/* * Copyright (c) 2018 Apple Inc. All Rights Reserved. * * @APPLE_LICENSE_HEADER_START@ * * This file contains Original Code and/or Modifications of Original Code * as defined in and that are subject to the Apple Public Source License * Version 2.0 (the 'License'). You may not use this file except in * compliance with the License. Please obtain a copy of the License at * http://www.opensource.apple.com/apsl/ and read it before using this * file. * * The Original Code and all software distributed under the License are * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. * Please see the License for the specific language governing rights and * limitations under the License. * * @APPLE_LICENSE_HEADER_END@ */ import Foundation extension Error { func sanitizeForClientXPC() -> Error { let nserror = self as NSError // CoreData errors might have extra things in them that need removal. if nserror.domain == NSCocoaErrorDomain { return nserror.cleanAllButDescription() } // The docs for CKXPCSuitableError say it only returns nil if you pass it nil, but swift can't read those. guard let ckCleanedError = CKXPCSuitableError(self) else { return ContainerError.unknownCloudKitError } return ckCleanedError } } extension NSError { func cleanAllButDescription() -> NSError { let userInfo: [String: AnyHashable]? if let description = self.userInfo[NSLocalizedDescriptionKey] as? AnyHashable { userInfo = [NSLocalizedDescriptionKey: description] } else { userInfo = nil } return NSError(domain: self.domain, code: self.code, userInfo: userInfo) } } class Client: TrustedPeersHelperProtocol { let endpoint: NSXPCListenerEndpoint? let containerMap: ContainerMap init(endpoint: NSXPCListenerEndpoint?, containerMap: ContainerMap) { self.endpoint = endpoint self.containerMap = containerMap } func ping(reply: @escaping (() -> Void)) { reply() } func logComplete(function: String, container: ContainerName, error: Error?) { if let error = error { os_log("%{public}@ errored for %{public}@: %{public}@", log: tplogDebug, type: .default, function, container.description, error as CVarArg) } else { os_log("%{public}@ finished for %{public}@", log: tplogDebug, type: .default, function, container.description) } } internal func getContainer(withContainer container: String, context: String) throws -> Container { let containerName = ContainerName(container: container, context: context) return try self.containerMap.findOrCreate(name: containerName) } func dump(withContainer container: String, context: String, reply: @escaping ([AnyHashable: Any]?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Dumping for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.dump { result, error in self.logComplete(function: "Dumping", container: container.name, error: error) reply(result, error?.sanitizeForClientXPC()) } } catch { os_log("Dumping failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, error.sanitizeForClientXPC()) } } func dumpEgoPeer(withContainer container: String, context: String, reply: @escaping (String?, TPPeerPermanentInfo?, TPPeerStableInfo?, TPPeerDynamicInfo?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Dumping peer for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.dumpEgoPeer { peerID, perm, stable, dyn, error in self.logComplete(function: "Dumping peer", container: container.name, error: error) reply(peerID, perm, stable, dyn, error?.sanitizeForClientXPC()) } } catch { os_log("Dumping peer failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, nil, nil, nil, error.sanitizeForClientXPC()) } } func trustStatus(withContainer container: String, context: String, reply: @escaping (TrustedPeersHelperEgoPeerStatus, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) let container = try self.containerMap.findOrCreate(name: containerName) container.trustStatus { egoPeerStatus, error in reply(egoPeerStatus, error?.sanitizeForClientXPC()) } } catch { os_log("Trust status failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(TrustedPeersHelperEgoPeerStatus(egoPeerID: nil, status: TPPeerStatus.unknown, viablePeerCountsByModelID: [:], peerCountsByMachineID: [:], isExcluded: false, isLocked: false), error.sanitizeForClientXPC()) } } func fetchTrustState(withContainer container: String, context: String, reply: @escaping (TrustedPeersHelperPeerState?, [TrustedPeersHelperPeer]?