AuthViewController.swift 38 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190
  1. @testable import FirebaseAuth
  2. // Copyright 2020 Google LLC
  3. //
  4. // Licensed under the Apache License, Version 2.0 (the "License");
  5. // you may not use this file except in compliance with the License.
  6. // You may obtain a copy of the License at
  7. //
  8. // http://www.apache.org/licenses/LICENSE-2.0
  9. //
  10. // Unless required by applicable law or agreed to in writing, software
  11. // distributed under the License is distributed on an "AS IS" BASIS,
  12. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. // See the License for the specific language governing permissions and
  14. // limitations under the License.
  15. // [START auth_import]
  16. import FirebaseCore
  17. import SwiftUI
  18. // For Sign in with Facebook
  19. import FBSDKLoginKit
  20. // For Sign in with Game Center
  21. import GameKit
  22. // For Sign in with Google
  23. // [START google_import]
  24. import GoogleSignIn
  25. import UIKit
  26. import SwiftUI
  27. // For Sign in with Apple
  28. import AuthenticationServices
  29. import CryptoKit
  30. private let kFacebookAppID = "ENTER APP ID HERE"
  31. private let kContinueUrl = "Enter URL"
  32. class AuthViewController: UIViewController, DataSourceProviderDelegate {
  33. var dataSourceProvider: DataSourceProvider<AuthMenuData>!
  34. var authStateDidChangeListeners: [AuthStateDidChangeListenerHandle] = []
  35. var IDTokenDidChangeListeners: [IDTokenDidChangeListenerHandle] = []
  36. var actionCodeContinueURL: URL?
  37. var actionCodeLinkDomain: String?
  38. var actionCodeRequestType: ActionCodeRequestType = .inApp
  39. let spinner = UIActivityIndicatorView(style: .medium)
  40. var tableView: UITableView { view as! UITableView }
  41. override func loadView() {
  42. view = UITableView(frame: .zero, style: .insetGrouped)
  43. }
  44. override func viewDidLoad() {
  45. super.viewDidLoad()
  46. configureNavigationBar()
  47. configureDataSourceProvider()
  48. }
  49. private func showSpinner() {
  50. spinner.center = view.center
  51. spinner.startAnimating()
  52. view.addSubview(spinner)
  53. }
  54. private func hideSpinner() {
  55. spinner.stopAnimating()
  56. spinner.removeFromSuperview()
  57. }
  58. private func actionCodeSettings() -> ActionCodeSettings {
  59. let settings = ActionCodeSettings()
  60. settings.url = actionCodeContinueURL
  61. settings.handleCodeInApp = (actionCodeRequestType == .inApp)
  62. settings.linkDomain = actionCodeLinkDomain
  63. return settings
  64. }
  65. // MARK: - DataSourceProviderDelegate
  66. func didSelectRowAt(_ indexPath: IndexPath, on tableView: UITableView) {
  67. let item = dataSourceProvider.item(at: indexPath)
  68. guard let providerName = item.title else {
  69. fatalError("Invalid item name")
  70. }
  71. guard let provider = AuthMenu(rawValue: providerName) else {
  72. // The row tapped has no affiliated action.
  73. return
  74. }
  75. switch provider {
  76. case .settings:
  77. performSettings()
  78. case .google:
  79. performGoogleSignInFlow()
  80. case .apple:
  81. performAppleSignInFlow()
  82. case .facebook:
  83. performFacebookSignInFlow()
  84. case .twitter, .microsoft, .gitHub, .yahoo, .linkedIn:
  85. performOAuthLoginFlow(for: provider)
  86. case .gameCenter:
  87. performGameCenterLoginFlow()
  88. case .emailPassword:
  89. performDemoEmailPasswordLoginFlow()
  90. case .passwordless:
  91. performPasswordlessLoginFlow()
  92. case .phoneNumber:
  93. performPhoneNumberLoginFlow()
  94. case .anonymous:
  95. performAnonymousLoginFlow()
  96. case .custom:
  97. performCustomAuthLoginFlow()
  98. case .initRecaptcha:
  99. performInitRecaptcha()
  100. case .customAuthDomain:
  101. performCustomAuthDomainFlow()
  102. case .getToken:
  103. getUserTokenResult(force: false)
  104. case .getTokenForceRefresh:
  105. getUserTokenResult(force: true)
  106. case .addAuthStateChangeListener:
  107. addAuthStateListener()
  108. case .removeLastAuthStateChangeListener:
  109. removeAuthStateListener()
  110. case .addIdTokenChangeListener:
  111. addIDTokenListener()
  112. case .removeLastIdTokenChangeListener:
  113. removeIDTokenListener()
  114. case .verifyClient:
  115. verifyClient()
  116. case .deleteApp:
  117. deleteApp()
  118. case .actionType:
  119. toggleActionCodeRequestType(at: indexPath)
  120. case .continueURL:
  121. changeActionCodeContinueURL(at: indexPath)
  122. case .linkDomain:
  123. changeActionCodeLinkDomain(at: indexPath)
  124. case .requestVerifyEmail:
  125. requestVerifyEmail()
  126. case .requestPasswordReset:
  127. requestPasswordReset()
  128. case .resetPassword:
  129. resetPassword()
  130. case .checkActionCode:
  131. checkActionCode()
  132. case .applyActionCode:
  133. applyActionCode()
  134. case .verifyPasswordResetCode:
  135. verifyPasswordResetCode()
  136. case .phoneEnroll:
  137. phoneEnroll()
  138. case .totpEnroll:
  139. Task { await totpEnroll() }
  140. case .multifactorUnenroll:
  141. mfaUnenroll()
  142. case .passkeySignUp:
  143. passkeySignUp()
  144. case .passkeySignIn:
  145. passkeySignIn()
  146. case .passkeyEnroll:
  147. passkeyEnroll()
  148. case .passkeyUnenroll:
  149. passkeyUnenroll()
  150. }
  151. }
  152. // MARK: - Firebase 🔥
  153. private func performSettings() {
  154. let settingsController = SettingsViewController()
  155. navigationController?.pushViewController(settingsController, animated: true)
  156. }
  157. private func performGoogleSignInFlow() {
  158. // [START headless_google_auth]
  159. guard let clientID = FirebaseApp.app()?.options.clientID else { return }
  160. // Create Google Sign In configuration object.
