diff --git a/.gitmodules b/.gitmodules
index f3a2516e..4f05b334 100644
--- a/.gitmodules
+++ b/.gitmodules
@@ -1,6 +1,3 @@
-[submodule "msa-auth-for-android"]
- path = lib/msa-auth-for-android
- url = https://github.com/SailReal/msa-auth-for-android.git
[submodule "subsampling-scale-image-view"]
path = lib/subsampling-scale-image-view
url = https://github.com/SailReal/subsampling-scale-image-view.git
diff --git a/.idea/vcs.xml b/.idea/vcs.xml
index 65b6cf64..a51d7b33 100755
--- a/.idea/vcs.xml
+++ b/.idea/vcs.xml
@@ -2,8 +2,7 @@
-
-
+
\ No newline at end of file
diff --git a/buildsystem/dependencies.gradle b/buildsystem/dependencies.gradle
index a2915e48..a12e59f0 100644
--- a/buildsystem/dependencies.gradle
+++ b/buildsystem/dependencies.gradle
@@ -2,12 +2,25 @@ allprojects {
repositories {
mavenCentral()
maven { url 'https://jitpack.io' }
+ // needed for 'com.microsoft.device.display' required by 'com.microsoft.graph:microsoft-graph'
+ exclusiveContent {
+ forRepository {
+ maven {
+ url 'https://pkgs.dev.azure.com/MicrosoftDeviceSDK/DuoSDK-Public/_packaging/Duo-SDK-Feed/maven/v1'
+ name 'Duo-SDK-Feed'
+ }
+ }
+ filter {
+ // this repository *only* contains artifacts with group "com.microsoft.device.display"
+ includeGroup "com.microsoft.device.display"
+ }
+ }
}
}
ext {
androidBuildToolsVersion = "30.0.2"
- androidMinSdkVersion = 24
+ androidMinSdkVersion = 26
androidTargetSdkVersion = 30
androidCompileSdkVersion = 30
@@ -63,7 +76,8 @@ ext {
*/
trackingFreeGoogleCLientVersion = '1.41.1'
- msgraphVersion = '2.10.0'
+ msgraphVersion = '5.12.0'
+ msgraphAuthVersion = '2.2.3'
minIoVersion = '8.3.5'
staxVersion = '1.2.0' // needed for minIO
@@ -139,6 +153,7 @@ ext {
mockitoInline : "org.mockito:mockito-inline:${mockitoVersion}",
mockitoKotlin : "org.mockito.kotlin:mockito-kotlin:${mockitoKotlinVersion}",
msgraph : "com.microsoft.graph:microsoft-graph:${msgraphVersion}",
+ msgraphAuth : "com.microsoft.identity.client:msal:${msgraphAuthVersion}",
multidex : "androidx.multidex:multidex:${multidexVersion}",
okHttp : "com.squareup.okhttp3:okhttp:${okHttpVersion}",
okHttpDigest : "io.github.rburgst:okhttp-digest:${okHttpDigestVersion}",
diff --git a/data/build.gradle b/data/build.gradle
index 4d2111a2..d401ab6a 100644
--- a/data/build.gradle
+++ b/data/build.gradle
@@ -78,11 +78,12 @@ android {
packagingOptions {
exclude 'META-INF/DEPENDENCIES'
+ exclude 'META-INF/NOTICE.md'
}
}
greendao {
- schemaVersion 10
+ schemaVersion 11
}
configurations.all {
@@ -95,7 +96,6 @@ dependencies {
implementation project(':domain')
implementation project(':util')
- implementation project(':msa-auth-for-android')
implementation project(':pcloud-sdk-java')
coreLibraryDesugaring dependencies.coreDesugaring
@@ -115,6 +115,7 @@ dependencies {
// cloud
implementation dependencies.dropbox
+ implementation dependencies.msgraphAuth
implementation dependencies.msgraph
implementation dependencies.stax
diff --git a/data/src/androidTest/java/org/cryptomator/data/db/UpgradeDatabaseTest.kt b/data/src/androidTest/java/org/cryptomator/data/db/UpgradeDatabaseTest.kt
index 1e0ad4c0..a2c19c7f 100644
--- a/data/src/androidTest/java/org/cryptomator/data/db/UpgradeDatabaseTest.kt
+++ b/data/src/androidTest/java/org/cryptomator/data/db/UpgradeDatabaseTest.kt
@@ -51,6 +51,7 @@ class UpgradeDatabaseTest {
Upgrade7To8().applyTo(db, 7)
Upgrade8To9(sharedPreferencesHandler).applyTo(db, 8)
Upgrade9To10(sharedPreferencesHandler).applyTo(db, 9)
+ Upgrade10To11().applyTo(db, 10)
CloudEntityDao(DaoConfig(db, CloudEntityDao::class.java)).loadAll()
VaultEntityDao(DaoConfig(db, VaultEntityDao::class.java)).loadAll()
@@ -470,4 +471,42 @@ class UpgradeDatabaseTest {
Assert.assertThat(sharedPreferencesHandler.vaultsRemovedDuringMigration(), CoreMatchers.`is`(Pair("LOCAL", arrayListOf("pathOfVault26"))))
}
+ @Test
+ fun upgrade10To11() {
+ Upgrade0To1().applyTo(db, 0)
+ Upgrade1To2().applyTo(db, 1)
+ Upgrade2To3(context).applyTo(db, 2)
+ Upgrade3To4().applyTo(db, 3)
+ Upgrade4To5().applyTo(db, 4)
+ Upgrade5To6().applyTo(db, 5)
+ Upgrade6To7().applyTo(db, 6)
+ Upgrade7To8().applyTo(db, 7)
+ Upgrade8To9(sharedPreferencesHandler).applyTo(db, 8)
+ Upgrade9To10(sharedPreferencesHandler).applyTo(db, 9)
+
+ Sql.insertInto("VAULT_ENTITY") //
+ .integer("_id", 25) //
+ .integer("FOLDER_CLOUD_ID", 3) //
+ .text("FOLDER_PATH", "path") //
+ .text("FOLDER_NAME", "name") //
+ .text("CLOUD_TYPE", CloudType.ONEDRIVE.name) //
+ .text("PASSWORD", "password") //
+ .integer("POSITION", 10) //
+ .executeOn(db)
+
+ Sql.query("CLOUD_ENTITY").executeOn(db).use {
+ Assert.assertThat(it.count, CoreMatchers.`is`(3))
+ }
+
+ Upgrade10To11().applyTo(db, 10)
+
+ Sql.query("VAULT_ENTITY").executeOn(db).use {
+ Assert.assertThat(it.count, CoreMatchers.`is`(1))
+ }
+
+ Sql.query("CLOUD_ENTITY").executeOn(db).use {
+ Assert.assertThat(it.count, CoreMatchers.`is`(2))
+ }
+ }
+
}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/MSAAuthAndroidAdapterImpl.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/MSAAuthAndroidAdapterImpl.java
deleted file mode 100644
index 1cf2556c..00000000
--- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/MSAAuthAndroidAdapterImpl.java
+++ /dev/null
@@ -1,25 +0,0 @@
-package org.cryptomator.data.cloud.onedrive;
-
-import android.content.Context;
-
-import org.cryptomator.data.BuildConfig;
-import org.cryptomator.data.cloud.onedrive.graph.MSAAuthAndroidAdapter;
-
-public class MSAAuthAndroidAdapterImpl extends MSAAuthAndroidAdapter {
-
- private static final String[] SCOPES = new String[] {"https://graph.microsoft.com/Files.ReadWrite", "offline_access", "openid"};
-
- public MSAAuthAndroidAdapterImpl(Context context, String refreshToken) {
- super(context, refreshToken);
- }
-
- @Override
- public String getClientId() {
- return BuildConfig.ONEDRIVE_API_KEY;
- }
-
- @Override
- public String[] getScopes() {
- return SCOPES;
- }
-}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveClientFactory.kt b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveClientFactory.kt
index 272071b5..27ac7cf5 100644
--- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveClientFactory.kt
+++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveClientFactory.kt
@@ -1,68 +1,59 @@
package org.cryptomator.data.cloud.onedrive
import android.content.Context
-import com.microsoft.graph.authentication.IAuthenticationProvider
-import com.microsoft.graph.core.DefaultClientConfig
-import com.microsoft.graph.models.extensions.IGraphServiceClient
-import com.microsoft.graph.requests.extensions.GraphServiceClient
-import org.cryptomator.data.cloud.okhttplogging.HttpLoggingInterceptor
-import org.cryptomator.data.cloud.onedrive.graph.MSAAuthAndroidAdapter
-import org.cryptomator.data.util.NetworkTimeout
-import okhttp3.Interceptor
-import okhttp3.OkHttpClient
+import com.microsoft.graph.authentication.BaseAuthenticationProvider
+import com.microsoft.graph.logger.ILogger
+import com.microsoft.graph.logger.LoggerLevel
+import com.microsoft.graph.requests.GraphServiceClient
+import org.cryptomator.util.SharedPreferencesHandler
+import org.cryptomator.util.crypto.CredentialCryptor
+import java.net.URL
+import java.util.concurrent.CompletableFuture
+import okhttp3.Request
import timber.log.Timber
+
class OnedriveClientFactory private constructor() {
companion object {
- @Volatile
- private var instance: IGraphServiceClient? = null
-
- @Volatile
- private var authenticationAdapter: MSAAuthAndroidAdapter? = null
-
- @Synchronized
- fun getInstance(context: Context, refreshToken: String?): IGraphServiceClient = instance ?: createClient(context, refreshToken).also { instance = it }
-
- @Synchronized
- fun getAuthAdapter(context: Context, refreshToken: String?): MSAAuthAndroidAdapter = authenticationAdapter ?: MSAAuthAndroidAdapterImpl(context, refreshToken).also { authenticationAdapter = it }
-
- private fun createClient(context: Context, refreshToken: String?): IGraphServiceClient {
- val builder = OkHttpClient() //
- .newBuilder() //
- .connectTimeout(NetworkTimeout.CONNECTION.timeout, NetworkTimeout.CONNECTION.unit) //
- .readTimeout(NetworkTimeout.READ.timeout, NetworkTimeout.READ.unit) //
- .writeTimeout(NetworkTimeout.WRITE.timeout, NetworkTimeout.WRITE.unit) //
- .addInterceptor(httpLoggingInterceptor(context))
-
- val onedriveHttpProvider = OnedriveHttpProvider(object : DefaultClientConfig() {
- override fun getAuthenticationProvider(): IAuthenticationProvider {
- return getAuthAdapter(context, refreshToken)
- }
- }, builder.build())
-
- return GraphServiceClient //
- .builder() //
- .authenticationProvider(authenticationAdapter) //
- .httpProvider(onedriveHttpProvider) //
- .buildClient()
- }
-
-
- private fun httpLoggingInterceptor(context: Context): Interceptor {
- val logger = object : HttpLoggingInterceptor.Logger {
- override fun log(message: String) {
- Timber.tag("OkHttp").d(message)
+ fun createInstance(context: Context, token: String?, sharedPreferencesHandler: SharedPreferencesHandler): GraphServiceClient {
+ val tokenAuthenticationProvider = object : BaseAuthenticationProvider() {
+ override fun getAuthorizationTokenAsync(requestUrl: URL): CompletableFuture {
+ return if (shouldAuthenticateRequestWithUrl(requestUrl)) {
+ val decryptedToken = CredentialCryptor.getInstance(context).decrypt(token)
+ CompletableFuture.completedFuture(decryptedToken)
+ } else {
+ CompletableFuture.completedFuture(null)
+ }
}
}
- return HttpLoggingInterceptor(logger, context)
- }
+ return GraphServiceClient //
+ .builder() //
+ .authenticationProvider(tokenAuthenticationProvider) //
+ .logger(object : ILogger {
+ override fun getLoggingLevel(): LoggerLevel {
+ return if(sharedPreferencesHandler.debugMode()) {
+ LoggerLevel.DEBUG
+ } else {
+ LoggerLevel.ERROR
+ }
+ }
- @Synchronized
- fun logout() {
- instance = null
+ override fun logDebug(message: String) {
+ Timber.tag("OnedriveClientFactory").d(message)
+ }
+
+ override fun logError(message: String, throwable: Throwable?) {
+ Timber.tag("OnedriveClientFactory").e(throwable, message)
+ }
+
+ override fun setLoggingLevel(level: LoggerLevel) {
+ TODO("Not yet implemented") // FIXME
+ }
+ })
+ .buildClient()
}
}
}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepository.kt b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepository.kt
index 6db19a32..4c91ad33 100644
--- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepository.kt
+++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepository.kt
@@ -2,8 +2,10 @@ package org.cryptomator.data.cloud.onedrive
import android.content.Context
import com.microsoft.graph.core.GraphErrorCodes
+import com.microsoft.graph.http.GraphServiceException
+import com.microsoft.graph.requests.GraphServiceClient
+import com.microsoft.identity.common.exception.ClientException
import org.cryptomator.data.cloud.InterceptingCloudContentRepository
