ServerTrustEvaluatorTests.swift 58 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480
  1. //
  2. // ServerTrustPolicyTests.swift
  3. //
  4. // Copyright (c) 2014-2018 Alamofire Software Foundation (http://alamofire.org/)
  5. //
  6. // Permission is hereby granted, free of charge, to any person obtaining a copy
  7. // of this software and associated documentation files (the "Software"), to deal
  8. // in the Software without restriction, including without limitation the rights
  9. // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  10. // copies of the Software, and to permit persons to whom the Software is
  11. // furnished to do so, subject to the following conditions:
  12. //
  13. // The above copyright notice and this permission notice shall be included in
  14. // all copies or substantial portions of the Software.
  15. //
  16. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  17. // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  18. // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  19. // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  20. // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  21. // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  22. // THE SOFTWARE.
  23. //
  24. import Alamofire
  25. import Foundation
  26. import XCTest
  27. private struct TestCertificates {
  28. // Root Certificates
  29. static let rootCA = TestCertificates.certificate(filename:"alamofire-root-ca")
  30. // Intermediate Certificates
  31. static let intermediateCA1 = TestCertificates.certificate(filename:"alamofire-signing-ca1")
  32. static let intermediateCA2 = TestCertificates.certificate(filename:"alamofire-signing-ca2")
  33. // Leaf Certificates - Signed by CA1
  34. static let leafWildcard = TestCertificates.certificate(filename:"wildcard.alamofire.org")
  35. static let leafMultipleDNSNames = TestCertificates.certificate(filename:"multiple-dns-names")
  36. static let leafSignedByCA1 = TestCertificates.certificate(filename:"signed-by-ca1")
  37. static let leafDNSNameAndURI = TestCertificates.certificate(filename:"test.alamofire.org")
  38. // Leaf Certificates - Signed by CA2
  39. static let leafExpired = TestCertificates.certificate(filename:"expired")
  40. static let leafMissingDNSNameAndURI = TestCertificates.certificate(filename:"missing-dns-name-and-uri")
  41. static let leafSignedByCA2 = TestCertificates.certificate(filename:"signed-by-ca2")
  42. static let leafValidDNSName = TestCertificates.certificate(filename:"valid-dns-name")
  43. static let leafValidURI = TestCertificates.certificate(filename:"valid-uri")
  44. static func certificate(filename: String) -> SecCertificate {
  45. class Locator {}
  46. let filePath = Bundle(for: Locator.self).path(forResource: filename, ofType: "cer")!
  47. let data = try! Data(contentsOf: URL(fileURLWithPath: filePath))
  48. let certificate = SecCertificateCreateWithData(nil, data as CFData)!
  49. return certificate
  50. }
  51. }
  52. // MARK: -
  53. private enum TestTrusts {
  54. // Leaf Trusts - Signed by CA1
  55. case leafWildcard
  56. case leafMultipleDNSNames
  57. case leafSignedByCA1
  58. case leafDNSNameAndURI
  59. // Leaf Trusts - Signed by CA2
  60. case leafExpired
  61. case leafMissingDNSNameAndURI
  62. case leafSignedByCA2
  63. case leafValidDNSName
  64. case leafValidURI
  65. // Invalid Trusts
  66. case leafValidDNSNameMissingIntermediate
  67. case leafValidDNSNameWithIncorrectIntermediate
  68. var trust: SecTrust {
  69. let trust: SecTrust
  70. switch self {
  71. case .leafWildcard:
  72. trust = TestTrusts.trustWithCertificates([
  73. TestCertificates.leafWildcard,
  74. TestCertificates.intermediateCA1,
  75. TestCertificates.rootCA
  76. ])
  77. case .leafMultipleDNSNames:
  78. trust = TestTrusts.trustWithCertificates([
  79. TestCertificates.leafMultipleDNSNames,
  80. TestCertificates.intermediateCA1,
  81. TestCertificates.rootCA
  82. ])
  83. case .leafSignedByCA1:
  84. trust = TestTrusts.trustWithCertificates([
  85. TestCertificates.leafSignedByCA1,
  86. TestCertificates.intermediateCA1,
  87. TestCertificates.rootCA
  88. ])
  89. case .leafDNSNameAndURI:
  90. trust = TestTrusts.trustWithCertificates([
  91. TestCertificates.leafDNSNameAndURI,
  92. TestCertificates.intermediateCA1,
  93. TestCertificates.rootCA
  94. ])
  95. case .leafExpired:
  96. trust = TestTrusts.trustWithCertificates([
  97. TestCertificates.leafExpired,
  98. TestCertificates.intermediateCA2,
  99. TestCertificates.rootCA
  100. ])
  101. case .leafMissingDNSNameAndURI:
  102. trust = TestTrusts.trustWithCertificates([
  103. TestCertificates.leafMissingDNSNameAndURI,
  104. TestCertificates.intermediateCA2,
  105. TestCertificates.rootCA
  106. ])
  107. case .leafSignedByCA2:
  108. trust = TestTrusts.trustWithCertificates([
  109. TestCertificates.leafSignedByCA2,
  110. TestCertificates.intermediateCA2,
  111. TestCertificates.rootCA
  112. ])
  113. case .leafValidDNSName:
  114. trust = TestTrusts.trustWithCertificates([
  115. TestCertificates.leafValidDNSName,
  116. TestCertificates.intermediateCA2,
  117. TestCertificates.rootCA
  118. ])
  119. case .leafValidURI:
  120. trust = TestTrusts.trustWithCertificates([
  121. TestCertificates.leafValidURI,
  122. TestCertificates.intermediateCA2,
  123. TestCertificates.rootCA
  124. ])
  125. case .leafValidDNSNameMissingIntermediate:
  126. trust = TestTrusts.trustWithCertificates([
  127. TestCertificates.leafValidDNSName,
  128. TestCertificates.rootCA
  129. ])
  130. case .leafValidDNSNameWithIncorrectIntermediate:
  131. trust = TestTrusts.trustWithCertificates([
  132. TestCertificates.leafValidDNSName,
  133. TestCertificates.intermediateCA1,
  134. TestCertificates.rootCA
  135. ])
  136. }
  137. return trust
  138. }
  139. static func trustWithCertificates(_ certificates: [SecCertificate]) -> SecTrust {
  140. let policy = SecPolicyCreateBasicX509()
  141. var trust: SecTrust?