  161. // [START_EXCLUDE silent]
  162. // TODO: Move configuration to Info.plist
  163. // [END_EXCLUDE]
  164. let config = GIDConfiguration(clientID: clientID)
  165. GIDSignIn.sharedInstance.configuration = config
  166. Task {
  167. do {
  168. let result = try await GIDSignIn.sharedInstance.signIn(withPresenting: self)
  169. let user = result.user
  170. guard let idToken = user.idToken?.tokenString
  171. else {
  172. // [START_EXCLUDE]
  173. let error = NSError(
  174. domain: "GIDSignInError",
  175. code: -1,
  176. userInfo: [
  177. NSLocalizedDescriptionKey: "Unexpected sign in result: required authentication data is missing.",
  178. ]
  179. )
  180. return displayError(error)
  181. // [END_EXCLUDE]
  182. }
  183. let credential = GoogleAuthProvider.credential(withIDToken: idToken,
  184. accessToken: user.accessToken.tokenString)
  185. try await signIn(with: credential)
  186. } catch {
  187. return displayError(error)
  188. }
  189. // [END_EXCLUDE]
  190. }
  191. // [END headless_google_auth]
  192. }
  193. func signIn(with credential: AuthCredential) async throws {
  194. do {
  195. _ = try await AppManager.shared.auth().signIn(with: credential)
  196. transitionToUserViewController()
  197. } catch {
  198. let authError = error as NSError
  199. if authError.code == AuthErrorCode.secondFactorRequired.rawValue {
  200. let resolver = authError
  201. .userInfo[AuthErrorUserInfoMultiFactorResolverKey] as! MultiFactorResolver
  202. performMfaLoginFlow(resolver: resolver)
  203. } else {
  204. return displayError(error)
  205. }
  206. }
  207. }
  208. // For Sign in with Apple
  209. var currentNonce: String?
  210. private func performAppleSignInFlow() {
  211. do {
  212. let nonce = try CryptoUtils.randomNonceString()
  213. currentNonce = nonce
  214. let appleIDProvider = ASAuthorizationAppleIDProvider()
  215. let request = appleIDProvider.createRequest()
  216. request.requestedScopes = [.fullName, .email]
  217. request.nonce = CryptoUtils.sha256(nonce)
  218. let authorizationController = ASAuthorizationController(authorizationRequests: [request])
  219. authorizationController.delegate = self
  220. authorizationController.presentationContextProvider = self
  221. authorizationController.performRequests()
  222. } catch {
  223. // In the unlikely case that nonce generation fails, show error view.
  224. displayError(error)
  225. }
  226. }
  227. private func performFacebookSignInFlow() {
  228. // The following config can also be stored in the project's .plist
  229. Settings.shared.appID = kFacebookAppID
  230. Settings.shared.displayName = "AuthenticationExample"
  231. // Create a Facebook `LoginManager` instance
  232. let loginManager = LoginManager()
  233. loginManager.logIn(permissions: ["email"], from: self) { result, error in
  234. guard error == nil else { return self.displayError(error) }
  235. guard let accessToken = AccessToken.current else { return }
  236. let credential = FacebookAuthProvider.credential(withAccessToken: accessToken.tokenString)
  237. self.signin(with: credential)
  238. }
  239. }
  240. // Maintain a strong reference to an OAuthProvider for login
  241. private var oauthProvider: OAuthProvider!
