2022-11-04 13:24:53 +02:00
|
|
|
//
|
2024-09-06 16:34:30 +03:00
|
|
|
// Copyright 2022-2024 New Vector Ltd.
|
2022-11-04 13:24:53 +02:00
|
|
|
//
|
2025-01-06 11:27:37 +01:00
|
|
|
// SPDX-License-Identifier: AGPL-3.0-only OR LicenseRef-Element-Commercial
|
|
|
|
// Please see LICENSE files in the repository root for full details.
|
2022-11-04 13:24:53 +02:00
|
|
|
//
|
|
|
|
|
|
|
|
import Foundation
|
|
|
|
import KeychainAccess
|
2023-09-15 10:01:09 +01:00
|
|
|
import MatrixRustSDK
|
2022-11-04 13:24:53 +02:00
|
|
|
|
2022-11-21 19:37:13 +03:00
|
|
|
enum KeychainControllerService: String {
|
|
|
|
case sessions
|
|
|
|
case tests
|
|
|
|
|
2023-10-19 10:42:12 +01:00
|
|
|
var restorationTokenID: String {
|
2023-01-31 17:48:24 +00:00
|
|
|
InfoPlistReader.main.baseBundleIdentifier + "." + rawValue
|
2022-11-21 19:37:13 +03:00
|
|
|
}
|
2023-10-19 10:42:12 +01:00
|
|
|
|
|
|
|
var mainID: String {
|
|
|
|
InfoPlistReader.main.baseBundleIdentifier + ".keychain.\(rawValue)"
|
|
|
|
}
|
2022-11-21 19:37:13 +03:00
|
|
|
}
|
|
|
|
|
2022-11-04 13:24:53 +02:00
|
|
|
class KeychainController: KeychainControllerProtocol {
|
2023-10-19 10:42:12 +01:00
|
|
|
/// The keychain responsible for storing account restoration tokens (keyed by userID).
|
|
|
|
private let restorationTokenKeychain: Keychain
|
|
|
|
/// The keychain responsible for storing all other secrets in the app (keyed by `Key`s).
|
|
|
|
private let mainKeychain: Keychain
|
|
|
|
|
|
|
|
private enum Key: String {
|
2023-10-27 10:09:12 +01:00
|
|
|
case appLockPINCode
|
|
|
|
case appLockBiometricState
|
2023-10-19 10:42:12 +01:00
|
|
|
}
|
2022-11-21 19:37:13 +03:00
|
|
|
|
2023-10-19 10:42:12 +01:00
|
|
|
init(service: KeychainControllerService, accessGroup: String) {
|
|
|
|
restorationTokenKeychain = Keychain(service: service.restorationTokenID, accessGroup: accessGroup)
|
|
|
|
mainKeychain = Keychain(service: service.mainID, accessGroup: accessGroup)
|
2022-11-04 13:24:53 +02:00
|
|
|
}
|
2023-10-19 10:42:12 +01:00
|
|
|
|
|
|
|
// MARK: - Restoration Tokens
|
2022-11-21 19:37:13 +03:00
|
|
|
|
2022-11-04 13:24:53 +02:00
|
|
|
func setRestorationToken(_ restorationToken: RestorationToken, forUsername username: String) {
|
|
|
|
do {
|
|
|
|
let tokenData = try JSONEncoder().encode(restorationToken)
|
2023-10-19 10:42:12 +01:00
|
|
|
try restorationTokenKeychain.set(tokenData, key: username)
|
2022-11-04 13:24:53 +02:00
|
|
|
} catch {
|
|
|
|
MXLog.error("Failed storing user restore token with error: \(error)")
|
|
|
|
}
|
|
|
|
}
|
2022-11-21 19:37:13 +03:00
|
|
|
|
2022-11-04 13:24:53 +02:00
|
|
|
func restorationTokenForUsername(_ username: String) -> RestorationToken? {
|
|
|
|
do {
|
2023-10-19 10:42:12 +01:00
|
|
|
guard let tokenData = try restorationTokenKeychain.getData(username) else {
|
2022-11-04 13:24:53 +02:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return try JSONDecoder().decode(RestorationToken.self, from: tokenData)
|
|
|
|
} catch {
|
|
|
|
MXLog.error("Failed retrieving user restore token")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
2022-11-21 19:37:13 +03:00
|
|
|
|
2022-11-04 13:24:53 +02:00
|
|
|
func restorationTokens() -> [KeychainCredentials] {
|
2023-10-19 10:42:12 +01:00
|
|
|
restorationTokenKeychain.allKeys().compactMap { username in
|
2022-11-04 13:24:53 +02:00
|
|
|
guard let restorationToken = restorationTokenForUsername(username) else {
|
|
|
|
return nil
|
|
|
|
}
|
2022-11-21 19:37:13 +03:00
|
|
|
|
2022-11-04 13:24:53 +02:00
|
|
|
return KeychainCredentials(userID: username, restorationToken: restorationToken)
|
|
|
|
}
|
|
|
|
}
|
2022-11-21 19:37:13 +03:00
|
|
|
|
2022-11-04 13:24:53 +02:00
|
|
|
func removeRestorationTokenForUsername(_ username: String) {
|
2023-03-31 14:42:05 +03:00
|
|
|
MXLog.warning("Removing restoration token for user: \(username).")