  142. SecTrustCreateWithCertificates(certificates as CFTypeRef, policy, &trust)
  143. return trust!
  144. }
  145. }
  146. // MARK: - Basic X509 and SSL Exploration Tests -
  147. class ServerTrustPolicyTestCase: BaseTestCase {
  148. func setRootCertificateAsLoneAnchorCertificateForTrust(_ trust: SecTrust) {
  149. SecTrustSetAnchorCertificates(trust, [TestCertificates.rootCA] as CFArray)
  150. SecTrustSetAnchorCertificatesOnly(trust, true)
  151. }
  152. }
  153. // MARK: - SecTrust Extension
  154. extension SecTrust {
  155. /// Evaluates `self` and returns `true` if the evaluation succeeds with a value of `.unspecified` or `.proceed`.
  156. var isValid: Bool {
  157. var result = SecTrustResultType.invalid
  158. let status = SecTrustEvaluate(self, &result)
  159. return (status == errSecSuccess) ? (result == .unspecified || result == .proceed) : false
  160. }
  161. }
  162. // MARK: -
  163. class ServerTrustPolicyExplorationBasicX509PolicyValidationTestCase: ServerTrustPolicyTestCase {
  164. func testThatAnchoredRootCertificatePassesBasicX509ValidationWithRootInTrust() {
  165. // Given
  166. let trust = TestTrusts.trustWithCertificates([
  167. TestCertificates.leafDNSNameAndURI,
  168. TestCertificates.intermediateCA1,
  169. TestCertificates.rootCA
  170. ])
  171. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  172. // When
  173. let policies = [SecPolicyCreateBasicX509()]
  174. SecTrustSetPolicies(trust, policies as CFTypeRef)
  175. // Then
  176. XCTAssertTrue(trust.isValid, "trust should be valid")
  177. }
  178. func testThatAnchoredRootCertificatePassesBasicX509ValidationWithoutRootInTrust() {
  179. // Given
  180. let trust = TestTrusts.leafDNSNameAndURI.trust
  181. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  182. // When
  183. let policies = [SecPolicyCreateBasicX509()]
  184. SecTrustSetPolicies(trust, policies as CFTypeRef)
  185. // Then
  186. XCTAssertTrue(trust.isValid, "trust should be valid")
  187. }
  188. func testThatCertificateMissingDNSNamePassesBasicX509Validation() {
  189. // Given
  190. let trust = TestTrusts.leafMissingDNSNameAndURI.trust
  191. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  192. // When
  193. let policies = [SecPolicyCreateBasicX509()]
  194. SecTrustSetPolicies(trust, policies as CFTypeRef)
  195. // Then
  196. XCTAssertTrue(trust.isValid, "trust should be valid")
  197. }
  198. func testThatExpiredCertificateFailsBasicX509Validation() {
  199. // Given
  200. let trust = TestTrusts.leafExpired.trust
  201. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  202. // When
  203. let policies = [SecPolicyCreateBasicX509()]
  204. SecTrustSetPolicies(trust, policies as CFTypeRef)
  205. // Then
  206. XCTAssertFalse(trust.isValid, "trust should not be valid")
  207. }
  208. }
  209. // MARK: -
  210. class ServerTrustPolicyExplorationSSLPolicyValidationTestCase: ServerTrustPolicyTestCase {
  211. func testThatAnchoredRootCertificatePassesSSLValidationWithRootInTrust() {
  212. // Given
  213. let trust = TestTrusts.trustWithCertificates([
  214. TestCertificates.leafDNSNameAndURI,
  215. TestCertificates.intermediateCA1,
  216. TestCertificates.rootCA
  217. ])
  218. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  219. // When
  220. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  221. SecTrustSetPolicies(trust, policies as CFTypeRef)
  222. // Then
  223. XCTAssertTrue(trust.isValid, "trust should be valid")
  224. }
  225. func testThatAnchoredRootCertificatePassesSSLValidationWithoutRootInTrust() {
  226. // Given
  227. let trust = TestTrusts.leafDNSNameAndURI.trust
  228. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  229. // When
  230. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  231. SecTrustSetPolicies(trust, policies as CFTypeRef)
  232. // Then
  233. XCTAssertTrue(trust.isValid, "trust should be valid")
  234. }
  235. func testThatCertificateMissingDNSNameFailsSSLValidation() {
  236. // Given
  237. let trust = TestTrusts.leafMissingDNSNameAndURI.trust
  238. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  239. // When
  240. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  241. SecTrustSetPolicies(trust, policies as CFTypeRef)
  242. // Then
  243. XCTAssertFalse(trust.isValid, "trust should not be valid")
  244. }
  245. func testThatWildcardCertificatePassesSSLValidation() {
  246. // Given
  247. let trust = TestTrusts.leafWildcard.trust // *.alamofire.org
  248. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  249. // When
  250. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  251. SecTrustSetPolicies(trust, policies as CFTypeRef)
  252. // Then
  253. XCTAssertTrue(trust.isValid, "trust should be valid")
  254. }
  255. func testThatDNSNameCertificatePassesSSLValidation() {
  256. // Given
  257. let trust = TestTrusts.leafValidDNSName.trust
  258. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  259. // When
  260. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  261. SecTrustSetPolicies(trust, policies as CFTypeRef)
  262. // Then
  263. XCTAssertTrue(trust.isValid, "trust should be valid")
  264. }
  265. func testThatURICertificateFailsSSLValidation() {
  266. // Given
  267. let trust = TestTrusts.leafValidURI.trust
  268. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  269. // When
  270. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  271. SecTrustSetPolicies(trust, policies as CFTypeRef)
  272. // Then
  273. XCTAssertFalse(trust.isValid, "trust should not be valid")
  274. }
  275. func testThatMultipleDNSNamesCertificatePassesSSLValidationForAllEntries() {
  276. // Given
  277. let trust = TestTrusts.leafMultipleDNSNames.trust
  278. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  279. // When
  280. let policies = [
  281. SecPolicyCreateSSL(true, "test.alamofire.org" as CFString),
  282. SecPolicyCreateSSL(true, "blog.alamofire.org" as CFString),
  283. SecPolicyCreateSSL(true, "www.alamofire.org" as CFString)
  284. ]
  285. SecTrustSetPolicies(trust, policies as CFTypeRef)
  286. // Then
  287. XCTAssertTrue(trust.isValid, "trust should not be valid")
  288. }
  289. func testThatPassingNilForHostParameterAllowsCertificateMissingDNSNameToPassSSLValidation() {
  290. // Given
  291. let trust = TestTrusts.leafMissingDNSNameAndURI.trust
  292. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  293. // When
  294. let policies = [SecPolicyCreateSSL(true, nil)]
  295. SecTrustSetPolicies(trust, policies as CFTypeRef)
  296. // Then