-import org.cryptomator.data.cloud.onedrive.graph.ClientException
import org.cryptomator.domain.OnedriveCloud
import org.cryptomator.domain.exception.BackendException
import org.cryptomator.domain.exception.FatalBackendException
@@ -20,8 +22,10 @@ import java.io.File
import java.io.IOException
import java.io.OutputStream
import java.net.SocketTimeoutException
+import okhttp3.Request
-internal class OnedriveCloudContentRepository(private val cloud: OnedriveCloud, context: Context) : InterceptingCloudContentRepository(Intercepted(cloud, context)) {
+internal class OnedriveCloudContentRepository(private val cloud: OnedriveCloud, context: Context, graphServiceClient: GraphServiceClient)
+ : InterceptingCloudContentRepository(Intercepted(cloud, context, graphServiceClient)) {
@Throws(BackendException::class)
override fun throwWrappedIfRequired(e: Exception) {
@@ -38,19 +42,21 @@ internal class OnedriveCloudContentRepository(private val cloud: OnedriveCloud,
private fun throwWrongCredentialsExceptionIfRequired(e: Exception) {
if (isAuthenticationError(e)) {
+ logout(cloud)
throw WrongCredentialsException(cloud)
}
}
private fun isAuthenticationError(e: Throwable?): Boolean {
return (e != null //
- && (e is ClientException && e.errorCode() == GraphErrorCodes.AUTHENTICATION_FAILURE //
+ && (e is ClientException && e.errorCode == GraphErrorCodes.AUTHENTICATION_FAILURE.name //
+ || e is GraphServiceException && e.serviceError?.code?.equals("InvalidAuthenticationToken") == true
|| isAuthenticationError(e.cause)))
}
- private class Intercepted(cloud: OnedriveCloud, context: Context) : CloudContentRepository {
+ private class Intercepted(cloud: OnedriveCloud, context: Context, graphServiceClient: GraphServiceClient) : CloudContentRepository {
- private val oneDriveImpl: OnedriveImpl = OnedriveImpl(cloud, context, OnedriveIdCache())
+ private val oneDriveImpl: OnedriveImpl = OnedriveImpl(cloud, context, graphServiceClient, OnedriveIdCache())
override fun root(cloud: OnedriveCloud): OnedriveFolder {
return oneDriveImpl.root()
@@ -141,7 +147,7 @@ internal class OnedriveCloudContentRepository(private val cloud: OnedriveCloud,
@Throws(BackendException::class)
override fun checkAuthenticationAndRetrieveCurrentAccount(cloud: OnedriveCloud): String {
- return oneDriveImpl.currentAccount()
+ return oneDriveImpl.currentAccount(cloud.username())
}
override fun logout(cloud: OnedriveCloud) {
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepositoryFactory.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepositoryFactory.java
index 243f8039..badaf5e3 100644
--- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepositoryFactory.java
+++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepositoryFactory.java
@@ -1,25 +1,28 @@
package org.cryptomator.data.cloud.onedrive;
+import static org.cryptomator.domain.CloudType.ONEDRIVE;
+
import android.content.Context;
import org.cryptomator.data.repository.CloudContentRepositoryFactory;
import org.cryptomator.domain.Cloud;
import org.cryptomator.domain.OnedriveCloud;
import org.cryptomator.domain.repository.CloudContentRepository;
+import org.cryptomator.util.SharedPreferencesHandler;
import javax.inject.Inject;
import javax.inject.Singleton;
-import static org.cryptomator.domain.CloudType.ONEDRIVE;
-
@Singleton
public class OnedriveCloudContentRepositoryFactory implements CloudContentRepositoryFactory {
private final Context context;
+ private final SharedPreferencesHandler sharedPreferencesHandler;
@Inject
- public OnedriveCloudContentRepositoryFactory(Context context) {
+ public OnedriveCloudContentRepositoryFactory(Context context, SharedPreferencesHandler sharedPreferencesHandler) {
this.context = context;
+ this.sharedPreferencesHandler = sharedPreferencesHandler;
}
@Override
@@ -29,6 +32,7 @@ public class OnedriveCloudContentRepositoryFactory implements CloudContentReposi
@Override
public CloudContentRepository cloudContentRepositoryFor(Cloud cloud) {
- return new OnedriveCloudContentRepository((OnedriveCloud) cloud, context);
+ OnedriveCloud onedriveCloud = (OnedriveCloud) cloud;
+ return new OnedriveCloudContentRepository(onedriveCloud, context, OnedriveClientFactory.Companion.createInstance(context, onedriveCloud.accessToken(), sharedPreferencesHandler));
}
}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudNodeFactory.kt b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudNodeFactory.kt
index 85aa7b45..3d0036ee 100644
--- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudNodeFactory.kt
+++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudNodeFactory.kt
@@ -1,6 +1,7 @@
package org.cryptomator.data.cloud.onedrive
-import com.microsoft.graph.models.extensions.DriveItem
+import com.microsoft.graph.models.DriveItem
+import org.cryptomator.domain.exception.FatalBackendException
import java.util.Date
internal object OnedriveCloudNodeFactory {
@@ -15,11 +16,15 @@ internal object OnedriveCloudNodeFactory {
}
private fun file(parent: OnedriveFolder, item: DriveItem): OnedriveFile {
- return OnedriveFile(parent, item.name, getNodePath(parent, item.name), item.size, lastModified(item))
+ item.name?.let {
+ return OnedriveFile(parent, it, getNodePath(parent, it), item.size, lastModified(item))
+ } ?: throw FatalBackendException("Item name shouldn't be null")
}
fun file(parent: OnedriveFolder, item: DriveItem, lastModified: Date?): OnedriveFile {
- return OnedriveFile(parent, item.name, getNodePath(parent, item.name), item.size, lastModified)
+ item.name?.let {
+ return OnedriveFile(parent, it, getNodePath(parent, it), item.size, lastModified)
+ } ?: throw FatalBackendException("Item name shouldn't be null")
}
fun file(parent: OnedriveFolder, name: String, size: Long?): OnedriveFile {
@@ -31,7 +36,9 @@ internal object OnedriveCloudNodeFactory {
}
fun folder(parent: OnedriveFolder, item: DriveItem): OnedriveFolder {
- return OnedriveFolder(parent, item.name, getNodePath(parent, item.name))
+ item.name?.let {
+ return OnedriveFolder(parent, it, getNodePath(parent, it))
+ } ?: throw FatalBackendException("Item name shouldn't be null")
}
fun folder(parent: OnedriveFolder, name: String): OnedriveFolder {
@@ -48,25 +55,27 @@ internal object OnedriveCloudNodeFactory {
@JvmStatic
fun getId(item: DriveItem): String {
- return if (item.remoteItem != null) item.remoteItem.id
- else item.id
+ return if (item.remoteItem != null) item.remoteItem?.id!!
+ else item.id!!
}
@JvmStatic
fun getDriveId(item: DriveItem): String? {
return when {
- item.remoteItem != null -> item.remoteItem.parentReference.driveId
- item.parentReference != null -> item.parentReference.driveId
+ item.remoteItem != null -> item.remoteItem?.parentReference?.driveId
+ item.parentReference != null -> item.parentReference?.driveId
else -> null
}
}
@JvmStatic
fun isFolder(item: DriveItem): Boolean {
- return item.folder != null || item.remoteItem != null && item.remoteItem.folder != null
+ return item.folder != null || item.remoteItem != null && item.remoteItem?.folder != null
}
private fun lastModified(item: DriveItem): Date? {
- return item.lastModifiedDateTime?.time
+ return item.lastModifiedDateTime?.let {
+ return Date.from(it.toInstant())
+ }
}
}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveHttpProvider.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveHttpProvider.java
deleted file mode 100644
index f3910ac0..00000000
--- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveHttpProvider.java
+++ /dev/null
@@ -1,575 +0,0 @@
-// ------------------------------------------------------------------------------
-// Copyright (c) 2015 Microsoft Corporation
-//
-// Permission is hereby granted, free of charge, to any person obtaining a copy
-// of this software and associated documentation files (the "Software"), to deal
-// in the Software without restriction, including without limitation the rights
-// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
-// copies of the Software, and to permit persons to whom the Software is
-// furnished to do so, subject to the following conditions:
-//
-// The above copyright notice and this permission notice shall be included in
-// all copies or substantial portions of the Software.
-//
-// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF WILDCARD_MIME_TYPE KIND, EXPRESS OR
-// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
-// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
-// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR WILDCARD_MIME_TYPE CLAIM, DAMAGES OR OTHER
-// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
-// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
-// THE SOFTWARE.
-// ------------------------------------------------------------------------------
-package org.cryptomator.data.cloud.onedrive;
-
-import com.google.common.annotations.VisibleForTesting;
-import com.microsoft.graph.authentication.IAuthenticationProvider;
-import com.microsoft.graph.concurrency.ICallback;
-import com.microsoft.graph.concurrency.IExecutors;
-import com.microsoft.graph.concurrency.IProgressCallback;
-import com.microsoft.graph.core.ClientException;
-import com.microsoft.graph.core.Constants;
-import com.microsoft.graph.core.DefaultConnectionConfig;
-import com.microsoft.graph.core.IClientConfig;
-import com.microsoft.graph.core.IConnectionConfig;
-import com.microsoft.graph.http.GraphServiceException;
-import com.microsoft.graph.http.HttpMethod;
-import com.microsoft.graph.http.HttpResponseCode;
-import com.microsoft.graph.http.HttpResponseHeadersHelper;
-import com.microsoft.graph.http.IHttpProvider;
-import com.microsoft.graph.http.IHttpRequest;
-import com.microsoft.graph.http.IStatefulResponseHandler;
-import com.microsoft.graph.httpcore.HttpClients;
-import com.microsoft.graph.httpcore.ICoreAuthenticationProvider;
-import com.microsoft.graph.httpcore.middlewareoption.RedirectOptions;
-import com.microsoft.graph.httpcore.middlewareoption.RetryOptions;
-import com.microsoft.graph.logger.ILogger;
-import com.microsoft.graph.logger.LoggerLevel;
-import com.microsoft.graph.options.HeaderOption;
-import com.microsoft.graph.serializer.ISerializer;
-
-import org.jetbrains.annotations.NotNull;
-
-import java.io.BufferedInputStream;
-import java.io.BufferedOutputStream;
-import java.io.ByteArrayInputStream;
-import java.io.IOException;
-import java.io.InputStream;
-import java.io.OutputStream;
-import java.io.UnsupportedEncodingException;
-import java.net.URL;
-import java.util.Collections;
-import java.util.List;
-import java.util.Map;
-import java.util.Scanner;
-import java.util.concurrent.TimeUnit;
-
-import okhttp3.MediaType;
-import okhttp3.OkHttpClient;
-import okhttp3.Protocol;
-import okhttp3.Request;
-import okhttp3.RequestBody;
-import okhttp3.Response;
-import okio.BufferedSink;
-
-/**
- * Http provider based off of URLConnection.
