Skip to content

Commit 9cdf8a0

Browse files
authored
Generate trust roots SecCertificate for Transport Services (swift-server#350)
This PR is a result of another swift-server#321. In that PR I provided an alternative structure to TLSConfiguration for when connecting with Transport Services. In this one I construct the NWProtocolTLS.Options from TLSConfiguration. It does mean a little more work for whenever we make a connection, but having spoken to @weissi he doesn't seem to think that is an issue. Also there is no method to create a SecIdentity at the moment. We need to generate a pkcs#12 from the certificate chain and private key, which can then be used to create the SecIdentity. This should resolve swift-server#292
1 parent 06daedf commit 9cdf8a0

File tree

5 files changed

+93
-21
lines changed

5 files changed

+93
-21
lines changed

.dockerignore

+2
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
.build
2+
.git

Sources/AsyncHTTPClient/NIOTransportServices/TLSConfiguration.swift

+70-18
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@
1616

1717
import Foundation
1818
import Network
19+
import NIO
1920
import NIOSSL
2021
import NIOTransportServices
2122

@@ -58,9 +59,25 @@
5859

5960
/// create NWProtocolTLS.Options for use with NIOTransportServices from the NIOSSL TLSConfiguration
6061
///
61-
/// - Parameter queue: Dispatch queue to run `sec_protocol_options_set_verify_block` on.
62+
/// - Parameter eventLoop: EventLoop to wait for creation of options on
63+
/// - Returns: Future holding NWProtocolTLS Options
64+
func getNWProtocolTLSOptions(on eventLoop: EventLoop) -> EventLoopFuture<NWProtocolTLS.Options> {
65+
let promise = eventLoop.makePromise(of: NWProtocolTLS.Options.self)
66+
Self.tlsDispatchQueue.async {
67+
do {
68+
let options = try self.getNWProtocolTLSOptions()
69+
promise.succeed(options)
70+
} catch {
71+
promise.fail(error)
72+
}
73+
}
74+
return promise.futureResult
75+
}
76+
77+
/// create NWProtocolTLS.Options for use with NIOTransportServices from the NIOSSL TLSConfiguration
78+
///
6279
/// - Returns: Equivalent NWProtocolTLS Options
63-
func getNWProtocolTLSOptions() -> NWProtocolTLS.Options {
80+
func getNWProtocolTLSOptions() throws -> NWProtocolTLS.Options {
6481
let options = NWProtocolTLS.Options()
6582

6683
let useMTELGExplainer = """
@@ -109,6 +126,11 @@
109126
preconditionFailure("TLSConfiguration.keyLogCallback is not supported. \(useMTELGExplainer)")
110127
}
111128

129+
// the certificate chain
130+
if self.certificateChain.count > 0 {
131+
preconditionFailure("TLSConfiguration.certificateChain is not supported. \(useMTELGExplainer)")
132+
}
133+
112134
// private key
113135
if self.privateKey != nil {
114136
preconditionFailure("TLSConfiguration.privateKey is not supported. \(useMTELGExplainer)")
@@ -117,30 +139,60 @@
117139
// renegotiation support key is unsupported
118140

119141
// trust roots
120-
if let trustRoots = self.trustRoots {
121-
guard case .default = trustRoots else {
122-
preconditionFailure("TLSConfiguration.trustRoots != .default is not supported. \(useMTELGExplainer)")
142+
var secTrustRoots: [SecCertificate]?
143+
switch trustRoots {
144+
case .some(.certificates(let certificates)):
145+
secTrustRoots = try certificates.compactMap { certificate in
146+
try SecCertificateCreateWithData(nil, Data(certificate.toDERBytes()) as CFData)
147+
}
148+
case .some(.file(let file)):
149+
let certificates = try NIOSSLCertificate.fromPEMFile(file)
150+
secTrustRoots = try certificates.compactMap { certificate in
151+
try SecCertificateCreateWithData(nil, Data(certificate.toDERBytes()) as CFData)
123152
}
153+
154+
case .some(.default), .none:
155+
break
124156
}
125157