  297. XCTAssertTrue(trust.isValid, "trust should not be valid")
  298. }
  299. func testThatExpiredCertificateFailsSSLValidation() {
  300. // Given
  301. let trust = TestTrusts.leafExpired.trust
  302. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  303. // When
  304. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  305. SecTrustSetPolicies(trust, policies as CFTypeRef)
  306. // Then
  307. XCTAssertFalse(trust.isValid, "trust should not be valid")
  308. }
  309. }
  310. // MARK: - Server Trust Policy Tests -
  311. class ServerTrustPolicyPerformDefaultEvaluationTestCase: ServerTrustPolicyTestCase {
  312. // MARK: Do NOT Validate Host
  313. func testThatValidCertificateChainPassesEvaluationWithoutHostValidation() {
  314. // Given
  315. let host = "test.alamofire.org"
  316. let serverTrust = TestTrusts.leafValidDNSName.trust
  317. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: false)
  318. // When
  319. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  320. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  321. // Then
  322. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  323. }
  324. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithoutHostValidation() {
  325. // Given
  326. let host = "test.alamofire.org"
  327. let serverTrust = TestTrusts.trustWithCertificates([
  328. TestCertificates.leafValidDNSName,
  329. TestCertificates.intermediateCA2
  330. ])
  331. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: false)
  332. // When
  333. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  334. // Then
  335. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  336. }
  337. func testThatMissingDNSNameLeafCertificatePassesEvaluationWithoutHostValidation() {
  338. // Given
  339. let host = "test.alamofire.org"
  340. let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
  341. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: false)
  342. // When
  343. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  344. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  345. // Then
  346. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  347. }
  348. func testThatExpiredCertificateChainFailsEvaluationWithoutHostValidation() {
  349. // Given
  350. let host = "test.alamofire.org"
  351. let serverTrust = TestTrusts.leafExpired.trust
  352. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: false)
  353. // When
  354. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  355. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  356. // Then
  357. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  358. }
  359. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithoutHostValidation() {
  360. // Given
  361. let host = "test.alamofire.org"
  362. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  363. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: false)
  364. // When
  365. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  366. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  367. // Then
  368. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  369. }
  370. // MARK: Validate Host
  371. func testThatValidCertificateChainPassesEvaluationWithHostValidation() {
  372. // Given
  373. let host = "test.alamofire.org"
  374. let serverTrust = TestTrusts.leafValidDNSName.trust
  375. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: true)
  376. // When
  377. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  378. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  379. // Then
  380. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  381. }
  382. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithHostValidation() {
  383. // Given
  384. let host = "test.alamofire.org"
  385. let serverTrust = TestTrusts.trustWithCertificates([
  386. TestCertificates.leafValidDNSName,
  387. TestCertificates.intermediateCA2
  388. ])
  389. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: true)
  390. // When
  391. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  392. // Then
  393. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  394. }
  395. func testThatMissingDNSNameLeafCertificateFailsEvaluationWithHostValidation() {
  396. // Given
  397. let host = "test.alamofire.org"
  398. let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
  399. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: true)
  400. // When
  401. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  402. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  403. // Then
  404. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  405. }
  406. func testThatWildcardedLeafCertificateChainPassesEvaluationWithHostValidation() {
  407. // Given
  408. let host = "test.alamofire.org"
  409. let serverTrust = TestTrusts.leafWildcard.trust
  410. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: true)
  411. // When
  412. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  413. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  414. // Then
  415. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  416. }
  417. func testThatExpiredCertificateChainFailsEvaluationWithHostValidation() {
  418. // Given
  419. let host = "test.alamofire.org"
  420. let serverTrust = TestTrusts.leafExpired.trust
  421. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: true)
  422. // When
  423. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  424. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  425. // Then
  426. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  427. }
  428. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithHostValidation() {
  429. // Given
  430. let host = "test.alamofire.org"
  431. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  432. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: false)
  433. // When
  434. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  435. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  436. // Then
  437. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  438. assertErrorIsAFError(result.error) { error in
  439. XCTAssertTrue(error.isServerTrustEvaluationError)
  440. }
  441. }
  442. }
  443. // MARK: -
  444. class ServerTrustPolicyPerformRevokedEvaluationTestCase: ServerTrustPolicyTestCase {
  445. // MARK: Do NOT Validate Host
  446. func testThatValidCertificateChainPassesEvaluationWithoutHostValidation() {
  447. // Given
  448. let host = "test.alamofire.org"
  449. let serverTrust = TestTrusts.leafValidDNSName.trust
  450. let serverTrustPolicy = RevocationTrustEvaluator(validateHost: false)
  451. // When