- */
-public class OnedriveHttpProvider implements IHttpProvider {
-
- private final HttpResponseHeadersHelper responseHeadersHelper = new HttpResponseHeadersHelper();
-
- /**
- * The serializer
- */
- private final ISerializer serializer;
-
- /**
- * The authentication provider
- */
- private final IAuthenticationProvider authenticationProvider;
-
- /**
- * The executors
- */
- private final IExecutors executors;
-
- /**
- * The logger
- */
- private final ILogger logger;
-
- /**
- * The connection config
- */
- private IConnectionConfig connectionConfig;
-
- /**
- * The OkHttpClient that handles all requests
- */
- private OkHttpClient corehttpClient;
-
- /**
- * Creates the DefaultHttpProvider
- *
- * @param serializer the serializer
- * @param authenticationProvider the authentication provider
- * @param executors the executors
- * @param logger the logger for diagnostic information
- */
- public OnedriveHttpProvider(final ISerializer serializer, final IAuthenticationProvider authenticationProvider, final IExecutors executors, final ILogger logger) {
- this.serializer = serializer;
- this.authenticationProvider = authenticationProvider;
- this.executors = executors;
- this.logger = logger;
- }
-
- /**
- * Creates the DefaultHttpProvider
- *
- * @param clientConfig the client configuration to use for the provider
- * @param httpClient the http client to execute the requests with
- */
- public OnedriveHttpProvider(final IClientConfig clientConfig, final OkHttpClient httpClient) {
- this(clientConfig.getSerializer(), clientConfig.getAuthenticationProvider(), clientConfig.getExecutors(), clientConfig.getLogger());
- this.corehttpClient = httpClient;
- }
-
- /**
- * Reads in a stream and converts it into a string
- *
- * @param input the response body stream
- * @return the string result
- */
- public static String streamToString(final InputStream input) {
- final String httpStreamEncoding = "UTF-8";
- final String endOfFile = "\\A";
- final Scanner scanner = new Scanner(input, httpStreamEncoding);
- String scannerString = "";
- try {
- scanner.useDelimiter(endOfFile);
- scannerString = scanner.next();
- } finally {
- scanner.close();
- }
- return scannerString;
- }
-
- /**
- * Searches for the given header in a list of HeaderOptions
- *
- * @param headers the list of headers to search through
- * @param header the header name to search for (case insensitive)
- * @return true if the header has already been set
- */
- @VisibleForTesting
- static boolean hasHeader(List headers, String header) {
- for (HeaderOption option : headers) {
- if (option.getName().equalsIgnoreCase(header)) {
- return true;
- }
- }
- return false;
- }
-
- /**
- * Gets the serializer for this HTTP provider
- *
- * @return the serializer for this provider
- */
- @Override
- public ISerializer getSerializer() {
- return serializer;
- }
-
- /**
- * Sends the HTTP request asynchronously
- *
- * @param request the request description
- * @param callback the callback to be called after success or failure
- * @param resultClass the class of the response from the service
- * @param serializable the object to send to the service in the body of the request
- * @param the type of the response object
- * @param the type of the object to send to the service in the body of the request
- */
- @Override
- public void send(final IHttpRequest request, final ICallback super Result> callback, final Class resultClass, final Body serializable) {
- final IProgressCallback super Result> progressCallback;
- if (callback instanceof IProgressCallback) {
- progressCallback = (IProgressCallback super Result>) callback;
- } else {
- progressCallback = null;
- }
-
- executors.performOnBackground(() -> {
- try {
- executors.performOnForeground(sendRequestInternal(request, resultClass, serializable, progressCallback, null), callback);
- } catch (final ClientException e) {
- executors.performOnForeground(e, callback);
- }
- });
- }
-
- /**
- * Sends the HTTP request
- *
- * @param request the request description
- * @param resultClass the class of the response from the service
- * @param serializable the object to send to the service in the body of the request
- * @param the type of the response object
- * @param the type of the object to send to the service in the body of the request
- * @return the result from the request
- * @throws ClientException an exception occurs if the request was unable to complete for any reason
- */
- @Override
- public Result send(final IHttpRequest request, final Class resultClass, final Body serializable) throws ClientException {
- return send(request, resultClass, serializable, null);
- }
-
- /**
- * Sends the HTTP request
- *
- * @param request the request description
- * @param resultClass the class of the response from the service
- * @param serializable the object to send to the service in the body of the request
- * @param handler the handler for stateful response
- * @param the type of the response object
- * @param the type of the object to send to the service in the body of the request
- * @param the response handler for stateful response
- * @return the result from the request
- * @throws ClientException this exception occurs if the request was unable to complete for any reason
- */
- public Result send(final IHttpRequest request, final Class resultClass, final Body serializable, final IStatefulResponseHandler handler) throws ClientException {
- return sendRequestInternal(request, resultClass, serializable, null, handler);
- }
-
- /**
- * Sends the HTTP request
- *
- * @param request the request description
- * @param resultClass the class of the response from the service
- * @param serializable the object to send to the service in the body of the request
- * @param progress the progress callback for the request
- * @param the type of the response object
- * @param the type of the object to send to the service in the body of the request
- * @return the result from the request
- * @throws ClientException an exception occurs if the request was unable to complete for any reason
- */
- public Request getHttpRequest(final IHttpRequest request, final Class resultClass, final Body serializable, final IProgressCallback super Result> progress) throws ClientException {
- final int defaultBufferSize = 4096;
-
- final URL requestUrl = request.getRequestUrl();
- logger.logDebug("Starting to send request, URL " + requestUrl.toString());
-
- if (this.connectionConfig == null) {
- this.connectionConfig = new DefaultConnectionConfig();
- }
-
- // Request level middleware options
- RedirectOptions redirectOptions = new RedirectOptions(request.getMaxRedirects() > 0 ? request.getMaxRedirects() : this.connectionConfig.getMaxRedirects(), request.getShouldRedirect() != null ? request.getShouldRedirect() : this.connectionConfig.getShouldRedirect());
- RetryOptions retryOptions = new RetryOptions(request.getShouldRetry() != null ? request.getShouldRetry() : this.connectionConfig.getShouldRetry(), request.getMaxRetries() > 0 ? request.getMaxRetries() : this.connectionConfig.getMaxRetries(), request.getDelay() > 0 ? request.getDelay() : this.connectionConfig.getDelay());
-
- Request coreHttpRequest = convertIHttpRequestToOkHttpRequest(request);
- Request.Builder corehttpRequestBuilder = coreHttpRequest.newBuilder().tag(RedirectOptions.class, redirectOptions).tag(RetryOptions.class, retryOptions);
-
- String contenttype = null;
-
- logger.logDebug("Request Method " + request.getHttpMethod().toString());
- List requestHeaders = request.getHeaders();
-
- for (HeaderOption headerOption : requestHeaders) {
- if (headerOption.getName().equalsIgnoreCase(Constants.CONTENT_TYPE_HEADER_NAME)) {
- contenttype = headerOption.getValue().toString();
- break;
- }
- }
-
- final byte[] bytesToWrite;
- corehttpRequestBuilder.addHeader("Accept", "*/*");
- if (serializable == null) {
- // Send an empty body through with a POST request
- // This ensures that the Content-Length header is properly set
- if (request.getHttpMethod() == HttpMethod.POST) {
- bytesToWrite = new byte[0];
- if (contenttype == null) {
- contenttype = Constants.BINARY_CONTENT_TYPE;
- }
- } else {
- bytesToWrite = null;
- }
- } else if (serializable instanceof byte[]) {
- logger.logDebug("Sending byte[] as request body");
- bytesToWrite = (byte[]) serializable;
-
- // If the user hasn't specified a Content-Type for the request
- if (!hasHeader(requestHeaders, Constants.CONTENT_TYPE_HEADER_NAME)) {
- corehttpRequestBuilder.addHeader(Constants.CONTENT_TYPE_HEADER_NAME, Constants.BINARY_CONTENT_TYPE);
- contenttype = Constants.BINARY_CONTENT_TYPE;
- }
- } else {
- logger.logDebug("Sending " + serializable.getClass().getName() + " as request body");
- final String serializeObject = serializer.serializeObject(serializable);
- try {
- bytesToWrite = serializeObject.getBytes(Constants.JSON_ENCODING);
- } catch (final UnsupportedEncodingException ex) {
- final ClientException clientException = new ClientException("Unsupported encoding problem: ", ex);
- logger.logError("Unsupported encoding problem: " + ex.getMessage(), ex);
- throw clientException;
- }
-
- // If the user hasn't specified a Content-Type for the request
- if (!hasHeader(requestHeaders, Constants.CONTENT_TYPE_HEADER_NAME)) {
- corehttpRequestBuilder.addHeader(Constants.CONTENT_TYPE_HEADER_NAME, Constants.JSON_CONTENT_TYPE);
- contenttype = Constants.JSON_CONTENT_TYPE;
- }
- }
-
- RequestBody requestBody = null;
- // Handle cases where we've got a body to process.
- if (bytesToWrite != null) {
- final String mediaContentType = contenttype;
- requestBody = new RequestBody() {
- @Override
- public long contentLength() {
- return bytesToWrite.length;
- }
-
- @Override
- public void writeTo(@NotNull BufferedSink sink) throws IOException {
- OutputStream out = sink.outputStream();
- int writtenSoFar = 0;
- BufferedOutputStream bos = new BufferedOutputStream(out);
- int toWrite;
- do {
- toWrite = Math.min(defaultBufferSize, bytesToWrite.length - writtenSoFar);
- bos.write(bytesToWrite, writtenSoFar, toWrite);
- writtenSoFar = writtenSoFar + toWrite;
- if (progress != null) {
- executors.performOnForeground(writtenSoFar, bytesToWrite.length, progress);
- }
- } while (toWrite > 0);
- bos.close();
- out.close();
- }
-
- @Override
- public MediaType contentType() {
- return MediaType.parse(mediaContentType);
- }
- };
- }
-
- corehttpRequestBuilder.method(request.getHttpMethod().toString(), requestBody);
- return corehttpRequestBuilder.build();
- }
-
- /**
- * Sends the HTTP request
- *
- * @param request the request description
- * @param resultClass the class of the response from the service
- * @param serializable the object to send to the service in the body of the request
- * @param progress the progress callback for the request
- * @param handler the handler for stateful response
- * @param the type of the response object
- * @param the type of the object to send to the service in the body of the request
- * @param the response handler for stateful response
- * @return the result from the request
- * @throws ClientException an exception occurs if the request was unable to complete for any reason
- */
- @SuppressWarnings("unchecked")
- private Result sendRequestInternal(final IHttpRequest request, final Class resultClass, final Body serializable, final IProgressCallback super Result> progress, final IStatefulResponseHandler handler) throws ClientException {
-
- try {
- if (this.connectionConfig == null) {
- this.connectionConfig = new DefaultConnectionConfig();
- }
- if (this.corehttpClient == null) {
- final ICoreAuthenticationProvider authProvider = request1 -> request1;
- this.corehttpClient = HttpClients.createDefault(authProvider).newBuilder().connectTimeout(connectionConfig.getConnectTimeout(), TimeUnit.MILLISECONDS).readTimeout(connectionConfig.getReadTimeout(), TimeUnit.MILLISECONDS).followRedirects(false) // TODO https://github.com/microsoftgraph/msgraph-sdk-java/issues/516
- .protocols(Collections.singletonList(Protocol.HTTP_1_1)) // https://stackoverflow.com/questions/62031298/sockettimeout-on-java-11-but-not-on-java-8
- .build();
- }
- if (authenticationProvider != null) { // TODO https://github.com/microsoftgraph/msgraph-sdk-java/issues/517
- authenticationProvider.authenticateRequest(request);
- }
- Request coreHttpRequest = getHttpRequest(request, resultClass, serializable, progress);
- Response response = corehttpClient.newCall(coreHttpRequest).execute();
- InputStream in = null;
- boolean isBinaryStreamInput = false;
- try {
-
- // Call being executed
-
- if (handler != null) {
- handler.configConnection(response);
- }
-
- logger.logDebug(String.format("Response code %d, %s", response.code(), response.message()));
-
- if (handler != null) {
- logger.logDebug("StatefulResponse is handling the HTTP response.");
- return handler.generateResult(request, response, this.getSerializer(), this.logger);
- }
-
- if (response.code() >= HttpResponseCode.HTTP_CLIENT_ERROR) {
- logger.logDebug("Handling error response");
- in = response.body().byteStream();
- handleErrorResponse(request, serializable, response);
- }
-
- if (response.code() == HttpResponseCode.HTTP_NOBODY || response.code() == HttpResponseCode.HTTP_NOT_MODIFIED) {
- logger.logDebug("Handling response with no body");
- return handleEmptyResponse(responseHeadersHelper.getResponseHeadersAsMapOfStringList(response), resultClass);
- }
-
- if (response.code() == HttpResponseCode.HTTP_ACCEPTED) {
- logger.logDebug("Handling accepted response");
- return handleEmptyResponse(responseHeadersHelper.getResponseHeadersAsMapOfStringList(response), resultClass);
- }
-
- in = new BufferedInputStream(response.body().byteStream());
-
- final Map headers = responseHeadersHelper.getResponseHeadersAsMapStringString(response);
-
- if (response.body() == null || response.body().contentLength() == 0) {
- return (Result) null;
- }
-
- final String contentType = headers.get(Constants.CONTENT_TYPE_HEADER_NAME);
- if (contentType != null && resultClass != InputStream.class && contentType.contains(Constants.JSON_CONTENT_TYPE)) {
- logger.logDebug("Response json");
- return handleJsonResponse(in, responseHeadersHelper.getResponseHeadersAsMapOfStringList(response), resultClass);
- } else if (resultClass == InputStream.class) {
- logger.logDebug("Response binary");
- isBinaryStreamInput = true;
- return (Result) handleBinaryStream(in);
- } else {
- return (Result) null;
- }
- } finally {
- if (!isBinaryStreamInput) {
- try {
- if (in != null) {
- in.close();
- }
- } catch (IOException e) {
- logger.logError(e.getMessage(), e);
- }
- if (response != null) {
- response.close();
- }
- }
- }
- } catch (final GraphServiceException ex) {
- final boolean shouldLogVerbosely = logger.getLoggingLevel() == LoggerLevel.DEBUG;