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Fetch Trust State for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.fetchTrustState { peerState, peerList, error in reply(peerState, peerList, error?.sanitizeForClientXPC()) } } catch { os_log("Fetch Trust State failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, nil, error.sanitizeForClientXPC()) } } func reset(withContainer container: String, context: String, resetReason: CuttlefishResetReason, reply: @escaping (Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Resetting for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.reset(resetReason: resetReason) { error in self.logComplete(function: "Resetting", container: container.name, error: error) reply(error?.sanitizeForClientXPC()) } } catch { os_log("Resetting failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(error.sanitizeForClientXPC()) } } func localReset(withContainer container: String, context: String, reply: @escaping (Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Performing local reset for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.localReset { error in self.logComplete(function: "Local reset", container: container.name, error: error) reply(error?.sanitizeForClientXPC()) } } catch { os_log("Local reset failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(error.sanitizeForClientXPC()) } } func setAllowedMachineIDsWithContainer(_ container: String, context: String, allowedMachineIDs: Set, honorIDMSListChanges: Bool, reply: @escaping (Bool, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Setting allowed machineIDs for %{public}@ to %{public}@", log: tplogDebug, type: .default, containerName.description, allowedMachineIDs) let container = try self.containerMap.findOrCreate(name: containerName) container.setAllowedMachineIDs(allowedMachineIDs, honorIDMSListChanges: honorIDMSListChanges) { differences, error in self.logComplete(function: "Setting allowed machineIDs", container: container.name, error: error) reply(differences, error?.sanitizeForClientXPC()) } } catch { os_log("Setting allowed machineIDs failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(false, error.sanitizeForClientXPC()) } } func addAllowedMachineIDs(withContainer container: String, context: String, machineIDs: [String], reply: @escaping (Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Adding allowed machineIDs for %{public}@: %{public}@", log: tplogDebug, type: .default, containerName.description, machineIDs) let container = try self.containerMap.findOrCreate(name: containerName) container.addAllow(machineIDs) { error in self.logComplete(function: "Adding allowed machineIDs", container: container.name, error: error) reply(error?.sanitizeForClientXPC()) } } catch { os_log("Adding allowed machineID failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(error.sanitizeForClientXPC()) } } func removeAllowedMachineIDs(withContainer container: String, context: String, machineIDs: [String], reply: @escaping (Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Removing allowed machineIDs for %{public}@: %{public}@", log: tplogDebug, type: .default, containerName.description, machineIDs) let container = try self.containerMap.findOrCreate(name: containerName) container.removeAllow(machineIDs) { error in self.logComplete(function: "Removing allowed machineIDs", container: container.name, error: error) reply(error?.sanitizeForClientXPC()) } } catch { os_log("Removing allowed machineID failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(error.sanitizeForClientXPC()) } } func fetchAllowedMachineIDs(withContainer container: String, context: String, reply: @escaping (Set?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Fetching allowed machineIDs for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.fetchAllowedMachineIDs { mids, error in self.logComplete(function: "Fetched allowed machineIDs", container: container.name, error: error) reply(mids, error?.sanitizeForClientXPC()) } } catch { os_log("Fetching allowed machineIDs failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, error.sanitizeForClientXPC()) } } func fetchEgoEpoch(withContainer container: String, context: String, reply: @escaping (UInt64, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("retrieving epoch for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.getEgoEpoch { epoch, error in reply(epoch, error?.sanitizeForClientXPC()) } } catch { os_log("Epoch retrieval failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(0, error.sanitizeForClientXPC()) } } func prepare(withContainer container: String, context: String, epoch: UInt64, machineID: String, bottleSalt: String, bottleID: String, modelID: String, deviceName: String?, serialNumber: String?, osVersion: String, policyVersion: TPPolicyVersion?, policySecrets: [String: Data]?, syncUserControllableViews: TPPBPeerStableInfo_UserControllableViewStatus, signingPrivKeyPersistentRef: Data?, encPrivKeyPersistentRef: Data?, reply: @escaping (String?, Data?, Data?, Data?, Data?, TPSyncingPolicy?