPassesEvaluationWithHostValidation() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let keys = [TestCertificates.leafSignedByCA1, TestCertificates.intermediateCA1, TestCertificates.leafValidDNSName].af.publicKeys
- let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- // MARK: Do NOT perform default validation or validate host.
- func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithMissingIntermediateCertificate() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
- let keys = [TestCertificates.leafValidDNSName].af.publicKeys
- let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys,
- performDefaultValidation: false,
- validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinningRootKeyWithoutCertificateChainValidationFailsEvaluationWithMissingIntermediateCertificate() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
- let keys = [TestCertificates.rootCA].af.publicKeys
- let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys,
- performDefaultValidation: false,
- validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithIncorrectIntermediateCertificate() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSNameWithIncorrectIntermediate.trust
- let keys = [TestCertificates.leafValidDNSName].af.publicKeys
- let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys,
- performDefaultValidation: false,
- validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let keys = [TestCertificates.leafExpired].af.publicKeys
- let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys,
- performDefaultValidation: false,
- validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinningIntermediateKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let keys = [TestCertificates.intermediateCA2].af.publicKeys
- let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys,
- performDefaultValidation: false,
- validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatPinningRootKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let keys = [TestCertificates.rootCA].af.publicKeys
- let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys,
- performDefaultValidation: false,
- validateHost: false)
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- }
- // MARK: -
- class ServerTrustPolicyDisableEvaluationTestCase: ServerTrustPolicyTestCase {
- func testThatCertificateChainMissingIntermediateCertificatePassesEvaluation() throws {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
- let serverTrustPolicy = DisabledEvaluator()
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatExpiredLeafCertificatePassesEvaluation() throws {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let serverTrustPolicy = DisabledEvaluator()
- // When
- let result = Result { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- }
- // MARK: -
- class ServerTrustPolicyCompositeTestCase: ServerTrustPolicyTestCase {
- func testThatValidCertificateChainPassesDefaultAndRevocationCompositeChecks() throws {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafValidDNSName.trust
- let defaultPolicy = DefaultTrustEvaluator(validateHost: false)
- let revocationPolicy = RevocationTrustEvaluator(validateHost: false)
- let compositePolicy = CompositeTrustEvaluator(evaluators: [defaultPolicy, revocationPolicy])
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try compositePolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
- }
- func testThatNonAnchoredRootCertificateChainFailsEvaluationWithoutHostValidation() throws {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.trustWithCertificates([TestCertificates.leafValidDNSName,
- TestCertificates.intermediateCA2])
- let defaultPolicy = DefaultTrustEvaluator(validateHost: false)
- let revocationPolicy = RevocationTrustEvaluator(validateHost: false)
- let compositePolicy = CompositeTrustEvaluator(evaluators: [defaultPolicy, revocationPolicy])
- // When
- let result = Result { try compositePolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- func testThatExpiredLeafCertificateFailsDefaultAndRevocationComposite() throws {
- // Given
- let host = "test.alamofire.org"
- let serverTrust = TestTrusts.leafExpired.trust
- let defaultPolicy = DefaultTrustEvaluator(validateHost: false)
- let revocationPolicy = RevocationTrustEvaluator(validateHost: false)
- let compositePolicy = CompositeTrustEvaluator(evaluators: [defaultPolicy, revocationPolicy])
- // When
- setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
- let result = Result { try compositePolicy.evaluate(serverTrust, forHost: host) }
- // Then
- XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
- }
- }
- // MARK: -
- class ServerTrustPolicyCertificatesInBundleTestCase: ServerTrustPolicyTestCase {
- func testOnlyValidCertificatesAreDetected() {
- // Given
- // Files present in bundle in the form of type+encoding+extension [key|cert][DER|PEM].[cer|crt|der|key|pem]
- // certDER.cer: DER-encoded well-formed certificate
- // certDER.crt: DER-encoded well-formed certificate
- // certDER.der: DER-encoded well-formed certificate
- // certPEM.*: PEM-encoded well-formed certificates, expected to fail: Apple API only handles DER encoding
- // devURandomGibberish.crt: Random data, should fail
- // keyDER.der: DER-encoded key, not a certificate, should fail
- // When
- let certificates = Bundle(for: ServerTrustPolicyCertificatesInBundleTestCase.self).af.certificates
- // Then
- // Expectation: 19 well-formed certificates in the test bundle plus 4 invalid certificates.
- #if os(macOS)
- // For some reason, macOS is allowing all certificates to be considered valid. Need to file a
- // rdar demonstrating this behavior.
- if #available(macOS 10.12, *) {
- XCTAssertEqual(certificates.count, 19, "Expected 19 well-formed certificates")
- } else {
- XCTAssertEqual(certificates.count, 23, "Expected 23 well-formed certificates")
- }
- #else
- XCTAssertEqual(certificates.count, 19, "Expected 19 well-formed certificates")
- #endif
- }
- }
|