  452. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  453. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  454. // Then
  455. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  456. }
  457. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithoutHostValidation() {
  458. // Given
  459. let host = "test.alamofire.org"
  460. let serverTrust = TestTrusts.trustWithCertificates([
  461. TestCertificates.leafValidDNSName,
  462. TestCertificates.intermediateCA2
  463. ])
  464. let serverTrustPolicy = RevocationTrustEvaluator(validateHost: false)
  465. // When
  466. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  467. // Then
  468. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  469. }
  470. func testThatMissingDNSNameLeafCertificatePassesEvaluationWithoutHostValidation() {
  471. // Given
  472. let host = "test.alamofire.org"
  473. let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
  474. let serverTrustPolicy = RevocationTrustEvaluator(validateHost: false)
  475. // When
  476. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  477. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  478. // Then
  479. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  480. }
  481. func testThatExpiredCertificateChainFailsEvaluationWithoutHostValidation() {
  482. // Given
  483. let host = "test.alamofire.org"
  484. let serverTrust = TestTrusts.leafExpired.trust
  485. let serverTrustPolicy = RevocationTrustEvaluator(validateHost: false)
  486. // When
  487. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  488. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  489. // Then
  490. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  491. }
  492. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithoutHostValidation() {
  493. // Given
  494. let host = "test.alamofire.org"
  495. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  496. let serverTrustPolicy = RevocationTrustEvaluator(validateHost: false)
  497. // When
  498. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  499. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  500. // Then
  501. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  502. }
  503. // MARK: Validate Host
  504. func testThatValidCertificateChainPassesEvaluationWithHostValidation() {
  505. // Given
  506. let host = "test.alamofire.org"
  507. let serverTrust = TestTrusts.leafValidDNSName.trust
  508. let serverTrustPolicy = RevocationTrustEvaluator()
  509. // When
  510. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  511. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  512. // Then
  513. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  514. }
  515. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithHostValidation() {
  516. // Given
  517. let host = "test.alamofire.org"
  518. let serverTrust = TestTrusts.trustWithCertificates([
  519. TestCertificates.leafValidDNSName,
  520. TestCertificates.intermediateCA2
  521. ])
  522. let serverTrustPolicy = RevocationTrustEvaluator()
  523. // When
  524. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  525. // Then
  526. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  527. }
  528. func testThatMissingDNSNameLeafCertificateFailsEvaluationWithHostValidation() {
  529. // Given
  530. let host = "test.alamofire.org"
  531. let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
  532. let serverTrustPolicy = RevocationTrustEvaluator()
  533. // When
  534. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  535. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  536. // Then
  537. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  538. }
  539. func testThatWildcardedLeafCertificateChainPassesEvaluationWithHostValidation() {
  540. // Given
  541. let host = "test.alamofire.org"
  542. let serverTrust = TestTrusts.leafWildcard.trust
  543. let serverTrustPolicy = RevocationTrustEvaluator()
  544. // When
  545. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  546. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  547. // Then
  548. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  549. }
  550. func testThatExpiredCertificateChainFailsEvaluationWithHostValidation() {
  551. // Given
  552. let host = "test.alamofire.org"
  553. let serverTrust = TestTrusts.leafExpired.trust
  554. let serverTrustPolicy = RevocationTrustEvaluator()
  555. // When
  556. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  557. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  558. // Then
  559. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  560. }
  561. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithHostValidation() {
  562. // Given
  563. let host = "test.alamofire.org"
  564. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  565. let serverTrustPolicy = RevocationTrustEvaluator()
  566. // When
  567. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  568. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  569. // Then
  570. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  571. }
  572. }
  573. // MARK: -
  574. class ServerTrustPolicyPinCertificatesTestCase: ServerTrustPolicyTestCase {
  575. // MARK: Validate Certificate Chain Without Validating Host
  576. func testThatPinnedLeafCertificatePassesEvaluationWithoutHostValidation() {
  577. // Given
  578. let host = "test.alamofire.org"
  579. let serverTrust = TestTrusts.leafValidDNSName.trust
  580. let certificates = [TestCertificates.leafValidDNSName]
  581. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates,
  582. performDefaultValidation: false,
  583. validateHost: false)
  584. // When
  585. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  586. // Then
  587. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  588. }
  589. func testThatPinnedIntermediateCertificatePassesEvaluationWithoutHostValidation() {
  590. // Given
  591. let host = "test.alamofire.org"
  592. let serverTrust = TestTrusts.leafValidDNSName.trust
  593. let certificates = [TestCertificates.intermediateCA2]
  594. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates,
  595. performDefaultValidation: false,
  596. validateHost: false)
  597. // When
  598. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  599. // Then
  600. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  601. }
  602. func testThatPinnedRootCertificatePassesEvaluationWithoutHostValidation() {
  603. // Given
  604. let host = "test.alamofire.org"
  605. let serverTrust = TestTrusts.leafValidDNSName.trust