  242. private func performOAuthLoginFlow(for provider: AuthMenu) {
  243. oauthProvider = OAuthProvider(providerID: provider.id)
  244. oauthProvider.getCredentialWith(nil) { credential, error in
  245. guard error == nil else { return self.displayError(error) }
  246. guard let credential = credential else { return }
  247. self.signin(with: credential)
  248. }
  249. }
  250. private func performGameCenterLoginFlow() {
  251. // Step 1: System Game Center Login
  252. GKLocalPlayer.local.authenticateHandler = { viewController, error in
  253. if let error = error {
  254. // Handle Game Center login error
  255. print("Error logging into Game Center: \(error.localizedDescription)")
  256. } else if let authViewController = viewController {
  257. // Present Game Center login UI if needed
  258. self.present(authViewController, animated: true)
  259. } else {
  260. // Game Center login successful, proceed to Firebase
  261. self.linkGameCenterToFirebase()
  262. }
  263. }
  264. }
  265. // Step 2: Link to Firebase
  266. private func linkGameCenterToFirebase() {
  267. GameCenterAuthProvider.getCredential { credential, error in
  268. if let error = error {
  269. // Handle Firebase credential retrieval error
  270. print("Error getting Game Center credential: \(error.localizedDescription)")
  271. } else if let credential = credential {
  272. Auth.auth().signIn(with: credential) { authResult, error in
  273. if let error = error {
  274. // Handle Firebase sign-in error
  275. print("Error signing into Firebase with Game Center: \(error.localizedDescription)")
  276. } else {
  277. // Firebase sign-in successful
  278. print("Successfully linked Game Center to Firebase")
  279. }
  280. }
  281. }
  282. }
  283. }
  284. private func performDemoEmailPasswordLoginFlow() {
  285. let loginView = LoginView(delegate: self)
  286. let hostingController = UIHostingController(rootView: loginView)
  287. hostingController.title = "Email/Password Auth"
  288. navigationController?.pushViewController(hostingController, animated: true)
  289. }
  290. private func performPasswordlessLoginFlow() {
  291. let passwordlessViewController = PasswordlessViewController()
  292. passwordlessViewController.delegate = self
  293. let navPasswordlessAuthController =
  294. UINavigationController(rootViewController: passwordlessViewController)
  295. navigationController?.present(navPasswordlessAuthController, animated: true)
  296. }
  297. private func performPhoneNumberLoginFlow() {
  298. let phoneAuthViewController = PhoneAuthViewController()
  299. phoneAuthViewController.delegate = self
  300. let navPhoneAuthController = UINavigationController(rootViewController: phoneAuthViewController)
  301. navigationController?.present(navPhoneAuthController, animated: true)
  302. }
  303. private func performMfaLoginFlow(resolver: MultiFactorResolver) {
  304. let mfaLoginController = UIHostingController(rootView: MFALoginView(
  305. resolver: resolver,
  306. delegate: self
  307. ))
  308. present(mfaLoginController, animated: true)
  309. }
  310. private func performAnonymousLoginFlow() {
  311. AppManager.shared.auth().signInAnonymously { result, error in
  312. guard error == nil else { return self.displayError(error) }
  313. self.transitionToUserViewController()
  314. }
  315. }
  316. private func performCustomAuthLoginFlow() {
  317. let customAuthController = CustomAuthViewController()
  318. customAuthController.delegate = self
  319. let navCustomAuthController = UINavigationController(rootViewController: customAuthController)
  320. navigationController?.present(navCustomAuthController, animated: true)
  321. }
  322. private func signin(with credential: AuthCredential) {
  323. AppManager.shared.auth().signIn(with: credential) { result, error in
  324. guard error == nil else { return self.displayError(error) }
  325. self.transitionToUserViewController()
  326. }
  327. }
  328. private func performInitRecaptcha() {
  329. Task {
  330. do {
  331. try await AppManager.shared.auth().initializeRecaptchaConfig()
  332. print("Initializing Recaptcha config succeeded.")
  333. } catch {
  334. print("Initializing Recaptcha config failed: \(error).")
  335. }
  336. }
  337. }
  338. private func performCustomAuthDomainFlow() {
  339. showTextInputPrompt(with: "Enter Custom Auth Domain For Auth: ", completion: { newDomain in
  340. AppManager.shared.auth().customAuthDomain = newDomain
  341. })
  342. }
  343. private func getUserTokenResult(force: Bool) {
  344. guard let currentUser = Auth.auth().currentUser else {
  345. print("Error: No user logged in")
  346. return
  347. }
  348. currentUser.getIDTokenResult(forcingRefresh: force, completion: { tokenResult, error in
  349. if error != nil {
  350. print("Error: Error refreshing token")
  351. return // Handle error case, returning early
  352. }
  353. if let tokenResult = tokenResult {
  354. let claims = tokenResult.claims
  355. var message = "Token refresh succeeded\n\n"
  356. for (key, value) in claims {
  357. message += "\(key): \(value)\n"
  358. }
  359. self.displayInfo(title: "Info", message: message, style: .alert)
  360. } else {
  361. print("Error: Unable to access claims.")
  362. }
  363. })
  364. }
  365. private func addAuthStateListener() {
  366. weak var weakSelf = self
  367. let index = authStateDidChangeListeners.count
  368. print("Auth State Did Change Listener #\(index) was added.")
  369. let handle = Auth.auth().addStateDidChangeListener { [weak weakSelf] auth, user in
  370. guard weakSelf != nil else { return }
  371. print("Auth State Did Change Listener #\(index) was invoked on user '\(user?.uid ?? "nil")'")
  372. }
  373. authStateDidChangeListeners.append(handle)
  374. }
  375. private func removeAuthStateListener() {
  376. guard !authStateDidChangeListeners.isEmpty else {
  377. print("No remaining Auth State Did Change Listeners.")
  378. return
  379. }
  380. let index = authStateDidChangeListeners.count - 1
  381. let handle = authStateDidChangeListeners.last!
