diff --git a/.gitmodules b/.gitmodules index f3a2516e..4f05b334 100644 --- a/.gitmodules +++ b/.gitmodules @@ -1,6 +1,3 @@ -[submodule "msa-auth-for-android"] - path = lib/msa-auth-for-android - url = https://github.com/SailReal/msa-auth-for-android.git [submodule "subsampling-scale-image-view"] path = lib/subsampling-scale-image-view url = https://github.com/SailReal/subsampling-scale-image-view.git diff --git a/.idea/vcs.xml b/.idea/vcs.xml index 65b6cf64..a51d7b33 100755 --- a/.idea/vcs.xml +++ b/.idea/vcs.xml @@ -2,8 +2,7 @@ - - + \ No newline at end of file diff --git a/buildsystem/dependencies.gradle b/buildsystem/dependencies.gradle index a2915e48..a12e59f0 100644 --- a/buildsystem/dependencies.gradle +++ b/buildsystem/dependencies.gradle @@ -2,12 +2,25 @@ allprojects { repositories { mavenCentral() maven { url 'https://jitpack.io' } + // needed for 'com.microsoft.device.display' required by 'com.microsoft.graph:microsoft-graph' + exclusiveContent { + forRepository { + maven { + url 'https://pkgs.dev.azure.com/MicrosoftDeviceSDK/DuoSDK-Public/_packaging/Duo-SDK-Feed/maven/v1' + name 'Duo-SDK-Feed' + } + } + filter { + // this repository *only* contains artifacts with group "com.microsoft.device.display" + includeGroup "com.microsoft.device.display" + } + } } } ext { androidBuildToolsVersion = "30.0.2" - androidMinSdkVersion = 24 + androidMinSdkVersion = 26 androidTargetSdkVersion = 30 androidCompileSdkVersion = 30 @@ -63,7 +76,8 @@ ext { */ trackingFreeGoogleCLientVersion = '1.41.1' - msgraphVersion = '2.10.0' + msgraphVersion = '5.12.0' + msgraphAuthVersion = '2.2.3' minIoVersion = '8.3.5' staxVersion = '1.2.0' // needed for minIO @@ -139,6 +153,7 @@ ext { mockitoInline : "org.mockito:mockito-inline:${mockitoVersion}", mockitoKotlin : "org.mockito.kotlin:mockito-kotlin:${mockitoKotlinVersion}", msgraph : "com.microsoft.graph:microsoft-graph:${msgraphVersion}", + msgraphAuth : "com.microsoft.identity.client:msal:${msgraphAuthVersion}", multidex : "androidx.multidex:multidex:${multidexVersion}", okHttp : "com.squareup.okhttp3:okhttp:${okHttpVersion}", okHttpDigest : "io.github.rburgst:okhttp-digest:${okHttpDigestVersion}", diff --git a/data/build.gradle b/data/build.gradle index 4d2111a2..d401ab6a 100644 --- a/data/build.gradle +++ b/data/build.gradle @@ -78,11 +78,12 @@ android { packagingOptions { exclude 'META-INF/DEPENDENCIES' + exclude 'META-INF/NOTICE.md' } } greendao { - schemaVersion 10 + schemaVersion 11 } configurations.all { @@ -95,7 +96,6 @@ dependencies { implementation project(':domain') implementation project(':util') - implementation project(':msa-auth-for-android') implementation project(':pcloud-sdk-java') coreLibraryDesugaring dependencies.coreDesugaring @@ -115,6 +115,7 @@ dependencies { // cloud implementation dependencies.dropbox + implementation dependencies.msgraphAuth implementation dependencies.msgraph implementation dependencies.stax diff --git a/data/src/androidTest/java/org/cryptomator/data/db/UpgradeDatabaseTest.kt b/data/src/androidTest/java/org/cryptomator/data/db/UpgradeDatabaseTest.kt index 1e0ad4c0..a2c19c7f 100644 --- a/data/src/androidTest/java/org/cryptomator/data/db/UpgradeDatabaseTest.kt +++ b/data/src/androidTest/java/org/cryptomator/data/db/UpgradeDatabaseTest.kt @@ -51,6 +51,7 @@ class UpgradeDatabaseTest { Upgrade7To8().applyTo(db, 7) Upgrade8To9(sharedPreferencesHandler).applyTo(db, 8) Upgrade9To10(sharedPreferencesHandler).applyTo(db, 9) + Upgrade10To11().applyTo(db, 10) CloudEntityDao(DaoConfig(db, CloudEntityDao::class.java)).loadAll() VaultEntityDao(DaoConfig(db, VaultEntityDao::class.java)).loadAll() @@ -470,4 +471,42 @@ class UpgradeDatabaseTest { Assert.assertThat(sharedPreferencesHandler.vaultsRemovedDuringMigration(), CoreMatchers.`is`(Pair("LOCAL", arrayListOf("pathOfVault26")))) } + @Test + fun upgrade10To11() { + Upgrade0To1().applyTo(db, 0) + Upgrade1To2().applyTo(db, 1) + Upgrade2To3(context).applyTo(db, 2) + Upgrade3To4().applyTo(db, 3) + Upgrade4To5().applyTo(db, 4) + Upgrade5To6().applyTo(db, 5) + Upgrade6To7().applyTo(db, 6) + Upgrade7To8().applyTo(db, 7) + Upgrade8To9(sharedPreferencesHandler).applyTo(db, 8) + Upgrade9To10(sharedPreferencesHandler).applyTo(db, 9) + + Sql.insertInto("VAULT_ENTITY") // + .integer("_id", 25) // + .integer("FOLDER_CLOUD_ID", 3) // + .text("FOLDER_PATH", "path") // + .text("FOLDER_NAME", "name") // + .text("CLOUD_TYPE", CloudType.ONEDRIVE.name) // + .text("PASSWORD", "password") // + .integer("POSITION", 10) // + .executeOn(db) + + Sql.query("CLOUD_ENTITY").executeOn(db).use { + Assert.assertThat(it.count, CoreMatchers.`is`(3)) + } + + Upgrade10To11().applyTo(db, 10) + + Sql.query("VAULT_ENTITY").executeOn(db).use { + Assert.assertThat(it.count, CoreMatchers.`is`(1)) + } + + Sql.query("CLOUD_ENTITY").executeOn(db).use { + Assert.assertThat(it.count, CoreMatchers.`is`(2)) + } + } + } diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/MSAAuthAndroidAdapterImpl.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/MSAAuthAndroidAdapterImpl.java deleted file mode 100644 index 1cf2556c..00000000 --- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/MSAAuthAndroidAdapterImpl.java +++ /dev/null @@ -1,25 +0,0 @@ -package org.cryptomator.data.cloud.onedrive; - -import android.content.Context; - -import org.cryptomator.data.BuildConfig; -import org.cryptomator.data.cloud.onedrive.graph.MSAAuthAndroidAdapter; - -public class MSAAuthAndroidAdapterImpl extends MSAAuthAndroidAdapter { - - private static final String[] SCOPES = new String[] {"https://graph.microsoft.com/Files.ReadWrite", "offline_access", "openid"}; - - public MSAAuthAndroidAdapterImpl(Context context, String refreshToken) { - super(context, refreshToken); - } - - @Override - public String getClientId() { - return BuildConfig.ONEDRIVE_API_KEY; - } - - @Override - public String[] getScopes() { - return SCOPES; - } -} diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveClientFactory.kt b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveClientFactory.kt index 272071b5..27ac7cf5 100644 --- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveClientFactory.kt +++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveClientFactory.kt @@ -1,68 +1,59 @@ package org.cryptomator.data.cloud.onedrive import android.content.Context -import com.microsoft.graph.authentication.IAuthenticationProvider -import com.microsoft.graph.core.DefaultClientConfig -import com.microsoft.graph.models.extensions.IGraphServiceClient -import com.microsoft.graph.requests.extensions.GraphServiceClient -import org.cryptomator.data.cloud.okhttplogging.HttpLoggingInterceptor -import org.cryptomator.data.cloud.onedrive.graph.MSAAuthAndroidAdapter -import org.cryptomator.data.util.NetworkTimeout -import okhttp3.Interceptor -import okhttp3.OkHttpClient +import com.microsoft.graph.authentication.BaseAuthenticationProvider +import com.microsoft.graph.logger.ILogger +import com.microsoft.graph.logger.LoggerLevel +import com.microsoft.graph.requests.GraphServiceClient +import org.cryptomator.util.SharedPreferencesHandler +import org.cryptomator.util.crypto.CredentialCryptor +import java.net.URL +import java.util.concurrent.CompletableFuture +import okhttp3.Request import timber.log.Timber + class OnedriveClientFactory private constructor() { companion object { - @Volatile - private var instance: IGraphServiceClient? = null - - @Volatile - private var authenticationAdapter: MSAAuthAndroidAdapter? = null - - @Synchronized - fun getInstance(context: Context, refreshToken: String?): IGraphServiceClient = instance ?: createClient(context, refreshToken).also { instance = it } - - @Synchronized - fun getAuthAdapter(context: Context, refreshToken: String?): MSAAuthAndroidAdapter = authenticationAdapter ?: MSAAuthAndroidAdapterImpl(context, refreshToken).also { authenticationAdapter = it } - - private fun createClient(context: Context, refreshToken: String?): IGraphServiceClient { - val builder = OkHttpClient() // - .newBuilder() // - .connectTimeout(NetworkTimeout.CONNECTION.timeout, NetworkTimeout.CONNECTION.unit) // - .readTimeout(NetworkTimeout.READ.timeout, NetworkTimeout.READ.unit) // - .writeTimeout(NetworkTimeout.WRITE.timeout, NetworkTimeout.WRITE.unit) // - .addInterceptor(httpLoggingInterceptor(context)) - - val onedriveHttpProvider = OnedriveHttpProvider(object : DefaultClientConfig() { - override fun getAuthenticationProvider(): IAuthenticationProvider { - return getAuthAdapter(context, refreshToken) - } - }, builder.build()) - - return GraphServiceClient // - .builder() // - .authenticationProvider(authenticationAdapter) // - .httpProvider(onedriveHttpProvider) // - .buildClient() - } - - - private fun httpLoggingInterceptor(context: Context): Interceptor { - val logger = object : HttpLoggingInterceptor.Logger { - override fun log(message: String) { - Timber.tag("OkHttp").d(message) + fun createInstance(context: Context, token: String?, sharedPreferencesHandler: SharedPreferencesHandler): GraphServiceClient { + val tokenAuthenticationProvider = object : BaseAuthenticationProvider() { + override fun getAuthorizationTokenAsync(requestUrl: URL): CompletableFuture { + return if (shouldAuthenticateRequestWithUrl(requestUrl)) { + val decryptedToken = CredentialCryptor.getInstance(context).decrypt(token) + CompletableFuture.completedFuture(decryptedToken) + } else { + CompletableFuture.completedFuture(null) + } } } - return HttpLoggingInterceptor(logger, context) - } + return GraphServiceClient // + .builder() // + .authenticationProvider(tokenAuthenticationProvider) // + .logger(object : ILogger { + override fun getLoggingLevel(): LoggerLevel { + return if(sharedPreferencesHandler.debugMode()) { + LoggerLevel.DEBUG + } else { + LoggerLevel.ERROR + } + } - @Synchronized - fun logout() { - instance = null + override fun logDebug(message: String) { + Timber.tag("OnedriveClientFactory").d(message) + } + + override fun logError(message: String, throwable: Throwable?) { + Timber.tag("OnedriveClientFactory").e(throwable, message) + } + + override fun setLoggingLevel(level: LoggerLevel) { + TODO("Not yet implemented") // FIXME + } + }) + .buildClient() } } } diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepository.kt b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepository.kt index 6db19a32..4c91ad33 100644 --- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepository.kt +++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepository.kt @@ -2,8 +2,10 @@ package org.cryptomator.data.cloud.onedrive import android.content.Context import com.microsoft.graph.core.GraphErrorCodes +import com.microsoft.graph.http.GraphServiceException +import com.microsoft.graph.requests.GraphServiceClient +import com.microsoft.identity.common.exception.ClientException import org.cryptomator.data.cloud.InterceptingCloudContentRepository -import org.cryptomator.data.cloud.onedrive.graph.ClientException import org.cryptomator.domain.OnedriveCloud import org.cryptomator.domain.exception.BackendException import org.cryptomator.domain.exception.FatalBackendException @@ -20,8 +22,10 @@ import java.io.File import java.io.IOException import java.io.OutputStream import java.net.SocketTimeoutException +import okhttp3.Request -internal class OnedriveCloudContentRepository(private val cloud: OnedriveCloud, context: Context) : InterceptingCloudContentRepository(Intercepted(cloud, context)) { +internal class OnedriveCloudContentRepository(private val cloud: OnedriveCloud, context: Context, graphServiceClient: GraphServiceClient) + : InterceptingCloudContentRepository(Intercepted(cloud, context, graphServiceClient)) { @Throws(BackendException::class) override fun throwWrappedIfRequired(e: Exception) { @@ -38,19 +42,21 @@ internal class OnedriveCloudContentRepository(private val cloud: OnedriveCloud, private fun throwWrongCredentialsExceptionIfRequired(e: Exception) { if (isAuthenticationError(e)) { + logout(cloud) throw WrongCredentialsException(cloud) } } private fun isAuthenticationError(e: Throwable?): Boolean { return (e != null // - && (e is ClientException && e.errorCode() == GraphErrorCodes.AUTHENTICATION_FAILURE // + && (e is ClientException && e.errorCode == GraphErrorCodes.AUTHENTICATION_FAILURE.name // + || e is GraphServiceException && e.serviceError?.code?.equals("InvalidAuthenticationToken") == true || isAuthenticationError(e.cause))) } - private class Intercepted(cloud: OnedriveCloud, context: Context) : CloudContentRepository { + private class Intercepted(cloud: OnedriveCloud, context: Context, graphServiceClient: GraphServiceClient) : CloudContentRepository { - private val oneDriveImpl: OnedriveImpl = OnedriveImpl(cloud, context, OnedriveIdCache()) + private val oneDriveImpl: OnedriveImpl = OnedriveImpl(cloud, context, graphServiceClient, OnedriveIdCache()) override fun root(cloud: OnedriveCloud): OnedriveFolder { return oneDriveImpl.root() @@ -141,7 +147,7 @@ internal class OnedriveCloudContentRepository(private val cloud: OnedriveCloud, @Throws(BackendException::class) override fun checkAuthenticationAndRetrieveCurrentAccount(cloud: OnedriveCloud): String { - return oneDriveImpl.currentAccount() + return oneDriveImpl.currentAccount(cloud.username()) } override fun logout(cloud: OnedriveCloud) { diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepositoryFactory.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepositoryFactory.java index 243f8039..badaf5e3 100644 --- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepositoryFactory.java +++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepositoryFactory.java @@ -1,25 +1,28 @@ package org.cryptomator.data.cloud.onedrive; +import static org.cryptomator.domain.CloudType.ONEDRIVE; + import android.content.Context; import org.cryptomator.data.repository.CloudContentRepositoryFactory; import org.cryptomator.domain.Cloud; import org.cryptomator.domain.OnedriveCloud; import org.cryptomator.domain.repository.CloudContentRepository; +import org.cryptomator.util.SharedPreferencesHandler; import javax.inject.Inject; import javax.inject.Singleton; -import static org.cryptomator.domain.CloudType.ONEDRIVE; - @Singleton public class OnedriveCloudContentRepositoryFactory implements CloudContentRepositoryFactory { private final Context context; + private final SharedPreferencesHandler sharedPreferencesHandler; @Inject - public OnedriveCloudContentRepositoryFactory(Context context) { + public OnedriveCloudContentRepositoryFactory(Context context, SharedPreferencesHandler sharedPreferencesHandler) { this.context = context; + this.sharedPreferencesHandler = sharedPreferencesHandler; } @Override @@ -29,6 +32,7 @@ public class OnedriveCloudContentRepositoryFactory implements CloudContentReposi @Override public CloudContentRepository cloudContentRepositoryFor(Cloud cloud) { - return new OnedriveCloudContentRepository((OnedriveCloud) cloud, context); + OnedriveCloud onedriveCloud = (OnedriveCloud) cloud; + return new OnedriveCloudContentRepository(onedriveCloud, context, OnedriveClientFactory.Companion.createInstance(context, onedriveCloud.accessToken(), sharedPreferencesHandler)); } } diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudNodeFactory.kt b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudNodeFactory.kt index 85aa7b45..3d0036ee 100644 --- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudNodeFactory.kt +++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudNodeFactory.kt @@ -1,6 +1,7 @@ package org.cryptomator.data.cloud.onedrive -import com.microsoft.graph.models.extensions.DriveItem +import com.microsoft.graph.models.DriveItem +import org.cryptomator.domain.exception.FatalBackendException import java.util.Date internal object OnedriveCloudNodeFactory { @@ -15,11 +16,15 @@ internal object OnedriveCloudNodeFactory { } private fun file(parent: OnedriveFolder, item: DriveItem): OnedriveFile { - return OnedriveFile(parent, item.name, getNodePath(parent, item.name), item.size, lastModified(item)) + item.name?.let { + return OnedriveFile(parent, it, getNodePath(parent, it), item.size, lastModified(item)) + } ?: throw FatalBackendException("Item name shouldn't be null") } fun file(parent: OnedriveFolder, item: DriveItem, lastModified: Date?): OnedriveFile { - return OnedriveFile(parent, item.name, getNodePath(parent, item.name), item.size, lastModified) + item.name?.let { + return OnedriveFile(parent, it, getNodePath(parent, it), item.size, lastModified) + } ?: throw FatalBackendException("Item name shouldn't be null") } fun file(parent: OnedriveFolder, name: String, size: Long?): OnedriveFile { @@ -31,7 +36,9 @@ internal object OnedriveCloudNodeFactory { } fun folder(parent: OnedriveFolder, item: DriveItem): OnedriveFolder { - return OnedriveFolder(parent, item.name, getNodePath(parent, item.name)) + item.name?.let { + return OnedriveFolder(parent, it, getNodePath(parent, it)) + } ?: throw FatalBackendException("Item name shouldn't be null") } fun folder(parent: OnedriveFolder, name: String): OnedriveFolder { @@ -48,25 +55,27 @@ internal object OnedriveCloudNodeFactory { @JvmStatic fun getId(item: DriveItem): String { - return if (item.remoteItem != null) item.remoteItem.id - else item.id + return if (item.remoteItem != null) item.remoteItem?.id!! + else item.id!! } @JvmStatic fun getDriveId(item: DriveItem): String? { return when { - item.remoteItem != null -> item.remoteItem.parentReference.driveId - item.parentReference != null -> item.parentReference.driveId + item.remoteItem != null -> item.remoteItem?.parentReference?.driveId + item.parentReference != null -> item.parentReference?.driveId else -> null } } @JvmStatic fun isFolder(item: DriveItem): Boolean { - return item.folder != null || item.remoteItem != null && item.remoteItem.folder != null + return item.folder != null || item.remoteItem != null && item.remoteItem?.folder != null } private fun lastModified(item: DriveItem): Date? { - return item.lastModifiedDateTime?.time + return item.lastModifiedDateTime?.let { + return Date.from(it.toInstant()) + } } } diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveHttpProvider.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveHttpProvider.java deleted file mode 100644 index f3910ac0..00000000 --- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveHttpProvider.java +++ /dev/null @@ -1,575 +0,0 @@ -// ------------------------------------------------------------------------------ -// Copyright (c) 2015 Microsoft Corporation -// -// Permission is hereby granted, free of charge, to any person obtaining a copy -// of this software and associated documentation files (the "Software"), to deal -// in the Software without restriction, including without limitation the rights -// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -// copies of the Software, and to permit persons to whom the Software is -// furnished to do so, subject to the following conditions: -// -// The above copyright notice and this permission notice shall be included in -// all copies or substantial portions of the Software. -// -// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF WILDCARD_MIME_TYPE KIND, EXPRESS OR -// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR WILDCARD_MIME_TYPE CLAIM, DAMAGES OR OTHER -// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -// THE SOFTWARE. -// ------------------------------------------------------------------------------ -package org.cryptomator.data.cloud.onedrive; - -import com.google.common.annotations.VisibleForTesting; -import com.microsoft.graph.authentication.IAuthenticationProvider; -import com.microsoft.graph.concurrency.ICallback; -import com.microsoft.graph.concurrency.IExecutors; -import com.microsoft.graph.concurrency.IProgressCallback; -import com.microsoft.graph.core.ClientException; -import com.microsoft.graph.core.Constants; -import com.microsoft.graph.core.DefaultConnectionConfig; -import com.microsoft.graph.core.IClientConfig; -import com.microsoft.graph.core.IConnectionConfig; -import com.microsoft.graph.http.GraphServiceException; -import com.microsoft.graph.http.HttpMethod; -import com.microsoft.graph.http.HttpResponseCode; -import com.microsoft.graph.http.HttpResponseHeadersHelper; -import com.microsoft.graph.http.IHttpProvider; -import com.microsoft.graph.http.IHttpRequest; -import com.microsoft.graph.http.IStatefulResponseHandler; -import com.microsoft.graph.httpcore.HttpClients; -import com.microsoft.graph.httpcore.ICoreAuthenticationProvider; -import com.microsoft.graph.httpcore.middlewareoption.RedirectOptions; -import com.microsoft.graph.httpcore.middlewareoption.RetryOptions; -import com.microsoft.graph.logger.ILogger; -import com.microsoft.graph.logger.LoggerLevel; -import com.microsoft.graph.options.HeaderOption; -import com.microsoft.graph.serializer.ISerializer; - -import org.jetbrains.annotations.NotNull; - -import java.io.BufferedInputStream; -import java.io.BufferedOutputStream; -import java.io.ByteArrayInputStream; -import java.io.IOException; -import java.io.InputStream; -import java.io.OutputStream; -import java.io.UnsupportedEncodingException; -import java.net.URL; -import java.util.Collections; -import java.util.List; -import java.util.Map; -import java.util.Scanner; -import java.util.concurrent.TimeUnit; - -import okhttp3.MediaType; -import okhttp3.OkHttpClient; -import okhttp3.Protocol; -import okhttp3.Request; -import okhttp3.RequestBody; -import okhttp3.Response; -import okio.BufferedSink; - -/** - * Http provider based off of URLConnection. - */ -public class OnedriveHttpProvider implements IHttpProvider { - - private final HttpResponseHeadersHelper responseHeadersHelper = new HttpResponseHeadersHelper(); - - /** - * The serializer - */ - private final ISerializer serializer; - - /** - * The authentication provider - */ - private final IAuthenticationProvider authenticationProvider; - - /** - * The executors - */ - private final IExecutors executors; - - /** - * The logger - */ - private final ILogger logger; - - /** - * The connection config - */ - private IConnectionConfig connectionConfig; - - /** - * The OkHttpClient that handles all requests - */ - private OkHttpClient corehttpClient; - - /** - * Creates the DefaultHttpProvider - * - * @param serializer the serializer - * @param authenticationProvider the authentication provider - * @param executors the executors - * @param logger the logger for diagnostic information - */ - public OnedriveHttpProvider(final ISerializer serializer, final IAuthenticationProvider authenticationProvider, final IExecutors executors, final ILogger logger) { - this.serializer = serializer; - this.authenticationProvider = authenticationProvider; - this.executors = executors; - this.logger = logger; - } - - /** - * Creates the DefaultHttpProvider - * - * @param clientConfig the client configuration to use for the provider - * @param httpClient the http client to execute the requests with - */ - public OnedriveHttpProvider(final IClientConfig clientConfig, final OkHttpClient httpClient) { - this(clientConfig.getSerializer(), clientConfig.getAuthenticationProvider(), clientConfig.getExecutors(), clientConfig.getLogger()); - this.corehttpClient = httpClient; - } - - /** - * Reads in a stream and converts it into a string - * - * @param input the response body stream - * @return the string result - */ - public static String streamToString(final InputStream input) { - final String httpStreamEncoding = "UTF-8"; - final String endOfFile = "\\A"; - final Scanner scanner = new Scanner(input, httpStreamEncoding); - String scannerString = ""; - try { - scanner.useDelimiter(endOfFile); - scannerString = scanner.next(); - } finally { - scanner.close(); - } - return scannerString; - } - - /** - * Searches for the given header in a list of HeaderOptions - * - * @param headers the list of headers to search through - * @param header the header name to search for (case insensitive) - * @return true if the header has already been set - */ - @VisibleForTesting - static boolean hasHeader(List headers, String header) { - for (HeaderOption option : headers) { - if (option.getName().equalsIgnoreCase(header)) { - return true; - } - } - return false; - } - - /** - * Gets the serializer for this HTTP provider - * - * @return the serializer for this provider - */ - @Override - public ISerializer getSerializer() { - return serializer; - } - - /** - * Sends the HTTP request asynchronously - * - * @param request the request description - * @param callback the callback to be called after success or failure - * @param resultClass the class of the response from the service - * @param serializable the object to send to the service in the body of the request - * @param the type of the response object - * @param the type of the object to send to the service in the body of the request - */ - @Override - public void send(final IHttpRequest request, final ICallback callback, final Class resultClass, final Body serializable) { - final IProgressCallback progressCallback; - if (callback instanceof IProgressCallback) { - progressCallback = (IProgressCallback) callback; - } else { - progressCallback = null; - } - - executors.performOnBackground(() -> { - try { - executors.performOnForeground(sendRequestInternal(request, resultClass, serializable, progressCallback, null), callback); - } catch (final ClientException e) { - executors.performOnForeground(e, callback); - } - }); - } - - /** - * Sends the HTTP request - * - * @param request the request description - * @param resultClass the class of the response from the service - * @param serializable the object to send to the service in the body of the request - * @param the type of the response object - * @param the type of the object to send to the service in the body of the request - * @return the result from the request - * @throws ClientException an exception occurs if the request was unable to complete for any reason - */ - @Override - public Result send(final IHttpRequest request, final Class resultClass, final Body serializable) throws ClientException { - return send(request, resultClass, serializable, null); - } - - /** - * Sends the HTTP request - * - * @param request the request description - * @param resultClass the class of the response from the service - * @param serializable the object to send to the service in the body of the request - * @param handler the handler for stateful response - * @param the type of the response object - * @param the type of the object to