  606. let certificates = [TestCertificates.rootCA]
  607. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates,
  608. performDefaultValidation: false,
  609. validateHost: false)
  610. // When
  611. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  612. // Then
  613. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  614. }
  615. func testThatPinningLeafCertificateNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  616. // Given
  617. let host = "test.alamofire.org"
  618. let serverTrust = TestTrusts.leafValidDNSName.trust
  619. let certificates = [TestCertificates.leafSignedByCA2]
  620. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  621. certificates: certificates,
  622. performDefaultValidation: true,
  623. validateHost: false
  624. )
  625. // When
  626. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  627. // Then
  628. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  629. }
  630. func testThatPinningIntermediateCertificateNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  631. // Given
  632. let host = "test.alamofire.org"
  633. let serverTrust = TestTrusts.leafValidDNSName.trust
  634. let certificates = [TestCertificates.intermediateCA1]
  635. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, validateHost: false)
  636. // When
  637. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  638. // Then
  639. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  640. }
  641. func testThatPinningExpiredLeafCertificateFailsEvaluationWithoutHostValidation() {
  642. // Given
  643. let host = "test.alamofire.org"
  644. let serverTrust = TestTrusts.leafExpired.trust
  645. let certificates = [TestCertificates.leafExpired]
  646. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, validateHost: false)
  647. // When
  648. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  649. // Then
  650. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  651. }
  652. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateFailsEvaluationWithoutHostValidation() {
  653. // Given
  654. let host = "test.alamofire.org"
  655. let serverTrust = TestTrusts.leafExpired.trust
  656. let certificates = [TestCertificates.intermediateCA2]
  657. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, validateHost: false)
  658. // When
  659. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  660. // Then
  661. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  662. }
  663. // MARK: Validate Certificate Chain and Host
  664. func testThatPinnedLeafCertificatePassesEvaluationWithSelfSignedSupportAndHostValidation() {
  665. // Given
  666. let host = "test.alamofire.org"
  667. let serverTrust = TestTrusts.leafValidDNSName.trust
  668. let certificates = [TestCertificates.leafValidDNSName]
  669. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, acceptSelfSignedCertificates: true)
  670. // When
  671. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  672. // Then
  673. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  674. }
  675. func testThatPinnedIntermediateCertificatePassesEvaluationWithSelfSignedSupportAndHostValidation() {
  676. // Given
  677. let host = "test.alamofire.org"
  678. let serverTrust = TestTrusts.leafValidDNSName.trust
  679. let certificates = [TestCertificates.intermediateCA2]
  680. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, acceptSelfSignedCertificates: true)
  681. // When
  682. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  683. // Then
  684. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  685. }
  686. func testThatPinnedRootCertificatePassesEvaluationWithSelfSignedSupportAndHostValidation() {
  687. // Given
  688. let host = "test.alamofire.org"
  689. let serverTrust = TestTrusts.leafValidDNSName.trust
  690. let certificates = [TestCertificates.rootCA]
  691. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, acceptSelfSignedCertificates: true)
  692. // When
  693. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  694. // Then
  695. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  696. }
  697. func testThatPinningLeafCertificateNotInCertificateChainFailsEvaluationWithHostValidation() {
  698. // Given
  699. let host = "test.alamofire.org"
  700. let serverTrust = TestTrusts.leafValidDNSName.trust
  701. let certificates = [TestCertificates.leafSignedByCA2]
  702. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  703. certificates: certificates,
  704. performDefaultValidation: true,
  705. validateHost: true
  706. )
  707. // When
  708. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  709. // Then
  710. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  711. }
  712. func testThatPinningIntermediateCertificateNotInCertificateChainFailsEvaluationWithHostValidation() {
  713. // Given
  714. let host = "test.alamofire.org"
  715. let serverTrust = TestTrusts.leafValidDNSName.trust
  716. let certificates = [TestCertificates.intermediateCA1]
  717. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates)
  718. // When
  719. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  720. // Then
  721. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  722. }
  723. func testThatPinningExpiredLeafCertificateFailsEvaluationWithHostValidation() {
  724. // Given
  725. let host = "test.alamofire.org"
  726. let serverTrust = TestTrusts.leafExpired.trust
  727. let certificates = [TestCertificates.leafExpired]
  728. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates)
  729. // When
  730. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  731. // Then
  732. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  733. }
  734. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateFailsEvaluationWithHostValidation() {
  735. // Given
  736. let host = "test.alamofire.org"
  737. let serverTrust = TestTrusts.leafExpired.trust
  738. let certificates = [TestCertificates.intermediateCA2]
  739. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates)
  740. // When
  741. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  742. // Then
  743. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  744. }
  745. // MARK: Do NOT Validate Certificate Chain or Host
  746. func testThatPinnedLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  747. // Given
  748. let host = "test.alamofire.org"
  749. let serverTrust = TestTrusts.leafValidDNSName.trust
  750. let certificates = [TestCertificates.leafValidDNSName]
  751. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  752. certificates: certificates,
  753. performDefaultValidation: false,
