APN Service Provider. More powerful than a push...
A quick look at The Ruby Toolbox reveals a ton of pre-existing APNS gems. Why recreate the wheel?
We needed an APNS package for use with a many-tenant MDM platform. Specifically, we needed the ability to quickly push many notifications to devices spanning across many push certificates.
We started here and eventually forked and added MDM support. apn_sender keeps a persistent connection to Apple, which is great. It doesn't handle multiple certificates though, so that means we'd have to have a separate daemon process running for every single push certificate.
In fact, most APNS packages were eliminated for this reason: They weren't built with multiple-certificate handling in mind, meaning something costly would have to be instantiated for each certificate.
This gem sets out to solve multiple-certificate handling, but it fell short in two ways:
In brief, AppleShove receives push requests from a Redis queue structure. These push requests include the APNS certificate and the payload to be pushed. A single thread called the demultiplexer reads from this Redis queue and also manages a pool of connection threads to Apple. When a request is received, the demultiplexer sends the request to the appropriate connection thread. If the connection thread doesn't already exist, it's created first. That's it!
For you concurrency fans out there, we are using the Actor concurrency pattern via Celluloid.
This architecture accomplishes a few things:
Willing to give it a try? Onward...
AppleShove expects certificates and keys to be bundled together in PKCS#12 PEM format. If you want to test the validity of your PKCS#12 file, you can do something similar to this:
apns_p12 = File.read('my_cert.p12')
begin
AppleShove.try_p12(apns_p12)
rescue Exception => e
puts "the PKCS#12 file is invalid: #{e.message}"
else
puts "it's valid!"
end
If you send a notification with an invalid PKCS#12 file, the notification will fail downstream.
Sending a notification request looks like this:
apns_p12 = File.read('my_cert.p12')
token = '[device token string]'
payload = { mdm: '[push magic string]' } # this can also be an app notification
AppleShove.notify p12: apns_p12,
device_token: token,
payload: payload,
expiration_date: Time.now + 60*60, # optional expiration timestamp. defaults to one year in the future.
priority: 5 # optional. defaults to 10.
Need it to be a sandbox notification?
AppleShove.notify p12: apns_p12,
device_token: token,
payload: payload,
sandbox: true
We also have a feedback mechanism in place:
tokens_array = AppleShove.feedback_tokens(apns_p12)
# or, for the sandboxed feedback service:
tokens_array = AppleShove.feedback_tokens(apns_p12, true)
# bundle exec rake -T
bundle exec rake apple_shove:run # run in the foreground
bundle exec rake apple_shove:start # start as a daemon
bundle exec rake apple_shove:stop # stop the daemon
bundle exec rake apple_shove:status # see status of daemon
bundle exec rake apple_shove:stats # stats related to daemon
log_dir: specify an absolute path if you want to log
pid_dir: specify an absolute or relative path where the PID file
is to be stored. Defaults to the current directory.
connection_limit: maximum number of simultaneous connections to Apple
allowed.
Example usage:
bundle exec rake apple_shove:start connection_limit=100 log_dir=/var/log
If you haven't already, install redis. It's normally available via brew, apt-get, and yum, but you can also build from source.
Add this line to your application's Gemfile:
gem 'apple_shove'
And then execute:
$ bundle
Or install it yourself as:
$ gem install apple_shove
AppleShove has the ability to maintain connections to Apple for long durations of time without sending a notification. These connections will generally stay open, however, intermediate NATs and firewalls may expire and close the connection prematurely.
To combat this, AppleShove enables keep-alive on all connections to Apple. AppleShove is not able to set the interval between keep-alives however, as this is generally managed by the operating system. If you are aware of a relatively short NAT or firewall timer, you can manually shorten your OS's keep-alive timer to be shorter than the timer. As this likely breaks the portability of your code, you can alternatively change the AppleShove::CONFIG[:reconnect_timer]
to a value less than the NAT/firewall timer. This will force AppleShove to re-establish the SSL connection after enough idle time has passed.
For reference, we have observed the following keep-alive timeout values:
Apple also seems to send a keep-alive packet if it sees the connection as idle for 10 minutes.
Due to the TCP/IP stack, AppleShove will only know about a broken pipe to APNS after it writes two notifications to the socket. When this occurs, AppleShove will re-transmit the first as well as the second notification. Because time may have elapsed between the first and second notification writes, a non-trivial delay in the delivery of the first notification may occur.
git checkout -b my-new-feature
)git commit -am 'Add some feature'
)git push origin my-new-feature
)