- logger.logError("Graph service exception " + ex.getMessage(shouldLogVerbosely), ex);
- throw ex;
- } catch (final Exception ex) {
- final ClientException clientException = new ClientException("Error during http request", ex);
- logger.logError("Error during http request", clientException);
- throw clientException;
- }
- }
-
- private Request convertIHttpRequestToOkHttpRequest(IHttpRequest request) {
- if (request != null) {
- Request.Builder requestBuilder = new Request.Builder();
- requestBuilder.url(request.getRequestUrl());
- for (final HeaderOption header : request.getHeaders()) {
- requestBuilder.addHeader(header.getName(), header.getValue().toString());
- }
- return requestBuilder.build();
- }
- return null;
- }
-
- /**
- * Handles the event of an error response
- *
- * @param request the request that caused the failed response
- * @param serializable the body of the request
- * @param connection the URL connection
- * @param the type of the request body
- * @throws IOException an exception occurs if there were any problems interacting with the connection object
- */
- private void handleErrorResponse(final IHttpRequest request, final Body serializable, final Response response) throws IOException {
- throw GraphServiceException.createFromConnection(request, serializable, serializer, response, logger);
- }
-
- /**
- * Handles the cause where the response is a binary stream
- *
- * @param in the input stream from the response
- * @return the input stream to return to the caller
- */
- private InputStream handleBinaryStream(final InputStream in) {
- return in;
- }
-
- /**
- * Handles the cause where the response is a JSON object
- *
- * @param in the input stream from the response
- * @param responseHeaders the response header
- * @param clazz the class of the response object
- * @param the type of the response object
- * @return the JSON object
- */
- private Result handleJsonResponse(final InputStream in, Map> responseHeaders, final Class clazz) {
- if (clazz == null) {
- return null;
- }
-
- final String rawJson = streamToString(in);
- return getSerializer().deserializeObject(rawJson, clazz, responseHeaders);
- }
-
- /**
- * Handles the case where the response body is empty
- *
- * @param responseHeaders the response headers
- * @param clazz the type of the response object
- * @return the JSON object
- */
- private Result handleEmptyResponse(Map> responseHeaders, final Class clazz) throws UnsupportedEncodingException {
- // Create an empty object to attach the response headers to
- InputStream in = new ByteArrayInputStream("{}".getBytes(Constants.JSON_ENCODING));
- return handleJsonResponse(in, responseHeaders, clazz);
- }
-
- @VisibleForTesting
- public ILogger getLogger() {
- return logger;
- }
-
- @VisibleForTesting
- public IExecutors getExecutors() {
- return executors;
- }
-
- @VisibleForTesting
- public IAuthenticationProvider getAuthenticationProvider() {
- return authenticationProvider;
- }
-
- /**
- * Get connection config for read and connect timeout in requests
- *
- * @return Connection configuration to be used for timeout values
- */
- public IConnectionConfig getConnectionConfig() {
- if (this.connectionConfig == null) {
- this.connectionConfig = new DefaultConnectionConfig();
- }
- return connectionConfig;
- }
-
- /**
- * Set connection config for read and connect timeout in requests
- *
- * @param connectionConfig Connection configuration to be used for timeout values
- */
- public void setConnectionConfig(IConnectionConfig connectionConfig) {
- this.connectionConfig = connectionConfig;
- }
-}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveImpl.kt b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveImpl.kt
index 2e3343ed..116f3ffa 100644
--- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveImpl.kt
+++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveImpl.kt
@@ -2,26 +2,25 @@ package org.cryptomator.data.cloud.onedrive
import android.content.Context
import android.net.Uri
-import com.microsoft.graph.concurrency.ChunkedUploadProvider
import com.microsoft.graph.http.GraphServiceException
-import com.microsoft.graph.models.extensions.DriveItem
-import com.microsoft.graph.models.extensions.DriveItemUploadableProperties
-import com.microsoft.graph.models.extensions.Folder
-import com.microsoft.graph.models.extensions.IGraphServiceClient
-import com.microsoft.graph.models.extensions.ItemReference
+import com.microsoft.graph.models.DriveItem
+import com.microsoft.graph.models.DriveItemCreateUploadSessionParameterSet
+import com.microsoft.graph.models.DriveItemUploadableProperties
+import com.microsoft.graph.models.Folder
+import com.microsoft.graph.models.ItemReference
import com.microsoft.graph.options.Option
import com.microsoft.graph.options.QueryOption
-import com.microsoft.graph.requests.extensions.IDriveRequestBuilder
+import com.microsoft.graph.requests.DriveRequestBuilder
+import com.microsoft.graph.requests.GraphServiceClient
+import com.microsoft.graph.tasks.LargeFileUploadTask
import com.tomclaw.cache.DiskLruCache
import org.cryptomator.data.cloud.onedrive.OnedriveCloudNodeFactory.folder
import org.cryptomator.data.cloud.onedrive.OnedriveCloudNodeFactory.from
import org.cryptomator.data.cloud.onedrive.OnedriveCloudNodeFactory.getDriveId
import org.cryptomator.data.cloud.onedrive.OnedriveCloudNodeFactory.getId
import org.cryptomator.data.cloud.onedrive.OnedriveCloudNodeFactory.isFolder
-import org.cryptomator.data.cloud.onedrive.graph.ClientException
-import org.cryptomator.data.cloud.onedrive.graph.ICallback
-import org.cryptomator.data.cloud.onedrive.graph.IProgressCallback
import org.cryptomator.data.util.CopyStream
+import org.cryptomator.data.util.TransferredBytesAwareInputStream
import org.cryptomator.data.util.TransferredBytesAwareOutputStream
import org.cryptomator.domain.OnedriveCloud
import org.cryptomator.domain.exception.BackendException
@@ -45,22 +44,20 @@ import java.util.ArrayList
import java.util.Date
import java.util.concurrent.CompletableFuture
import java.util.concurrent.ExecutionException
+import okhttp3.Request
import timber.log.Timber
-internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCache: OnedriveIdCache) {
+internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, graphServiceClient: GraphServiceClient, nodeInfoCache: OnedriveIdCache) {
private val cloud: OnedriveCloud
private val context: Context
+ private val graphServiceClient: GraphServiceClient
private val nodeInfoCache: OnedriveIdCache
private val sharedPreferencesHandler: SharedPreferencesHandler
private var diskLruCache: DiskLruCache? = null
- private fun client(): IGraphServiceClient {
- return OnedriveClientFactory.getInstance(context, cloud.accessToken())
- }
-
- private fun drive(driveId: String?): IDriveRequestBuilder {
- return if (driveId == null) client().me().drive() else client().drives(driveId)
+ private fun drive(driveId: String?): DriveRequestBuilder {
+ return if (driveId == null) graphServiceClient.me().drive() else graphServiceClient.drives(driveId)
}
fun root(): OnedriveFolder {
@@ -90,11 +87,7 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach
private fun childByName(parentId: String, parentDriveId: String, name: String): DriveItem? {
return try {
- drive(parentDriveId) //
- .items(parentId) //
- .itemWithPath(Uri.encode(name)) //
- .buildRequest() //
- .get()
+ drive(parentDriveId).items(parentId).itemWithPath(Uri.encode(name)).buildRequest().get()
} catch (e: GraphServiceException) {
if (isNotFoundError(e)) {
null
@@ -138,18 +131,14 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach
fun list(folder: OnedriveFolder): List {
val result: MutableList = ArrayList()
val nodeInfo = requireNodeInfo(folder)
- var page = drive(nodeInfo.driveId) //
- .items(nodeInfo.id) //
- .children() //
- .buildRequest() //
- .get()
+ var page = drive(nodeInfo.driveId).items(nodeInfo.id).children().buildRequest().get()
do {
removeChildNodeInfo(folder)
- page.currentPage?.forEach {
+ page?.currentPage?.forEach {
result.add(cacheNodeInfo(from(folder, it), it))
}
- page = if (page.nextPage != null) {
- page.nextPage.buildRequest().get()
+ page = if (page?.nextPage != null) {
+ page.nextPage?.buildRequest()?.get()
} else {
null
}
@@ -170,10 +159,7 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach
folderToCreate.name = folder.name
folderToCreate.folder = Folder()
val parentNodeInfo = requireNodeInfo(parentFolder)
- val createdFolder = drive(parentNodeInfo.driveId) //
- .items(parentNodeInfo.id).children() //
- .buildRequest() //
- .post(folderToCreate)
+ val createdFolder = drive(parentNodeInfo.driveId).items(parentNodeInfo.id).children().buildRequest().post(folderToCreate)
return cacheNodeInfo(folder(parentFolder, createdFolder), createdFolder)
} ?: throw ParentFolderIsNullException(folder.name)
}
@@ -192,12 +178,10 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach
targetParentReference.driveId = targetNodeInfo?.driveId
targetItem.parentReference = targetParentReference
val sourceNodeInfo = requireNodeInfo(source)
- val movedItem = drive(sourceNodeInfo.driveId) //
- .items(sourceNodeInfo.id) //
- .buildRequest() //
- .patch(targetItem)
- removeNodeInfo(source)
- return cacheNodeInfo(from(targetsParent, movedItem), movedItem)
+ drive(sourceNodeInfo.driveId).items(sourceNodeInfo.id).buildRequest().patch(targetItem)?.let {
+ removeNodeInfo(source)
+ return cacheNodeInfo(from(targetsParent, it), it)
+ } ?: throw FatalBackendException("Failed to move file, response is null")
} ?: throw ParentFolderIsNullException(target.name)
}
@@ -214,7 +198,7 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach
val conflictBehaviorOption: Option = QueryOption("@name.conflictBehavior", uploadMode)
val result = CompletableFuture()
if (size <= CHUNKED_UPLOAD_MAX_SIZE) {
- uploadFile(file, data, progressAware, result, conflictBehaviorOption)
+ uploadFile(file, data, progressAware, result, conflictBehaviorOption, size)
} else {
try {
chunkedUploadFile(file, data, progressAware, result, conflictBehaviorOption, size)
@@ -233,88 +217,67 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach
}
@Throws(NoSuchCloudFileException::class)
- private fun uploadFile( //
- file: OnedriveFile, //
- data: DataSource, //
- progressAware: ProgressAware, //
- result: CompletableFuture, //
- conflictBehaviorOption: Option
- ) {
- val parentNodeInfo = requireNodeInfo(file.parent)
- try {
- data.open(context)?.use { inputStream ->
- drive(parentNodeInfo.driveId) //
- .items(parentNodeInfo.id) //
- .itemWithPath(file.name) //
- .content() //
- .buildRequest(listOf(conflictBehaviorOption)) //
- .put(CopyStream.toByteArray(inputStream), object : IProgressCallback {
- override fun progress(current: Long, max: Long) {
- progressAware //
- .onProgress(
- Progress.progress(UploadState.upload(file)) //
- .between(0) //
- .and(max) //
- .withValue(current)
- )
+ private fun uploadFile(file: OnedriveFile, data: DataSource, progressAware: ProgressAware, result: CompletableFuture, conflictBehaviorOption: Option, size: Long) {
+ data.open(context)?.use { inputStream ->
+ object : TransferredBytesAwareInputStream(inputStream) {
+ override fun bytesTransferred(transferred: Long) {
+ progressAware.onProgress(Progress.progress(UploadState.upload(file)).between(0).and(size).withValue(transferred))
+ }
+ }.use {
+ val parentNodeInfo = requireNodeInfo(file.parent)
+ try {
+ drive(parentNodeInfo.driveId) //
+ .items(parentNodeInfo.id) //
+ .itemWithPath(file.name) //
+ .content() //
+ .buildRequest(listOf(conflictBehaviorOption)) //
+ .putAsync(CopyStream.toByteArray(it)) //
+ .whenComplete { driveItem, error ->
+ run {
+ if (error == null) {
+ progressAware.onProgress(Progress.completed(UploadState.upload(file)))
+ result.complete(driveItem)
+ cacheNodeInfo(file, driveItem)
+ } else {
+ result.completeExceptionally(error)
+ }
+ }
}
-
- override fun success(item: DriveItem) {
- progressAware.onProgress(Progress.completed(UploadState.upload(file)))
- result.complete(item)
- cacheNodeInfo(file, item)
- }
-
- override fun failure(ex: com.microsoft.graph.core.ClientException) {
- result.completeExceptionally(ex)
- }
- })
- } ?: throw FatalBackendException("InputStream shouldn't be null")
- } catch (e: IOException) {
- throw FatalBackendException(e)
- }
+ } catch (e: IOException) {
+ throw FatalBackendException(e)
+ }
+ }
+ } ?: throw FatalBackendException("InputStream shouldn't bee null")
}
@Throws(IOException::class, NoSuchCloudFileException::class)
- private fun chunkedUploadFile( //
- file: OnedriveFile, //
- data: DataSource, //
- progressAware: ProgressAware, //
- result: CompletableFuture, //
- conflictBehaviorOption: Option, //
- size: Long
- ) {
+ private fun chunkedUploadFile(file: OnedriveFile, data: DataSource, progressAware: ProgressAware, result: CompletableFuture, conflictBehaviorOption: Option, size: Long) {
val parentNodeInfo = requireNodeInfo(file.parent)
- val uploadSession = drive(parentNodeInfo.driveId) //
+ drive(parentNodeInfo.driveId) //
.items(parentNodeInfo.id) //
.itemWithPath(file.name) //
- .createUploadSession(DriveItemUploadableProperties()) //
+ .createUploadSession(DriveItemCreateUploadSessionParameterSet.newBuilder().withItem(DriveItemUploadableProperties()).build()) //
.buildRequest() //
- .post()
- data.open(context).use { inputStream ->
- ChunkedUploadProvider(uploadSession, client(), inputStream, size, DriveItem::class.java) //
- .upload(listOf(conflictBehaviorOption), object : IProgressCallback {
- override fun progress(current: Long, max: Long) {
- progressAware.onProgress(
- Progress //
- .progress(UploadState.upload(file)) //
- .between(0) //
- .and(max) //
- .withValue(current)
- )
- }
-
- override fun success(item: DriveItem) {
- progressAware.onProgress(Progress.completed(UploadState.upload(file)))
- result.complete(item)
- cacheNodeInfo(file, item)
- }
-
- override fun failure(ex: com.microsoft.graph.core.ClientException) {
- result.completeExceptionally(ex)
- }
- }, CHUNKED_UPLOAD_CHUNK_SIZE, CHUNKED_UPLOAD_MAX_ATTEMPTS)
- }
+ .post()?.let { uploadSession ->
+ data.open(context)?.use { inputStream ->
+ LargeFileUploadTask(uploadSession, graphServiceClient, inputStream, size, DriveItem::class.java) //
+ .uploadAsync(CHUNKED_UPLOAD_CHUNK_SIZE, listOf(conflictBehaviorOption)) { current, max ->
+ progressAware.onProgress(
+ Progress.progress(UploadState.upload(file)).between(0).and(max).withValue(current)
+ )
+ }.whenComplete { driveItemResult, error ->
+ run {
+ if (error == null && driveItemResult.responseBody != null) {
+ progressAware.onProgress(Progress.completed(UploadState.upload(file)))
+ result.complete(driveItemResult.responseBody)
+ cacheNodeInfo(file, driveItemResult.responseBody!!)