126-
switch self.certificateVerification {
127-
case .none:
158+
precondition(self.certificateVerification != .noHostnameVerification,
159+
"TLSConfiguration.certificateVerification = .noHostnameVerification is not supported. \(useMTELGExplainer)")
160+
161+
if certificateVerification != .fullVerification || trustRoots != nil {
128162
// add verify block to control certificate verification
129163
sec_protocol_options_set_verify_block(
130164
options.securityProtocolOptions,
131-
{ _, _, sec_protocol_verify_complete in
132-
sec_protocol_verify_complete(true)
133-
}, TLSConfiguration.tlsDispatchQueue
165+
{ _, sec_trust, sec_protocol_verify_complete in
166+
guard self.certificateVerification != .none else {
167+
sec_protocol_verify_complete(true)
168+
return
169+
}
170+
171+
let trust = sec_trust_copy_ref(sec_trust).takeRetainedValue()
172+
if let trustRootCertificates = secTrustRoots {
173+
SecTrustSetAnchorCertificates(trust, trustRootCertificates as CFArray)
174+
}
175+
if #available(macOS 10.15, iOS 13.0, tvOS 13.0, watchOS 6.0, *) {
176+
dispatchPrecondition(condition: .onQueue(Self.tlsDispatchQueue))
177+
SecTrustEvaluateAsyncWithError(trust, Self.tlsDispatchQueue) { _, result, error in
178+
if let error = error {
179+
print("Trust failed: \(error.localizedDescription)")
180+
}
181+
sec_protocol_verify_complete(result)
182+
}
183+
} else {
184+
SecTrustEvaluateAsync(trust, Self.tlsDispatchQueue) { _, result in
185+
switch result {
186+
case .proceed, .unspecified:
187+
sec_protocol_verify_complete(true)
188+
default:
189+
sec_protocol_verify_complete(false)
190+
}
191+
}
192+
}
193+
}, Self.tlsDispatchQueue
134194
)
135-
136-
case .noHostnameVerification:
137-
precondition(self.certificateVerification != .noHostnameVerification,
138-
"TLSConfiguration.certificateVerification = .noHostnameVerification is not supported. \(useMTELGExplainer)")
139-
140-
case .fullVerification:
141-
break
142195
}
143-
144196
return options
145197
}
146198
}

Sources/AsyncHTTPClient/Utils.swift

+5-3
Original file line numberDiff line numberDiff line change
@@ -180,9 +180,11 @@ extension NIOClientTCPBootstrap {
180180
// if eventLoop is compatible with NIOTransportServices create a NIOTSConnectionBootstrap
181181
if #available(OSX 10.14, iOS 12.0, tvOS 12.0, watchOS 6.0, *), let tsBootstrap = NIOTSConnectionBootstrap(validatingGroup: eventLoop) {
182182
// create NIOClientTCPBootstrap with NIOTS TLS provider
183-
let parameters = tlsConfiguration.getNWProtocolTLSOptions()
184-
let tlsProvider = NIOTSClientTLSProvider(tlsOptions: parameters)
185-
return eventLoop.makeSucceededFuture(NIOClientTCPBootstrap(tsBootstrap, tls: tlsProvider))
183+
return tlsConfiguration.getNWProtocolTLSOptions(on: eventLoop)
184+
.map { parameters in
185+
let tlsProvider = NIOTSClientTLSProvider(tlsOptions: parameters)
186+
return NIOClientTCPBootstrap(tsBootstrap, tls: tlsProvider)
187+
}
186188
}
187189
#endif
188190

Tests/AsyncHTTPClientTests/HTTPClientNIOTSTests+XCTest.swift

+1
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ extension HTTPClientNIOTSTests {
2929
("testTLSFailError", testTLSFailError),
3030
("testConnectionFailError", testConnectionFailError),
3131
("testTLSVersionError", testTLSVersionError),
32+
("testTrustRootCertificateLoadFail", testTrustRootCertificateLoadFail),
3233
]
3334
}
3435
}

Tests/AsyncHTTPClientTests/HTTPClientNIOTSTests.swift

+15
Original file line numberDiff line numberDiff line change
@@ -111,4 +111,19 @@ class HTTPClientNIOTSTests: XCTestCase {
111111
}
112112
#endif
113113
}
114+
115+
func testTrustRootCertificateLoadFail() {
116+
guard isTestingNIOTS() else { return }
117+
#if canImport(Network)
118+
let tlsConfig = TLSConfiguration.forClient(trustRoots: .file("not/a/certificate"))
119+
XCTAssertThrowsError(try tlsConfig.getNWProtocolTLSOptions()) { error in
120+
switch error {
121+
case let error as NIOSSL.NIOSSLError where error == .failedToLoadCertificate:
122+
break
123+
default:
124+
XCTFail("\(error)")
125+
}
126+
}
127+
#endif
128+
}
114129
}

0 commit comments

Comments
 (0)