BrainExpanded

BrainExpanded – Login State Caching Issue in iOS Share Extension

As part of the BrainExpanded project, I’m building an iOS app that lets users easily add links, text, and images to the “brain’s memory.” Once in the memory, various agents process the content to make it more accessible and useful (see previous posts for a description). The app’s XCode project has two targets: the main app and a Share Extension. The Share Extension allows users to add content from other apps via the iOS Activity View (previously known as “Share Sheet”).

To integrate with the BrainExpanded service, I needed to send user-submitted entries to a messaging queue. This required authentication, so I turned to Google’s Firebase, which simplifies adding authentication and other backend features to an app. However, I ran into a tricky issue while sharing the user’s login state between the main app and the Share Extension.

The Problem: Keychain Sync and Stale Login State

In XCode, the Share Extension (the entry into the Activity View) and the main app are treated as separate targets. To allow the Share Extension to check the user’s login state stored by the main app, I set up a shared group entitlement for the keychain. This setup allowed both the app and the Share Extension to access the same authentication state.

At first, everything seemed to work fine. The BrainExpanded Share Extension could pick up the login state from the keychain. But then I noticed a strange behavior:

  1. The first time I shared a webpage from Safari, the Share Extension correctly fetched the current login state.
  2. If I switched to the main app and changed the login state (e.g., logged out while logged in), and then returned to Safari to share something else, the Share Extension still used the old login state.

Clearly, this was a caching issue. Firebase wasn’t updating the login state in real time, and I couldn’t find an explicit Firebase API to force a refresh of the keychain data.

The Solution: Let Firebase Manage the Keychain Access Group

After trying several approaches, I found the solution by updating how Firebase determines the access group ID for the keychain. Here’s the key change I made:

override func viewDidLoad() {
    super.viewDidLoad()

    FirebaseApp.configure()

    do {
        var user: User?
        try user = Auth.auth().getStoredUser(forAccessGroup: nil)
        if (user == nil) {
            requireLogin()
            return
        }
    } catch {
        requireLogin()
        return

The key was to let Firebase handle the access group by passing nil to forAccessGroup when calling getStoredUser(). This allowed Firebase to dynamically determine the correct access group ID, ensuring the Share Extension always fetched the up-to-date login state. Many posts and discussions on the web suggested hardcoding the access group ID, but in my case, using nil resolved the caching issue.

Lessons Learned

This issue highlighted the nuances of working with Firebase authentication and iOS extensions. Here are a few takeaways:

  1. Extensions Cache Data: Extensions don’t always refresh their view of shared data, especially when it’s stored in the keychain. Explicit steps may be needed to ensure data stays in sync.
  2. Let the Framework Do the Work: While manually setting the access group ID seemed logical, allowing Firebase to handle it automatically worked better.
  3. Don’t Overlook the “Simple Fix”: Sometimes, the solution isn’t about adding complexity but simplifying and relying on defaults.

Now, the Share Extension and the main app work seamlessly together. If the user’s login state changes in the app, the Share Extension immediately picks it up.


I hope this post helps others who run into similar issues with Firebase, keychain synchronization, or iOS Share Extensions.


Disclaimer: I experimenting with ChatGPT as the generator for this post and the featured image. I did have to make few changes but ChatGPT did a pretty good job 🙂

Savas Parastatidis

Savas Parastatidis works at Amazon as a Sr. Principal Engineer in Alexa AI'. Previously, he worked at Microsoft where he co-founded Cortana and led the effort as the team's architect. While at Microsoft, Savas also worked on distributed data storage and high-performance data processing technologies. He was involved in various e-Science projects while at Microsoft Research where he also investigated technologies related to knowledge representation & reasoning. Savas also worked on language understanding technologies at Facebook. Prior to joining Microsoft, Savas was a Principal Research Associate at Newcastle University where he undertook research in the areas of distributed, service-oriented computing and e-Science. He was also the Chief Software Architect at the North-East Regional e-Science Centre where he oversaw the architecture and the application of Web Services technologies for a number of large research projects. Savas worked as a Senior Software Engineer for Hewlett Packard where he co-lead the R&D effort for the industry's Web Service transactions service and protocol. You can find out more about Savas at https://savas.me/about

Share
Published by
Savas Parastatidis

Recent Posts

Is AI Good or Bad?

Artificial Intelligence (AI) has rapidly evolved over the past few decades, becoming an integral part…

2 months ago

BrainExpanded – Copilot

Happy New Year everyone! I was planning for my next BrainExpanded post to be a…

3 months ago

BrainExpanded – The Timeline

See "BrainExpanded - Introduction" for context on this post. Notes and links Over the years,…

3 months ago

BrainExpanded – Introduction

This is the first post, in what I think is going to be a series,…

3 months ago

Digital twin follow up

Back in February, I shared the results of some initial experimentation with a digital twin.…

4 months ago

Digital Twin (my playground)

I am embarking on a side project that involves memory and multimodal understanding for an…

1 year ago