+ } else {
+ result.completeExceptionally(error)
+ }
+ }
+ }
+ } ?: throw FatalBackendException("InputStream shouldn't bee null")
+ } ?: throw FatalBackendException("Failed to create upload session, response is null")
}
@Throws(BackendException::class, IOException::class)
@@ -340,27 +303,12 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach
}
@Throws(IOException::class)
- private fun writeToData(
- file: OnedriveFile, //
- nodeInfo: OnedriveIdCache.NodeInfo, //
- data: OutputStream, //
- encryptedTmpFile: File?, //
- cacheKey: String?, //
- progressAware: ProgressAware
- ) {
- val request = drive(nodeInfo.driveId) //
- .items(nodeInfo.id) //
- .content() //
- .buildRequest()
- request.get().use { inputStream ->
+ private fun writeToData(file: OnedriveFile, nodeInfo: OnedriveIdCache.NodeInfo, data: OutputStream, encryptedTmpFile: File?, cacheKey: String?, progressAware: ProgressAware) {
+ val request = drive(nodeInfo.driveId).items(nodeInfo.id).content().buildRequest()
+ request.get()?.use { inputStream ->
object : TransferredBytesAwareOutputStream(data) {
override fun bytesTransferred(transferred: Long) {
- progressAware.onProgress( //
- Progress.progress(DownloadState.download(file)) //
- .between(0) //
- .and(file.size ?: Long.MAX_VALUE) //
- .withValue(transferred)
- )
+ progressAware.onProgress(Progress.progress(DownloadState.download(file)).between(0).and(file.size ?: Long.MAX_VALUE).withValue(transferred))
}
}.use { out -> CopyStream.copyStreamToStream(inputStream, out) }
}
@@ -391,10 +339,7 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach
@Throws(NoSuchCloudFileException::class)
fun delete(node: OnedriveNode) {
val nodeInfo = requireNodeInfo(node)
- drive(nodeInfo.driveId) //
- .items(nodeInfo.id) //
- .buildRequest() //
- .delete()
+ drive(nodeInfo.driveId).items(nodeInfo.id).buildRequest().delete()
removeNodeInfo(node)
}
@@ -440,8 +385,9 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach
}
private fun loadRootNodeInfo(): OnedriveIdCache.NodeInfo {
- val item = drive(null).root().buildRequest().get()
- return OnedriveIdCache.NodeInfo(getId(item), getDriveId(item), true, item.cTag)
+ return drive(null).root().buildRequest().get()?.let { rootItem ->
+ OnedriveIdCache.NodeInfo(getId(rootItem), getDriveId(rootItem), true, rootItem.cTag)
+ } ?: throw FatalBackendException("Failed to load root item, item is null")
}
private fun loadNonRootNodeInfo(node: OnedriveNode): OnedriveIdCache.NodeInfo? {
@@ -459,37 +405,20 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach
} ?: throw ParentFolderIsNullException(node.name)
}
- fun currentAccount(): String {
- return client().me().drive().buildRequest().get().owner.user.displayName
+ fun currentAccount(username: String): String {
+ // used to check authentication
+ graphServiceClient.me().drive().buildRequest().get()?.owner?.user
+ return username
}
fun logout() {
- val result = CompletableFuture()
- OnedriveClientFactory.getAuthAdapter(context, cloud.accessToken()).logout(object : ICallback {
- override fun success(aVoid: Void?) {
- result.complete(null)
- }
-
- override fun failure(e: ClientException) {
- result.completeExceptionally(e)
- }
- })
- try {
- result.get()
- } catch (e: InterruptedException) {
- throw FatalBackendException(e)
- } catch (e: ExecutionException) {
- throw FatalBackendException(e)
- }
-
- OnedriveClientFactory.logout()
+ // FIXME what about logout?
}
companion object {
private const val CHUNKED_UPLOAD_MAX_SIZE = 4L shl 20
private const val CHUNKED_UPLOAD_CHUNK_SIZE = 327680 * 32
- private const val CHUNKED_UPLOAD_MAX_ATTEMPTS = 5
private const val REPLACE_MODE = "replace"
private const val NON_REPLACING_MODE = "rename"
}
@@ -500,6 +429,7 @@ internal class OnedriveImpl(cloud: OnedriveCloud, context: Context, nodeInfoCach
}
this.cloud = cloud
this.context = context
+ this.graphServiceClient = graphServiceClient
this.nodeInfoCache = nodeInfoCache
sharedPreferencesHandler = SharedPreferencesHandler(context)
}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/ClientException.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/ClientException.java
deleted file mode 100644
index 4c3641cc..00000000
--- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/ClientException.java
+++ /dev/null
@@ -1,29 +0,0 @@
-package org.cryptomator.data.cloud.onedrive.graph;
-
-import com.microsoft.graph.core.GraphErrorCodes;
-
-/**
- * An exception from the client.
- */
-public class ClientException extends com.microsoft.graph.core.ClientException {
-
- private static final long serialVersionUID = -10662352567392559L;
-
- private final Enum errorCode;
-
- /**
- * Creates the client exception
- *
- * @param message the message to display
- * @param ex the exception from
- */
- public ClientException(final String message, final Throwable ex, Enum errorCode) {
- super(message, ex);
-
- this.errorCode = errorCode;
- }
-
- public Enum errorCode() {
- return errorCode;
- }
-}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/IAuthenticationAdapter.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/IAuthenticationAdapter.java
deleted file mode 100644
index 653e5d8d..00000000
--- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/IAuthenticationAdapter.java
+++ /dev/null
@@ -1,40 +0,0 @@
-package org.cryptomator.data.cloud.onedrive.graph;
-
-import android.app.Activity;
-
-import com.microsoft.graph.authentication.IAuthenticationProvider;
-
-/**
- * An authentication adapter for signing requests, logging in, and logging out.
- */
-public interface IAuthenticationAdapter extends IAuthenticationProvider {
-
- /**
- * Logs out the user
- *
- * @param callback The callback when the logout is complete or an error occurs
- */
- void logout(final ICallback callback);
-
- /**
- * Login a user by popping UI
- *
- * @param activity The current activity
- * @param callback The callback when the login is complete or an error occurs
- */
- void login(final Activity activity, final ICallback callback);
-
- /**
- * Login a user with no ui
- *
- * @param callback The callback when the login is complete or an error occurs
- */
- void loginSilent(final ICallback callback);
-
- /**
- * Gets the access token for the session of a logged in user
- *
- * @return the access token
- */
- String getAccessToken() throws ClientException;
-}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/ICallback.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/ICallback.java
deleted file mode 100644
index e02bada9..00000000
--- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/ICallback.java
+++ /dev/null
@@ -1,45 +0,0 @@
-package org.cryptomator.data.cloud.onedrive.graph;
-
-// ------------------------------------------------------------------------------
-// Copyright (c) 2017 Microsoft Corporation
-//
-// Permission is hereby granted, free of charge, to any person obtaining a copy
-// of this software and associated documentation files (the "Software"), to deal
-// in the Software without restriction, including without limitation the rights
-// to use, copy, modify, merge, publish, distribute, sub-license, and/or sell
-// copies of the Software, and to permit persons to whom the Software is
-// furnished to do so, subject to the following conditions:
-//
-// The above copyright notice and this permission notice shall be included in
-// all copies or substantial portions of the Software.
-//
-// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
-// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
-// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
-// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
-// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
-// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
-// THE SOFTWARE.
-// ------------------------------------------------------------------------------
-
-/**
- * A callback that describes how to deal with success and failure
- *
- * @param the result type of the successful action
- */
-public interface ICallback {
-
- /**
- * How successful results are handled
- *
- * @param result the result
- */
- void success(final Result result);
-
- /**
- * How failures are handled
- *
- * @param ex the exception
- */
- void failure(final ClientException ex);
-}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/IProgressCallback.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/IProgressCallback.java
deleted file mode 100644
index 98012d50..00000000
--- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/IProgressCallback.java
+++ /dev/null
@@ -1,39 +0,0 @@
-package org.cryptomator.data.cloud.onedrive.graph;
-
-// ------------------------------------------------------------------------------
-// Copyright (c) 2017 Microsoft Corporation
-//
-// Permission is hereby granted, free of charge, to any person obtaining a copy
-// of this software and associated documentation files (the "Software"), to deal
-// in the Software without restriction, including without limitation the rights
-// to use, copy, modify, merge, publish, distribute, sub-license, and/or sell
-// copies of the Software, and to permit persons to whom the Software is
-// furnished to do so, subject to the following conditions:
-//
-// The above copyright notice and this permission notice shall be included in
-// all copies or substantial portions of the Software.
-//
-// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
-// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
-// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
-// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
-// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
-// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
-// THE SOFTWARE.
-// ------------------------------------------------------------------------------
-
-/**
- * A callback that describes how to deal with success, failure, and progress
- *
- * @param the result type of the successful action
- */
-public interface IProgressCallback extends com.microsoft.graph.concurrency.IProgressCallback {
-
- /**
- * How progress updates are handled for this callback
- *
- * @param current the current amount of progress
- * @param max the max amount of progress
- */
- void progress(final long current, final long max);
-}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/MSAAuthAndroidAdapter.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/MSAAuthAndroidAdapter.java
deleted file mode 100644
index 4fdb3224..00000000
--- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/MSAAuthAndroidAdapter.java
+++ /dev/null
@@ -1,275 +0,0 @@
-package org.cryptomator.data.cloud.onedrive.graph;
-
-import android.app.Activity;
-import android.content.Context;
-
-import com.microsoft.graph.http.IHttpRequest;
-import com.microsoft.graph.options.HeaderOption;
-import com.microsoft.services.msa.LiveAuthClient;
-import com.microsoft.services.msa.LiveAuthException;
-import com.microsoft.services.msa.LiveAuthListener;
-import com.microsoft.services.msa.LiveConnectSession;
-import com.microsoft.services.msa.LiveStatus;
-
-import org.cryptomator.util.crypto.CredentialCryptor;
-
-import java.util.Arrays;
-import java.util.concurrent.atomic.AtomicReference;
-
-import timber.log.Timber;
-
-import static com.microsoft.graph.core.GraphErrorCodes.AUTHENTICATION_FAILURE;
-
-/**
- * Supports login, logout, and signing requests with authorization information.
- */
-public abstract class MSAAuthAndroidAdapter implements IAuthenticationAdapter {
-
- /**
- * The authorization header name.
- */
- private static final String AUTHORIZATION_HEADER_NAME = "Authorization";
-
- /**
- * The bearer prefix.
- */
- private static final String OAUTH_BEARER_PREFIX = "bearer ";
-
- /**
- * The live auth client.
- */
- private final LiveAuthClient mLiveAuthClient;
- private Context context;
-
- /**
- * Create a new instance of the provider
- *
- * @param context the application context instance
- * @param refreshToken
- */
- protected MSAAuthAndroidAdapter(final Context context, String refreshToken) {
- this.context = context;
- mLiveAuthClient = new LiveAuthClient(context, getClientId(), Arrays.asList(getScopes()), MicrosoftOAuth2Endpoint.getInstance(), refreshToken);
- }
-
- /**
- * The client id for this authenticator.
- * http://graph.microsoft.io/en-us/app-registration
- *
- * @return The client id.
- */
- protected abstract String getClientId();
-
- /**
- * The scopes for this application.
- * http://graph.microsoft.io/en-us/docs/authorization/permission_scopes
- *
- * @return The scopes for this application.
- */
- protected abstract String[] getScopes();
-
- @Override
- public void authenticateRequest(final IHttpRequest request) {
- Timber.tag("MSAAuthAndroidAdapter").d("Authenticating request, %s", request.getRequestUrl());
-
- // If the request already has an authorization header, do not intercept it.