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Preparing new identity for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.prepare(epoch: epoch, machineID: machineID, bottleSalt: bottleSalt, bottleID: bottleID, modelID: modelID, deviceName: deviceName, serialNumber: serialNumber, osVersion: osVersion, policyVersion: policyVersion, policySecrets: policySecrets, syncUserControllableViews: syncUserControllableViews, signingPrivateKeyPersistentRef: signingPrivKeyPersistentRef, encryptionPrivateKeyPersistentRef: encPrivKeyPersistentRef) { peerID, permanentInfo, permanentInfoSig, stableInfo, stableInfoSig, policy, error in self.logComplete(function: "Prepare", container: container.name, error: error) reply(peerID, permanentInfo, permanentInfoSig, stableInfo, stableInfoSig, policy, error?.sanitizeForClientXPC()) } } catch { os_log("Prepare failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, nil, nil, nil, nil, nil, error.sanitizeForClientXPC()) } } func establish(withContainer container: String, context: String, ckksKeys: [CKKSKeychainBackedKeySet], tlkShares: [CKKSTLKShare], preapprovedKeys: [Data]?, reply: @escaping (String?, [CKRecord]?, TPSyncingPolicy?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Establishing %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.establish(ckksKeys: ckksKeys, tlkShares: tlkShares, preapprovedKeys: preapprovedKeys) { peerID, keyHierarchyRecords, policy, error in self.logComplete(function: "Establishing", container: container.name, error: error) reply(peerID, keyHierarchyRecords, policy, error?.sanitizeForClientXPC()) } } catch { os_log("Establishing failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, nil, nil, error.sanitizeForClientXPC()) } } func vouch(withContainer container: String, context: String, peerID: String, permanentInfo: Data, permanentInfoSig: Data, stableInfo: Data, stableInfoSig: Data, ckksKeys: [CKKSKeychainBackedKeySet], reply: @escaping (Data?, Data?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Vouching %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.vouch(peerID: peerID, permanentInfo: permanentInfo, permanentInfoSig: permanentInfoSig, stableInfo: stableInfo, stableInfoSig: stableInfoSig, ckksKeys: ckksKeys) { voucher, voucherSig, error in self.logComplete(function: "Vouching", container: container.name, error: error) reply(voucher, voucherSig, error?.sanitizeForClientXPC()) } } catch { os_log("Vouching failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, nil, error.sanitizeForClientXPC()) } } func preflightVouchWithBottle(withContainer container: String, context: String, bottleID: String, reply: @escaping (String?, TPSyncingPolicy?, Bool, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Preflight Vouch With Bottle %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.preflightVouchWithBottle(bottleID: bottleID) { peerID, policy, refetched, error in self.logComplete(function: "Preflight Vouch With Bottle", container: container.name, error: error) reply(peerID, policy, refetched, error?.sanitizeForClientXPC()) } } catch { os_log("Preflighting Vouch With Bottle failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, nil, false, error.sanitizeForClientXPC()) } } func vouchWithBottle(withContainer container: String, context: String, bottleID: String, entropy: Data, bottleSalt: String, tlkShares: [CKKSTLKShare], reply: @escaping (Data?, Data?, Int64, Int64, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Vouching With Bottle %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.vouchWithBottle(bottleID: bottleID, entropy: entropy, bottleSalt: bottleSalt, tlkShares: tlkShares) { voucher, voucherSig, uniqueTLKsRecovered, totalTLKSharesRecovered, error in self.logComplete(function: "Vouching With Bottle", container: container.name, error: error) reply(voucher, voucherSig, uniqueTLKsRecovered, totalTLKSharesRecovered, error?.sanitizeForClientXPC()) } } catch { os_log("Vouching with Bottle failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, nil, 0, 0, error.sanitizeForClientXPC()) } } func preflightVouchWithRecoveryKey(withContainer container: String, context: String, recoveryKey: String, salt: String, reply: @escaping (String?, TPSyncingPolicy?