NCBaseSessionManager.swift 1.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041
  1. //
  2. // SPDX-FileCopyrightText: 2024 Nextcloud GmbH and Nextcloud contributors
  3. // SPDX-License-Identifier: GPL-3.0-or-later
  4. //
  5. import Foundation
  6. @objcMembers public class NCBaseSessionManager: AFHTTPSessionManager {
  7. public static var baseUserAgent = "Mozilla/5.0 (iOS) Nextcloud-Talk v\(Bundle.main.infoDictionary?["CFBundleShortVersionString"] ?? "Unknown")"
  8. public var userAgent: String = baseUserAgent
  9. init(configuration: URLSessionConfiguration, responseSerializer: AFHTTPResponseSerializer, requestSerializer: AFHTTPRequestSerializer) {
  10. super.init(baseURL: nil, sessionConfiguration: configuration)
  11. self.responseSerializer = responseSerializer
  12. self.requestSerializer = requestSerializer
  13. self.securityPolicy = AFSecurityPolicy(pinningMode: .none)
  14. self.updateUserAgent()
  15. }
  16. @available(*, unavailable)
  17. required init?(coder: NSCoder) {
  18. fatalError("init(coder:) has not been implemented")
  19. }
  20. internal func updateUserAgent() {
  21. self.requestSerializer.setValue(self.userAgent, forHTTPHeaderField: "User-Agent")
  22. }
  23. public override func urlSession(_ session: URLSession, didReceive challenge: URLAuthenticationChallenge, completionHandler: @escaping (URLSession.AuthChallengeDisposition, URLCredential?) -> Void) {
  24. // The pinning check
  25. if CCCertificate.sharedManager().checkTrustedChallenge(challenge) {
  26. completionHandler(.useCredential, URLCredential(trust: challenge.protectionSpace.serverTrust!))
  27. } else {
  28. completionHandler(.performDefaultHandling, nil)
  29. }
  30. }
  31. }