  754. validateHost: false
  755. )
  756. // When
  757. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  758. // Then
  759. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  760. }
  761. func testThatPinnedIntermediateCertificateWithoutCertificateChainValidationPassesEvaluation() {
  762. // Given
  763. let host = "test.alamofire.org"
  764. let serverTrust = TestTrusts.leafValidDNSName.trust
  765. let certificates = [TestCertificates.intermediateCA2]
  766. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  767. certificates: certificates,
  768. performDefaultValidation: false,
  769. validateHost: false
  770. )
  771. // When
  772. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  773. // Then
  774. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  775. }
  776. func testThatPinnedRootCertificateWithoutCertificateChainValidationPassesEvaluation() {
  777. // Given
  778. let host = "test.alamofire.org"
  779. let serverTrust = TestTrusts.leafValidDNSName.trust
  780. let certificates = [TestCertificates.rootCA]
  781. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  782. certificates: certificates,
  783. performDefaultValidation: false,
  784. validateHost: false
  785. )
  786. // When
  787. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  788. // Then
  789. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  790. }
  791. func testThatPinningLeafCertificateNotInCertificateChainWithoutCertificateChainValidationFailsEvaluation() {
  792. // Given
  793. let host = "test.alamofire.org"
  794. let serverTrust = TestTrusts.leafValidDNSName.trust
  795. let certificates = [TestCertificates.leafSignedByCA2]
  796. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  797. certificates: certificates,
  798. performDefaultValidation: false,
  799. validateHost: false
  800. )
  801. // When
  802. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  803. // Then
  804. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  805. }
  806. func testThatPinningIntermediateCertificateNotInCertificateChainWithoutCertificateChainValidationFailsEvaluation() {
  807. // Given
  808. let host = "test.alamofire.org"
  809. let serverTrust = TestTrusts.leafValidDNSName.trust
  810. let certificates = [TestCertificates.intermediateCA1]
  811. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  812. certificates: certificates,
  813. performDefaultValidation: false,
  814. validateHost: false
  815. )
  816. // When
  817. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  818. // Then
  819. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  820. }
  821. func testThatPinningExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  822. // Given
  823. let host = "test.alamofire.org"
  824. let serverTrust = TestTrusts.leafExpired.trust
  825. let certificates = [TestCertificates.leafExpired]
  826. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  827. certificates: certificates,
  828. performDefaultValidation: false,
  829. validateHost: false
  830. )
  831. // When
  832. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  833. // Then
  834. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  835. }
  836. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  837. // Given
  838. let host = "test.alamofire.org"
  839. let serverTrust = TestTrusts.leafExpired.trust
  840. let certificates = [TestCertificates.intermediateCA2]
  841. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  842. certificates: certificates,
  843. performDefaultValidation: false,
  844. validateHost: false
  845. )
  846. // When
  847. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  848. // Then
  849. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  850. }
  851. func testThatPinningRootCertificateWithExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  852. // Given
  853. let host = "test.alamofire.org"
  854. let serverTrust = TestTrusts.leafExpired.trust
  855. let certificates = [TestCertificates.rootCA]
  856. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  857. certificates: certificates,
  858. performDefaultValidation: false,
  859. validateHost: false
  860. )
  861. // When
  862. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  863. // Then
  864. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  865. }
  866. func testThatPinningMultipleCertificatesWithoutCertificateChainValidationPassesEvaluation() {
  867. // Given
  868. let host = "test.alamofire.org"
  869. let serverTrust = TestTrusts.leafExpired.trust
  870. let certificates = [
  871. TestCertificates.leafMultipleDNSNames, // not in certificate chain
  872. TestCertificates.leafSignedByCA1, // not in certificate chain
  873. TestCertificates.leafExpired, // in certificate chain 👍🏼👍🏼
  874. TestCertificates.leafWildcard, // not in certificate chain
  875. TestCertificates.leafDNSNameAndURI, // not in certificate chain
  876. ]
  877. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  878. certificates: certificates,
  879. performDefaultValidation: false,
  880. validateHost: false
  881. )
  882. // When
  883. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  884. // Then
  885. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  886. }
  887. }
  888. // MARK: -
  889. class ServerTrustPolicyPinPublicKeysTestCase: ServerTrustPolicyTestCase {
  890. // MARK: Validate Certificate Chain Without Validating Host
  891. func testThatPinningLeafKeyPassesEvaluationWithoutHostValidation() {
  892. // Given
  893. let host = "test.alamofire.org"
  894. let serverTrust = TestTrusts.leafValidDNSName.trust
  895. let keys = [TestCertificates.leafValidDNSName].af.publicKeys
  896. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys, validateHost: false)
  897. // When
  898. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  899. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  900. // Then
  901. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  902. }
  903. func testThatPinningIntermediateKeyPassesEvaluationWithoutHostValidation() {
  904. // Given
  905. let host = "test.alamofire.org"
  906. let serverTrust = TestTrusts.leafValidDNSName.trust
  907. let keys = [TestCertificates.intermediateCA2].af.publicKeys
  908. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys, validateHost: false)
  909. // When
  910. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  911. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  912. // Then
  913. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  914. }