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Preflight Vouch With RecoveryKey %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.preflightVouchWithRecoveryKey(recoveryKey: recoveryKey, salt: salt) { rkID, policy, error in self.logComplete(function: "Preflight Vouch With RecoveryKey", container: container.name, error: error) reply(rkID, policy, error?.sanitizeForClientXPC()) } } catch { os_log("Preflighting Vouch With RecoveryKey failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, nil, error.sanitizeForClientXPC()) } } func vouchWithRecoveryKey(withContainer container: String, context: String, recoveryKey: String, salt: String, tlkShares: [CKKSTLKShare], reply: @escaping (Data?, Data?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Vouching With Recovery Key %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.vouchWithRecoveryKey(recoveryKey: recoveryKey, salt: salt, tlkShares: tlkShares) { voucher, voucherSig, error in self.logComplete(function: "Vouching With Recovery Key", container: container.name, error: error) reply(voucher, voucherSig, error?.sanitizeForClientXPC()) } } catch { os_log("Vouching with Recovery Key failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, nil, error.sanitizeForClientXPC()) } } func join(withContainer container: String, context: String, voucherData: Data, voucherSig: Data, ckksKeys: [CKKSKeychainBackedKeySet], tlkShares: [CKKSTLKShare], preapprovedKeys: [Data]?, reply: @escaping (String?, [CKRecord]?, TPSyncingPolicy?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Joining %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.join(voucherData: voucherData, voucherSig: voucherSig, ckksKeys: ckksKeys, tlkShares: tlkShares, preapprovedKeys: preapprovedKeys) { peerID, keyHierarchyRecords, policy, error in reply(peerID, keyHierarchyRecords, policy, error?.sanitizeForClientXPC()) } } catch { os_log("Joining failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, nil, nil, error.sanitizeForClientXPC()) } } func preflightPreapprovedJoin(withContainer container: String, context: String, preapprovedKeys: [Data]?, reply: @escaping (Bool, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Attempting to preflight a preapproved join for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.preflightPreapprovedJoin(preapprovedKeys: preapprovedKeys) { success, error in reply(success, error?.sanitizeForClientXPC()) } } catch { os_log("preflightPreapprovedJoin failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(false, error.sanitizeForClientXPC()) } } func attemptPreapprovedJoin(withContainer container: String, context: String, ckksKeys: [CKKSKeychainBackedKeySet], tlkShares: [CKKSTLKShare], preapprovedKeys: [Data]?, reply: @escaping (String?, [CKRecord]?, TPSyncingPolicy?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Attempting a preapproved join for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.preapprovedJoin(ckksKeys: ckksKeys, tlkShares: tlkShares, preapprovedKeys: preapprovedKeys) { peerID, keyHierarchyRecords, policy, error in reply(peerID, keyHierarchyRecords, policy, error?.sanitizeForClientXPC()) } } catch { os_log("attemptPreapprovedJoin failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, nil, nil, error.sanitizeForClientXPC()) } } func update(withContainer container: String, context: String, deviceName: String?, serialNumber: String?, osVersion: String?, policyVersion: NSNumber?, policySecrets: [String: Data]?, syncUserControllableViews: NSNumber?, reply: @escaping (TrustedPeersHelperPeerState?, TPSyncingPolicy?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Updating %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) let syncUserControllableSetting: TPPBPeerStableInfo_UserControllableViewStatus? if let value = syncUserControllableViews?.int32Value { switch value { case TPPBPeerStableInfo_UserControllableViewStatus.ENABLED.rawValue: syncUserControllableSetting = .ENABLED case TPPBPeerStableInfo_UserControllableViewStatus.DISABLED.rawValue: syncUserControllableSetting = .DISABLED case TPPBPeerStableInfo_UserControllableViewStatus.FOLLOWING.rawValue: syncUserControllableSetting = .FOLLOWING default: throw ContainerError.unknownSyncUserControllableViewsValue(value: value) } } else { syncUserControllableSetting = nil } container.update(deviceName: deviceName, serialNumber: serialNumber, osVersion: osVersion, policyVersion: policyVersion?.uint64Value, policySecrets: policySecrets, syncUserControllableViews: syncUserControllableSetting) { state, policy, error in reply(state, policy, error?.sanitizeForClientXPC()) } } catch { os_log("update failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, nil, error.sanitizeForClientXPC()) } } func setPreapprovedKeysWithContainer(_ container: String, context: String, preapprovedKeys: [Data], reply: @escaping (TrustedPeersHelperPeerState?