[英]Get details of provisioning profile and certificate at runtime
我想在我的應用程序中獲取並顯示我的配置文件和分發證書的詳細信息(例如到期日期和注冊公司)。 我已經嘗試過了,但是在我的應用程序中無法正常工作。 最初,它為profilePath
賦予nil。
我正在使用Swift 2.3和Xcode 8.2.1。 我試圖將代碼混合並匹配到我的應用程序中,因為我無法將其完全轉換為Swift(陷入sscanf
方法)。 任何幫助表示贊賞。
我沒有訪問Xcode 8 / Swift 3.2的權限,但這是在Swift 4中執行所需操作所需的代碼。我已經在幾個可用的配置文件/證書上對其進行了測試,並且得到了您所要求的信息。
供應配置文件
func getProvisioningProfileExpirationDate() -> Date?
{
self.getCertificateExpirationDate()
let profilePath: String? = Bundle.main.path(forResource: "embedded", ofType: "mobileprovision")
if( profilePath != nil )
{
let plistData = NSData(contentsOfFile: profilePath!)
let plistDataString = String(format: "%@", plistData!)
var plistString: String = extractPlist(fromMobileProvisionDataString:plistDataString)
let pattern = "<key>ExpirationDate</key>.*<date>(.*)</date>"
let regex = try! NSRegularExpression(pattern: pattern, options: .caseInsensitive)
let textCheckingResult : NSTextCheckingResult = regex.firstMatch(in: plistString, options: NSRegularExpression.MatchingOptions(rawValue: UInt(0)), range: NSMakeRange(0, plistString.characters.count))!
let matchRange : NSRange = textCheckingResult.range(at: 1)
let expirationDateString : String = (plistString as NSString).substring(with: matchRange)
let dateFormatter = DateFormatter()
dateFormatter.locale = Locale.current
dateFormatter.dateFormat = "yyyy-MM-dd'T'HH:mm:ssZ"
print( "Profile expires: \(dateFormatter.date(from: expirationDateString)!)" )
return dateFormatter.date(from: expirationDateString)!
}
return nil
}
我們需要進行一些操作,因為如果不將Embedded.mobileprovision文件從hex轉換為非可讀文件,然后僅提取plist標記之間的內容,則該文件不可讀。
func extractPlist( fromMobileProvisionDataString:String ) -> String
{
// Remove brackets at beginning and end
var range = Range(NSMakeRange(0, 1), in: fromMobileProvisionDataString)
var plistDataString = fromMobileProvisionDataString.replacingCharacters(in:range!, with: "")
range = Range(NSMakeRange(plistDataString.count-1, 1), in: plistDataString)
plistDataString.replaceSubrange(range!, with: "")
// Remove spaces
plistDataString = plistDataString.replacingOccurrences(of: " ", with: "")
// convert hex to ascii
let profileText = hexStringtoAscii( plistDataString )
// I tried using regular expressions and normal NSString operations to get this, but it simply wouldn't work, so I went with this ugly method.
// return extractPlistText(fromProfileString:profileText)
// Remove whitespaces and new lines characters and splits into individual lines.
let profileWords = profileText.components(separatedBy: CharacterSet.newlines)
var plistString = "";
var inPlist = false;
for word in profileWords
{
if( word.contains("<plist") ) { inPlist = true }
if( inPlist ) { plistString.append(" "); plistString.append( word ) }
if (word.contains("</plist")) { inPlist = false }
}
return plistString;
}
func hexStringtoAscii(_ hexString : String) -> String {
let pattern = "(0x)?([0-9a-f]{2})"
let regex = try! NSRegularExpression(pattern: pattern, options: .caseInsensitive)
let nsString = hexString as NSString
let matches = regex.matches(in: hexString, options: [], range: NSMakeRange(0, nsString.length))
let characters = matches.map {
Character(UnicodeScalar(UInt32(nsString.substring(with: $0.range(at: 2)), radix: 16)!)!)
}
return String(characters)
}
我已驗證此方法可從物理設備上的Embedded.mobileprovision文件中提取到期日期。 從概要文件plist數據中拉出其他元素將是微不足道的。
證書:
要獲得證書信息,我可以使用以下方法使其起作用:
func getCertificateExpirationDate() -> Date?