send to the service in the body of the request - * @param the response handler for stateful response - * @return the result from the request - * @throws ClientException this exception occurs if the request was unable to complete for any reason - */ - public Result send(final IHttpRequest request, final Class resultClass, final Body serializable, final IStatefulResponseHandler handler) throws ClientException { - return sendRequestInternal(request, resultClass, serializable, null, handler); - } - - /** - * Sends the HTTP request - * - * @param request the request description - * @param resultClass the class of the response from the service - * @param serializable the object to send to the service in the body of the request - * @param progress the progress callback for the request - * @param the type of the response object - * @param the type of the object to send to the service in the body of the request - * @return the result from the request - * @throws ClientException an exception occurs if the request was unable to complete for any reason - */ - public Request getHttpRequest(final IHttpRequest request, final Class resultClass, final Body serializable, final IProgressCallback progress) throws ClientException { - final int defaultBufferSize = 4096; - - final URL requestUrl = request.getRequestUrl(); - logger.logDebug("Starting to send request, URL " + requestUrl.toString()); - - if (this.connectionConfig == null) { - this.connectionConfig = new DefaultConnectionConfig(); - } - - // Request level middleware options - RedirectOptions redirectOptions = new RedirectOptions(request.getMaxRedirects() > 0 ? request.getMaxRedirects() : this.connectionConfig.getMaxRedirects(), request.getShouldRedirect() != null ? request.getShouldRedirect() : this.connectionConfig.getShouldRedirect()); - RetryOptions retryOptions = new RetryOptions(request.getShouldRetry() != null ? request.getShouldRetry() : this.connectionConfig.getShouldRetry(), request.getMaxRetries() > 0 ? request.getMaxRetries() : this.connectionConfig.getMaxRetries(), request.getDelay() > 0 ? request.getDelay() : this.connectionConfig.getDelay()); - - Request coreHttpRequest = convertIHttpRequestToOkHttpRequest(request); - Request.Builder corehttpRequestBuilder = coreHttpRequest.newBuilder().tag(RedirectOptions.class, redirectOptions).tag(RetryOptions.class, retryOptions); - - String contenttype = null; - - logger.logDebug("Request Method " + request.getHttpMethod().toString()); - List requestHeaders = request.getHeaders(); - - for (HeaderOption headerOption : requestHeaders) { - if (headerOption.getName().equalsIgnoreCase(Constants.CONTENT_TYPE_HEADER_NAME)) { - contenttype = headerOption.getValue().toString(); - break; - } - } - - final byte[] bytesToWrite; - corehttpRequestBuilder.addHeader("Accept", "*/*"); - if (serializable == null) { - // Send an empty body through with a POST request - // This ensures that the Content-Length header is properly set - if (request.getHttpMethod() == HttpMethod.POST) { - bytesToWrite = new byte[0]; - if (contenttype == null) { - contenttype = Constants.BINARY_CONTENT_TYPE; - } - } else { - bytesToWrite = null; - } - } else if (serializable instanceof byte[]) { - logger.logDebug("Sending byte[] as request body"); - bytesToWrite = (byte[]) serializable; - - // If the user hasn't specified a Content-Type for the request - if (!hasHeader(requestHeaders, Constants.CONTENT_TYPE_HEADER_NAME)) { - corehttpRequestBuilder.addHeader(Constants.CONTENT_TYPE_HEADER_NAME, Constants.BINARY_CONTENT_TYPE); - contenttype = Constants.BINARY_CONTENT_TYPE; - } - } else { - logger.logDebug("Sending " + serializable.getClass().getName() + " as request body"); - final String serializeObject = serializer.serializeObject(serializable); - try { - bytesToWrite = serializeObject.getBytes(Constants.JSON_ENCODING); - } catch (final UnsupportedEncodingException ex) { - final ClientException clientException = new ClientException("Unsupported encoding problem: ", ex); - logger.logError("Unsupported encoding problem: " + ex.getMessage(), ex); - throw clientException; - } - - // If the user hasn't specified a Content-Type for the request - if (!hasHeader(requestHeaders, Constants.CONTENT_TYPE_HEADER_NAME)) { - corehttpRequestBuilder.addHeader(Constants.CONTENT_TYPE_HEADER_NAME, Constants.JSON_CONTENT_TYPE); - contenttype = Constants.JSON_CONTENT_TYPE; - } - } - - RequestBody requestBody = null; - // Handle cases where we've got a body to process. - if (bytesToWrite != null) { - final String mediaContentType = contenttype; - requestBody = new RequestBody() { - @Override - public long contentLength() { - return bytesToWrite.length; - } - - @Override - public void writeTo(@NotNull BufferedSink sink) throws IOException { - OutputStream out = sink.outputStream(); - int writtenSoFar = 0; - BufferedOutputStream bos = new BufferedOutputStream(out); - int toWrite; - do { - toWrite = Math.min(defaultBufferSize, bytesToWrite.length - writtenSoFar); - bos.write(bytesToWrite, writtenSoFar, toWrite); - writtenSoFar = writtenSoFar + toWrite; - if (progress != null) { - executors.performOnForeground(writtenSoFar, bytesToWrite.length, progress); - } - } while (toWrite > 0); - bos.close(); - out.close(); - } - - @Override - public MediaType contentType() { - return MediaType.parse(mediaContentType); - } - }; - } - - corehttpRequestBuilder.method(request.getHttpMethod().toString(), requestBody); - return corehttpRequestBuilder.build(); - } - - /** - * Sends the HTTP request - * - * @param request the request description - * @param resultClass the class of the response from the service - * @param serializable the object to send to the service in the body of the request - * @param progress the progress callback for the request - * @param handler the handler for stateful response - * @param the type of the response object - * @param the type of the object to send to the service in the body of the request - * @param the response handler for stateful response - * @return the result from the request - * @throws ClientException an exception occurs if the request was unable to complete for any reason - */ - @SuppressWarnings("unchecked") - private Result sendRequestInternal(final IHttpRequest request, final Class resultClass, final Body serializable, final IProgressCallback progress, final IStatefulResponseHandler handler) throws ClientException { - - try { - if (this.connectionConfig == null) { - this.connectionConfig = new DefaultConnectionConfig(); - } - if (this.corehttpClient == null) { - final ICoreAuthenticationProvider authProvider = request1 -> request1; - this.corehttpClient = HttpClients.createDefault(authProvider).newBuilder().connectTimeout(connectionConfig.getConnectTimeout(), TimeUnit.MILLISECONDS).readTimeout(connectionConfig.getReadTimeout(), TimeUnit.MILLISECONDS).followRedirects(false) // TODO https://github.com/microsoftgraph/msgraph-sdk-java/issues/516 - .protocols(Collections.singletonList(Protocol.HTTP_1_1)) // https://stackoverflow.com/questions/62031298/sockettimeout-on-java-11-but-not-on-java-8 - .build(); - } - if (authenticationProvider != null) { // TODO https://github.com/microsoftgraph/msgraph-sdk-java/issues/517 - authenticationProvider.authenticateRequest(request); - } - Request coreHttpRequest = getHttpRequest(request, resultClass, serializable, progress); - Response response = corehttpClient.newCall(coreHttpRequest).execute(); - InputStream in = null; - boolean isBinaryStreamInput = false; - try { - - // Call being executed - - if (handler != null) { - handler.configConnection(response); - } - - logger.logDebug(String.format("Response code %d, %s", response.code(), response.message())); - - if (handler != null) { - logger.logDebug("StatefulResponse is handling the HTTP response."); - return handler.generateResult(request, response, this.getSerializer(), this.logger); - } - - if (response.code() >= HttpResponseCode.HTTP_CLIENT_ERROR) { - logger.logDebug("Handling error response"); - in = response.body().byteStream(); - handleErrorResponse(request, serializable, response); - } - - if (response.code() == HttpResponseCode.HTTP_NOBODY || response.code() == HttpResponseCode.HTTP_NOT_MODIFIED) { - logger.logDebug("Handling response with no body"); - return handleEmptyResponse(responseHeadersHelper.getResponseHeadersAsMapOfStringList(response), resultClass); - } - - if (response.code() == HttpResponseCode.HTTP_ACCEPTED) { - logger.logDebug("Handling accepted response"); - return handleEmptyResponse(responseHeadersHelper.getResponseHeadersAsMapOfStringList(response), resultClass); - } - - in = new BufferedInputStream(response.body().byteStream()); - - final Map headers = responseHeadersHelper.getResponseHeadersAsMapStringString(response); - - if (response.body() == null || response.body().contentLength() == 0) { - return (Result) null; - } - - final String contentType = headers.get(Constants.CONTENT_TYPE_HEADER_NAME); - if (contentType != null && resultClass != InputStream.class && contentType.contains(Constants.JSON_CONTENT_TYPE)) { - logger.logDebug("Response json"); - return handleJsonResponse(in, responseHeadersHelper.getResponseHeadersAsMapOfStringList(response), resultClass); - } else if (resultClass == InputStream.class) { - logger.logDebug("Response binary"); - isBinaryStreamInput = true; - return (Result) handleBinaryStream(in); - } else { - return (Result) null; - } - } finally { - if (!isBinaryStreamInput) { - try { - if (in != null) { - in.close(); - } - } catch (IOException e) { - logger.logError(e.getMessage(), e); - } - if (response != null) { - response.close(); - } - } - } - } catch (final GraphServiceException ex) { - final boolean shouldLogVerbosely = logger.getLoggingLevel() == LoggerLevel.DEBUG; - logger.logError("Graph service exception " + ex.getMessage(shouldLogVerbosely), ex); - throw ex; - } catch (final Exception ex) { - final ClientException clientException = new ClientException("Error during http request", ex); - logger.logError("Error during http request", clientException); - throw clientException; - } - } - - private Request convertIHttpRequestToOkHttpRequest(IHttpRequest request) { - if (request != null) { - Request.Builder requestBuilder = new Request.Builder(); - requestBuilder.url(request.getRequestUrl()); - for (final HeaderOption header : request.getHeaders()) { - requestBuilder.addHeader(header.getName(), header.getValue().toString()); - } - return requestBuilder.build(); - } - return null; - } - - /** - * Handles the event of an error response - * - * @param request the request that caused the failed response - * @param serializable the body of the request - * @param connection the URL connection - * @param the type of the request body - * @throws IOException an exception occurs if there were any problems interacting with the connection object - */ - private void handleErrorResponse(final IHttpRequest request, final Body serializable, final Response response) throws IOException { - throw GraphServiceException.createFromConnection(request, serializable, serializer, response, logger); - } - - /** - * Handles the cause where the response is a binary stream - * - * @param in the input stream from the response - * @return the input stream to return to the caller - */ - private InputStream handleBinaryStream(final InputStream in) { - return in; - } - - /** - * Handles the cause where the response is a JSON object - * - * @param in the input stream from the response - * @param responseHeaders the response header - * @param clazz the class of the response object - * @param the type of the response object - * @return the JSON object - */ - private Result handleJsonResponse(final InputStream in, Map> responseHeaders, final Class clazz) { - if (clazz == null) { - return null; - } - - final String rawJson = streamToString(in); - return getSerializer().deserializeObject(rawJson, clazz, responseHeaders); - } - - /** - * Handles the case where the response body is empty - * - * @param responseHeaders the response headers - * @param clazz the type of the response object - * @return the JSON object - */ - private Result handleEmptyResponse(Map> responseHeaders, final Class clazz) throws UnsupportedEncodingException { - // Create an empty object to attach the response headers to - InputStream in = new ByteArrayInputStream("{}".getBytes(Constants.JSON_ENCODING)); - return handleJsonResponse(in, responseHeaders, clazz); - } - - @VisibleForTesting - public ILogger getLogger() { - return logger; - } - - @VisibleForTesting - public IExecutors getExecutors() { - return executors; - } - - @VisibleForTesting - public IAuthenticationProvider getAuthenticationProvider() { - return authenticationProvider; - } - - /** - * Get connection config for read and connect timeout in requests - * - * @return Connection configuration to be used for timeout values - */ - public IConnectionConfig getConnectionConfig() { - if (this.connectionConfig == null) { - this.connectionConfig = new DefaultConnectionConfig(); - } - return connectionConfig; - } - - /** - * Set connection config for read and connect timeout in requests - * - * @param connectionConfig Connection configuration to be used for timeout values - */ - public void