UserProfileUpdate.swift 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195
  1. // Copyright 2024 Google LLC
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. import Foundation
  15. /// Actor to serialize the update profile calls.
  16. @available(iOS 13, tvOS 13, macOS 10.15, macCatalyst 13, watchOS 7, *)
  17. actor UserProfileUpdate {
  18. func link(user: User, with credential: AuthCredential) async throws -> AuthDataResult {
  19. let accessToken = try await user.internalGetTokenAsync()
  20. let request = VerifyAssertionRequest(providerID: credential.provider,
  21. requestConfiguration: user.requestConfiguration)
  22. credential.prepare(request)
  23. request.accessToken = accessToken
  24. do {
  25. let response = try await AuthBackend.call(with: request)
  26. guard let idToken = response.idToken,
  27. let refreshToken = response.refreshToken,
  28. let providerID = response.providerID else {
  29. fatalError("Internal Auth Error: missing token in EmailLinkSignInResponse")
  30. }
  31. try await updateTokenAndRefreshUser(user: user,
  32. idToken: idToken,
  33. refreshToken: refreshToken,
  34. expirationDate: response.approximateExpirationDate)
  35. let updatedOAuthCredential = OAuthCredential(withVerifyAssertionResponse: response)
  36. let additionalUserInfo = AdditionalUserInfo(providerID: providerID,
  37. profile: response.profile,
  38. username: response.username,
  39. isNewUser: response.isNewUser)
  40. return AuthDataResult(withUser: user, additionalUserInfo: additionalUserInfo,
  41. credential: updatedOAuthCredential)
  42. } catch {
  43. user.signOutIfTokenIsInvalid(withError: error)
  44. throw error
  45. }
  46. }
  47. func unlink(user: User, fromProvider provider: String) async throws -> User {
  48. let accessToken = try await user.internalGetTokenAsync()
  49. let request = SetAccountInfoRequest(requestConfiguration: user.requestConfiguration)
  50. request.accessToken = accessToken
  51. if user.providerDataRaw[provider] == nil {
  52. throw AuthErrorUtils.noSuchProviderError()
  53. }
  54. request.deleteProviders = [provider]
  55. do {
  56. let response = try await AuthBackend.call(with: request)
  57. // We can't just use the provider info objects in SetAccountInfoResponse
  58. // because they don't have localID and email fields. Remove the specific
  59. // provider manually.
  60. user.providerDataRaw.removeValue(forKey: provider)
  61. if provider == EmailAuthProvider.id {
  62. user.hasEmailPasswordCredential = false
  63. }
  64. #if os(iOS)
  65. // After successfully unlinking a phone auth provider, remove the phone number
  66. // from the cached user info.
  67. if provider == PhoneAuthProvider.id {
  68. user.phoneNumber = nil
  69. }
  70. #endif
  71. if let idToken = response.idToken,
  72. let refreshToken = response.refreshToken {
  73. let tokenService = SecureTokenService(
  74. withRequestConfiguration: user.requestConfiguration,
  75. accessToken: idToken,
  76. accessTokenExpirationDate: response.approximateExpirationDate,
  77. refreshToken: refreshToken
  78. )
  79. try await setTokenService(user: user, tokenService: tokenService)
  80. return user
  81. }
  82. } catch {
  83. user.signOutIfTokenIsInvalid(withError: error)
  84. throw error
  85. }
  86. if let error = user.updateKeychain() {
  87. throw error
  88. }
  89. return user
  90. }
  91. /// Performs a setAccountInfo request by mutating the results of a getAccountInfo response,
  92. /// atomically in regards to other calls to this method.
  93. /// - Parameter changeBlock: A block responsible for mutating a template `SetAccountInfoRequest`
  94. func executeUserUpdateWithChanges(user: User,
  95. changeBlock: @escaping (GetAccountInfoResponseUser,
  96. SetAccountInfoRequest)
  97. -> Void) async throws {
  98. let userAccountInfo = try await getAccountInfoRefreshingCache(user)
  99. let accessToken = try await user.internalGetTokenAsync()
  100. // Mutate setAccountInfoRequest in block
  101. let setAccountInfoRequest =
  102. SetAccountInfoRequest(requestConfiguration: user.requestConfiguration)
  103. setAccountInfoRequest.accessToken = accessToken
  104. changeBlock(userAccountInfo, setAccountInfoRequest)
  105. do {
  106. let accountInfoResponse = try await AuthBackend.call(with: setAccountInfoRequest)
  107. if let idToken = accountInfoResponse.idToken,
  108. let refreshToken = accountInfoResponse.refreshToken {
  109. let tokenService = SecureTokenService(
  110. withRequestConfiguration: user.requestConfiguration,
  111. accessToken: idToken,
  112. accessTokenExpirationDate: accountInfoResponse.approximateExpirationDate,
  113. refreshToken: refreshToken
  114. )
  115. try await setTokenService(user: user, tokenService: tokenService)
  116. }
  117. } catch {
  118. user.signOutIfTokenIsInvalid(withError: error)
  119. throw error
  120. }
  121. }
  122. // Update the new token and refresh user info again.
  123. func updateTokenAndRefreshUser(user: User,
  124. idToken: String,
  125. refreshToken: String,
  126. expirationDate: Date?) async throws {
  127. user.tokenService = SecureTokenService(
  128. withRequestConfiguration: user.requestConfiguration,
  129. accessToken: idToken,
  130. accessTokenExpirationDate: expirationDate,
  131. refreshToken: refreshToken
  132. )
  133. let accessToken = try await user.internalGetTokenAsync()
  134. let getAccountInfoRequest = GetAccountInfoRequest(
  135. accessToken: accessToken,
  136. requestConfiguration: user.requestConfiguration
  137. )
  138. do {
  139. let response = try await AuthBackend.call(with: getAccountInfoRequest)
  140. user.isAnonymous = false
  141. user.update(withGetAccountInfoResponse: response)
  142. } catch {
  143. user.signOutIfTokenIsInvalid(withError: error)
  144. throw error
  145. }
  146. if let error = user.updateKeychain() {
  147. throw error
  148. }
  149. }
  150. /// Sets a new token service for the `User` instance.
  151. ///
  152. /// The method makes sure the token service has access and refresh token and the new tokens
  153. /// are saved in the keychain before calling back.
  154. /// - Parameter tokenService: The new token service object.
  155. /// - Parameter callback: The block to be called in the global auth working queue once finished.
  156. func setTokenService(user: User, tokenService: SecureTokenService) async throws {
  157. _ = try await tokenService.fetchAccessToken(forcingRefresh: false)
  158. user.tokenService = tokenService
  159. if let error = user.updateKeychain() {
  160. throw error
  161. }
  162. }
  163. /// Gets the users' account data from the server, updating our local values.
  164. /// - Parameter callback: Invoked when the request to getAccountInfo has completed, or when an
  165. /// error has been detected. Invoked asynchronously on the auth global work queue in the future.
  166. func getAccountInfoRefreshingCache(_ user: User) async throws
  167. -> GetAccountInfoResponseUser {
  168. let token = try await user.internalGetTokenAsync()
  169. let request = GetAccountInfoRequest(accessToken: token,
  170. requestConfiguration: user.requestConfiguration)
  171. do {
  172. let accountInfoResponse = try await AuthBackend.call(with: request)
  173. user.update(withGetAccountInfoResponse: accountInfoResponse)
  174. if let error = user.updateKeychain() {
  175. throw error
  176. }
  177. return (accountInfoResponse.users?.first)!
  178. } catch {
  179. user.signOutIfTokenIsInvalid(withError: error)
  180. throw error
  181. }
  182. }
  183. }