Swift 3 HTTPS GET请求
嗨iam试图从HTTPS网址获取请求。但Iam不断得到错误。Swift 3 HTTPS GET请求
2017-10-13 18:13:43.372427+0800 VQ Smart Home[13412:2155414] Unknown class _TtC13VQ_Smart_Home16ManageUserstable in Interface
Builder文件。 VQ Smart Home [13412:2155471] TQ SSL信任错误[6:0x604000167680]:3:0 2017-10-13 18:13:43.403672 + 0800 VQ Smart Home [13412:2155471] NSURLSession/NSURLConnection的HTTP加载失败 (kCFStreamErrorDomainSSL,-9813) 2017年10月13日18:13:43.404000 + 0800 VQ智能家居[13412:2155471]任务< 8BB05664-B56E-41CA-92F7-BBAECC8008E3 >。 < 5> HTTP加载失败(错误 代码:-1202 [3:-9813]) 2017-10-13 18:13:43.404496 + 0800 VQ智能家居[13412:2155472]任务< 8BB05664-B56E-41CA-92F7 -BBAECC8008E3>。 < 5>用错误代码: -1202 错误=可选(错误域= NSURLErrorDomain代码= -1202“此服务器的证书无效。您可能正在连接到假装为”202.73“的 服务器。 46.176” ,这可能会危害您的 机密信息。” 的UserInfo = {NSURLErrorFailingURLPeerTrustErrorKey =,= NSLocalizedRecoverySuggestion你想 连接到服务器吗?_kCFStreamErrorDomainKey = 3, _kCFStreamErrorCodeKey = -9813,NSErrorPeerCertificateChainKey =( “” ),NSUnderlyingError = 0x60400025c920 {Error Domain = kCFErrorDomainCFNetwork Code = -1202“(null)” UserInfo = {_ kCFStreamPropertySSLClientCertificateState = 0, kCFStreamPropertySSLPeerTrust =, _kCFNetworkCFStreamSSLErrorOriginalValue = -9813,_kCFStreamErrorDomainKey = 3,_kCFStreamErrorCodeKey = -9813,kCFStreamPropertySSLPeerCertificates =( “” )}},NSLocalizedDescription =此服务器的证书是无效的。您可能正在连接到一个伪装成 “202.73.46.176”,它可以把您的机密信息 风险的服务器, NSErrorFailingURLKey = https://202.73.46.176/api/v1/user/find/all/1, NSErrorFailingURLStringKey = https://202.73.46.176/api/v1/user/find/all/1, NSErrorClientCertificateStateKey = 0})
viewDidLoad中
let urlstr: String = "https://202.73.46.176/api/v1/user/find/all/1"
let request = NSMutableURLRequest(url: NSURL(string: urlstr)! as URL)
request.httpMethod = "GET"
let postString = ""
request.httpBody = postString.data(using: String.Encoding.utf8)
let task = URLSession.shared.dataTask(with: request as URLRequest) {
data, response, error in
if error != nil {
print("error=\(error)")
return
}
print("response = \(response)")
let responseString = NSString(data: data!, encoding: String.Encoding.utf8.rawValue)
print("responseString = \(responseString)")
}
task.resume()
方法
func urlSession(_ session: URLSession, didReceive challenge: URLAuthenticationChallenge, completionHandler: @escaping (URLSession.AuthChallengeDisposition, URLCredential?) -> Void) {
//Implementation 1: VERY WEAK METHOD
/*if challenge.previousFailureCount > 0{
completionHandler(URLSession.AuthChallengeDisposition.cancelAuthenticationChallenge, nil)
}else{
completionHandler(URLSession.AuthChallengeDisposition.useCredential, URLCredential(trust:challenge.protectionSpace.serverTrust!))
}*/
//Implementation 2:
var disposition: URLSession.AuthChallengeDisposition = URLSession.AuthChallengeDisposition.performDefaultHandling
var credential:URLCredential?
if challenge.protectionSpace.authenticationMethod == NSURLAuthenticationMethodServerTrust {
//certificate-based server credentials are used when verifying the server’s identity
credential = URLCredential(trust: challenge.protectionSpace.serverTrust!)
if (credential != nil) {
disposition = URLSession.AuthChallengeDisposition.useCredential
}
else{
disposition = URLSession.AuthChallengeDisposition.performDefaultHandling
}
}
else{
disposition = URLSession.AuthChallengeDisposition.cancelAuthenticationChallenge
}
print("==============", #function," disposition: ", disposition)
print("==============", #function," disposition: ", credential!)
