| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220 |
- // Copyright 2023 Google LLC
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- #if !os(macOS) && !os(watchOS)
- import Foundation
- import UIKit
- #if COCOAPODS
- internal import GoogleUtilities
- #else
- internal import GoogleUtilities_Environment
- #endif // COCOAPODS
- // Protocol to help with unit tests.
- protocol AuthAPNSTokenApplication {
- @MainActor func registerForRemoteNotifications()
- }
- extension UIApplication: AuthAPNSTokenApplication {}
- /// A class to manage APNs token in memory.
- @available(iOS 13, tvOS 13, macOS 10.15, macCatalyst 13, watchOS 7, *)
- class AuthAPNSTokenManager: @unchecked Sendable /* TODO: sendable */ {
- /// The timeout for registering for remote notification.
- ///
- /// Only tests should access this property.
- let timeout: TimeInterval
- /// Initializes the instance.
- /// - Parameter application: The `UIApplication` to request the token from.
- /// - Returns: The initialized instance.
- init(withApplication application: sending AuthAPNSTokenApplication, timeout: TimeInterval = 5) {
- self.application = application
- self.timeout = timeout
- }
- /// Attempts to get the APNs token.
- /// - Parameter callback: The block to be called either immediately or in future, either when a
- /// token becomes available, or when timeout occurs, whichever happens earlier.
- ///
- /// This function is internal to make visible for tests.
- func getTokenInternal(callback: @escaping @Sendable (Result<AuthAPNSToken, Error>) -> Void) {
- if let token = tokenStore {
- callback(.success(token))
- return
- }
- if pendingCallbacks.count > 0 {
- pendingCallbacks.append(callback)
- // TODO(ncooke3): This is likely a bug in that the async wrapper method
- // cannot make forward progress.
- return
- }
- pendingCallbacks = [callback]
- DispatchQueue.main.async {
- self.application.registerForRemoteNotifications()
- }
- let applicableCallbacks = pendingCallbacks
- let deadline = DispatchTime.now() + timeout
- kAuthGlobalWorkQueue.asyncAfter(deadline: deadline) {
- // Only cancel if the pending callbacks remain the same, i.e., not triggered yet.
- if applicableCallbacks.count == self.pendingCallbacks.count {
- self.callback(.failure(AuthErrorUtils.missingAppTokenError(underlyingError: nil)))
- }
- }
- }
- func getToken() async throws -> AuthAPNSToken {
- return try await withUnsafeThrowingContinuation { continuation in
- self.getTokenInternal { result in
- switch result {
- case let .success(token):
- continuation.resume(returning: token)
- case let .failure(error):
- continuation.resume(throwing: error)
- }
- }
- }
- }
- /// The APNs token, if one is available.
- ///
- /// Setting a token with AuthAPNSTokenTypeUnknown will automatically converts it to
- /// a token with the automatically detected type.
- var token: AuthAPNSToken? {
- get {
- tokenStore
- }
- set(setToken) {
- guard let setToken else {
- tokenStore = nil
- return
- }
- var newToken = setToken
- if setToken.type == AuthAPNSTokenType.unknown {
- let detectedTokenType = isProductionApp() ? AuthAPNSTokenType.prod : AuthAPNSTokenType
- .sandbox
- newToken = AuthAPNSToken(withData: setToken.data, type: detectedTokenType)
- }
- tokenStore = newToken
- callback(.success(newToken))
- }
- }
- /// Should only be written to in tests
- var tokenStore: AuthAPNSToken?
- /// Cancels any pending `getTokenWithCallback:` request.
- /// - Parameter error: The error to return .
- func cancel(withError error: Error) {
- callback(.failure(error))
- }
- /// Enable unit test faking.
- var application: AuthAPNSTokenApplication
- private var pendingCallbacks: [(Result<AuthAPNSToken, Error>) -> Void] = []
- private func callback(_ result: Result<AuthAPNSToken, Error>) {
- let pendingCallbacks = self.pendingCallbacks
- self.pendingCallbacks = []
- for callback in pendingCallbacks {
- callback(result)
- }
- }
- private func isProductionApp() -> Bool {
- let defaultAppTypeProd = true
- if GULAppEnvironmentUtil.isSimulator() {
- AuthLog.logInfo(code: "I-AUT000006", message: "Assuming prod APNs token type on simulator.")
- return defaultAppTypeProd
- }
- // Apps distributed via AppStore or TestFlight use the Production APNS certificates.
- if GULAppEnvironmentUtil.isFromAppStore() {
- return defaultAppTypeProd
- }
- // TODO: resolve https://github.com/firebase/firebase-ios-sdk/issues/10921
- // to support TestFlight
- let path = Bundle.main.bundlePath + "/" + "embedded.mobileprovision"
- do {
- let profileData = try NSData(contentsOfFile: path) as Data
- // The "embedded.mobileprovision" sometimes contains characters with value 0, which signals
- // the end of a c-string and halts the ASCII parser, or with value > 127, which violates
- // strict 7-bit ASCII. Replace any 0s or invalid characters in the input.
- let byteArray = [UInt8](profileData)
- var outBytes: [UInt8] = []
- for byte in byteArray {
- if byte == 0 || byte > 127 {
- outBytes.append(46) // ASCII '.'
- } else {
- outBytes.append(byte)
- }
- }
- guard let embeddedProfile = String(bytes: outBytes, encoding: .utf8) else {
- AuthLog.logInfo(code: "I-AUT000008",
- message: "Error while reading embedded mobileprovision. " +
- "Failed to convert to String")
- return defaultAppTypeProd
- }
- let scanner = Scanner(string: embeddedProfile)
- if scanner.scanUpToString("<plist") != nil {
- guard let plistContents = scanner.scanUpToString("</plist>")?.appending("</plist>"),
- let data = plistContents.data(using: .utf8) else {
- return defaultAppTypeProd
- }
- do {
- let plistData = try PropertyListSerialization.propertyList(from: data, format: nil)
- guard let plistMap = plistData as? [String: Any] else {
- AuthLog.logInfo(code: "I-AUT000008",
- message: "Error while converting assumed plist to dictionary.")
- return defaultAppTypeProd
- }
- if plistMap["ProvisionedDevices"] != nil {
- AuthLog.logInfo(code: "I-AUT000011",
- message: "Provisioning profile has specifically provisioned devices, " +
- "most likely a Dev profile.")
- }
- guard let entitlements = plistMap["Entitlements"] as? [String: Any],
- let apsEnvironment = entitlements["aps-environment"] as? String else {
- AuthLog.logInfo(code: "I-AUT000013",
- message: "No aps-environment set. If testing on a device APNS is not " +
- "correctly configured. Please recheck your provisioning profiles.")
- return defaultAppTypeProd
- }
- AuthLog.logDebug(code: "I-AUT000012",
- message: "APNS Environment in profile: \(apsEnvironment)")
- if apsEnvironment == "development" {
- return false
- }
- } catch {
- AuthLog.logInfo(code: "I-AUT000008",
- message: "Error while converting assumed plist to dict " +
- "\(error.localizedDescription)")
- }
- }
- } catch {
- AuthLog.logInfo(code: "I-AUT000008",
- message: "Error while reading embedded mobileprovision \(error)")
- }
- return defaultAppTypeProd
- }
- }
- #endif
|