  382. Auth.auth().removeStateDidChangeListener(handle)
  383. authStateDidChangeListeners.removeLast()
  384. print("Auth State Did Change Listener #\(index) was removed.")
  385. }
  386. private func addIDTokenListener() {
  387. weak var weakSelf = self
  388. let index = IDTokenDidChangeListeners.count
  389. print("ID Token Did Change Listener #\(index) was added.")
  390. let handle = Auth.auth().addIDTokenDidChangeListener { [weak weakSelf] auth, user in
  391. guard weakSelf != nil else { return }
  392. print("ID Token Did Change Listener #\(index) was invoked on user '\(user?.uid ?? "")'.")
  393. }
  394. IDTokenDidChangeListeners.append(handle)
  395. }
  396. private func removeIDTokenListener() {
  397. guard !IDTokenDidChangeListeners.isEmpty else {
  398. print("No remaining ID Token Did Change Listeners.")
  399. return
  400. }
  401. let index = IDTokenDidChangeListeners.count - 1
  402. let handle = IDTokenDidChangeListeners.last!
  403. Auth.auth().removeIDTokenDidChangeListener(handle)
  404. IDTokenDidChangeListeners.removeLast()
  405. print("ID Token Did Change Listener #\(index) was removed.")
  406. }
  407. private func verifyClient() {
  408. AppManager.shared.auth().tokenManager.getTokenInternal { result in
  409. guard case let .success(token) = result else {
  410. print("Verify iOS Client failed.")
  411. return
  412. }
  413. let request = VerifyClientRequest(
  414. withAppToken: token.string,
  415. isSandbox: token.type == .sandbox,
  416. requestConfiguration: AppManager.shared.auth().requestConfiguration
  417. )
  418. Task {
  419. do {
  420. let verifyResponse = try await AppManager.shared.auth().backend.call(with: request)
  421. guard let receipt = verifyResponse.receipt,
  422. let timeoutDate = verifyResponse.suggestedTimeOutDate else {
  423. print("Internal Auth Error: invalid VerifyClientResponse.")
  424. return
  425. }
  426. let timeout = timeoutDate.timeIntervalSinceNow
  427. do {
  428. let credential = await AppManager.shared.auth().appCredentialManager
  429. .didStartVerification(
  430. withReceipt: receipt,
  431. timeout: timeout
  432. )
  433. guard credential.secret != nil else {
  434. print("Failed to receive remote notification to verify App ID.")
  435. return
  436. }
  437. let testPhoneNumber = "+16509964692"
  438. let request = SendVerificationCodeRequest(
  439. phoneNumber: testPhoneNumber,
  440. codeIdentity: CodeIdentity.credential(credential),
  441. requestConfiguration: AppManager.shared.auth().requestConfiguration
  442. )
  443. do {
  444. _ = try await AppManager.shared.auth().backend.call(with: request)
  445. print("Verify iOS client succeeded")
  446. } catch {
  447. print("Verify iOS Client failed: \(error.localizedDescription)")
  448. }
  449. }
  450. } catch {
  451. print("Verify iOS Client failed: \(error.localizedDescription)")
  452. }
  453. }
  454. }
  455. }
  456. private func deleteApp() {
  457. AppManager.shared.app.delete { success in
  458. if success {
  459. print("App deleted successfully.")
  460. } else {
  461. print("Failed to delete app.")
  462. }
  463. }
  464. }
  465. private func toggleActionCodeRequestType(at indexPath: IndexPath) {
  466. switch actionCodeRequestType {
  467. case .inApp:
  468. actionCodeRequestType = .continue
  469. case .continue:
  470. actionCodeRequestType = .email
  471. case .email:
  472. actionCodeRequestType = .inApp
  473. }
  474. dataSourceProvider.updateItem(
  475. at: indexPath,
  476. item: Item(title: AuthMenu.actionType.name, detailTitle: actionCodeRequestType.name)
  477. )
  478. tableView.reloadData()
  479. }
  480. private func changeActionCodeContinueURL(at indexPath: IndexPath) {
  481. showTextInputPrompt(with: "Continue URL:", completion: { newContinueURL in
  482. self.actionCodeContinueURL = URL(string: newContinueURL)
  483. print("Successfully set Continue URL to: \(newContinueURL)")
  484. self.dataSourceProvider.updateItem(
  485. at: indexPath,
  486. item: Item(
  487. title: AuthMenu.continueURL.name,
  488. detailTitle: self.actionCodeContinueURL?.absoluteString,
  489. isEditable: true
  490. )
  491. )
  492. self.tableView.reloadData()
  493. })
  494. }
  495. private func changeActionCodeLinkDomain(at indexPath: IndexPath) {
  496. showTextInputPrompt(with: "Link Domain:", completion: { newLinkDomain in
  497. self.actionCodeLinkDomain = newLinkDomain
  498. print("Successfully set Link Domain to: \(newLinkDomain)")
  499. self.dataSourceProvider.updateItem(
  500. at: indexPath,
  501. item: Item(
  502. title: AuthMenu.linkDomain.name,
  503. detailTitle: self.actionCodeLinkDomain,
  504. isEditable: true
  505. )
  506. )
  507. self.tableView.reloadData()
  508. })
  509. }
  510. private func requestVerifyEmail() {
  511. showSpinner()
  512. let completionHandler: ((any Error)?) -> Void = { [weak self] error in
  513. guard let self = self else { return }
  514. self.hideSpinner()
  515. if let error = error {
  516. let errorMessage = "Error sending verification email: \(error.localizedDescription)"
  517. showAlert(for: errorMessage)
  518. print(errorMessage)
  519. } else {
  520. let successMessage = "Verification email sent successfully!"