- for (final HeaderOption option : request.getHeaders()) {
- if (option.getName().equals(AUTHORIZATION_HEADER_NAME)) {
- Timber.tag("MSAAuthAndroidAdapter").d("Found an existing authorization header!");
- return;
- }
- }
-
- try {
- final String accessToken = getAccessToken();
- request.addHeader(AUTHORIZATION_HEADER_NAME, OAUTH_BEARER_PREFIX + accessToken);
- } catch (ClientException e) {
- final String message = "Unable to authenticate request, No active account found";
- final ClientException exception = new ClientException(message, e, AUTHENTICATION_FAILURE);
- Timber.tag("MSAAuthAndroidAdapter").e(exception, message);
- throw exception;
- }
- }
-
- @Override
- public String getAccessToken() throws ClientException {
- if (hasValidSession()) {
- Timber.tag("MSAAuthAndroidAdapter").d("Found account information");
- if (mLiveAuthClient.getSession().isExpired()) {
- Timber.tag("MSAAuthAndroidAdapter").d("Account access token is expired, refreshing");
- loginSilentBlocking();
- }
- return mLiveAuthClient.getSession().getAccessToken();
- } else {
- final String message = "Unable to get access token, No active account found";
- final ClientException exception = new ClientException(message, null, AUTHENTICATION_FAILURE);
- Timber.tag("MSAAuthAndroidAdapter").e(exception, message);
- throw exception;
- }
- }
-
- @Override
- public void logout(final ICallback callback) {
- Timber.tag("MSAAuthAndroidAdapter").d("Logout started");
-
- if (callback == null) {
- throw new IllegalArgumentException("callback");
- }
-
- mLiveAuthClient.logout(new LiveAuthListener() {
- @Override
- public void onAuthComplete(final LiveStatus status, final LiveConnectSession session, final Object userState) {
- Timber.tag("MSAAuthAndroidAdapter").d("Logout complete");
- callback.success(null);
- }
-
- @Override
- public void onAuthError(final LiveAuthException exception, final Object userState) {
- final ClientException clientException = new ClientException("Logout failure", exception, AUTHENTICATION_FAILURE);
- Timber.tag("MSAAuthAndroidAdapter").e(clientException);
- callback.failure(clientException);
- }
- });
- }
-
- @Override
- public void login(final Activity activity, final ICallback callback) {
- Timber.tag("MSAAuthAndroidAdapter").d("Login started");
-
- if (callback == null) {
- throw new IllegalArgumentException("callback");
- }
-
- if (hasValidSession()) {
- Timber.tag("MSAAuthAndroidAdapter").d("Already logged in");
- callback.success(null);
- return;
- }
-
- final LiveAuthListener listener = new LiveAuthListener() {
- @Override
- public void onAuthComplete(final LiveStatus status, final LiveConnectSession session, final Object userState) {
- Timber.tag("MSAAuthAndroidAdapter").d(String.format("LiveStatus: %s, LiveConnectSession good?: %s, UserState %s", status, session != null, userState));
-
- if (status == LiveStatus.NOT_CONNECTED && session.getRefreshToken() == null) {
- Timber.tag("MSAAuthAndroidAdapter").d("Received invalid login failure from silent authentication, ignoring.");
- return;
- }
-
- if (status == LiveStatus.CONNECTED) {
- Timber.tag("MSAAuthAndroidAdapter").d("Login completed");
- callback.success(encrypt(session.getRefreshToken()));
- return;
- }
-
- final ClientException clientException = new ClientException("Unable to login successfully", null, AUTHENTICATION_FAILURE);
- Timber.tag("MSAAuthAndroidAdapter").e(clientException);
- callback.failure(clientException);
- }
-
- @Override
- public void onAuthError(final LiveAuthException exception, final Object userState) {
- final ClientException clientException = new ClientException("Login failure", exception, AUTHENTICATION_FAILURE);
- Timber.tag("MSAAuthAndroidAdapter").e(clientException);
- callback.failure(clientException);
- }
- };
-
- // Make sure the login process is started with the current activity information
- activity.runOnUiThread(() -> mLiveAuthClient.login(activity, listener));
- }
-
- private String encrypt(String refreshToken) {
- if (refreshToken == null) {
- return null;
- }
- return CredentialCryptor //
- .getInstance(context) //
- .encrypt(refreshToken);
- }
-
- /**
- * Login a user with no ui
- *
- * @param callback The callback when the login is complete or an error occurs
- */
- @Override
- public void loginSilent(final ICallback callback) {
- Timber.tag("MSAAuthAndroidAdapter").d("Login silent started");
-
- if (callback == null) {
- throw new IllegalArgumentException("callback");
- }
-
- final LiveAuthListener listener = new LiveAuthListener() {
- @Override
- public void onAuthComplete(final LiveStatus status, final LiveConnectSession session, final Object userState) {
- Timber.tag("MSAAuthAndroidAdapter").d(String.format("LiveStatus: %s, LiveConnectSession good?: %s, UserState %s", status, session != null, userState));
-
- if (status == LiveStatus.CONNECTED) {
- Timber.tag("MSAAuthAndroidAdapter").d("Login completed");
- callback.success(null);
- return;
- }
-
- final ClientException clientException = new ClientException("Unable to login silently", null, AUTHENTICATION_FAILURE);
- Timber.tag("MSAAuthAndroidAdapter").e(clientException);
- callback.failure(clientException);
- }
-
- @Override
- public void onAuthError(final LiveAuthException exception, final Object userState) {
- final ClientException clientException = new ClientException("Unable to login silently", null, AUTHENTICATION_FAILURE);
- Timber.tag("MSAAuthAndroidAdapter").e(clientException);
- callback.failure(clientException);
- }
- };
-
- mLiveAuthClient.loginSilent(listener);
- }
-
- /**
- * Login silently while blocking for the call to return
- *
- * @return the result of the login attempt
- * @throws ClientException The exception if there was an issue during the login attempt
- */
- private Void loginSilentBlocking() throws ClientException {
- Timber.tag("MSAAuthAndroidAdapter").d("Login silent blocking started");
- final SimpleWaiter waiter = new SimpleWaiter();
- final AtomicReference returnValue = new AtomicReference<>();
- final AtomicReference exceptionValue = new AtomicReference<>();
-
- loginSilent(new ICallback() {
- @Override
- public void success(final Void aVoid) {
- returnValue.set(aVoid);
- waiter.signal();
- }
-
- @Override
- public void failure(ClientException ex) {
- exceptionValue.set(ex);
- waiter.signal();
- }
- });
-
- waiter.waitForSignal();
-
- // noinspection ThrowableResultOfMethodCallIgnored
- if (exceptionValue.get() != null) {
- throw exceptionValue.get();
- }
-
- return returnValue.get();
- }
-
- /**
- * Is the session object valid
- *
- * @return true, if the session is valid (but not necessary unexpired)
- */
- private boolean hasValidSession() {
- return mLiveAuthClient.getSession() != null && mLiveAuthClient.getSession().getAccessToken() != null;
- }
-}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/MicrosoftOAuth2Endpoint.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/MicrosoftOAuth2Endpoint.java
deleted file mode 100644
index 5d964fdb..00000000
--- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/MicrosoftOAuth2Endpoint.java
+++ /dev/null
@@ -1,44 +0,0 @@
-package org.cryptomator.data.cloud.onedrive.graph;
-
-import android.net.Uri;
-
-import com.microsoft.services.msa.OAuthConfig;
-
-import org.cryptomator.data.BuildConfig;
-
-class MicrosoftOAuth2Endpoint implements OAuthConfig {
-
- /**
- * The current instance of this class
- */
- private static final MicrosoftOAuth2Endpoint sInstance = new MicrosoftOAuth2Endpoint();
-
- /**
- * The current instance of this class
- *
- * @return The instance
- */
- static MicrosoftOAuth2Endpoint getInstance() {
- return sInstance;
- }
-
- @Override
- public Uri getAuthorizeUri() {
- return Uri.parse("https://login.microsoftonline.com/common/oauth2/v2.0/authorize");
- }
-
- @Override
- public Uri getDesktopUri() {
- return Uri.parse(BuildConfig.ONEDRIVE_API_REDIRCT_URI);
- }
-
- @Override
- public Uri getLogoutUri() {
- return Uri.parse("https://login.microsoftonline.com/common/oauth2/v2.0/logout");
- }
-
- @Override
- public Uri getTokenUri() {
- return Uri.parse("https://login.microsoftonline.com/common/oauth2/v2.0/token");
- }
-}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/SimpleWaiter.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/SimpleWaiter.java
deleted file mode 100644
index 96f3e623..00000000
--- a/data/src/main/java/org/cryptomator/data/cloud/onedrive/graph/SimpleWaiter.java
+++ /dev/null
@@ -1,65 +0,0 @@
-package org.cryptomator.data.cloud.onedrive.graph;
-
-// ------------------------------------------------------------------------------
-// Copyright (c) 2015 Microsoft Corporation
-//
-// Permission is hereby granted, free of charge, to any person obtaining a copy
-// of this software and associated documentation files (the "Software"), to deal
-// in the Software without restriction, including without limitation the rights
-// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
-// copies of the Software, and to permit persons to whom the Software is
-// furnished to do so, subject to the following conditions:
-//
-// The above copyright notice and this permission notice shall be included in
-// all copies or substantial portions of the Software.
-//
-// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
-// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
-// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
-// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
-// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
-// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
-// THE SOFTWARE.
-// ------------------------------------------------------------------------------
-
-/**
- * A simple signal/waiter interface for synchronizing multi-threaded actions.
- */
-public class SimpleWaiter {
-
- /**
- * The internal lock object for this waiter.
- */
- private final Object mInternalLock = new Object();
-
- /**
- * Indicates if this waiter has been triggered.
- */
- private boolean mTriggerState;
-
- /**
- * BLOCKING: Waits for the signal to be triggered, or returns immediately if it has already been triggered.
- */
- public void waitForSignal() {
- synchronized (mInternalLock) {
- if (this.mTriggerState) {
- return;
- }
- try {
- mInternalLock.wait();
- } catch (final InterruptedException e) {
- throw new RuntimeException(e);
- }
- }
- }
-
- /**
- * Triggers the signal for this waiter.
