pub struct ExceptionDomains {
pub includes_subdomains: Option<bool>,
pub exception_allows_insecure_http_loads: Option<bool>,
pub exception_minimum_tls_version: Option<ExceptionMinimumTlsVersion>,
pub exception_requires_forward_secrecy: Option<bool>,
pub requires_certificate_transparency: Option<bool>,
}Expand description
Exception Domains
Fields§
§includes_subdomains: Option<bool>A Boolean value that indicates whether to extend the configuration to subdomains of the given domain.
You can include this key in any of the domain-specific dictionaries that you add to the NSExceptionDomains and NSPinnedDomains dictionaries. Adding the NSIncludesSubdomains key affects the applicability of the other configuration in the same domain-specific dictionary. The key is optional, with a default value of NO.
Set the value for this key to YES to apply the configuration for the given domain to all subdomains of the domain that have one additional path component. For example, if you set this value to YES and the domain name string is example.com, then the configuration applies to example.com, as well as math.example.com and history.example.com. However, it doesn’t apply to the subdomains advanced.math.example.com or ancient.history.example.com because those subdomains have two additional path components. If the value is NO the configuration applies only to example.com.
§Availability
- iOS 9.0+
- macOS 10.11+
§Framework
- Security
exception_allows_insecure_http_loads: Option<bool>A Boolean value indicating whether to allow insecure HTTP loads.
Set the value for this key to YES to allow insecure HTTP loads for the given domain, or to be able to loosen the server trust evaluation requirements for HTTPS connections to the domain, as described in Performing Manual Server Trust Authentication.
Using this key doesn’t by itself change default server trust evaluation requirements for HTTPS connections, described in Ensure the Network Server Meets Minimum Requirements. Using only this key also doesn’t change the TLS or forward secrecy requirements imposed by ATS. As a result, you might need to combine this key with the NSExceptionMinimumTLSVersion or NSExceptionRequiresForwardSecrecy key in certain cases.
This key is optional. The default value is NO.
§Important
You must supply a justification during App Store review if you set the key’s value to YES, as described in Provide Justification for Exceptions.
§Availability
- iOS 9.0+
- macOS 10.11+
§Framework
- Security
exception_minimum_tls_version: Option<ExceptionMinimumTlsVersion>The minimum Transport Layer Security (TLS) version for network connections.
This key is optional. The value is a string, with a default value of TLSv1.2.
§Important
You must supply a justification during App Store review if you use this key to set a protocol version lower than 1.2, as described in Provide Justification for Exceptions.
§Availability
- iOS 9.0+
- macOS 10.11+
§Framework
- Security
exception_requires_forward_secrecy: Option<bool>A Boolean value indicating whether to override the perfect forward secrecy requirement.
Set the value for this key to NO to override the requirement that a server support perfect forward secrecy (PFS) for the given domain. Disabling this requirement also removes the key length check described in Ensure the Network Server Meets Minimum Requirements. However, it doesn’t impact the TLS version requirement. To control that, use NSExceptionMinimumTLSVersion.
This key is optional. The default value is YES, which limits the accepted ciphers to those that support PFS through Elliptic Curve Diffie-Hellman Ephemeral (ECDHE) key exchange.
§Availability
- iOS 9.0+
- macOS 10.11+
§Framework
- Security
requires_certificate_transparency: Option<bool>A Boolean value indicating whether to require Certificate Transparency.
Certificate Transparency (CT) is a protocol that ATS can use to identify mistakenly or maliciously issued X.509 certificates. Set the value for the NSRequiresCertificateTransparency key to YES to require that for a given domain, server certificates are supported by valid, signed CT timestamps from at least two CT logs trusted by Apple. For more information about Certificate Transparency, see RFC6962.
Unlike most other ATS exceptions, using a non-default value in this case tightens security requirements.
This key is optional. The default value is NO.
§Availability
- iOS 9.0+
- macOS 10.11+
§Framework
- Security
Trait Implementations§
Source§impl Clone for ExceptionDomains
impl Clone for ExceptionDomains
Source§fn clone(&self) -> ExceptionDomains
fn clone(&self) -> ExceptionDomains
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read moreSource§impl Debug for ExceptionDomains
impl Debug for ExceptionDomains
Source§impl Default for ExceptionDomains
impl Default for ExceptionDomains
Source§fn default() -> ExceptionDomains
fn default() -> ExceptionDomains
Source§impl<'de> Deserialize<'de> for ExceptionDomains
impl<'de> Deserialize<'de> for ExceptionDomains
Source§fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
Source§impl PartialEq for ExceptionDomains
impl PartialEq for ExceptionDomains
Source§impl Serialize for ExceptionDomains
impl Serialize for ExceptionDomains
impl Eq for ExceptionDomains
impl StructuralPartialEq for ExceptionDomains
Auto Trait Implementations§
impl Freeze for ExceptionDomains
impl RefUnwindSafe for ExceptionDomains
impl Send for ExceptionDomains
impl Sync for ExceptionDomains
impl Unpin for ExceptionDomains
impl UnwindSafe for ExceptionDomains
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
Source§impl<Q, K> Equivalent<K> for Q
impl<Q, K> Equivalent<K> for Q
Source§impl<Q, K> Equivalent<K> for Q
impl<Q, K> Equivalent<K> for Q
Source§fn equivalent(&self, key: &K) -> bool
fn equivalent(&self, key: &K) -> bool
key and return true if they are equal.