  521. showAlert(for: successMessage)
  522. print(successMessage)
  523. }
  524. }
  525. if actionCodeRequestType == .email {
  526. AppManager.shared.auth().currentUser?.sendEmailVerification(completion: completionHandler)
  527. } else {
  528. if actionCodeContinueURL == nil {
  529. print("Error: Action code continue URL is nil.")
  530. return
  531. }
  532. AppManager.shared.auth().currentUser?.sendEmailVerification(
  533. with: actionCodeSettings(),
  534. completion: completionHandler
  535. )
  536. }
  537. }
  538. func requestPasswordReset() {
  539. showTextInputPrompt(with: "Email:", completion: { email in
  540. print("Sending password reset link to: \(email)")
  541. self.showSpinner()
  542. let completionHandler: ((any Error)?) -> Void = { [weak self] error in
  543. guard let self = self else { return }
  544. self.hideSpinner()
  545. if let error = error {
  546. print("Request password reset failed: \(error)")
  547. showAlert(for: error.localizedDescription)
  548. return
  549. }
  550. print("Request password reset succeeded.")
  551. showAlert(for: "Sent!")
  552. }
  553. if self.actionCodeRequestType == .email {
  554. AppManager.shared.auth().sendPasswordReset(withEmail: email, completion: completionHandler)
  555. } else {
  556. guard self.actionCodeContinueURL != nil else {
  557. print("Error: Action code continue URL is nil.")
  558. return
  559. }
  560. AppManager.shared.auth().sendPasswordReset(
  561. withEmail: email,
  562. actionCodeSettings: self.actionCodeSettings(),
  563. completion: completionHandler
  564. )
  565. }
  566. })
  567. }
  568. private func resetPassword() {
  569. showSpinner()
  570. let completionHandler: ((any Error)?) -> Void = { [weak self] error in
  571. guard let self = self else { return }
  572. self.hideSpinner()
  573. if let error = error {
  574. print("Password reset failed \(error)")
  575. showAlert(for: error.localizedDescription)
  576. return
  577. }
  578. print("Password reset succeeded")
  579. showAlert(for: "Password reset succeeded!")
  580. }
  581. showTextInputPrompt(with: "OOB Code:") {
  582. code in
  583. self.showTextInputPrompt(with: "New Password") {
  584. password in
  585. AppManager.shared.auth().confirmPasswordReset(
  586. withCode: code,
  587. newPassword: password,
  588. completion: completionHandler
  589. )
  590. }
  591. }
  592. }
  593. private func nameForActionCodeOperation(_ operation: ActionCodeOperation) -> String {
  594. switch operation {
  595. case .verifyEmail:
  596. return "Verify Email"
  597. case .recoverEmail:
  598. return "Recover Email"
  599. case .passwordReset:
  600. return "Password Reset"
  601. case .emailLink:
  602. return "Email Sign-In Link"
  603. case .verifyAndChangeEmail:
  604. return "Verify Before Change Email"
  605. case .revertSecondFactorAddition:
  606. return "Revert Second Factor Addition"
  607. case .unknown:
  608. return "Unknown action"
  609. }
  610. }
  611. private func checkActionCode() {
  612. showSpinner()
  613. let completionHandler: (ActionCodeInfo?, (any Error)?) -> Void = { [weak self] info, error in
  614. guard let self = self else { return }
  615. self.hideSpinner()
  616. if let error = error {
  617. print("Check action code failed: \(error)")
  618. showAlert(for: error.localizedDescription)
  619. return
  620. }
  621. guard let info = info else { return }
  622. print("Check action code succeeded")
  623. let email = info.email
  624. let previousEmail = info.previousEmail
  625. let operation = self.nameForActionCodeOperation(info.operation)
  626. showAlert(for: operation, message: previousEmail ?? email)
  627. }
  628. showTextInputPrompt(with: "OOB Code:") {
  629. oobCode in
  630. AppManager.shared.auth().checkActionCode(oobCode, completion: completionHandler)
  631. }
  632. }
  633. private func applyActionCode() {
  634. showSpinner()
  635. let completionHandler: ((any Error)?) -> Void = { [weak self] error in
  636. guard let self = self else { return }
  637. self.hideSpinner()
  638. if let error = error {
  639. print("Apply action code failed \(error)")
  640. showAlert(for: error.localizedDescription)
  641. return
  642. }
  643. print("Apply action code succeeded")
  644. showAlert(for: "Action code was properly applied")
  645. }
  646. showTextInputPrompt(with: "OOB Code: ") {
  647. oobCode in
  648. AppManager.shared.auth().applyActionCode(oobCode, completion: completionHandler)
  649. }
  650. }
  651. private func verifyPasswordResetCode() {
  652. showSpinner()
  653. let completionHandler: (String?, (any Error)?) -> Void = { [weak self] email, error in
  654. guard let self = self else { return }
  655. self.hideSpinner()
  656. if let error = error {
  657. print("Verify password reset code failed \(error)")
  658. showAlert(for: error.localizedDescription)
  659. return
  660. }
  661. print("Verify password resest code succeeded.")