setConnectionConfig(IConnectionConfig connectionConfig) { - this.connectionConfig = connectionConfig; - } -} diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveImpl.kt b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveImpl.kt index 2e3343ed..116f3ffa 100644 --- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveImpl.kt +++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveImpl.kt @@ -2,26 +2,25 @@ package org.cryptomator.data.cloud.onedrive import android.content.Context import android.net.Uri -import com.microsoft.graph.concurrency.ChunkedUploadProvider import com.microsoft.graph.http.GraphServiceException -import com.microsoft.graph.models.extensions.DriveItem -import com.microsoft.graph.models.extensions.DriveItemUploadableProperties -import com.microsoft.graph.models.extensions.Folder -import com.microsoft.graph.models.extensions.IGraphServiceClient -import com.microsoft.graph.models.extensions.ItemReference +import com.microsoft.graph.models.DriveItem +import com.microsoft.graph.models.DriveItemCreateUploadSessionParameterSet +import com.microsoft.graph.models.DriveItemUploadableProperties +import com.microsoft.graph.models.Folder +import com.microsoft.graph.models.ItemReference import com.microsoft.graph.options.Option import com.microsoft.graph.options.QueryOption -import com.microsoft.graph.requests.extensions.IDriveRequestBuilder +import com.microsoft.graph.requests.DriveRequestBuilder +import com.microsoft.graph.requests.GraphServiceClient +import com.microsoft.graph.tasks.LargeFileUploadTask import com.tomclaw.cache.DiskLruCache import org.cryptomator.data.cloud.onedrive.OnedriveCloudNodeFactory.folder import org.cryptomator.data.cloud.onedrive.OnedriveCloudNodeFactory.from import org.cryptomator.data.cloud.onedrive.OnedriveCloudNodeFactory.getDriveId import org.cryptomator.data.cloud.onedrive.OnedriveCloudNodeFactory.getId import org.cryptomator.data.cloud.onedrive.OnedriveCloudNodeFactory.isFolder -import org.cryptomator.data.cloud.onedrive.graph.ClientException -import org.cryptomator.data.cloud.onedrive.graph.ICallback -import org.cryptomator.data.cloud.onedrive.graph.IProgressCallback import org.cryptomator.data.util.CopyStream +import org.cryptomator.data.util.TransferredBytesAwareInputStream import org.cryptomator.data.util.TransferredBytesAwareOutputStream import org.cryptomator.domain.OnedriveCloud import org.cryptomator.domain.exception.BackendException @@ -45,22 +44,20 @@ import java.util.ArrayList import java.util.Date import java.util.concurrent.CompletableFuture import java.util.concurrent.ExecutionException +import okhttp3.Request import timber.log.Timber -internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCache: OnedriveIdCache) { +internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, graphServiceClient: GraphServiceClient, nodeInfoCache: OnedriveIdCache) { private val cloud: OnedriveCloud private val context: Context + private val graphServiceClient: GraphServiceClient private val nodeInfoCache: OnedriveIdCache private val sharedPreferencesHandler: SharedPreferencesHandler private var diskLruCache: DiskLruCache? = null - private fun client(): IGraphServiceClient { - return OnedriveClientFactory.getInstance(context, cloud.accessToken()) - } - - private fun drive(driveId: String?): IDriveRequestBuilder { - return if (driveId == null) client().me().drive() else client().drives(driveId) + private fun drive(driveId: String?): DriveRequestBuilder { + return if (driveId == null) graphServiceClient.me().drive() else graphServiceClient.drives(driveId) } fun root(): OnedriveFolder { @@ -90,11 +87,7 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach private fun childByName(parentId: String, parentDriveId: String, name: String): DriveItem? { return try { - drive(parentDriveId) // - .items(parentId) // - .itemWithPath(Uri.encode(name)) // - .buildRequest() // - .get() + drive(parentDriveId).items(parentId).itemWithPath(Uri.encode(name)).buildRequest().get() } catch (e: GraphServiceException) { if (isNotFoundError(e)) { null @@ -138,18 +131,14 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach fun list(folder: OnedriveFolder): List { val result: MutableList = ArrayList() val nodeInfo = requireNodeInfo(folder) - var page = drive(nodeInfo.driveId) // - .items(nodeInfo.id) // - .children() // - .buildRequest() // - .get() + var page = drive(nodeInfo.driveId).items(nodeInfo.id).children().buildRequest().get() do { removeChildNodeInfo(folder) - page.currentPage?.forEach { + page?.currentPage?.forEach { result.add(cacheNodeInfo(from(folder, it), it)) } - page = if (page.nextPage != null) { - page.nextPage.buildRequest().get() + page = if (page?.nextPage != null) { + page.nextPage?.buildRequest()?.get() } else { null } @@ -170,10 +159,7 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach folderToCreate.name = folder.name folderToCreate.folder = Folder() val parentNodeInfo = requireNodeInfo(parentFolder) - val createdFolder = drive(parentNodeInfo.driveId) // - .items(parentNodeInfo.id).children() // - .buildRequest() // - .post(folderToCreate) + val createdFolder = drive(parentNodeInfo.driveId).items(parentNodeInfo.id).children().buildRequest().post(folderToCreate) return cacheNodeInfo(folder(parentFolder, createdFolder), createdFolder) } ?: throw ParentFolderIsNullException(folder.name) } @@ -192,12 +178,10 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach targetParentReference.driveId = targetNodeInfo?.driveId targetItem.parentReference = targetParentReference val sourceNodeInfo = requireNodeInfo(source) - val movedItem = drive(sourceNodeInfo.driveId) // - .items(sourceNodeInfo.id) // - .buildRequest() // - .patch(targetItem) - removeNodeInfo(source) - return cacheNodeInfo(from(targetsParent, movedItem), movedItem) + drive(sourceNodeInfo.driveId).items(sourceNodeInfo.id).buildRequest().patch(targetItem)?.let { + removeNodeInfo(source) + return cacheNodeInfo(from(targetsParent, it), it) + } ?: throw FatalBackendException("Failed to move file, response is null") } ?: throw ParentFolderIsNullException(target.name) } @@ -214,7 +198,7 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach val conflictBehaviorOption: Option = QueryOption("@name.conflictBehavior", uploadMode) val result = CompletableFuture() if (size <= CHUNKED_UPLOAD_MAX_SIZE) { - uploadFile(file, data, progressAware, result, conflictBehaviorOption) + uploadFile(file, data, progressAware, result, conflictBehaviorOption, size) } else { try { chunkedUploadFile(file, data, progressAware, result, conflictBehaviorOption, size) @@ -233,88 +217,67 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach } @Throws(NoSuchCloudFileException::class) - private fun uploadFile( // - file: OnedriveFile, // - data: DataSource, // - progressAware: ProgressAware, // - result: CompletableFuture, // - conflictBehaviorOption: Option - ) { - val parentNodeInfo = requireNodeInfo(file.parent) - try { - data.open(context)?.use { inputStream -> - drive(parentNodeInfo.driveId) // - .items(parentNodeInfo.id) // - .itemWithPath(file.name) // - .content() // - .buildRequest(listOf(conflictBehaviorOption)) // - .put(CopyStream.toByteArray(inputStream), object : IProgressCallback { - override fun progress(current: Long, max: Long) { - progressAware // - .onProgress( - Progress.progress(UploadState.upload(file)) // - .between(0) // - .and(max) // - .withValue(current) - ) + private fun uploadFile(file: OnedriveFile, data: DataSource, progressAware: ProgressAware, result: CompletableFuture, conflictBehaviorOption: Option, size: Long) { + data.open(context)?.use { inputStream -> + object : TransferredBytesAwareInputStream(inputStream) { + override fun bytesTransferred(transferred: Long) { + progressAware.onProgress(Progress.progress(UploadState.upload(file)).between(0).and(size).withValue(transferred)) + } + }.use { + val parentNodeInfo = requireNodeInfo(file.parent) + try { + drive(parentNodeInfo.driveId) // + .items(parentNodeInfo.id) // + .itemWithPath(file.name) // + .content() // + .buildRequest(listOf(conflictBehaviorOption)) // + .putAsync(CopyStream.toByteArray(it)) // + .whenComplete { driveItem, error -> + run { + if (error == null) { + progressAware.onProgress(Progress.completed(UploadState.upload(file))) + result.complete(driveItem) + cacheNodeInfo(file, driveItem) + } else { + result.completeExceptionally(error) + } + } } - - override fun success(item: DriveItem) { - progressAware.onProgress(Progress.completed(UploadState.upload(file))) - result.complete(item) - cacheNodeInfo(file, item) - } - - override fun failure(ex: com.microsoft.graph.core.ClientException) { - result.completeExceptionally(ex) - } - }) - } ?: throw FatalBackendException("InputStream shouldn't be null") - } catch (e: IOException) { - throw FatalBackendException(e) - } + } catch (e: IOException) { + throw FatalBackendException(e) + } + } + } ?: throw FatalBackendException("InputStream shouldn't bee null") } @Throws(IOException::class, NoSuchCloudFileException::class) - private fun chunkedUploadFile( // - file: OnedriveFile, // - data: DataSource, // - progressAware: ProgressAware, // - result: CompletableFuture, // - conflictBehaviorOption: Option, // - size: Long - ) { + private fun chunkedUploadFile(file: OnedriveFile, data: DataSource, progressAware: ProgressAware, result: CompletableFuture, conflictBehaviorOption: Option, size: Long) { val parentNodeInfo = requireNodeInfo(file.parent) - val uploadSession = drive(parentNodeInfo.driveId) // + drive(parentNodeInfo.driveId) // .items(parentNodeInfo.id) // .itemWithPath(file.name) // - .createUploadSession(DriveItemUploadableProperties()) // + .createUploadSession(DriveItemCreateUploadSessionParameterSet.newBuilder().withItem(DriveItemUploadableProperties()).build()) // .buildRequest() // - .post() - data.open(context).use { inputStream -> - ChunkedUploadProvider(uploadSession, client(), inputStream, size, DriveItem::class.java) // - .upload(listOf(conflictBehaviorOption), object : IProgressCallback { - override fun progress(current: Long, max: Long) { - progressAware.onProgress( - Progress // - .progress(UploadState.upload(file)) // - .between(0) // - .and(max) // - .withValue(current) - ) - } - - override fun success(item: DriveItem) { - progressAware.onProgress(Progress.completed(UploadState.upload(file))) - result.complete(item) - cacheNodeInfo(file, item) - } - - override fun failure(ex: com.microsoft.graph.core.ClientException) { - result.completeExceptionally(ex) - } - }, CHUNKED_UPLOAD_CHUNK_SIZE, CHUNKED_UPLOAD_MAX_ATTEMPTS) - } + .post()?.let { uploadSession -> + data.open(context)?.use { inputStream -> + LargeFileUploadTask(uploadSession, graphServiceClient, inputStream, size, DriveItem::class.java) // + .uploadAsync(CHUNKED_UPLOAD_CHUNK_SIZE, listOf(conflictBehaviorOption)) { current, max -> + progressAware.onProgress( + Progress.progress(UploadState.upload(file)).between(0).and(max).withValue(current) + ) + }.whenComplete { driveItemResult, error -> + run { + if (error == null && driveItemResult.responseBody != null) { + progressAware.onProgress(Progress.completed(UploadState.upload(file))) + result.complete(driveItemResult.responseBody) + cacheNodeInfo(file, driveItemResult.responseBody!!) + } else { + result.completeExceptionally(error) + } + } + } + } ?: throw FatalBackendException("InputStream shouldn't bee null") + } ?: throw FatalBackendException("Failed to create upload session, response is null") } @Throws(BackendException::class, IOException::class) @@ -340,27 +303,12 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach } @Throws(IOException::class) - private fun writeToData( - file: OnedriveFile, // - nodeInfo: OnedriveIdCache.NodeInfo, // - data: OutputStream, // - encryptedTmpFile: File?, // - cacheKey: String?, // - progressAware: ProgressAware - ) { - val request = drive(nodeInfo.driveId) // - .items(nodeInfo.id) // - .content() // - .buildRequest() - request.get().use { inputStream -> + private fun writeToData(file: OnedriveFile, nodeInfo: OnedriveIdCache.NodeInfo, data: OutputStream, encryptedTmpFile: File?, cacheKey: String?, progressAware: ProgressAware) { + val request = drive(nodeInfo.driveId).items(nodeInfo.id).content().buildRequest() + request.get()?.use { inputStream -> object : TransferredBytesAwareOutputStream(data) { override fun bytesTransferred(transferred: Long) { - progressAware.onProgress( // - Progress.progress(DownloadState.download(file)) // - .between(0) // - .and(file.size ?: Long.MAX_VALUE) // - .withValue(transferred) - ) + progressAware.onProgress(Progress.progress(DownloadState.download(file)).between(0).and(file.size ?: Long.MAX_VALUE).withValue(transferred)) } }.use { out -> CopyStream.copyStreamToStream(inputStream, out) } } @@ -391,10 +339,7 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach @Throws(NoSuchCloudFileException::class) fun delete(node: OnedriveNode) { val nodeInfo = requireNodeInfo(node) - drive(nodeInfo.driveId) // - .items(nodeInfo.id) // - .buildRequest() // - .delete() + drive(nodeInfo.driveId).items(nodeInfo.id).buildRequest().delete() removeNodeInfo(node) } @@ -440,8 +385,9 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach } private fun loadRootNodeInfo(): OnedriveIdCache.NodeInfo { - val