  915. func testThatPinningRootKeyPassesEvaluationWithoutHostValidation() {
  916. // Given
  917. let host = "test.alamofire.org"
  918. let serverTrust = TestTrusts.leafValidDNSName.trust
  919. let keys = [TestCertificates.rootCA].af.publicKeys
  920. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys, validateHost: false)
  921. // When
  922. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  923. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  924. // Then
  925. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  926. }
  927. func testThatPinningKeyNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  928. // Given
  929. let host = "test.alamofire.org"
  930. let serverTrust = TestTrusts.leafValidDNSName.trust
  931. let keys = [TestCertificates.leafSignedByCA2].af.publicKeys
  932. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys, validateHost: false)
  933. // When
  934. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  935. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  936. // Then
  937. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  938. }
  939. func testThatPinningBackupKeyPassesEvaluationWithoutHostValidation() {
  940. // Given
  941. let host = "test.alamofire.org"
  942. let serverTrust = TestTrusts.leafValidDNSName.trust
  943. let keys = [TestCertificates.leafSignedByCA1, TestCertificates.intermediateCA1, TestCertificates.leafValidDNSName].af.publicKeys
  944. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys, validateHost: false)
  945. // When
  946. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  947. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  948. // Then
  949. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  950. }
  951. // MARK: Validate Certificate Chain and Host
  952. func testThatPinningLeafKeyPassesEvaluationWithHostValidation() {
  953. // Given
  954. let host = "test.alamofire.org"
  955. let serverTrust = TestTrusts.leafValidDNSName.trust
  956. let keys = [TestCertificates.leafValidDNSName].af.publicKeys
  957. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys)
  958. // When
  959. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  960. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  961. // Then
  962. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  963. }
  964. func testThatPinningIntermediateKeyPassesEvaluationWithHostValidation() {
  965. // Given
  966. let host = "test.alamofire.org"
  967. let serverTrust = TestTrusts.leafValidDNSName.trust
  968. let keys = [TestCertificates.intermediateCA2].af.publicKeys
  969. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys)
  970. // When
  971. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  972. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  973. // Then
  974. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  975. }
  976. func testThatPinningRootKeyPassesEvaluationWithHostValidation() {
  977. // Given
  978. let host = "test.alamofire.org"
  979. let serverTrust = TestTrusts.leafValidDNSName.trust
  980. let keys = [TestCertificates.rootCA].af.publicKeys
  981. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys)
  982. // When
  983. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  984. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  985. // Then
  986. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  987. }
  988. func testThatPinningKeyNotInCertificateChainFailsEvaluationWithHostValidation() {
  989. // Given
  990. let host = "test.alamofire.org"
  991. let serverTrust = TestTrusts.leafValidDNSName.trust
  992. let keys = [TestCertificates.leafSignedByCA2].af.publicKeys
  993. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys)
  994. // When
  995. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  996. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  997. // Then
  998. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  999. }
  1000. func testThatPinningBackupKeyPassesEvaluationWithHostValidation() {
  1001. // Given
  1002. let host = "test.alamofire.org"
  1003. let serverTrust = TestTrusts.leafValidDNSName.trust
  1004. let keys = [TestCertificates.leafSignedByCA1, TestCertificates.intermediateCA1, TestCertificates.leafValidDNSName].af.publicKeys
  1005. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys)
  1006. // When
  1007. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1008. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  1009. // Then
  1010. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  1011. }
  1012. // MARK: Do NOT perform default validation or validate host.
  1013. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithMissingIntermediateCertificate() {
  1014. // Given
  1015. let host = "test.alamofire.org"
  1016. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  1017. let keys = [TestCertificates.leafValidDNSName].af.publicKeys
  1018. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys,
  1019. performDefaultValidation: false,
  1020. validateHost: false)
  1021. // When
  1022. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1023. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  1024. // Then
  1025. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  1026. }
  1027. func testThatPinningRootKeyWithoutCertificateChainValidationFailsEvaluationWithMissingIntermediateCertificate() {
  1028. // Given
  1029. let host = "test.alamofire.org"
  1030. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  1031. let keys = [TestCertificates.rootCA].af.publicKeys
  1032. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys,
  1033. performDefaultValidation: false,
  1034. validateHost: false)
  1035. // When
  1036. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1037. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  1038. // Then
  1039. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  1040. }
  1041. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithIncorrectIntermediateCertificate() {
  1042. // Given
  1043. let host = "test.alamofire.org"
  1044. let serverTrust = TestTrusts.leafValidDNSNameWithIncorrectIntermediate.trust
  1045. let keys = [TestCertificates.leafValidDNSName].af.publicKeys
  1046. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys,
  1047. performDefaultValidation: false,
  1048. validateHost: false)
  1049. // When
  1050. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1051. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  1052. // Then
  1053. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  1054. }