  662. showAlert(for: "Code verified for email: \(email ?? "missing email")")
  663. }
  664. showTextInputPrompt(with: "OOB Code: ") {
  665. oobCode in
  666. AppManager.shared.auth().verifyPasswordResetCode(oobCode, completion: completionHandler)
  667. }
  668. }
  669. private func phoneEnroll() {
  670. guard let user = AppManager.shared.auth().currentUser else {
  671. showAlert(for: "No user logged in!")
  672. print("Error: User must be logged in first.")
  673. return
  674. }
  675. showTextInputPrompt(with: "Phone Number:") { phoneNumber in
  676. user.multiFactor.getSessionWithCompletion { session, error in
  677. guard let session = session else { return }
  678. guard error == nil else {
  679. self.showAlert(for: "Enrollment failed")
  680. print("Multi factor start enroll failed. Error: \(error!)")
  681. return
  682. }
  683. PhoneAuthProvider.provider()
  684. .verifyPhoneNumber(phoneNumber, multiFactorSession: session) { verificationID, error in
  685. guard error == nil else {
  686. self.showAlert(for: "Enrollment failed")
  687. print("Multi factor start enroll failed. Error: \(error!)")
  688. return
  689. }
  690. self.showTextInputPrompt(with: "Verification Code: ") { verificationCode in
  691. let credential = PhoneAuthProvider.provider().credential(
  692. withVerificationID: verificationID!,
  693. verificationCode: verificationCode
  694. )
  695. let assertion = PhoneMultiFactorGenerator.assertion(with: credential)
  696. self.showTextInputPrompt(with: "Display Name:") { displayName in
  697. user.multiFactor.enroll(with: assertion, displayName: displayName) { error in
  698. if let error = error {
  699. self.showAlert(for: "Enrollment failed")
  700. print("Multi factor finalize enroll failed. Error: \(error)")
  701. } else {
  702. self.showAlert(for: "Successfully enrolled: \(displayName)")
  703. print("Multi factor finalize enroll succeeded.")
  704. }
  705. }
  706. }
  707. }
  708. }
  709. }
  710. }
  711. }
  712. private func totpEnroll() async {
  713. guard
  714. let user = AppManager.shared.auth().currentUser,
  715. let accountName = user.email
  716. else {
  717. showAlert(for: "Enrollment failed: User must be logged and have email address.")
  718. return
  719. }
  720. guard let issuer = AppManager.shared.auth().app?.name else {
  721. showAlert(for: "Enrollment failed: Firebase app is missing name.")
  722. return
  723. }
  724. do {
  725. let session = try await user.multiFactor.session()
  726. let secret = try await TOTPMultiFactorGenerator.generateSecret(with: session)
  727. print("Secret: " + secret.sharedSecretKey())
  728. let url = secret.generateQRCodeURL(withAccountName: accountName, issuer: issuer)
  729. guard !url.isEmpty else {
  730. showAlert(for: "Enrollment failed")
  731. print("Multi factor finalize enroll failed. Could not generate URL.")
  732. return
  733. }
  734. secret.openInOTPApp(withQRCodeURL: url)
  735. guard
  736. let oneTimePassword = await showTextInputPrompt(with: "Enter the one time passcode.")
  737. else {
  738. showAlert(for: "Enrollment failed: one time passcode not entered.")
  739. return
  740. }
  741. let assertion = TOTPMultiFactorGenerator.assertionForEnrollment(
  742. with: secret,
  743. oneTimePassword: oneTimePassword
  744. )
  745. // TODO(nickcooke): Provide option to enter display name.
  746. try await user.multiFactor.enroll(with: assertion, displayName: "TOTP")
  747. showAlert(for: "Successfully enrolled: TOTP")
  748. print("Multi factor finalize enroll succeeded.")
  749. } catch {
  750. print(error)
  751. showAlert(for: "Enrollment failed: \(error.localizedDescription)")
  752. }
  753. }
  754. func mfaUnenroll() {
  755. var displayNames: [String] = []
  756. guard let currentUser = Auth.auth().currentUser else {
  757. print("Error: No current user")
  758. return
  759. }
  760. for factorInfo in currentUser.multiFactor.enrolledFactors {
  761. if let displayName = factorInfo.displayName {
  762. displayNames.append(displayName)
  763. }
  764. }
  765. let alertController = UIAlertController(
  766. title: "Select Multi Factor to Unenroll",
  767. message: nil,
  768. preferredStyle: .actionSheet
  769. )
  770. for displayName in displayNames {
  771. let action = UIAlertAction(title: displayName, style: .default) { _ in
  772. self.unenrollFactor(with: displayName)
  773. }
  774. alertController.addAction(action)
  775. }
  776. let cancelAction = UIAlertAction(title: "Cancel", style: .cancel, handler: nil)
  777. alertController.addAction(cancelAction)
  778. present(alertController, animated: true, completion: nil)
  779. }
  780. private func unenrollFactor(with displayName: String) {
  781. guard let currentUser = Auth.auth().currentUser else {
  782. showAlert(for: "User must be logged in")
  783. print("Error: No current user")
  784. return
  785. }
  786. var factorInfoToUnenroll: MultiFactorInfo?