//completionHandler(disposition, credential);
//Implementation 3:
let serverTrust = challenge.protectionSpace.serverTrust
let certificate = SecTrustGetCertificateAtIndex(serverTrust!, 0)
// Set SSL policies for domain name check
let policies = NSMutableArray();
policies.add(SecPolicyCreateSSL(true, (challenge.protectionSpace.host as CFString)))
SecTrustSetPolicies(serverTrust!, policies);
// Evaluate server certificate
var result = SecTrustResultType(rawValue: 0)!
SecTrustEvaluate(serverTrust!, &result)
let isServerTrusted:Bool = (result == SecTrustResultType.unspecified || result == SecTrustResultType.unspecified || result == SecTrustResultType.proceed)
print("==============",#function," isServerTrusted: ", isServerTrusted)
print("==============", #function," result: ", result.hashValue," SecTrustResultType.unspecified: ", SecTrustResultType.unspecified.hashValue," SecTrustResultType.proceed: ", SecTrustResultType.proceed.hashValue)
var certName = ""
// if self.isSimulatingCertificateCorruption {
// certName = corruptedCert
// } else {
// certName = cert
// }
// Get local and remote cert data
let remoteCertificateData = SecCertificateCopyData(certificate!) as Data
let pathToCert = Bundle.main.path(forResource: certName, ofType: "der")
let localCertificate = try! Data(contentsOf: URL(fileURLWithPath: pathToCert!))
print(" remoteCertificateData: ", remoteCertificateData," localCertificate: ", localCertificate, " serverTrust: ", serverTrust.debugDescription )
if (remoteCertificateData == localCertificate) { //TODO:- this is strictly for tesing puposes, to allow untrusted severs. REMOVE IN PRODUCTION.
let credential:URLCredential = URLCredential(trust: serverTrust!)
completionHandler(.useCredential, credential)
}else if (isServerTrusted && (remoteCertificateData == localCertificate)) {
let credential:URLCredential = URLCredential(trust: serverTrust!)
completionHandler(.useCredential, credential)
} else {
completionHandler(.cancelAuthenticationChallenge, nil)
}
}
有人可以帮助我解决这个问题。
我发现了一个更好的答案..
创建SecurityCertificateManager
import Foundation
import Alamofire
class SecurityCertificateManager {
static let sharedInstance = SecurityCertificateManager()
let defaultManager: Alamofire.SessionManager = {
let serverTrustPolicies: [String: ServerTrustPolicy] = [
"12.3.3.3": .disableEvaluation
]
let configuration = URLSessionConfiguration.default
configuration.httpAdditionalHeaders = Alamofire.SessionManager.defaultHTTPHeaders
return Alamofire.SessionManager(
configuration: configuration,
serverTrustPolicyManager: ServerTrustPolicyManager(policies: serverTrustPolicies)
)
}()
}
,并调用它
let service = CommanLinksUtility().getServiceAuthUrl()
let ticket = UserDefaults.standard.value(forKey: "servicket") as! String
let baseUrl = "https://12.3.3.3:5051/api/v1/user/find/all/1"
let header = [ "content-type" : "application/json", "url": service, "ticket" : ticket ]
SecurityCertificateManager.sharedInstance.defaultManager.request(baseUrl, method: .get, parameters: header as? [String : AnyObject], encoding: URLEncoding.queryString, headers: header)
.responseJSON { response in
let jsonResult = JSON(data: response.data!)
for anItem in jsonResult["result"].arrayValue {
}
}
您可以使用AFNETWorking或Almofire库
你得到这个错误,因为你的服务器没有SSL证书,因此它不受信任
“此服务器的证书是无效的。你可能会连接到假装为“202.73.46.176”的服务器,可能会将您的机密信息置于危险之中。“'
这部分错误本身应该足以了解发生了什么。一旦你安装了一个可信的有效证书,错误就会消失。您也可以让这个可以通过在你的plist
<key>NSAppTransportSecurity</key>
<dict>
<key>NSExceptionDomains</key>
<dict>
<key>yourdomain.com</key>
<dict>
<!--Include to allow subdomains-->
<key>NSIncludesSubdomains</key>
<true/>
<!--Include to allow HTTP requests-->
<key>NSTemporaryExceptionAllowsInsecureHTTPLoads</key>
<true/>
<!--Include to specify minimum TLS version-->
<key>NSTemporaryExceptionMinimumTLSVersion</key>
<string>TLSv1.1</string>
</dict>
</dict>
</dict>
指定它忽略,但我会从这样做的,刚开始的SSL证书为您的服务器
从How can I add NSAppTransportSecurity to my info.plist file?引用了的.plist键避免