|
|
|
|
|
2022-11-04 13:24:53 +02:00
|
|
|
do {
|
2023-10-19 10:42:12 +01:00
|
|
|
try restorationTokenKeychain.remove(username)
|
2022-11-04 13:24:53 +02:00
|
|
|
} catch {
|
|
|
|
MXLog.error("Failed removing restore token with error: \(error)")
|
|
|
|
}
|
|
|
|
}
|
2022-11-21 19:37:13 +03:00
|
|
|
|
2022-11-04 13:24:53 +02:00
|
|
|
func removeAllRestorationTokens() {
|
2023-03-31 14:42:05 +03:00
|
|
|
MXLog.warning("Removing all user restoration tokens.")
|
|
|
|
|
2022-11-04 13:24:53 +02:00
|
|
|
do {
|
2023-10-19 10:42:12 +01:00
|
|
|
try restorationTokenKeychain.removeAll()
|
2022-11-04 13:24:53 +02:00
|
|
|
} catch {
|
|
|
|
MXLog.error("Failed removing all tokens")
|
|
|
|
}
|
|
|
|
}
|
2023-09-15 10:01:09 +01:00
|
|
|
|
|
|
|
// MARK: - ClientSessionDelegate
|
|
|
|
|
|
|
|
func retrieveSessionFromKeychain(userId: String) throws -> Session {
|
|
|
|
MXLog.info("Retrieving an updated Session from the keychain.")
|
|
|
|
guard let session = restorationTokenForUsername(userId)?.session else {
|
|
|
|
throw ClientError.Generic(msg: "Failed to find RestorationToken in the Keychain.")
|
|
|
|
}
|
|
|
|
return session
|
|
|
|
}
|
|
|
|
|
|
|
|
func saveSessionInKeychain(session: Session) {
|
|
|
|
MXLog.info("Saving session changes in the keychain.")
|
2024-01-12 16:45:59 +00:00
|
|
|
|
|
|
|
guard let oldToken = restorationTokenForUsername(session.userId) else {
|
|
|
|
MXLog.error("Failed retrieving the restoration token for \(session.userId)")
|
|
|
|
fatalError("Something has gone mega wrong, all bets are off.")
|
|
|
|
}
|
|
|
|
let restorationToken = RestorationToken(session: session,
|
2024-09-11 14:32:03 +01:00
|
|
|
sessionDirectories: oldToken.sessionDirectories,
|
2024-01-12 16:45:59 +00:00
|
|
|
passphrase: oldToken.passphrase,
|
2025-02-18 10:34:32 +00:00
|
|
|
pusherNotificationClientIdentifier: oldToken.pusherNotificationClientIdentifier,
|
|
|
|
slidingSyncProxyURLString: oldToken.slidingSyncProxyURLString)
|
2023-09-15 10:01:09 +01:00
|
|
|
setRestorationToken(restorationToken, forUsername: session.userId)
|
|
|
|
}
|
2023-10-19 10:42:12 +01:00
|
|
|
|
|
|
|
// MARK: - App Secrets
|
|
|
|
|
|
|
|
func resetSecrets() {
|
|
|
|
MXLog.warning("Resetting main keychain.")
|
|
|
|
|
|
|
|
do {
|
|
|
|
try mainKeychain.removeAll()
|
|
|
|
} catch {
|
|
|
|
MXLog.error("Failed resetting the main keychain.")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func containsPINCode() throws -> Bool {
|
2023-10-27 10:09:12 +01:00
|
|
|
try mainKeychain.contains(Key.appLockPINCode.rawValue)
|
2023-10-19 10:42:12 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func setPINCode(_ pinCode: String) throws {
|
2023-10-27 10:09:12 +01:00
|
|
|
try mainKeychain.set(pinCode, key: Key.appLockPINCode.rawValue)
|
2023-10-19 10:42:12 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func pinCode() -> String? {
|
|
|
|
do {
|
2023-10-27 10:09:12 +01:00
|
|
|
return try mainKeychain.getString(Key.appLockPINCode.rawValue)
|
2023-10-19 10:42:12 +01:00
|
|
|
} catch {
|
|
|
|
MXLog.error("Failed retrieving the PIN code.")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func removePINCode() {
|
|
|
|
do {
|
2023-10-27 10:09:12 +01:00
|
|
|
try mainKeychain.remove(Key.appLockPINCode.rawValue)
|
2023-10-19 10:42:12 +01:00
|
|
|
} catch {
|
|
|
|
MXLog.error("Failed removing the PIN code.")
|
|
|
|
}
|
|
|
|
}
|
2023-10-27 10:09:12 +01:00
|
|
|
|
|
|
|
func containsPINCodeBiometricState() -> Bool {
|
|
|
|
do {
|
|
|
|
return try mainKeychain.contains(Key.appLockBiometricState.rawValue)
|
|
|
|
} catch {
|
|
|
|
MXLog.error("Failed checking for biometric state.")
|
|
|
|
return false // No need to re-throw the error, we can fall back to the PIN code.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func setPINCodeBiometricState(_ state: Data) throws {
|
|
|
|
try mainKeychain.set(state, key: Key.appLockBiometricState.rawValue)
|
|
|
|
}
|
|
|
|
|
|
|
|
func pinCodeBiometricState() -> Data? {
|
|
|
|
do {
|
|
|
|
return try mainKeychain.getData(Key.appLockBiometricState.rawValue)
|
|
|
|
} catch {
|
|
|
|
MXLog.error("Failed setting the PIN code biometric state.")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func removePINCodeBiometricState() {
|
|
|
|
do {
|
|
|
|
try mainKeychain.remove(Key.appLockBiometricState.rawValue)
|
|
|
|
} catch {
|
|
|
|
MXLog.error("Failed removing the PIN code biometric state.")
|
|
|
|
}
|
|
|
|
}
|
2022-11-04 13:24:53 +02:00
|
|
|
}
|