{
let profilePath: String? = Bundle.main.path(forResource: "embedded", ofType: "mobileprovision")
if( profilePath != nil )
{
let plistData = NSData(contentsOfFile: profilePath!)
let plistDataString = String(format: "%@", plistData!)
var plistString: String = extractPlist(fromMobileProvisionDataString:plistDataString)
// Trying to extract thecert information aswell, but haven't gotten it to work.
let certPattern = "<key>DeveloperCertificates</key>\\s*<array>\\s*<data>([^<]*)</data>"
let certRegex = try! NSRegularExpression(pattern: certPattern, options: .caseInsensitive)
let certCheckingResult : NSTextCheckingResult = certRegex.firstMatch(in: plistString, options: NSRegularExpression.MatchingOptions(rawValue: UInt(0)), range: NSMakeRange(0, plistString.characters.count))!
let certMatchRange : NSRange = certCheckingResult.range(at: 1)
let certDataString : String = (plistString as NSString).substring(with: certMatchRange)
let decodedData = Data(base64Encoded: certDataString, options: [])
let decodedString = String( data: decodedData!, encoding: .ascii )
let cfData = decodedData as! CFData
let certificate: SecCertificate = SecCertificateCreateWithData(nil, cfData)!
var description: CFString = SecCertificateCopySubjectSummary(certificate)!
print( "Certificate name: \(description)")
let certDate = self.extractCertExpirationDate(fromDecodedCertDataString: decodedString!)
print( "Certificate expires: \(certDate)")
let certOrg = self.extractCertOrg(fromDecodedCertDataString: decodedString!)
print( "Certificate organization: \(certOrg)")
return certDate
}
return nil
}
func extractCertExpirationDate( fromDecodedCertDataString: String ) -> Date
{
// Remove new lines characters and split into individual lines.
let certWords = fromDecodedCertDataString.components(separatedBy: CharacterSet.newlines)
var foundWWDRCA = false;
var certStartDate = ""
var certEndDate = ""
var certOrg = ""
for word in certWords
{
if( foundWWDRCA && (certStartDate.isEmpty || certEndDate.isEmpty))
{
var certData = word.prefix(13)
if( certStartDate.isEmpty && !certData.isEmpty )
{
certStartDate = String( certData );
}
else if( certEndDate.isEmpty && !certData.isEmpty )
{
certEndDate = String( certData );
}
}
if( word.contains("Apple Worldwide Developer Relations Certification Authority") ) { foundWWDRCA = true }
}
let dateFormatter = DateFormatter()
dateFormatter.locale = Locale.current
dateFormatter.dateFormat = "yyMMddHHmmssZ"
return dateFormatter.date(from: certEndDate)!
}
func extractCertOrg( fromDecodedCertDataString: String ) -> String
{
// Remove new lines characters and split into individual lines.
let certWords = fromDecodedCertDataString.components(separatedBy: CharacterSet.newlines)
var foundWWDRCA = false;
var certStartDate = ""
var certEndDate = ""
var certOrg = ""
for word in certWords
{
if( foundWWDRCA && (certStartDate.isEmpty || certEndDate.isEmpty))
{
var certData = word.prefix(13)
if( certStartDate.isEmpty && !certData.isEmpty )
{
certStartDate = String( certData );
}
else if( certEndDate.isEmpty && !certData.isEmpty )
{
certEndDate = String( certData );
}
}
else if( foundWWDRCA && word.contains("\u{17}") && certOrg.isEmpty)
{
var orgString = word.suffix(word.count-1)
certOrg = String( orgString.prefix(orgString.count - 1))
}
if( word.contains("Apple Worldwide Developer Relations Certification Authority") ) { foundWWDRCA = true }
}
return certOrg
}
請注意,這只會檢查安裝時與應用程序捆綁在一起的配置文件/證書。 它不會檢查設備上其他可能有效的配置文件。 因此,即使嵌入式配置文件已過期,如果還有其他用於在使用的設備上安裝配置文件的機制(設備管理,使用較新的通配符配置文件安裝其他應用程序等),應用程序仍然有可能運行。 但是,如果用於對應用程序進行簽名的證書已過期,則即使設備上存在更新的配置文件,該證書也不會運行。
對於證書信息,我仍然認為最安全的方法是使用openssl庫描述DER編碼的x509證書,但是在base64解碼證書數據后我能夠進行的解析似乎可以提取所需的信息。
聲明:本站的技術帖子網頁,遵循CC BY-SA 4.0協議,如果您需要轉載,請注明本站網址或者原文地址。任何問題請咨詢:yoyou2525@163.com.