  787. for factorInfo in currentUser.multiFactor.enrolledFactors {
  788. if factorInfo.displayName == displayName {
  789. factorInfoToUnenroll = factorInfo
  790. break
  791. }
  792. }
  793. if let factorInfo = factorInfoToUnenroll {
  794. currentUser.multiFactor.unenroll(withFactorUID: factorInfo.uid) { error in
  795. if let error = error {
  796. self.showAlert(for: "Failed to unenroll factor: \(displayName)")
  797. print("Multi factor unenroll failed. Error: \(error.localizedDescription)")
  798. } else {
  799. self.showAlert(for: "Successfully unenrolled: \(displayName)")
  800. print("Multi factor unenroll succeeded.")
  801. }
  802. }
  803. }
  804. }
  805. private func passkeySignUp(){
  806. guard #available(iOS 16.0, macOS 12.0, tvOS 16.0, *) else {
  807. print("OS version is not supported for this action.")
  808. return
  809. }
  810. // Sign in anonymously
  811. AppManager.shared.auth().signInAnonymously { [weak self] result, error in
  812. guard let self = self else { return }
  813. if let error = error {
  814. self.showAlert(for:"sign-in anonymously failed")
  815. print("Sign in anonymously first")
  816. } else {
  817. print("sign-in anonymously succeeded.")
  818. if let user = result?.user {
  819. print("User ID : \(user.uid)")
  820. self.passkeyEnroll()
  821. }else{
  822. self.showAlert(for: "sign-in anonymously failed: User is nil")
  823. print("sign-in anonymously failed: User is nil")
  824. }
  825. }
  826. }
  827. }
  828. func passkeySignIn() {
  829. guard #available(iOS 16.0, macOS 12.0, tvOS 16.0, *) else {
  830. print("OS version is not supported for this action.")
  831. return
  832. }
  833. Task {
  834. do {
  835. let request = try await AppManager.shared.auth().startPasskeySignIn()
  836. let controller = ASAuthorizationController(authorizationRequests: [request])
  837. controller.delegate = self
  838. controller.presentationContextProvider = self
  839. controller.performRequests(options: .preferImmediatelyAvailableCredentials)
  840. } catch {
  841. print("Passkey sign-in failed with error: \(error)")
  842. }
  843. }
  844. }
  845. func passkeyEnroll() {
  846. guard #available(iOS 16.0, macOS 12.0, tvOS 16.0, *) else {
  847. print("OS version is not supported for this action.")
  848. return
  849. }
  850. guard let user = Auth.auth().currentUser else {
  851. print("Please sign in first.")
  852. return
  853. }
  854. showTextInputPrompt(with: "Passkey name") { [weak self] passkeyName in
  855. let passkeyName: String = passkeyName
  856. print ("Passkey Name is \(passkeyName)")
  857. Task {
  858. do {
  859. let regRequest = try await user.startPasskeyEnrollmentWithName(withName: passkeyName)
  860. print("request done \(regRequest)")
  861. let controller = ASAuthorizationController(authorizationRequests: [regRequest])
  862. controller.delegate = self
  863. controller.presentationContextProvider = self
  864. controller.performRequests()
  865. } catch {
  866. print("Error during passkey enrollment: \(error)")
  867. }
  868. }
  869. }
  870. }
  871. func passkeyUnenroll() {
  872. guard let user = Auth.auth().currentUser else {
  873. print("Please sign in first.")
  874. return
  875. }
  876. Task {
  877. guard let credentialID = await showTextInputPrompt(with: "passkey credential ID") else {
  878. print("User cancelled or didn't provide credential ID.")