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("setPreapprovedKeysWithContainer %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.set(preapprovedKeys: preapprovedKeys) { state, error in reply(state, error?.sanitizeForClientXPC()) } } catch { os_log("setPreapprovedKeysWithContainer failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, error.sanitizeForClientXPC()) } } func updateTLKs(withContainer container: String, context: String, ckksKeys: [CKKSKeychainBackedKeySet], tlkShares: [CKKSTLKShare], reply: @escaping ([CKRecord]?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Updating TLKs for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.updateTLKs(ckksKeys: ckksKeys, tlkShares: tlkShares) { records, error in reply(records, error?.sanitizeForClientXPC()) } } catch { os_log("updateTLKs failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, error.sanitizeForClientXPC()) } } func departByDistrustingSelf(withContainer container: String, context: String, reply: @escaping (Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Departing %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.departByDistrustingSelf { error in reply(error?.sanitizeForClientXPC()) } } catch { os_log("departByDistrustingSelf failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(error.sanitizeForClientXPC()) } } func distrustPeerIDs(withContainer container: String, context: String, peerIDs: Set, reply: @escaping (Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Distrusting %{public}@ in %{public}@", log: tplogDebug, type: .default, peerIDs, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.distrust(peerIDs: peerIDs) { error in reply(error?.sanitizeForClientXPC()) } } catch { os_log("distrustPeerIDs failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(error.sanitizeForClientXPC()) } } func fetchViableBottles(withContainer container: String, context: String, reply: @escaping ([String]?, [String]?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("fetchViableBottles in %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.fetchViableBottles { sortedBottleIDs, partialBottleIDs, error in reply(sortedBottleIDs, partialBottleIDs, error?.sanitizeForClientXPC()) } } catch { os_log("fetchViableBottles failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, nil, error.sanitizeForClientXPC()) } } func fetchViableEscrowRecords(withContainer container: String, context: String, forceFetch: Bool, reply: @escaping ([Data]?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("fetchViableEscrowRecords in %@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.fetchEscrowRecords(forceFetch: forceFetch) { recordDatas, error in reply(recordDatas, error?.sanitizeForClientXPC()) } } catch { reply(nil, error.sanitizeForClientXPC()) } } func fetchEscrowContents(withContainer container: String, context: String, reply: @escaping (Data?, String?, Data?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("fetchEscrowContents in %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.fetchEscrowContents { entropy, bottleID, signingPublicKey, error in reply(entropy, bottleID, signingPublicKey, error?.sanitizeForClientXPC()) } } catch { os_log("fetchEscrowContents failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, nil, nil, error.sanitizeForClientXPC()) } } func fetchCurrentPolicy(withContainer container: String, context: String, modelIDOverride: String?, reply: @escaping (TPSyncingPolicy?, TPPBPeerStableInfo_UserControllableViewStatus, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Fetching policy+views for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.fetchCurrentPolicy(modelIDOverride: modelIDOverride) { policy, peersOpinion, error in reply(policy, peersOpinion, error?.sanitizeForClientXPC()) } } catch { os_log("fetchCurrentPolicy failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, .UNKNOWN, error.sanitizeForClientXPC()) } } func fetchPolicyDocuments(withContainer container: String, context: String, versions: Set, reply: @escaping ([TPPolicyVersion: Data]?