- */
- public void signal() {
- synchronized (mInternalLock) {
- mTriggerState = true;
- mInternalLock.notifyAll();
- }
- }
-}
diff --git a/data/src/main/java/org/cryptomator/data/db/DatabaseUpgrades.java b/data/src/main/java/org/cryptomator/data/db/DatabaseUpgrades.java
index 638c5c76..77239abe 100644
--- a/data/src/main/java/org/cryptomator/data/db/DatabaseUpgrades.java
+++ b/data/src/main/java/org/cryptomator/data/db/DatabaseUpgrades.java
@@ -1,5 +1,7 @@
package org.cryptomator.data.db;
+import static java.lang.String.format;
+
import java.util.ArrayList;
import java.util.Collections;
import java.util.Comparator;
@@ -10,8 +12,6 @@ import java.util.Map;
import javax.inject.Inject;
import javax.inject.Singleton;
-import static java.lang.String.format;
-
@Singleton
class DatabaseUpgrades {
@@ -28,7 +28,9 @@ class DatabaseUpgrades {
Upgrade6To7 upgrade6To7, //
Upgrade7To8 upgrade7To8, //
Upgrade8To9 upgrade8To9, //
- Upgrade9To10 upgrade9To10) {
+ Upgrade9To10 upgrade9To10, //
+ Upgrade10To11 upgrade10To11
+ ) {
availableUpgrades = defineUpgrades( //
upgrade0To1, //
@@ -40,11 +42,8 @@ class DatabaseUpgrades {
upgrade6To7, //
upgrade7To8, //
upgrade8To9, //
- upgrade9To10);
- }
-
- private static Comparator reverseOrder() {
- return (a, b) -> b.compareTo(a);
+ upgrade9To10, //
+ upgrade10To11);
}
private Map> defineUpgrades(DatabaseUpgrade... upgrades) {
@@ -56,7 +55,7 @@ class DatabaseUpgrades {
result.get(upgrade.from()).add(upgrade);
}
for (List list : result.values()) {
- Collections.sort(list, reverseOrder());
+ Collections.sort(list, Comparator.reverseOrder());
}
return result;
}
diff --git a/data/src/main/java/org/cryptomator/data/db/Upgrade10To11.kt b/data/src/main/java/org/cryptomator/data/db/Upgrade10To11.kt
new file mode 100644
index 00000000..dffc9d36
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/db/Upgrade10To11.kt
@@ -0,0 +1,25 @@
+package org.cryptomator.data.db
+
+import org.greenrobot.greendao.database.Database
+import javax.inject.Inject
+import javax.inject.Singleton
+
+@Singleton
+internal class Upgrade10To11 @Inject constructor() : DatabaseUpgrade(10, 11) {
+
+ private val onedriveCloudId = 3L
+
+ override fun internalApplyTo(db: Database, origin: Int) {
+ db.beginTransaction()
+ try {
+ Sql.deleteFrom("CLOUD_ENTITY")
+ .where("_id", Sql.eq(onedriveCloudId))
+ .where("TYPE", Sql.eq("ONEDRIVE"))
+ .executeOn(db)
+
+ db.setTransactionSuccessful()
+ } finally {
+ db.endTransaction()
+ }
+ }
+}
diff --git a/domain/src/main/java/org/cryptomator/domain/OnedriveCloud.java b/domain/src/main/java/org/cryptomator/domain/OnedriveCloud.java
index a56accf0..8791bb7e 100644
--- a/domain/src/main/java/org/cryptomator/domain/OnedriveCloud.java
+++ b/domain/src/main/java/org/cryptomator/domain/OnedriveCloud.java
@@ -55,7 +55,11 @@ public class OnedriveCloud implements Cloud {
@Override
public boolean configurationMatches(Cloud cloud) {
- return true;
+ return cloud instanceof OnedriveCloud && configurationMatches((OnedriveCloud) cloud);
+ }
+
+ private boolean configurationMatches(OnedriveCloud cloud) {
+ return username.equals(cloud.username);
}
@NotNull
diff --git a/lib/msa-auth-for-android b/lib/msa-auth-for-android
deleted file mode 160000
index e930a736..00000000
--- a/lib/msa-auth-for-android
+++ /dev/null
@@ -1 +0,0 @@
-Subproject commit e930a73612d0eee17710f5a9460c9a943efb090f
diff --git a/presentation/build.gradle b/presentation/build.gradle
index 90e807f5..3d63162c 100644
--- a/presentation/build.gradle
+++ b/presentation/build.gradle
@@ -3,6 +3,7 @@ apply plugin: 'kotlin-android'
apply plugin: 'kotlin-kapt'
apply plugin: 'kotlin-android-extensions'
apply plugin: 'de.mannodermaus.android-junit5'
+apply from: 'prebuild.gradle'
android {
signingConfigs {
@@ -51,9 +52,10 @@ android {
shrinkResources false
buildConfigField "String", "DROPBOX_API_KEY", "\"" + getApiKey('DROPBOX_API_KEY') + "\""
- manifestPlaceholders = [DROPBOX_API_KEY: getApiKey('DROPBOX_API_KEY')]
buildConfigField "String", "PCLOUD_CLIENT_ID", "\"" + getApiKey('PCLOUD_CLIENT_ID') + "\""
+ manifestPlaceholders = [DROPBOX_API_KEY: getApiKey('DROPBOX_API_KEY'), ONEDRIVE_API_KEY_DECODED: getOnedriveApiKey()]
+
resValue "string", "app_id", androidApplicationId
}
@@ -66,9 +68,10 @@ android {
testCoverageEnabled false
buildConfigField "String", "DROPBOX_API_KEY", "\"" + getApiKey('DROPBOX_API_KEY_DEBUG') + "\""
- manifestPlaceholders = [DROPBOX_API_KEY: getApiKey('DROPBOX_API_KEY_DEBUG')]
buildConfigField "String", "PCLOUD_CLIENT_ID", "\"" + getApiKey('PCLOUD_CLIENT_ID_DEBUG') + "\""
+ manifestPlaceholders = [DROPBOX_API_KEY: getApiKey('DROPBOX_API_KEY_DEBUG'), ONEDRIVE_API_KEY_DECODED: getOnedriveApiKey()]
+
applicationIdSuffix ".debug"
versionNameSuffix '-DEBUG'
@@ -108,6 +111,7 @@ android {
packagingOptions {
exclude 'META-INF/jersey-module-version'
+ exclude 'META-INF/NOTICE.md'
exclude 'META-INF/DEPENDENCIES'
}
}
@@ -145,6 +149,7 @@ dependencies {
// cloud
implementation dependencies.dropbox
implementation dependencies.msgraph
+ implementation dependencies.msgraphAuth
playstoreImplementation(dependencies.googleApiServicesDrive) {
exclude module: 'guava-jdk5'
@@ -248,6 +253,13 @@ static def getApiKey(key) {
return System.getenv().getOrDefault(key, "")
}
+static def getOnedriveApiKey() {
+ String onedrivePath = "" + getApiKey('ONEDRIVE_API_REDIRCT_URI')
+ String idStr = onedrivePath.substring(onedrivePath.lastIndexOf('/') + 1)
+ URI uri = new URI(idStr)
+ return uri.path
+}
+
tasks.withType(Test) {
testLogging {
events "failed"
diff --git a/presentation/prebuild.gradle b/presentation/prebuild.gradle
new file mode 100644
index 00000000..b7a5e16c
--- /dev/null
+++ b/presentation/prebuild.gradle
@@ -0,0 +1,36 @@
+import groovy.json.JsonOutput
+import groovy.json.JsonSlurper
+
+task generateAppConfigurationFile() {
+ def jsonSlurper = new JsonSlurper()
+
+ def apiKey = "" + getApiKey('ONEDRIVE_API_KEY')
+ def redirectUri = "" + getApiKey('ONEDRIVE_API_REDIRCT_URI')
+
+ def jsonString = """
+ {
+ "client_id" : "${apiKey}",
+ "authorization_user_agent" : "DEFAULT",
+ "redirect_uri" : "${redirectUri}",
+ "broker_redirect_uri_registered": true,
+ "shared_device_mode_supported": true,
+ "authorities" : [
+ {
+ "type": "AAD",
+ "audience": {
+ "type": "AzureADandPersonalMicrosoftAccount",
+ "tenant_id": "common"
+ }
+ }
+ ]
+ }"""
+
+ def config_file = new File('presentation/src/main/res/raw/auth_config_onedrive.json')
+ config_file.write(JsonOutput.prettyPrint(JsonOutput.toJson(jsonSlurper.parseText(jsonString))))
+}
+
+static def getApiKey(key) {
+ return System.getenv().getOrDefault(key, "")
+}
+
+build.dependsOn generateAppConfigurationFile
diff --git a/presentation/src/foss/java/org/cryptomator/presentation/presenter/AuthenticateCloudPresenter.kt b/presentation/src/foss/java/org/cryptomator/presentation/presenter/AuthenticateCloudPresenter.kt
index eac080bf..f8e595d7 100644
--- a/presentation/src/foss/java/org/cryptomator/presentation/presenter/AuthenticateCloudPresenter.kt
+++ b/presentation/src/foss/java/org/cryptomator/presentation/presenter/AuthenticateCloudPresenter.kt
@@ -210,49 +210,113 @@ class AuthenticateCloudPresenter @Inject constructor( //
}
}
- private inner class OnedriveAuthStrategy : AuthStrategy {
+ private fun startAuthentication(cloud: CloudModel) {
+ authenticationStarted = true
- private var authenticationStarted = false
- override fun supports(cloud: CloudModel): Boolean {
- return cloud.cloudType() == CloudTypeModel.ONEDRIVE
- }
+ PublicClientApplication.createMultipleAccountPublicClientApplication(
+ context(),
+ R.raw.auth_config_onedrive,
+ object : IPublicClientApplication.IMultipleAccountApplicationCreatedListener {
+ override fun onCreated(application: IMultipleAccountPublicClientApplication) {
+ application.getAccounts(object : IPublicClientApplication.LoadAccountsCallback {
+ override fun onTaskCompleted(accounts: List) {
+ if (accounts.isEmpty()) {
+ application.acquireToken(activity(), onedriveScopes(), getAuthInteractiveCallback(cloud))
+ } else {
+ accounts.find { account -> account.username == cloud.username() }?.let {
+ application.acquireTokenSilentAsync(
+ onedriveScopes(),
+ it,
+ "https://login.microsoftonline.com/common",
+ getAuthSilentCallback(cloud, application)
+ )
+ } ?: application.acquireToken(activity(), onedriveScopes(), getAuthInteractiveCallback(cloud))
+ }
+ }
- override fun resumed(intent: AuthenticateCloudIntent) {
- if (!authenticationStarted) {
- startAuthentication(intent.cloud())
- }
- }
-
- private fun startAuthentication(cloud: CloudModel) {
- authenticationStarted = true
- val authenticationAdapter = OnedriveClientFactory.getAuthAdapter(context(), (cloud.toCloud() as OnedriveCloud).accessToken())
- authenticationAdapter.login(activity(), object : ICallback {
- override fun success(accessToken: String?) {
- if (accessToken == null) {
- Timber.tag("AuthicateCloudPrester").e("Onedrive access token is empty")
- failAuthentication(cloud.name())
- } else {
- showProgress(ProgressModel(ProgressStateModel.AUTHENTICATION))
- handleAuthenticationResult(cloud, accessToken)
- }
+ override fun onError(e: MsalException) {
+ Timber.tag("AuthenticateCloudPresenter").e(e, "Error to get accounts")
+ failAuthentication(cloud.name())
+ }
+ })
}
- override fun failure(ex: ClientException) {
- Timber.tag("AuthicateCloudPrester").e(ex)
+ override fun onError(e: MsalException) {
+ Timber.tag("AuthenticateCloudPresenter").i(e, "Error in configuration")
failAuthentication(cloud.name())
}
})
- }
+ }
- private fun handleAuthenticationResult(cloud: CloudModel, accessToken: String) {
- getUsernameAndSuceedAuthentication( //
- OnedriveCloud.aCopyOf(cloud.toCloud() as OnedriveCloud) //
- .withAccessToken(accessToken) //
- .build()
- )
+ private fun getAuthSilentCallback(cloud: CloudModel, application: IMultipleAccountPublicClientApplication): AuthenticationCallback {
+ return object : AuthenticationCallback {
+
+ override fun onSuccess(authenticationResult: IAuthenticationResult) {
+ Timber.tag("AuthenticateCloudPresenter").i("Successfully authenticated")
+ handleAuthenticationResult(cloud, authenticationResult.accessToken)
+ }
+
+ override fun onError(e: MsalException) {
+ Timber.tag("AuthenticateCloudPresenter").e(e, "Failed to acquireToken")
+ when (e) {
+ is MsalClientException -> {
+ /* Exception inside MSAL, more info inside MsalError.java */
+ failAuthentication(cloud.name())
+ }
+ is MsalServiceException -> {
+ /* Exception when communicating with the STS, likely config issue */
+ failAuthentication(cloud.name())
+ }
+ is MsalUiRequiredException -> {
+ /* Tokens expired or no session, retry with interactive */
+ application.acquireToken(activity(), onedriveScopes(), getAuthInteractiveCallback(cloud))
+ }
+ }
+ }
+
+ override fun onCancel() {
+ Timber.tag("AuthenticateCloudPresenter").i("User cancelled login")
+ }
}
}
+ private fun getAuthInteractiveCallback(cloud: CloudModel): AuthenticationCallback {
+ return object : AuthenticationCallback {
+
+ override fun onSuccess(authenticationResult: IAuthenticationResult) {
+ Timber.tag("AuthenticateCloudPresenter").i("Successfully authenticated")
+ handleAuthenticationResult(cloud, authenticationResult.accessToken, authenticationResult.account.username)
+ }
+
+ override fun onError(e: MsalException) {
+ Timber.tag("AuthenticateCloudPresenter").e(e, "Successfully authenticated")
+ failAuthentication(cloud.name())
+ }
+
+ override fun onCancel() {
+ Timber.tag("AuthenticateCloudPresenter").i("User cancelled login")
+ }
+ }
+ }
+
+ private fun handleAuthenticationResult(cloud: CloudModel, accessToken: String) {
+ getUsernameAndSuceedAuthentication( //
+ OnedriveCloud.aCopyOf(cloud.toCloud() as OnedriveCloud) //
+ .withAccessToken(encrypt(accessToken)) //
+ .build()
+ )
+ }
+
+ private fun handleAuthenticationResult(cloud: CloudModel, accessToken: String, username: String) {
+ getUsernameAndSuceedAuthentication( //
+ OnedriveCloud.aCopyOf(cloud.toCloud() as OnedriveCloud) //