  879. return
  880. }
  881. user.unenrollPasskey(with: credentialID) { [weak self] error in
  882. guard let self = self else { return }
  883. if let error = error {
  884. print("Withdraw passkey with credential ID: \(credentialID) failed with error: \(error)")
  885. } else {
  886. print("Withdraw passkey with credential ID: \(credentialID) succeeded")
  887. }
  888. }
  889. }
  890. }
  891. // MARK: - Private Helpers
  892. private func showTextInputPrompt(with message: String, completion: ((String) -> Void)? = nil) {
  893. let editController = UIAlertController(
  894. title: message,
  895. message: nil,
  896. preferredStyle: .alert
  897. )
  898. editController.addTextField()
  899. let saveHandler: (UIAlertAction) -> Void = { _ in
  900. let text = editController.textFields?.first?.text ?? ""
  901. if let completion {
  902. completion(text)
  903. }
  904. }
  905. let cancelHandler: (UIAlertAction) -> Void = { _ in
  906. if let completion {
  907. completion("")
  908. }
  909. }
  910. editController.addAction(UIAlertAction(title: "Save", style: .default, handler: saveHandler))
  911. editController.addAction(UIAlertAction(title: "Cancel", style: .cancel, handler: cancelHandler))
  912. // Assuming `self` is a view controller
  913. present(editController, animated: true, completion: nil)
  914. }
  915. private func showTextInputPrompt(with message: String) async -> String? {
  916. await withCheckedContinuation { continuation in
  917. showTextInputPrompt(with: message) { inputText in
  918. continuation.resume(returning: inputText.isEmpty ? nil : inputText)
  919. }
  920. }
  921. }
  922. // Function to generate QR code from a string
  923. private func generateQRCode(from string: String) -> UIImage? {
  924. let data = string.data(using: String.Encoding.ascii)
  925. if let filter = CIFilter(name: "CIQRCodeGenerator") {
  926. filter.setValue(data, forKey: "inputMessage")
  927. let transform = CGAffineTransform(scaleX: 10, y: 10)
  928. if let output = filter.outputImage?.transformed(by: transform) {
  929. return UIImage(ciImage: output)
  930. }
  931. }
  932. return nil
  933. }
  934. func showAlert(for title: String, message: String? = nil) {
  935. let alertController = UIAlertController(
  936. title: message,
  937. message: nil,
  938. preferredStyle: .alert
  939. )
  940. alertController.addAction(UIAlertAction(title: "OK", style: UIAlertAction.Style.default))
  941. }
  942. private func configureDataSourceProvider() {
  943. dataSourceProvider = DataSourceProvider(
  944. dataSource: AuthMenuData.sections,
  945. tableView: tableView
  946. )
  947. dataSourceProvider.delegate = self
  948. }
  949. private func configureNavigationBar() {
  950. navigationItem.title = "Firebase Auth"
  951. guard let navigationBar = navigationController?.navigationBar else { return }
  952. navigationBar.prefersLargeTitles = true
  953. navigationBar.titleTextAttributes = [.foregroundColor: UIColor.systemOrange]
  954. navigationBar.largeTitleTextAttributes = [.foregroundColor: UIColor.systemOrange]
  955. }
  956. private func transitionToUserViewController() {
  957. // UserViewController is at index 1 in the tabBarController.viewControllers array
  958. tabBarController?.transitionToViewController(atIndex: 1)
  959. }
  960. }
  961. // MARK: - LoginDelegate
  962. extension AuthViewController: LoginDelegate {
  963. public func loginDidOccur(resolver: MultiFactorResolver?) {
  964. if let resolver {
  965. performMfaLoginFlow(resolver: resolver)
  966. } else {
  967. transitionToUserViewController()
  968. }
  969. }
  970. }
  971. // MARK: - Implementing Sign in with Apple with Firebase
  972. extension AuthViewController: ASAuthorizationControllerDelegate,
  973. ASAuthorizationControllerPresentationContextProviding {
  974. // MARK: ASAuthorizationControllerDelegate
  975. func authorizationController(controller: ASAuthorizationController,
  976. didCompleteWithAuthorization authorization: ASAuthorization) {
  977. guard let appleIDCredential = authorization.credential as? ASAuthorizationAppleIDCredential
  978. else {
  979. print("Unable to retrieve AppleIDCredential")
  980. return
  981. }
  982. guard let nonce = currentNonce else {
  983. fatalError("Invalid state: A login callback was received, but no login request was sent.")
  984. }
  985. guard let appleIDToken = appleIDCredential.identityToken else {
  986. print("Unable to fetch identity token")
  987. return
  988. }
  989. guard let appleAuthCode = appleIDCredential.authorizationCode else {
  990. print("Unable to fetch authorization code")
  991. return
  992. }
  993. guard let idTokenString = String(data: appleIDToken, encoding: .utf8) else {
  994. print("Unable to serialize token string from data: \(appleIDToken.debugDescription)")
  995. return
  996. }
  997. guard let _ = String(data: appleAuthCode, encoding: .utf8) else {
  998. print("Unable to serialize auth code string from data: \(appleAuthCode.debugDescription)")
  999. return
  1000. }
  1001. // use this call to create the authentication credential and set the user's full name
  1002. let credential = OAuthProvider.appleCredential(withIDToken: idTokenString,
  1003. rawNonce: nonce,
  1004. fullName: appleIDCredential.fullName)
  1005. AppManager.shared.auth().signIn(with: credential) { result, error in
  1006. // Error. If error.code == .MissingOrInvalidNonce, make sure
  1007. // you're sending the SHA256-hashed nonce as a hex string with
  1008. // your request to Apple.
  1009. guard error == nil else { return self.displayError(error) }
  1010. // At this point, our user is signed in
  1011. // so we advance to the User View Controller
  1012. self.transitionToUserViewController()
  1013. }
  1014. }
  1015. func authorizationController(controller: ASAuthorizationController,
  1016. didCompleteWithError error: any Error) {
  1017. // Ensure that you have:
  1018. // - enabled `Sign in with Apple` on the Firebase console
  1019. // - added the `Sign in with Apple` capability for this project
  1020. print("Sign in with Apple failed: \(error)")
  1021. }
  1022. // MARK: ASAuthorizationControllerPresentationContextProviding
  1023. func presentationAnchor(for controller: ASAuthorizationController) -> ASPresentationAnchor {
  1024. return view.window!
  1025. }
  1026. }