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Fetching policy documents %{public}@ with versions: %{public}@", log: tplogDebug, type: .default, containerName.description, versions) let container = try self.containerMap.findOrCreate(name: containerName) container.fetchPolicyDocuments(versions: versions) { entries, error in reply(entries, error?.sanitizeForClientXPC()) } } catch { os_log("fetchPolicyDocuments failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, error.sanitizeForClientXPC()) } } func validatePeers(withContainer container: String, context: String, reply: @escaping ([AnyHashable: Any]?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("ValidatePeers for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) let request = ValidatePeersRequest() container.validatePeers(request: request) { result, error in self.logComplete(function: "validatePeers", container: container.name, error: error) reply(result, error?.sanitizeForClientXPC()) } } catch { os_log("ValidatePeers failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, error.sanitizeForClientXPC()) } } func setRecoveryKeyWithContainer(_ container: String, context: String, recoveryKey: String, salt: String, ckksKeys: [CKKSKeychainBackedKeySet], reply: @escaping ([CKRecord]?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("SetRecoveryKey for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.setRecoveryKey(recoveryKey: recoveryKey, salt: salt, ckksKeys: ckksKeys) { records, error in self.logComplete(function: "setRecoveryKey", container: container.name, error: error) reply(records, error?.sanitizeForClientXPC()) } } catch { os_log("SetRecoveryKey failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, error.sanitizeForClientXPC()) } } func reportHealth(withContainer container: String, context: String, stateMachineState: String, trustState: String, reply: @escaping (Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("ReportHealth for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) let request = ReportHealthRequest.with { $0.stateMachineState = stateMachineState } container.reportHealth(request: request) { error in self.logComplete(function: "reportHealth", container: container.name, error: error) reply(error?.sanitizeForClientXPC()) } } catch { os_log("ReportHealth failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(error.sanitizeForClientXPC()) } } func pushHealthInquiry(withContainer container: String, context: String, reply: @escaping (Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("PushHealthInquiry for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.pushHealthInquiry { error in self.logComplete(function: "pushHealthInquiry", container: container.name, error: error) reply(error?.sanitizeForClientXPC()) } } catch { os_log("PushHealthInquiry failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(error.sanitizeForClientXPC()) } } func requestHealthCheck(withContainer container: String, context: String, requiresEscrowCheck: Bool, reply: @escaping (Bool, Bool, Bool, Bool, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("Health Check! requiring escrow check? %d for %{public}@", log: tplogDebug, type: .default, requiresEscrowCheck, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.requestHealthCheck(requiresEscrowCheck: requiresEscrowCheck) { postRepair, postEscrow, postReset, leaveTrust, error in reply(postRepair, postEscrow, postReset, leaveTrust, error?.sanitizeForClientXPC()) } } catch { os_log("Health Check! failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(false, false, false, false, error.sanitizeForClientXPC()) } } func getSupportAppInfo(withContainer container: String, context: String, reply: @escaping (Data?, Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("getSupportAppInfo for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.getSupportAppInfo { info, error in reply(info, error?.sanitizeForClientXPC()) } } catch { os_log("getSupportInfo failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(nil, error.sanitizeForClientXPC()) } } func removeEscrowCache(withContainer container: String, context: String, reply: @escaping (Error?) -> Void) { do { let containerName = ContainerName(container: container, context: context) os_log("removeEscrowCache for %{public}@", log: tplogDebug, type: .default, containerName.description) let container = try self.containerMap.findOrCreate(name: containerName) container.removeEscrowCache { error in reply(error?.sanitizeForClientXPC()) } } catch { os_log("removeEscrowCache failed for (%{public}@, %{public}@): %{public}@", log: tplogDebug, type: .default, container, context, error as CVarArg) reply(error.sanitizeForClientXPC()) } } }