item = drive(null).root().buildRequest().get() - return OnedriveIdCache.NodeInfo(getId(item), getDriveId(item), true, item.cTag) + return drive(null).root().buildRequest().get()?.let { rootItem -> + OnedriveIdCache.NodeInfo(getId(rootItem), getDriveId(rootItem), true, rootItem.cTag) + } ?: throw FatalBackendException("Failed to load root item, item is null") } private fun loadNonRootNodeInfo(node: OnedriveNode): OnedriveIdCache.NodeInfo? { @@ -459,37 +405,20 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach } ?: throw ParentFolderIsNullException(node.name) } - fun currentAccount(): String { - return client().me().drive().buildRequest().get().owner.user.displayName + fun currentAccount(username: String): String { + // used to check authentication + graphServiceClient.me().drive().buildRequest().get()?.owner?.user + return username } fun logout() { - val result = CompletableFuture() - OnedriveClientFactory.getAuthAdapter(context, cloud.accessToken()).logout(object : ICallback { - override fun success(aVoid: Void?) { - result.complete(null) - } - - override fun failure(e: ClientException) { - result.completeExceptionally(e) - } - }) - try { - result.get() - } catch (e: InterruptedException) { - throw FatalBackendException(e) - } catch (e: ExecutionException) { - throw FatalBackendException(e) - } - - OnedriveClientFactory.logout() + // FIXME what about logout? } companion object { private const val CHUNKED_UPLOAD_MAX_SIZE = 4L shl 20 private const val CHUNKED_UPLOAD_CHUNK_SIZE = 327680 * 32 - private const val CHUNKED_UPLOAD_MAX_ATTEMPTS = 5 private const val REPLACE_MODE = "replace" private const val NON_REPLACING_MODE = "rename" } @@ -500,6 +429,7 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach } this.cloud = cloud this.context = context + this.graphServiceClient = graphServiceClient this.nodeInfoCache = nodeInfoCache sharedPreferencesHandler = SharedPreferencesHandler(context) } diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/ClientException.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/ClientException.java deleted file mode 100644 index 4c3641cc..00000000 --- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/ClientException.java +++ /dev/null @@ -1,29 +0,0 @@ -package org.cryptomator.data.cloud.onedrive.graph; - -import com.microsoft.graph.core.GraphErrorCodes; - -/** - * An exception from the client. - */ -public class ClientException extends com.microsoft.graph.core.ClientException { - - private static final long serialVersionUID = -10662352567392559L; - - private final Enum errorCode; - - /** - * Creates the client exception - * - * @param message the message to display - * @param ex the exception from - */ - public ClientException(final String message, final Throwable ex, Enum errorCode) { - super(message, ex); - - this.errorCode = errorCode; - } - - public Enum errorCode() { - return errorCode; - } -} diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/IAuthenticationAdapter.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/IAuthenticationAdapter.java deleted file mode 100644 index 653e5d8d..00000000 --- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/IAuthenticationAdapter.java +++ /dev/null @@ -1,40 +0,0 @@ -package org.cryptomator.data.cloud.onedrive.graph; - -import android.app.Activity; - -import com.microsoft.graph.authentication.IAuthenticationProvider; - -/** - * An authentication adapter for signing requests, logging in, and logging out. - */ -public interface IAuthenticationAdapter extends IAuthenticationProvider { - - /** - * Logs out the user - * - * @param callback The callback when the logout is complete or an error occurs - */ - void logout(final ICallback callback); - - /** - * Login a user by popping UI - * - * @param activity The current activity - * @param callback The callback when the login is complete or an error occurs - */ - void login(final Activity activity, final ICallback callback); - - /** - * Login a user with no ui - * - * @param callback The callback when the login is complete or an error occurs - */ - void loginSilent(final ICallback callback); - - /** - * Gets the access token for the session of a logged in user - * - * @return the access token - */ - String getAccessToken() throws ClientException; -} diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/ICallback.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/ICallback.java deleted file mode 100644 index e02bada9..00000000 --- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/ICallback.java +++ /dev/null @@ -1,45 +0,0 @@ -package org.cryptomator.data.cloud.onedrive.graph; - -// ------------------------------------------------------------------------------ -// Copyright (c) 2017 Microsoft Corporation -// -// Permission is hereby granted, free of charge, to any person obtaining a copy -// of this software and associated documentation files (the "Software"), to deal -// in the Software without restriction, including without limitation the rights -// to use, copy, modify, merge, publish, distribute, sub-license, and/or sell -// copies of the Software, and to permit persons to whom the Software is -// furnished to do so, subject to the following conditions: -// -// The above copyright notice and this permission notice shall be included in -// all copies or substantial portions of the Software. -// -// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -// THE SOFTWARE. -// ------------------------------------------------------------------------------ - -/** - * A callback that describes how to deal with success and failure - * - * @param the result type of the successful action - */ -public interface ICallback { - - /** - * How successful results are handled - * - * @param result the result - */ - void success(final Result result); - - /** - * How failures are handled - * - * @param ex the exception - */ - void failure(final ClientException ex); -} diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/IProgressCallback.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/IProgressCallback.java deleted file mode 100644 index 98012d50..00000000 --- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/IProgressCallback.java +++ /dev/null @@ -1,39 +0,0 @@ -package org.cryptomator.data.cloud.onedrive.graph; - -// ------------------------------------------------------------------------------ -// Copyright (c) 2017 Microsoft Corporation -// -// Permission is hereby granted, free of charge, to any person obtaining a copy -// of this software and associated documentation files (the "Software"), to deal -// in the Software without restriction, including without limitation the rights -// to use, copy, modify, merge, publish, distribute, sub-license, and/or sell -// copies of the Software, and to permit persons to whom the Software is -// furnished to do so, subject to the following conditions: -// -// The above copyright notice and this permission notice shall be included in -// all copies or substantial portions of the Software. -// -// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -// THE SOFTWARE. -// ------------------------------------------------------------------------------ - -/** - * A callback that describes how to deal with success, failure, and progress - * - * @param the result type of the successful action - */ -public interface IProgressCallback extends com.microsoft.graph.concurrency.IProgressCallback { - - /** - * How progress updates are handled for this callback - * - * @param current the current amount of progress - * @param max the max amount of progress - */ - void progress(final long current, final long max); -} diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/MSAAuthAndroidAdapter.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/MSAAuthAndroidAdapter.java deleted file mode 100644 index 4fdb3224..00000000 --- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/MSAAuthAndroidAdapter.java +++ /dev/null @@ -1,275 +0,0 @@ -package org.cryptomator.data.cloud.onedrive.graph; - -import android.app.Activity; -import android.content.Context; - -import com.microsoft.graph.http.IHttpRequest; -import com.microsoft.graph.options.HeaderOption; -import com.microsoft.services.msa.LiveAuthClient; -import com.microsoft.services.msa.LiveAuthException; -import com.microsoft.services.msa.LiveAuthListener; -import com.microsoft.services.msa.LiveConnectSession; -import com.microsoft.services.msa.LiveStatus; - -import org.cryptomator.util.crypto.CredentialCryptor; - -import java.util.Arrays; -import java.util.concurrent.atomic.AtomicReference; - -import timber.log.Timber; - -import static com.microsoft.graph.core.GraphErrorCodes.AUTHENTICATION_FAILURE; - -/** - * Supports login, logout, and signing requests with authorization information. - */ -public abstract class MSAAuthAndroidAdapter implements IAuthenticationAdapter { - - /** - * The authorization header name. - */ - private static final String AUTHORIZATION_HEADER_NAME = "Authorization"; - - /** - * The bearer prefix. - */ - private static final String OAUTH_BEARER_PREFIX = "bearer "; - - /** - * The live auth client. - */ - private final LiveAuthClient mLiveAuthClient; - private Context context; - - /** - * Create a new instance of the provider - * - * @param context the application context instance - * @param refreshToken - */ - protected MSAAuthAndroidAdapter(final Context context, String refreshToken) { - this.context = context; - mLiveAuthClient = new LiveAuthClient(context, getClientId(), Arrays.asList(getScopes()), MicrosoftOAuth2Endpoint.getInstance(), refreshToken); - } - - /** - * The client id for this authenticator. - * http://graph.microsoft.io/en-us/app-registration - * - * @return The client id. - */ - protected abstract String getClientId(); - - /** - * The scopes for this application. - * http://graph.microsoft.io/en-us/docs/authorization/permission_scopes - * - * @return The scopes for this application. - */ - protected abstract String[] getScopes(); - - @Override - public void authenticateRequest(final IHttpRequest request) { - Timber.tag("MSAAuthAndroidAdapter").d("Authenticating request, %s", request.getRequestUrl()); - - // If the request already has an authorization header, do not intercept it. - for (final HeaderOption option : request.getHeaders()) { - if (option.getName().equals(AUTHORIZATION_HEADER_NAME)) { - Timber.tag("MSAAuthAndroidAdapter").d("Found an existing authorization header!"); - return; - } - } - - try { - final String accessToken = getAccessToken(); - request.addHeader(AUTHORIZATION_HEADER_NAME, OAUTH_BEARER_PREFIX + accessToken); - } catch (ClientException e) { - final String message = "Unable to authenticate request, No active account found"; - final ClientException exception = new ClientException(message, e, AUTHENTICATION_FAILURE); - Timber.tag("MSAAuthAndroidAdapter").e(exception, message); - throw exception; - } - } - - @Override - public String getAccessToken() throws ClientException { - if (hasValidSession()) { - Timber.tag("MSAAuthAndroidAdapter").d("Found account information"); - if (mLiveAuthClient.getSession().isExpired()) { - Timber.tag("MSAAuthAndroidAdapter").d("Account access token is expired, refreshing"); - loginSilentBlocking(); - } - return mLiveAuthClient.getSession().getAccessToken(); - } else { - final String message = "Unable to get access token, No active account found"; - final ClientException exception = new ClientException(message, null, AUTHENTICATION_FAILURE); - Timber.tag("MSAAuthAndroidAdapter").e(exception, message); - throw exception; - } - } - - @Override - public void logout(final ICallback callback) { - Timber.tag("MSAAuthAndroidAdapter").d("Logout started"); - - if (callback == null) { - throw new IllegalArgumentException("callback"); - } - - mLiveAuthClient.logout(new LiveAuthListener() { - @Override - public void onAuthComplete(final LiveStatus status, final LiveConnectSession session, final Object userState) { - Timber.tag("MSAAuthAndroidAdapter").d("Logout complete"); - callback.success(null); - } - - @Override - public void onAuthError(final LiveAuthException exception, final Object userState) { - final ClientException clientException = new ClientException("Logout failure", exception, AUTHENTICATION_FAILURE); - Timber.tag("MSAAuthAndroidAdapter").e(clientException); - callback.failure(clientException); - } - }); - } - - @Override - public void login(final Activity activity, final ICallback callback) { - Timber.tag("MSAAuthAndroidAdapter").d("Login started"); - - if (callback == null) { - throw new IllegalArgumentException("callback"); - } - - if (hasValidSession()) { - Timber.tag("MSAAuthAndroidAdapter").d("Already logged in"); - callback.success(null); - return; - } - - final LiveAuthListener listener = new LiveAuthListener() { - @Override - public void onAuthComplete(final LiveStatus status, final LiveConnectSession session, final Object userState) { - Timber.tag("MSAAuthAndroidAdapter").d(String.format("LiveStatus: %s, LiveConnectSession good?: %s, UserState %s", status, session != null, userState)); - - if (status == LiveStatus.NOT_CONNECTED && session.getRefreshToken() == null) { - Timber.tag("MSAAuthAndroidAdapter").d("Received invalid login failure from silent authentication, ignoring."); - return; - } - - if (status == LiveStatus.CONNECTED) { - Timber.tag("MSAAuthAndroidAdapter").d("Login completed"); - callback.success(encrypt(session.getRefreshToken())); - return; - } - - final ClientException clientException = new ClientException("Unable to login successfully", null, AUTHENTICATION_FAILURE); - Timber.tag("MSAAuthAndroidAdapter").e(clientException); - callback.failure(clientException); - } - - @Override - public void onAuthError(final LiveAuthException exception, final Object userState) { - final ClientException clientException = new ClientException("Login failure", exception, AUTHENTICATION_FAILURE); - Timber.tag("MSAAuthAndroidAdapter").e(clientException); - callback.failure(clientException); - } - }; - - // Make sure the login process is started with the current activity information - activity.runOnUiThread(() -> mLiveAuthClient.login(activity, listener)); - } - - private String encrypt(String refreshToken) { - if (refreshToken == null) { - return null; - } - return CredentialCryptor // - .getInstance(context) // - .encrypt(refreshToken); - } - - /** - * Login a user with no ui - * - * @param callback The callback when the login is complete or an error occurs - */ - @Override - public void loginSilent(final ICallback callback) { - Timber.tag("MSAAuthAndroidAdapter").d("Login silent started"); - - if (callback == null) { - throw new IllegalArgumentException("callback"); - } - - final LiveAuthListener listener = new LiveAuthListener() { - @Override - public void onAuthComplete(final LiveStatus status, final LiveConnectSession session, final Object userState) { - Timber.tag("MSAAuthAndroidAdapter").d(String.format("LiveStatus: %s, LiveConnectSession good?: %s, UserState %s", status, session != null, userState)); - - if (status == LiveStatus.CONNECTED) { - Timber.tag("MSAAuthAndroidAdapter").d("Login completed"); - callback.success(null); - return; - } - - final ClientException clientException = new ClientException("Unable to login silently", null, AUTHENTICATION_FAILURE); - Timber.tag("MSAAuthAndroidAdapter").e(clientException); - callback.failure(clientException); - } - - @Override - public void onAuthError(final LiveAuthException exception, final Object userState) { - final ClientException clientException = new ClientException("Unable to login silently", null, AUTHENTICATION_FAILURE); - Timber.tag("MSAAuthAndroidAdapter").e(clientException); - callback.failure(clientException); - } - }; - - mLiveAuthClient.loginSilent(listener); - } - - /** - * Login silently while blocking for the call to return - * - * @return the result of the login attempt - * @throws ClientException The exception if there was an issue during the login attempt - */ - private Void loginSilentBlocking() throws ClientException { - Timber.tag("MSAAuthAndroidAdapter").d("Login silent blocking started"); - final SimpleWaiter waiter = new SimpleWaiter(); - final AtomicReference returnValue = new AtomicReference<>(); - final AtomicReference exceptionValue = new AtomicReference<>(); - - loginSilent(new ICallback() { - @Override - public void success(final Void aVoid) { - returnValue.set(aVoid); - waiter.signal(); - } - - @Override - public void failure(ClientException ex) { - exceptionValue.set(ex); - waiter.signal(); - } - }); - - waiter.waitForSignal(); - - // noinspection ThrowableResultOfMethodCallIgnored - if (exceptionValue.get() != null) { - throw exceptionValue.get(); - } - - return returnValue.get(); - } - - /** - * Is the session object valid - * - * @return true, if the session is valid (but not necessary unexpired) - */ - private boolean hasValidSession() { - return mLiveAuthClient.getSession() != null && mLiveAuthClient.getSession().getAccessToken() != null; - } -} diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/MicrosoftOAuth2Endpoint.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/MicrosoftOAuth2Endpoint.java deleted file mode 100644 index 5d964fdb..00000000 --- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/MicrosoftOAuth2Endpoint.java +++ /dev/null @@ -1,44 +0,0 @@ -package org.cryptomator.data.cloud.onedrive.graph; - -import android.net.Uri; - -import com.microsoft.services.msa.OAuthConfig; - -import org.cryptomator.data.BuildConfig; - -class MicrosoftOAuth2Endpoint implements OAuthConfig { - - /** - * The current instance of this class - */ - private static final MicrosoftOAuth2Endpoint sInstance = new MicrosoftOAuth2Endpoint(); - - /** - * The current instance of this class - * - * @return The instance - */ - static MicrosoftOAuth2Endpoint getInstance() { - return sInstance; - } - - @Override - public Uri getAuthorizeUri() { - return Uri.parse("https://login.microsoftonline.com/common/oauth2/v2.0/authorize"); - } - - @Override - public Uri getDesktopUri() { - return Uri.parse(BuildConfig.ONEDRIVE_API_REDIRCT_URI); - } - - @Override - public Uri getLogoutUri() { - return Uri.parse("https://login.microsoftonline.com/common/oauth2/v2.0/logout"); - } - - @Override - public Uri getTokenUri() { - return Uri.parse("https://login.microsoftonline.com/common/oauth2/v2.0/token"); - } -} diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/SimpleWaiter.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/SimpleWaiter.java deleted file mode 100644 index 96f3e623..00000000 --- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/SimpleWaiter.java +++ /dev/null @@ -1,65 +0,0 @@ -package org.cryptomator.data.cloud.onedrive.graph; - -// ------------------------------------------------------------------------------ -// Copyright (c) 2015 Microsoft Corporation -// -// Permission is hereby granted, free of charge, to any person obtaining a copy -// of this software and associated documentation files (the "Software"), to deal -// in the Software without restriction, including without limitation the rights -// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -// copies of the Software, and to permit persons to whom the Software is -// furnished to do so, subject to the following conditions: -// -// The above copyright notice and this permission notice shall be included in -// all copies or substantial portions of the Software. -// -// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -// THE SOFTWARE. -// ------------------------------------------------------------------------------ - -/** - * A simple signal/waiter interface for synchronizing multi-threaded actions. - */ -public class SimpleWaiter { - - /** - * The internal lock object for this waiter. - */ - private final Object mInternalLock = new Object(); - - /** - * Indicates if this waiter has been triggered. - */ - private boolean mTriggerState; - - /** - * BLOCKING: Waits for the signal to be triggered, or returns immediately if it has already been triggered. - */ - public void waitForSignal() { - synchronized (mInternalLock) { - if (this.mTriggerState) { - return; - } - try { - mInternalLock.wait(); - } catch (final InterruptedException e) { - throw new RuntimeException(e); - } - } - } - - /** - * Triggers the signal for this waiter. - */ - public void signal() { - synchronized (mInternalLock) { - mTriggerState = true; - mInternalLock.notifyAll(); - } - } -} diff --git a/data/src/main/java/org/cryptomator/data/db/DatabaseUpgrades.java b/data/src/main/java/org/cryptomator/data/db/DatabaseUpgrades.java index 638c5c76..77239abe 100644 --- a/data/src/main/java/org/cryptomator/data/db/DatabaseUpgrades.java +++ b/data/src/main/java/org/cryptomator/data/db/DatabaseUpgrades.java @@ -1,5 +1,7 @@ package org.cryptomator.data.db; +import static java.lang.String.format; + import java.util.ArrayList; import java.util.Collections; import java.util.Comparator; @@ -10,8 +12,6 @@ import java.util.Map; import javax.inject.Inject; import javax.inject.Singleton; -import static java.lang.String.format; - @Singleton class DatabaseUpgrades { @@ -28,7 +28,9 @@ class DatabaseUpgrades { Upgrade6To7 upgrade6To7, // Upgrade7To8 upgrade7To8, // Upgrade8To9 upgrade8To9, // - Upgrade9To10 upgrade9To10) { + Upgrade9To10 upgrade9To10, // + Upgrade10To11 upgrade10To11 + ) { availableUpgrades = defineUpgrades( // upgrade0To1, // @@ -40,11 +42,8 @@ class DatabaseUpgrades { upgrade6To7, // upgrade7To8, // upgrade8To9, // - upgrade9To10); - } - - private static Comparator reverseOrder() { - return (a, b) -> b.compareTo(a); + upgrade9To10, // + upgrade10To11); } private Map> defineUpgrades(DatabaseUpgrade... upgrades) { @@ -56,7 +55,7 @@ class DatabaseUpgrades { result.get(upgrade.from()).add(upgrade); } for (List list : result.values()) { - Collections.sort(list, reverseOrder()); + Collections.sort(list, Comparator.reverseOrder()); } return result; } diff --git a/data/src/main/java/org/cryptomator/data/db/Upgrade10To11.kt b/data/src/main/java/org/cryptomator/data/db/Upgrade10To11.kt new file mode 100644 index 00000000..dffc9d36 --- /dev/null +++ b/data/src/main/java/org/cryptomator/data/db/Upgrade10To11.kt @@ -0,0 +1,25 @@ +package org.cryptomator.data.db + +import org.greenrobot.greendao.database.Database +import javax.inject.Inject +import javax.inject.Singleton + +@Singleton +internal class Upgrade10To11 @Inject constructor() : DatabaseUpgrade(10, 11) { + + private val onedriveCloudId = 3L + + override fun internalApplyTo(db: Database, origin: Int) { + db.beginTransaction() + try { + Sql.deleteFrom("CLOUD_ENTITY") + .where("_id", Sql.eq(onedriveCloudId)) + .where("TYPE", Sql.eq("ONEDRIVE")) + .executeOn(db) + + db.setTransactionSuccessful() + } finally { + db.endTransaction() + } + } +} diff --git a/domain/src/main/java/org/cryptomator/domain/OnedriveCloud.java b/domain/src/main/java/org/cryptomator/domain/OnedriveCloud.java index a56accf0..8791bb7e 100644 --- a/domain/src/main/java/org/cryptomator/domain/OnedriveCloud.java +++ b/domain/src/main/java/org/cryptomator/domain/OnedriveCloud.java @@ -55,7 +55,11 @@ public class OnedriveCloud implements Cloud { @Override public boolean configurationMatches(Cloud cloud) { - return true; + return cloud instanceof OnedriveCloud && configurationMatches((OnedriveCloud) cloud); + } + + private boolean configurationMatches(OnedriveCloud cloud) { + return username.equals(cloud.username); } @NotNull diff --git a/lib/msa-auth-for-android b/lib/msa-auth-for-android deleted file mode 160000 index e930a736..00000000 --- a/lib/msa-auth-for-android +++ /dev/null @@ -1 +0,0 @@ -Subproject commit e930a73612d0eee17710f5a9460c9a943efb090f diff --git a/presentation/build.gradle b/presentation/build.gradle index 90e807f5..3d63162c 100644 --- a/presentation/build.gradle +++ b/presentation/build.gradle @@ -3,6 +3,7 @@ apply plugin: 'kotlin-android' apply plugin: 'kotlin-kapt' apply plugin: 'kotlin-android-extensions' apply plugin: 'de.mannodermaus.android-junit5' +apply from: 'prebuild.gradle' android { signingConfigs { @@ -51,9 +52,10 @@ android { shrinkResources false buildConfigField "String", "DROPBOX_API_KEY", "\"" + getApiKey('DROPBOX_API_KEY') + "\"" - manifestPlaceholders = [DROPBOX_API_KEY: getApiKey('DROPBOX_API_KEY')] buildConfigField "String", "PCLOUD_CLIENT_ID", "\"" + getApiKey('PCLOUD_CLIENT_ID') + "\"" + manifestPlaceholders = [DROPBOX_API_KEY: getApiKey('DROPBOX_API_KEY'), ONEDRIVE_API_KEY_DECODED: getOnedriveApiKey()] + resValue "string", "app_id", androidApplicationId } @@ -66,9 +68,10 @@ android { testCoverageEnabled false buildConfigField "String", "DROPBOX_API_KEY", "\"" + getApiKey('DROPBOX_API_KEY_DEBUG') + "\"" - manifestPlaceholders = [DROPBOX_API_KEY: getApiKey('DROPBOX_API_KEY_DEBUG')] buildConfigField "String", "PCLOUD_CLIENT_ID", "\"" + getApiKey('PCLOUD_CLIENT_ID_DEBUG') + "\"" + manifestPlaceholders = [DROPBOX_API_KEY: getApiKey('DROPBOX_API_KEY_DEBUG'), ONEDRIVE_API_KEY_DECODED: getOnedriveApiKey()] + applicationIdSuffix ".debug" versionNameSuffix '-DEBUG' @@ -108,6 +111,7 @@ android { packagingOptions { exclude 'META-INF/jersey-module-version' + exclude 'META-INF/NOTICE.md' exclude 'META-INF/DEPENDENCIES' } } @@ -145,6 +149,7 @@ dependencies { // cloud implementation dependencies.dropbox implementation dependencies.msgraph + implementation dependencies.msgraphAuth playstoreImplementation(dependencies.googleApiServicesDrive) { exclude module: 'guava-jdk5' @@ -248,6 +253,13 @@ static def getApiKey(key) { return System.getenv().getOrDefault(key, "") } +static def getOnedriveApiKey() { + String onedrivePath = "" + getApiKey('ONEDRIVE_API_REDIRCT_URI') + String idStr = onedrivePath.substring(onedrivePath.lastIndexOf('/') + 1) + URI uri = new URI(idStr) + return uri.path +} + tasks.withType(Test) { testLogging { events "failed" diff --git a/presentation/prebuild.gradle b/presentation/prebuild.gradle new file mode 100644 index 00000000..b7a5e16c --- /dev/null +++ b/presentation/prebuild.gradle @@ -0,0 +1,36 @@ +import groovy.json.JsonOutput +import groovy.json.JsonSlurper + +task generateAppConfigurationFile() { + def jsonSlurper = new JsonSlurper() + + def apiKey = "" + getApiKey('ONEDRIVE_API_KEY') + def redirectUri = "" + getApiKey('ONEDRIVE_API_REDIRCT_URI') + + def jsonString = """ + { + "client_id" : "${apiKey}", + "authorization_user_agent" : "DEFAULT", + "redirect_uri" : "${redirectUri}", + "broker_redirect_uri_registered": true, + "shared_device_mode_supported": true, + "authorities" : [ + { + "type": "AAD", + "audience": { + "type": "AzureADandPersonalMicrosoftAccount", + "tenant_id": "common" + } + } + ] + }""" + + def config_file = new File('presentation/src/main/res/raw/auth_config_onedrive.json') + config_file.write(JsonOutput.prettyPrint(JsonOutput.toJson(jsonSlurper.parseText(jsonString)))) +} + +static def getApiKey(key) { + return System.getenv().getOrDefault(key, "") +} + +build.dependsOn generateAppConfigurationFile diff --git a/presentation/src/foss/java/org/cryptomator/presentation/presenter/AuthenticateCloudPresenter.kt b/presentation/src/foss/java/org/cryptomator/presentation/presenter/AuthenticateCloudPresenter.kt index eac080bf..f8e595d7 100644 --- a/presentation/src/foss/java/org/cryptomator/presentation/presenter/AuthenticateCloudPresenter.kt +++ b/presentation/src/foss/java/org/cryptomator/presentation/presenter/AuthenticateCloudPresenter.kt @@ -210,49 +210,113 @@ class AuthenticateCloudPresenter @Inject constructor( // } } - private inner class OnedriveAuthStrategy : AuthStrategy { + private fun startAuthentication(cloud: CloudModel) { + authenticationStarted = true - private var authenticationStarted = false - override fun supports(cloud: CloudModel): Boolean { - return cloud.cloudType() == CloudTypeModel.ONEDRIVE - } + PublicClientApplication.createMultipleAccountPublicClientApplication( + context(), + R.raw.auth_config_onedrive, + object : IPublicClientApplication.IMultipleAccountApplicationCreatedListener { + override fun onCreated(application: IMultipleAccountPublicClientApplication) { + application.getAccounts(object : IPublicClientApplication.LoadAccountsCallback { + override fun onTaskCompleted(accounts: List) { + if (accounts.isEmpty()) { + application.acquireToken(activity(), onedriveScopes(), getAuthInteractiveCallback(cloud)) + } else { + accounts.find { account -> account.username == cloud.username() }?.let { + application.acquireTokenSilentAsync( + onedriveScopes(), + it, + "https://login.microsoftonline.com/common", + getAuthSilentCallback(cloud, application) + ) + } ?: application.acquireToken(activity(), onedriveScopes(), getAuthInteractiveCallback(cloud)) + } + } - override fun resumed(intent: AuthenticateCloudIntent) { - if (!authenticationStarted) { - startAuthentication(intent.cloud()) - } - } - - private fun startAuthentication(cloud: CloudModel) { - authenticationStarted = true - val authenticationAdapter = OnedriveClientFactory.getAuthAdapter(context(), (cloud.toCloud() as OnedriveCloud).accessToken()) - authenticationAdapter.login(activity(), object : ICallback { - override fun success(accessToken: String?) { - if (accessToken == null) { - Timber.tag("AuthicateCloudPrester").e("Onedrive access token is empty") - failAuthentication(cloud.name()) - } else { - showProgress(ProgressModel(ProgressStateModel.AUTHENTICATION)) - handleAuthenticationResult(cloud, accessToken) - } + override fun onError(e: MsalException) { + Timber.tag("AuthenticateCloudPresenter").e(e, "Error to get accounts") + failAuthentication(cloud.name()) + } + }) } - override fun failure(ex: ClientException) { - Timber.tag("AuthicateCloudPrester").e(ex) + override fun onError(e: MsalException) { + Timber.tag("AuthenticateCloudPresenter").i(e, "Error in configuration") failAuthentication(cloud.name()) } }) - } + } - private fun handleAuthenticationResult(cloud: CloudModel, accessToken: String) { - getUsernameAndSuceedAuthentication( // - OnedriveCloud.aCopyOf(cloud.toCloud() as OnedriveCloud) // - .withAccessToken(accessToken) // - .build() - ) + private fun getAuthSilentCallback(cloud: CloudModel, application: IMultipleAccountPublicClientApplication): AuthenticationCallback { + return object : AuthenticationCallback { + + override fun onSuccess(authenticationResult: IAuthenticationResult) { + Timber.tag("AuthenticateCloudPresenter").i("Successfully authenticated") + handleAuthenticationResult(cloud, authenticationResult.accessToken) + } + + override fun onError(e: MsalException) { + Timber.tag("AuthenticateCloudPresenter").e(e, "Failed to acquireToken") + when (e) { + is MsalClientException -> { + /* Exception inside MSAL, more info inside MsalError.java */ + failAuthentication(cloud.name()) + } + is MsalServiceException -> { + /* Exception when communicating with the STS, likely config issue */ + failAuthentication(cloud.name()) + } + is MsalUiRequiredException -> { + /* Tokens expired or no session, retry with interactive */ + application.acquireToken(activity(), onedriveScopes(), getAuthInteractiveCallback(cloud)) + } + } + } + + override fun onCancel() { + Timber.tag("AuthenticateCloudPresenter").i("User cancelled login") + } } } + private fun getAuthInteractiveCallback(cloud: CloudModel): AuthenticationCallback { + return object : AuthenticationCallback { + + override fun onSuccess(authenticationResult: IAuthenticationResult) { + Timber.tag("AuthenticateCloudPresenter").i("Successfully authenticated") + handleAuthenticationResult(cloud, authenticationResult.accessToken, authenticationResult.account.username) + } + + override fun onError(e: MsalException) { + Timber.tag("AuthenticateCloudPresenter").e(e, "Successfully authenticated") + failAuthentication(cloud.name()) + } + + override fun onCancel() { + Timber.tag("AuthenticateCloudPresenter").i("User cancelled login") + } + } + } + + private fun handleAuthenticationResult(cloud: CloudModel, accessToken: String) { + getUsernameAndSuceedAuthentication( // + OnedriveCloud.aCopyOf(cloud.toCloud() as OnedriveCloud) // + .withAccessToken(encrypt(accessToken)) // + .build() + ) + } + + private fun handleAuthenticationResult(cloud: CloudModel, accessToken: String, username: String) { + getUsernameAndSuceedAuthentication( // + OnedriveCloud.aCopyOf(cloud.toCloud() as OnedriveCloud) // + .withAccessToken(encrypt(accessToken)) // + .withUsername(username) + .build() + ) + } +} + private inner class PCloudAuthStrategy : AuthStrategy { private var authenticationStarted = false @@ -512,6 +576,10 @@ class AuthenticateCloudPresenter @Inject constructor( // companion object { const val WEBDAV_ACCEPTED_UNTRUSTED_CERTIFICATE = "acceptedUntrustedCertificate" + + fun onedriveScopes(): Array { + return arrayOf("User.Read", "Files.ReadWrite") + } } init { diff --git a/presentation/src/main/AndroidManifest.xml b/presentation/src/main/AndroidManifest.xml index 5852673c..9c449d8b 100644 --- a/presentation/src/main/AndroidManifest.xml +++ b/presentation/src/main/AndroidManifest.xml @@ -159,6 +159,17 @@ + + + + + + + + requestActivityResult( - ActivityResultCallbacks.addChangeMultiCloud(), // - Intents.webDavAddOrChangeIntent() - ) - CloudTypeModel.PCLOUD -> { - requestActivityResult( - ActivityResultCallbacks.pCloudAuthenticationFinished(), // - Intents.authenticatePCloudIntent() - ) - } - CloudTypeModel.S3 -> requestActivityResult( - ActivityResultCallbacks.addChangeMultiCloud(), // - Intents.s3AddOrChangeIntent() - ) + CloudTypeModel.ONEDRIVE -> addOnedriveCloud() + CloudTypeModel.WEBDAV -> requestActivityResult(ActivityResultCallbacks.addChangeMultiCloud(), Intents.webDavAddOrChangeIntent()) + CloudTypeModel.PCLOUD -> requestActivityResult(ActivityResultCallbacks.pCloudAuthenticationFinished(), Intents.authenticatePCloudIntent()) + CloudTypeModel.S3 -> requestActivityResult(ActivityResultCallbacks.addChangeMultiCloud(), Intents.s3AddOrChangeIntent()) CloudTypeModel.LOCAL -> openDocumentTree() } } + private fun addOnedriveCloud() { + PublicClientApplication.createMultipleAccountPublicClientApplication( + context(), + R.raw.auth_config_onedrive, + object : IPublicClientApplication.IMultipleAccountApplicationCreatedListener { + override fun onCreated(application: IMultipleAccountPublicClientApplication) { + application.getAccounts(object : IPublicClientApplication.LoadAccountsCallback { + override fun onTaskCompleted(accounts: List) { + application.acquireToken(activity(), AuthenticateCloudPresenter.onedriveScopes(), getAuthInteractiveCallback()) + } + + override fun onError(e: MsalException) { + Timber.tag("AuthenticateCloudPresenter").e(e, "Error to get accounts") + showError(e); + } + }) + } + + override fun onError(e: MsalException) { + Timber.tag("AuthenticateCloudPresenter").i(e, "Error in configuration") + showError(e); + } + }) + } + + private fun getAuthInteractiveCallback(): AuthenticationCallback { + return object : AuthenticationCallback { + + override fun onSuccess(authenticationResult: IAuthenticationResult) { + Timber.tag("AuthenticateCloudPresenter").i("Successfully authenticated") + val accessToken = CredentialCryptor.getInstance(context()).encrypt(authenticationResult.accessToken) + val onedriveSkeleton = OnedriveCloud.aOnedriveCloud().withAccessToken(accessToken).withUsername(authenticationResult.account.username).build() + saveOnedriveCloud(onedriveSkeleton) + } + + override fun onError(e: MsalException) { + Timber.tag("AuthenticateCloudPresenter").e(e, "Successfully authenticated") + showError(e); + } + + override fun onCancel() { + Timber.tag("AuthenticateCloudPresenter").i("User cancelled login") + } + } + } + + private fun saveOnedriveCloud(onedriveSkeleton: OnedriveCloud) { + getUsernameUseCase // + .withCloud(onedriveSkeleton) // + .run(object : DefaultResultHandler() { + override fun onSuccess(username: String) { + prepareForSavingOnedriveCloud(OnedriveCloud.aCopyOf(onedriveSkeleton).withUsername(username).build()) + } + }) + } + + fun prepareForSavingOnedriveCloud(cloud: OnedriveCloud) { + getCloudsUseCase // + .withCloudType(CloudTypeModel.valueOf(selectedCloudType.get())) // + .run(object : DefaultResultHandler>() { + override fun onSuccess(clouds: List) { + clouds.firstOrNull { + (it as OnedriveCloud).username() == cloud.username() + }?.let { + saveCloud(OnedriveCloud.aCopyOf(it as OnedriveCloud).withAccessToken(cloud.accessToken()).build()) + Timber.tag("CloudConnListPresenter").i("OneDrive access token updated") + } ?: saveCloud(cloud) + } + }) + } + private fun openDocumentTree() { try { - requestActivityResult( // - ActivityResultCallbacks.pickedLocalStorageLocation(), // - Intent(Intent.ACTION_OPEN_DOCUMENT_TREE) - ) + requestActivityResult(ActivityResultCallbacks.pickedLocalStorageLocation(), Intent(Intent.ACTION_OPEN_DOCUMENT_TREE)) } catch (exception: ActivityNotFoundException) { - Toast // - .makeText( // - activity().applicationContext, // - context().getText(R.string.screen_cloud_local_error_no_content_provider), // - Toast.LENGTH_SHORT - ) // - .show() + Toast.makeText(activity().applicationContext, context().getText(R.string.screen_cloud_local_error_no_content_provider), Toast.LENGTH_SHORT).show() Timber.tag("CloudConnListPresenter").e(exception, "No ContentProvider on system") } } @@ -198,14 +258,8 @@ class CloudConnectionListPresenter @Inject constructor( // if (!code.isNullOrEmpty() && !hostname.isNullOrEmpty()) { Timber.tag("CloudConnectionListPresenter").i("PCloud OAuth code successfully retrieved") - - val accessToken = CredentialCryptor // - .getInstance(this.context()) // - .encrypt(code) - val pCloudSkeleton = PCloud.aPCloud() // - .withAccessToken(accessToken) - .withUrl(hostname) - .build(); + val accessToken = CredentialCryptor.getInstance(this.context()).encrypt(code) + val pCloudSkeleton = PCloud.aPCloud().withAccessToken(accessToken).withUrl(hostname).build(); getUsernameUseCase // .withCloud(pCloudSkeleton) // .run(object : DefaultResultHandler() { @@ -226,19 +280,14 @@ class CloudConnectionListPresenter @Inject constructor( // clouds.firstOrNull { (it as PCloud).username() == cloud.username() }?.let { - saveCloud( - PCloud.aCopyOf(it as PCloud) // - .withUrl(cloud.url()) - .withAccessToken(cloud.accessToken()) - .build() - ) + saveCloud(PCloud.aCopyOf(it as PCloud).withUrl(cloud.url()).withAccessToken(cloud.accessToken()).build()) view?.showDialog(PCloudCredentialsUpdatedDialog.newInstance(it.username())) } ?: saveCloud(cloud) } }) } - fun saveCloud(cloud: PCloud) { + fun saveCloud(cloud: Cloud) { addOrChangeCloudConnectionUseCase // .withCloud(cloud) // .run(object : DefaultResultHandler() { @@ -252,15 +301,13 @@ class CloudConnectionListPresenter @Inject constructor( // fun pickedLocalStorageLocation(result: ActivityResult) { val rootTreeUriOfLocalStorage = result.intent().data persistUriPermission(rootTreeUriOfLocalStorage) - addOrChangeCloudConnectionUseCase.withCloud( - LocalStorageCloud.aLocalStorage() // - .withRootUri(rootTreeUriOfLocalStorage.toString()) // - .build() - ).run(object : DefaultResultHandler() { - override fun onSuccess(void: Void?) { - loadCloudList() - } - }) + addOrChangeCloudConnectionUseCase + .withCloud(LocalStorageCloud.aLocalStorage().withRootUri(rootTreeUriOfLocalStorage.toString()).build()) + .run(object : DefaultResultHandler() { + override fun onSuccess(void: Void?) { + loadCloudList() + } + }) } private fun persistUriPermission(rootTreeUriOfLocalStorage: Uri?) { diff --git a/presentation/src/main/java/org/cryptomator/presentation/presenter/CloudSettingsPresenter.kt b/presentation/src/main/java/org/cryptomator/presentation/presenter/CloudSettingsPresenter.kt index 9117574b..79ca7a35 100644 --- a/presentation/src/main/java/org/cryptomator/presentation/presenter/CloudSettingsPresenter.kt +++ b/presentation/src/main/java/org/cryptomator/presentation/presenter/CloudSettingsPresenter.kt @@ -2,6 +2,7 @@ package org.cryptomator.presentation.presenter import org.cryptomator.domain.Cloud import org.cryptomator.domain.LocalStorageCloud +import org.cryptomator.domain.OnedriveCloud import org.cryptomator.domain.PCloud import org.cryptomator.domain.S3Cloud import org.cryptomator.domain.WebDavCloud @@ -18,6 +19,7 @@ import org.cryptomator.presentation.intent.Intents import org.cryptomator.presentation.model.CloudModel import org.cryptomator.presentation.model.CloudTypeModel import org.cryptomator.presentation.model.LocalStorageModel +import org.cryptomator.presentation.model.OnedriveCloudModel import org.cryptomator.presentation.model.PCloudModel import org.cryptomator.presentation.model.S3CloudModel import org.cryptomator.presentation.model.WebDavCloudModel @@ -39,6 +41,7 @@ class CloudSettingsPresenter @Inject constructor( // private val nonSingleLoginClouds: Set = EnumSet.of( // CloudTypeModel.CRYPTO, // CloudTypeModel.LOCAL, // + CloudTypeModel.ONEDRIVE, // CloudTypeModel.PCLOUD, // CloudTypeModel.S3, // CloudTypeModel.WEBDAV @@ -95,6 +98,7 @@ class CloudSettingsPresenter @Inject constructor( // private fun effectiveTitle(cloudTypeModel: CloudTypeModel): String { when (cloudTypeModel) { + CloudTypeModel.ONEDRIVE -> return context().getString(R.string.screen_cloud_settings_onedrive_connections) CloudTypeModel.PCLOUD -> return context().getString(R.string.screen_cloud_settings_pcloud_connections) CloudTypeModel.WEBDAV -> return context().getString(R.string.screen_cloud_settings_webdav_connections) CloudTypeModel.S3 -> return context().getString(R.string.screen_cloud_settings_s3_connections) @@ -130,6 +134,7 @@ class CloudSettingsPresenter @Inject constructor( // .filter { cloud -> !