  1055. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1056. // Given
  1057. let host = "test.alamofire.org"
  1058. let serverTrust = TestTrusts.leafExpired.trust
  1059. let keys = [TestCertificates.leafExpired].af.publicKeys
  1060. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys,
  1061. performDefaultValidation: false,
  1062. validateHost: false)
  1063. // When
  1064. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1065. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  1066. // Then
  1067. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  1068. }
  1069. func testThatPinningIntermediateKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1070. // Given
  1071. let host = "test.alamofire.org"
  1072. let serverTrust = TestTrusts.leafExpired.trust
  1073. let keys = [TestCertificates.intermediateCA2].af.publicKeys
  1074. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys,
  1075. performDefaultValidation: false,
  1076. validateHost: false)
  1077. // When
  1078. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1079. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  1080. // Then
  1081. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  1082. }
  1083. func testThatPinningRootKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1084. // Given
  1085. let host = "test.alamofire.org"
  1086. let serverTrust = TestTrusts.leafExpired.trust
  1087. let keys = [TestCertificates.rootCA].af.publicKeys
  1088. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: keys,
  1089. performDefaultValidation: false,
  1090. validateHost: false)
  1091. // When
  1092. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1093. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  1094. // Then
  1095. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  1096. }
  1097. }
  1098. // MARK: -
  1099. class ServerTrustPolicyDisableEvaluationTestCase: ServerTrustPolicyTestCase {
  1100. func testThatCertificateChainMissingIntermediateCertificatePassesEvaluation() throws {
  1101. // Given
  1102. let host = "test.alamofire.org"
  1103. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  1104. let serverTrustPolicy = DisabledEvaluator()
  1105. // When
  1106. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  1107. // Then
  1108. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  1109. }
  1110. func testThatExpiredLeafCertificatePassesEvaluation() throws {
  1111. // Given
  1112. let host = "test.alamofire.org"
  1113. let serverTrust = TestTrusts.leafExpired.trust
  1114. let serverTrustPolicy = DisabledEvaluator()
  1115. // When
  1116. let result = AFResult { try serverTrustPolicy.evaluate(serverTrust, forHost: host) }
  1117. // Then
  1118. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  1119. }
  1120. }
  1121. // MARK: -
  1122. class ServerTrustPolicyCompositeTestCase: ServerTrustPolicyTestCase {
  1123. func testThatValidCertificateChainPassesDefaultAndRevocationCompositeChecks() throws {
  1124. // Given
  1125. let host = "test.alamofire.org"
  1126. let serverTrust = TestTrusts.leafValidDNSName.trust
  1127. let defaultPolicy = DefaultTrustEvaluator(validateHost: false)
  1128. let revocationPolicy = RevocationTrustEvaluator(validateHost: false)
  1129. let compositePolicy = CompositeTrustEvaluator(evaluators: [defaultPolicy, revocationPolicy])
  1130. // When
  1131. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1132. let result = AFResult { try compositePolicy.evaluate(serverTrust, forHost: host) }
  1133. // Then
  1134. XCTAssertTrue(result.isSuccess, "server trust should pass evaluation")
  1135. }
  1136. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithoutHostValidation() throws {
  1137. // Given
  1138. let host = "test.alamofire.org"
  1139. let serverTrust = TestTrusts.trustWithCertificates([
  1140. TestCertificates.leafValidDNSName,
  1141. TestCertificates.intermediateCA2
  1142. ])
  1143. let defaultPolicy = DefaultTrustEvaluator(validateHost: false)
  1144. let revocationPolicy = RevocationTrustEvaluator(validateHost: false)
  1145. let compositePolicy = CompositeTrustEvaluator(evaluators: [defaultPolicy, revocationPolicy])
  1146. // When
  1147. let result = AFResult { try compositePolicy.evaluate(serverTrust, forHost: host) }
  1148. // Then
  1149. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  1150. }
  1151. func testThatExpiredLeafCertificateFailsDefaultAndRevocationComposite() throws {
  1152. // Given
  1153. let host = "test.alamofire.org"
  1154. let serverTrust = TestTrusts.leafExpired.trust
  1155. let defaultPolicy = DefaultTrustEvaluator(validateHost: false)
  1156. let revocationPolicy = RevocationTrustEvaluator(validateHost: false)
  1157. let compositePolicy = CompositeTrustEvaluator(evaluators: [defaultPolicy, revocationPolicy])
  1158. // When
  1159. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1160. let result = AFResult { try compositePolicy.evaluate(serverTrust, forHost: host) }
  1161. // Then
  1162. XCTAssertFalse(result.isSuccess, "server trust should not pass evaluation")
  1163. }
  1164. }
  1165. // MARK: -
  1166. class ServerTrustPolicyCertificatesInBundleTestCase: ServerTrustPolicyTestCase {
  1167. func testOnlyValidCertificatesAreDetected() {
  1168. // Given
  1169. // Files present in bundle in the form of type+encoding+extension [key|cert][DER|PEM].[cer|crt|der|key|pem]
  1170. // certDER.cer: DER-encoded well-formed certificate
  1171. // certDER.crt: DER-encoded well-formed certificate
  1172. // certDER.der: DER-encoded well-formed certificate
  1173. // certPEM.*: PEM-encoded well-formed certificates, expected to fail: Apple API only handles DER encoding
  1174. // devURandomGibberish.crt: Random data, should fail
  1175. // keyDER.der: DER-encoded key, not a certificate, should fail
  1176. // When
  1177. let certificates = Bundle(for: ServerTrustPolicyCertificatesInBundleTestCase.self).af.certificates
  1178. // Then
  1179. // Expectation: 19 well-formed certificates in the test bundle plus 4 invalid certificates.
  1180. #if os(macOS)
  1181. // For some reason, macOS is allowing all certificates to be considered valid. Need to file a
  1182. // rdar demonstrating this behavior.
  1183. if #available(macOS 10.12, *) {
  1184. XCTAssertEqual(certificates.count, 19, "Expected 19 well-formed certificates")
  1185. } else {
  1186. XCTAssertEqual(certificates.count, 23, "Expected 23 well-formed certificates")
  1187. }
  1188. #else
  1189. XCTAssertEqual(certificates.count, 19, "Expected 19 well-formed certificates")
  1190. #endif
  1191. }
  1192. }