(BuildConfig.FLAVOR == "fdroid" && cloud.cloudType() == CloudTypeModel.GOOGLE_DRIVE) } // .toMutableList() // .also { + it.add(aOnedriveCloud()) it.add(aPCloud()) it.add(aWebdavCloud()) it.add(aS3Cloud()) @@ -138,6 +143,10 @@ class CloudSettingsPresenter @Inject constructor( // view?.render(cloudModel) } + private fun aOnedriveCloud(): OnedriveCloudModel { + return OnedriveCloudModel(OnedriveCloud.aOnedriveCloud().build()) + } + private fun aPCloud(): PCloudModel { return PCloudModel(PCloud.aPCloud().build()) } diff --git a/presentation/src/main/java/org/cryptomator/presentation/ui/adapter/CloudConnectionListAdapter.kt b/presentation/src/main/java/org/cryptomator/presentation/ui/adapter/CloudConnectionListAdapter.kt index f2cedc79..ea6c6f70 100644 --- a/presentation/src/main/java/org/cryptomator/presentation/ui/adapter/CloudConnectionListAdapter.kt +++ b/presentation/src/main/java/org/cryptomator/presentation/ui/adapter/CloudConnectionListAdapter.kt @@ -7,6 +7,7 @@ import org.cryptomator.domain.exception.FatalBackendException import org.cryptomator.presentation.R import org.cryptomator.presentation.model.CloudModel import org.cryptomator.presentation.model.LocalStorageModel +import org.cryptomator.presentation.model.OnedriveCloudModel import org.cryptomator.presentation.model.PCloudModel import org.cryptomator.presentation.model.S3CloudModel import org.cryptomator.presentation.model.WebDavCloudModel @@ -55,6 +56,9 @@ internal constructor(context: Context) : RecyclerViewBaseAdapter { + bindOnedriveCloudModel(cloudModel) + } is WebDavCloudModel -> { bindWebDavCloudModel(cloudModel) } @@ -70,6 +74,12 @@ internal constructor(context: Context) : RecyclerViewBaseAdapter itemView.cloudName.text = context.getString(R.string.screen_cloud_settings_onedrive_connections) CloudTypeModel.PCLOUD -> itemView.cloudName.text = context.getString(R.string.screen_cloud_settings_pcloud_connections) CloudTypeModel.S3 -> itemView.cloudName.text = context.getString(R.string.screen_cloud_settings_s3_connections) CloudTypeModel.WEBDAV -> itemView.cloudName.text = context.getString(R.string.screen_cloud_settings_webdav_connections) diff --git a/presentation/src/main/java/org/cryptomator/presentation/ui/bottomsheet/CloudConnectionSettingsBottomSheet.kt b/presentation/src/main/java/org/cryptomator/presentation/ui/bottomsheet/CloudConnectionSettingsBottomSheet.kt index 6d967b51..ffdc6167 100644 --- a/presentation/src/main/java/org/cryptomator/presentation/ui/bottomsheet/CloudConnectionSettingsBottomSheet.kt +++ b/presentation/src/main/java/org/cryptomator/presentation/ui/bottomsheet/CloudConnectionSettingsBottomSheet.kt @@ -7,6 +7,7 @@ import org.cryptomator.presentation.R import org.cryptomator.presentation.model.CloudModel import org.cryptomator.presentation.model.CloudTypeModel import org.cryptomator.presentation.model.LocalStorageModel +import org.cryptomator.presentation.model.OnedriveCloudModel import org.cryptomator.presentation.model.PCloudModel import org.cryptomator.presentation.model.S3CloudModel import org.cryptomator.presentation.model.WebDavCloudModel @@ -29,6 +30,7 @@ class CloudConnectionSettingsBottomSheet : BaseBottomSheet bindViewForOnedrive(cloudModel as OnedriveCloudModel) CloudTypeModel.WEBDAV -> bindViewForWebDAV(cloudModel as WebDavCloudModel) CloudTypeModel.PCLOUD -> bindViewForPCloud(cloudModel as PCloudModel) CloudTypeModel.S3 -> bindViewForS3(cloudModel as S3CloudModel) @@ -57,6 +59,11 @@ class CloudConnectionSettingsBottomSheet : BaseBottomSheet @string/screen_settings_cloud_settings_label + OneDrive connections WebDAV connections pCloud connections S3 connections diff --git a/presentation/src/notFoss/java/org/cryptomator/presentation/presenter/AuthenticateCloudPresenter.kt b/presentation/src/notFoss/java/org/cryptomator/presentation/presenter/AuthenticateCloudPresenter.kt index 7e12859b..f0454849 100644 --- a/presentation/src/notFoss/java/org/cryptomator/presentation/presenter/AuthenticateCloudPresenter.kt +++ b/presentation/src/notFoss/java/org/cryptomator/presentation/presenter/AuthenticateCloudPresenter.kt @@ -9,9 +9,16 @@ import android.widget.Toast import com.dropbox.core.android.Auth import com.google.api.client.googleapis.extensions.android.gms.auth.GoogleAccountCredential import com.google.api.services.drive.DriveScopes -import org.cryptomator.data.cloud.onedrive.OnedriveClientFactory -import org.cryptomator.data.cloud.onedrive.graph.ClientException -import org.cryptomator.data.cloud.onedrive.graph.ICallback +import com.microsoft.identity.client.AuthenticationCallback +import com.microsoft.identity.client.IAccount +import com.microsoft.identity.client.IAuthenticationResult +import com.microsoft.identity.client.IMultipleAccountPublicClientApplication +import com.microsoft.identity.client.IPublicClientApplication +import com.microsoft.identity.client.PublicClientApplication +import com.microsoft.identity.client.exception.MsalClientException +import com.microsoft.identity.client.exception.MsalException +import com.microsoft.identity.client.exception.MsalServiceException +import com.microsoft.identity.client.exception.MsalUiRequiredException import org.cryptomator.data.util.X509CertificateHelper import org.cryptomator.domain.Cloud import org.cryptomator.domain.CloudType @@ -35,7 +42,6 @@ import org.cryptomator.generator.Callback import org.cryptomator.presentation.BuildConfig import org.cryptomator.presentation.R import org.cryptomator.presentation.exception.ExceptionHandlers -import org.cryptomator.presentation.exception.PermissionNotGrantedException import org.cryptomator.presentation.intent.AuthenticateCloudIntent import org.cryptomator.presentation.intent.Intents import org.cryptomator.presentation.model.CloudModel @@ -151,10 +157,6 @@ class AuthenticateCloudPresenter @Inject constructor( // finish() } - private fun failAuthentication(error: PermissionNotGrantedException) { - finishWithResult(error) - } - private inner class DropboxAuthStrategy : AuthStrategy { private var authenticationStarted = false @@ -271,29 +273,106 @@ class AuthenticateCloudPresenter @Inject constructor( // private fun startAuthentication(cloud: CloudModel) { authenticationStarted = true - val authenticationAdapter = OnedriveClientFactory.getAuthAdapter(context(), (cloud.toCloud() as OnedriveCloud).accessToken()) - authenticationAdapter.login(activity(), object : ICallback { - override fun success(accessToken: String?) { - if (accessToken == null) { - Timber.tag("AuthicateCloudPrester").e("Onedrive access token is empty") + + PublicClientApplication.createMultipleAccountPublicClientApplication( + context(), + R.raw.auth_config_onedrive, + object : IPublicClientApplication.IMultipleAccountApplicationCreatedListener { + override fun onCreated(application: IMultipleAccountPublicClientApplication) { + application.getAccounts(object : IPublicClientApplication.LoadAccountsCallback { + override fun onTaskCompleted(accounts: List) { + if (accounts.isEmpty()) { + application.acquireToken(activity(), onedriveScopes(), getAuthInteractiveCallback(cloud)) + } else { + accounts.find { account -> account.username == cloud.username() }?.let { + application.acquireTokenSilentAsync( + onedriveScopes(), + it, + "https://login.microsoftonline.com/common", + getAuthSilentCallback(cloud, application) + ) + } ?: application.acquireToken(activity(), onedriveScopes(), getAuthInteractiveCallback(cloud)) + } + } + + override fun onError(e: MsalException) { + Timber.tag("AuthenticateCloudPresenter").e(e, "Error to get accounts") + failAuthentication(cloud.name()) + } + }) + } + + override fun onError(e: MsalException) { + Timber.tag("AuthenticateCloudPresenter").i(e, "Error in configuration") failAuthentication(cloud.name()) - } else { - showProgress(ProgressModel(ProgressStateModel.AUTHENTICATION)) - handleAuthenticationResult(cloud, accessToken) + } + }) + } + + private fun getAuthSilentCallback(cloud: CloudModel, application: IMultipleAccountPublicClientApplication): AuthenticationCallback { + return object : AuthenticationCallback { + + override fun onSuccess(authenticationResult: IAuthenticationResult) { + Timber.tag("AuthenticateCloudPresenter").i("Successfully authenticated") + handleAuthenticationResult(cloud, authenticationResult.accessToken) + } + + override fun onError(e: MsalException) { + Timber.tag("AuthenticateCloudPresenter").e(e, "Failed to acquireToken") + when (e) { + is MsalClientException -> { + /* Exception inside MSAL, more info inside MsalError.java */ + failAuthentication(cloud.name()) + } + is MsalServiceException -> { + /* Exception when communicating with the STS, likely config issue */ + failAuthentication(cloud.name()) + } + is MsalUiRequiredException -> { + /* Tokens expired or no session, retry with interactive */ + application.acquireToken(activity(), onedriveScopes(), getAuthInteractiveCallback(cloud)) + } } } - override fun failure(ex: ClientException) { - Timber.tag("AuthicateCloudPrester").e(ex) + override fun onCancel() { + Timber.tag("AuthenticateCloudPresenter").i("User cancelled login") + } + } + } + + private fun getAuthInteractiveCallback(cloud: CloudModel): AuthenticationCallback { + return object : AuthenticationCallback { + + override fun onSuccess(authenticationResult: IAuthenticationResult) { + Timber.tag("AuthenticateCloudPresenter").i("Successfully authenticated") + handleAuthenticationResult(cloud, authenticationResult.accessToken, authenticationResult.account.username) + } + + override fun onError(e: MsalException) { + Timber.tag("AuthenticateCloudPresenter").e(e, "Successfully authenticated") failAuthentication(cloud.name()) } - }) + + override fun onCancel() { + Timber.tag("AuthenticateCloudPresenter").i("User cancelled login") + } + } } private fun handleAuthenticationResult(cloud: CloudModel, accessToken: String) { getUsernameAndSuceedAuthentication( // OnedriveCloud.aCopyOf(cloud.toCloud() as OnedriveCloud) // - .withAccessToken(accessToken) // + .withAccessToken(encrypt(accessToken)) // + .build() + ) + } + + private fun handleAuthenticationResult(cloud: CloudModel, accessToken: String, username: String) { + getUsernameAndSuceedAuthentication( // + OnedriveCloud.aCopyOf(cloud.toCloud() as OnedriveCloud) // + .withAccessToken(encrypt(accessToken)) // + .withUsername(username) .build() ) } @@ -558,6 +637,10 @@ class AuthenticateCloudPresenter @Inject constructor( // companion object { const val WEBDAV_ACCEPTED_UNTRUSTED_CERTIFICATE = "acceptedUntrustedCertificate" + + fun onedriveScopes(): Array { + return arrayOf("User.Read", "Files.ReadWrite") + } } init { diff --git a/settings.gradle b/settings.gradle index 6398dc17..cf7883a7 100644 --- a/settings.gradle +++ b/settings.gradle @@ -1,8 +1,7 @@ -include ':generator', ':presentation', ':generator-api', ':domain', ':data', ':util', ':msa-auth-for-android', ':pcloud-sdk-java-root', ':pcloud-sdk-java', ':subsampling-image-view' +include ':generator', ':presentation', ':generator-api', ':domain', ':data', ':util', ':pcloud-sdk-java-root', ':pcloud-sdk-java', ':subsampling-image-view' var libFolder = new File(rootDir, 'lib') -project(':msa-auth-for-android').projectDir = file(new File(libFolder, 'msa-auth-for-android')) project(':pcloud-sdk-java-root').projectDir = file(new File(libFolder, 'pcloud-sdk-java')) project(':pcloud-sdk-java').projectDir = file(new File(libFolder, 'pcloud-sdk-java/java-core')) project(':subsampling-image-view').projectDir = file(new File(libFolder, 'subsampling-scale-image-view/library'))