+ .withAccessToken(encrypt(accessToken)) //
+ .withUsername(username)
+ .build()
+ )
+ }
+}
+
private inner class PCloudAuthStrategy : AuthStrategy {
private var authenticationStarted = false
@@ -512,6 +576,10 @@ class AuthenticateCloudPresenter @Inject constructor( //
companion object {
const val WEBDAV_ACCEPTED_UNTRUSTED_CERTIFICATE = "acceptedUntrustedCertificate"
+
+ fun onedriveScopes(): Array {
+ return arrayOf("User.Read", "Files.ReadWrite")
+ }
}
init {
diff --git a/presentation/src/main/AndroidManifest.xml b/presentation/src/main/AndroidManifest.xml
index 5852673c..9c449d8b 100644
--- a/presentation/src/main/AndroidManifest.xml
+++ b/presentation/src/main/AndroidManifest.xml
@@ -159,6 +159,17 @@
+
+
+
+
+
+
+
+
requestActivityResult(
- ActivityResultCallbacks.addChangeMultiCloud(), //
- Intents.webDavAddOrChangeIntent()
- )
- CloudTypeModel.PCLOUD -> {
- requestActivityResult(
- ActivityResultCallbacks.pCloudAuthenticationFinished(), //
- Intents.authenticatePCloudIntent()
- )
- }
- CloudTypeModel.S3 -> requestActivityResult(
- ActivityResultCallbacks.addChangeMultiCloud(), //
- Intents.s3AddOrChangeIntent()
- )
+ CloudTypeModel.ONEDRIVE -> addOnedriveCloud()
+ CloudTypeModel.WEBDAV -> requestActivityResult(ActivityResultCallbacks.addChangeMultiCloud(), Intents.webDavAddOrChangeIntent())
+ CloudTypeModel.PCLOUD -> requestActivityResult(ActivityResultCallbacks.pCloudAuthenticationFinished(), Intents.authenticatePCloudIntent())
+ CloudTypeModel.S3 -> requestActivityResult(ActivityResultCallbacks.addChangeMultiCloud(), Intents.s3AddOrChangeIntent())
CloudTypeModel.LOCAL -> openDocumentTree()
}
}
+ private fun addOnedriveCloud() {
+ PublicClientApplication.createMultipleAccountPublicClientApplication(
+ context(),
+ R.raw.auth_config_onedrive,
+ object : IPublicClientApplication.IMultipleAccountApplicationCreatedListener {
+ override fun onCreated(application: IMultipleAccountPublicClientApplication) {
+ application.getAccounts(object : IPublicClientApplication.LoadAccountsCallback {
+ override fun onTaskCompleted(accounts: List) {
+ application.acquireToken(activity(), AuthenticateCloudPresenter.onedriveScopes(), getAuthInteractiveCallback())
+ }
+
+ override fun onError(e: MsalException) {
+ Timber.tag("AuthenticateCloudPresenter").e(e, "Error to get accounts")
+ showError(e);
+ }
+ })
+ }
+
+ override fun onError(e: MsalException) {
+ Timber.tag("AuthenticateCloudPresenter").i(e, "Error in configuration")
+ showError(e);
+ }
+ })
+ }
+
+ private fun getAuthInteractiveCallback(): AuthenticationCallback {
+ return object : AuthenticationCallback {
+
+ override fun onSuccess(authenticationResult: IAuthenticationResult) {
+ Timber.tag("AuthenticateCloudPresenter").i("Successfully authenticated")
+ val accessToken = CredentialCryptor.getInstance(context()).encrypt(authenticationResult.accessToken)
+ val onedriveSkeleton = OnedriveCloud.aOnedriveCloud().withAccessToken(accessToken).withUsername(authenticationResult.account.username).build()
+ saveOnedriveCloud(onedriveSkeleton)
+ }
+
+ override fun onError(e: MsalException) {
+ Timber.tag("AuthenticateCloudPresenter").e(e, "Successfully authenticated")
+ showError(e);
+ }
+
+ override fun onCancel() {
+ Timber.tag("AuthenticateCloudPresenter").i("User cancelled login")
+ }
+ }
+ }
+
+ private fun saveOnedriveCloud(onedriveSkeleton: OnedriveCloud) {
+ getUsernameUseCase //
+ .withCloud(onedriveSkeleton) //
+ .run(object : DefaultResultHandler() {
+ override fun onSuccess(username: String) {
+ prepareForSavingOnedriveCloud(OnedriveCloud.aCopyOf(onedriveSkeleton).withUsername(username).build())
+ }
+ })
+ }
+
+ fun prepareForSavingOnedriveCloud(cloud: OnedriveCloud) {
+ getCloudsUseCase //
+ .withCloudType(CloudTypeModel.valueOf(selectedCloudType.get())) //
+ .run(object : DefaultResultHandler>() {
+ override fun onSuccess(clouds: List) {
+ clouds.firstOrNull {
+ (it as OnedriveCloud).username() == cloud.username()
+ }?.let {
+ saveCloud(OnedriveCloud.aCopyOf(it as OnedriveCloud).withAccessToken(cloud.accessToken()).build())
+ Timber.tag("CloudConnListPresenter").i("OneDrive access token updated")
+ } ?: saveCloud(cloud)
+ }
+ })
+ }
+
private fun openDocumentTree() {
try {
- requestActivityResult( //
- ActivityResultCallbacks.pickedLocalStorageLocation(), //
- Intent(Intent.ACTION_OPEN_DOCUMENT_TREE)
- )
+ requestActivityResult(ActivityResultCallbacks.pickedLocalStorageLocation(), Intent(Intent.ACTION_OPEN_DOCUMENT_TREE))
} catch (exception: ActivityNotFoundException) {
- Toast //
- .makeText( //
- activity().applicationContext, //
- context().getText(R.string.screen_cloud_local_error_no_content_provider), //
- Toast.LENGTH_SHORT
- ) //
- .show()
+ Toast.makeText(activity().applicationContext, context().getText(R.string.screen_cloud_local_error_no_content_provider), Toast.LENGTH_SHORT).show()
Timber.tag("CloudConnListPresenter").e(exception, "No ContentProvider on system")
}
}
@@ -198,14 +258,8 @@ class CloudConnectionListPresenter @Inject constructor( //
if (!code.isNullOrEmpty() && !hostname.isNullOrEmpty()) {
Timber.tag("CloudConnectionListPresenter").i("PCloud OAuth code successfully retrieved")
-
- val accessToken = CredentialCryptor //
- .getInstance(this.context()) //
- .encrypt(code)
- val pCloudSkeleton = PCloud.aPCloud() //
- .withAccessToken(accessToken)
- .withUrl(hostname)
- .build();
+ val accessToken = CredentialCryptor.getInstance(this.context()).encrypt(code)
+ val pCloudSkeleton = PCloud.aPCloud().withAccessToken(accessToken).withUrl(hostname).build();
getUsernameUseCase //
.withCloud(pCloudSkeleton) //
.run(object : DefaultResultHandler() {
@@ -226,19 +280,14 @@ class CloudConnectionListPresenter @Inject constructor( //
clouds.firstOrNull {
(it as PCloud).username() == cloud.username()
}?.let {
- saveCloud(
- PCloud.aCopyOf(it as PCloud) //
- .withUrl(cloud.url())
- .withAccessToken(cloud.accessToken())
- .build()
- )
+ saveCloud(PCloud.aCopyOf(it as PCloud).withUrl(cloud.url()).withAccessToken(cloud.accessToken()).build())
view?.showDialog(PCloudCredentialsUpdatedDialog.newInstance(it.username()))
} ?: saveCloud(cloud)
}
})
}
- fun saveCloud(cloud: PCloud) {
+ fun saveCloud(cloud: Cloud) {
addOrChangeCloudConnectionUseCase //
.withCloud(cloud) //
.run(object : DefaultResultHandler() {
@@ -252,15 +301,13 @@ class CloudConnectionListPresenter @Inject constructor( //
fun pickedLocalStorageLocation(result: ActivityResult) {
val rootTreeUriOfLocalStorage = result.intent().data
persistUriPermission(rootTreeUriOfLocalStorage)
- addOrChangeCloudConnectionUseCase.withCloud(
- LocalStorageCloud.aLocalStorage() //
- .withRootUri(rootTreeUriOfLocalStorage.toString()) //
- .build()
- ).run(object : DefaultResultHandler() {
- override fun onSuccess(void: Void?) {
- loadCloudList()
- }
- })
+ addOrChangeCloudConnectionUseCase
+ .withCloud(LocalStorageCloud.aLocalStorage().withRootUri(rootTreeUriOfLocalStorage.toString()).build())
+ .run(object : DefaultResultHandler() {
+ override fun onSuccess(void: Void?) {
+ loadCloudList()
+ }
+ })
}
private fun persistUriPermission(rootTreeUriOfLocalStorage: Uri?) {
diff --git a/presentation/src/main/java/org/cryptomator/presentation/presenter/CloudSettingsPresenter.kt b/presentation/src/main/java/org/cryptomator/presentation/presenter/CloudSettingsPresenter.kt
index 9117574b..79ca7a35 100644
--- a/presentation/src/main/java/org/cryptomator/presentation/presenter/CloudSettingsPresenter.kt
+++ b/presentation/src/main/java/org/cryptomator/presentation/presenter/CloudSettingsPresenter.kt
@@ -2,6 +2,7 @@ package org.cryptomator.presentation.presenter
import org.cryptomator.domain.Cloud
import org.cryptomator.domain.LocalStorageCloud
+import org.cryptomator.domain.OnedriveCloud
import org.cryptomator.domain.PCloud
import org.cryptomator.domain.S3Cloud
import org.cryptomator.domain.WebDavCloud
@@ -18,6 +19,7 @@ import org.cryptomator.presentation.intent.Intents
import org.cryptomator.presentation.model.CloudModel
import org.cryptomator.presentation.model.CloudTypeModel
import org.cryptomator.presentation.model.LocalStorageModel
+import org.cryptomator.presentation.model.OnedriveCloudModel
import org.cryptomator.presentation.model.PCloudModel
import org.cryptomator.presentation.model.S3CloudModel
import org.cryptomator.presentation.model.WebDavCloudModel
@@ -39,6 +41,7 @@ class CloudSettingsPresenter @Inject constructor( //
private val nonSingleLoginClouds: Set = EnumSet.of( //
CloudTypeModel.CRYPTO, //
CloudTypeModel.LOCAL, //
+ CloudTypeModel.ONEDRIVE, //
CloudTypeModel.PCLOUD, //
CloudTypeModel.S3, //
CloudTypeModel.WEBDAV
@@ -95,6 +98,7 @@ class CloudSettingsPresenter @Inject constructor( //
private fun effectiveTitle(cloudTypeModel: CloudTypeModel): String {
when (cloudTypeModel) {
+ CloudTypeModel.ONEDRIVE -> return context().getString(R.string.screen_cloud_settings_onedrive_connections)
CloudTypeModel.PCLOUD -> return context().getString(R.string.screen_cloud_settings_pcloud_connections)
CloudTypeModel.WEBDAV -> return context().getString(R.string.screen_cloud_settings_webdav_connections)
CloudTypeModel.S3 -> return context().getString(R.string.screen_cloud_settings_s3_connections)
@@ -130,6 +134,7 @@ class CloudSettingsPresenter @Inject constructor( //
.filter { cloud -> !(BuildConfig.FLAVOR == "fdroid" && cloud.cloudType() == CloudTypeModel.GOOGLE_DRIVE) } //
.toMutableList() //
.also {
+ it.add(aOnedriveCloud())
it.add(aPCloud())
it.add(aWebdavCloud())
it.add(aS3Cloud())
@@ -138,6 +143,10 @@ class CloudSettingsPresenter @Inject constructor( //
view?.render(cloudModel)
}
+ private fun aOnedriveCloud(): OnedriveCloudModel {
+ return OnedriveCloudModel(OnedriveCloud.aOnedriveCloud().build())
+ }
+
private fun aPCloud(): PCloudModel {
return PCloudModel(PCloud.aPCloud().build())
}
diff --git a/presentation/src/main/java/org/cryptomator/presentation/ui/adapter/CloudConnectionListAdapter.kt b/presentation/src/main/java/org/cryptomator/presentation/ui/adapter/CloudConnectionListAdapter.kt
index f2cedc79..ea6c6f70 100644
--- a/presentation/src/main/java/org/cryptomator/presentation/ui/adapter/CloudConnectionListAdapter.kt
+++ b/presentation/src/main/java/org/cryptomator/presentation/ui/adapter/CloudConnectionListAdapter.kt
@@ -7,6 +7,7 @@ import org.cryptomator.domain.exception.FatalBackendException
import org.cryptomator.presentation.R
import org.cryptomator.presentation.model.CloudModel
import org.cryptomator.presentation.model.LocalStorageModel
+import org.cryptomator.presentation.model.OnedriveCloudModel
import org.cryptomator.presentation.model.PCloudModel
import org.cryptomator.presentation.model.S3CloudModel
import org.cryptomator.presentation.model.WebDavCloudModel
@@ -55,6 +56,9 @@ internal constructor(context: Context) : RecyclerViewBaseAdapter {
+ bindOnedriveCloudModel(cloudModel)
+ }
is WebDavCloudModel -> {
bindWebDavCloudModel(cloudModel)
}
@@ -70,6 +74,12 @@ internal constructor(context: Context) : RecyclerViewBaseAdapter itemView.cloudName.text = context.getString(R.string.screen_cloud_settings_onedrive_connections)
CloudTypeModel.PCLOUD -> itemView.cloudName.text = context.getString(R.string.screen_cloud_settings_pcloud_connections)
CloudTypeModel.S3 -> itemView.cloudName.text = context.getString(R.string.screen_cloud_settings_s3_connections)
CloudTypeModel.WEBDAV -> itemView.cloudName.text = context.getString(R.string.screen_cloud_settings_webdav_connections)
diff --git a/presentation/src/main/java/org/cryptomator/presentation/ui/bottomsheet/CloudConnectionSettingsBottomSheet.kt b/presentation/src/main/java/org/cryptomator/presentation/ui/bottomsheet/CloudConnectionSettingsBottomSheet.kt
index 6d967b51..ffdc6167 100644
--- a/presentation/src/main/java/org/cryptomator/presentation/ui/bottomsheet/CloudConnectionSettingsBottomSheet.kt
+++ b/presentation/src/main/java/org/cryptomator/presentation/ui/bottomsheet/CloudConnectionSettingsBottomSheet.kt
@@ -7,6 +7,7 @@ import org.cryptomator.presentation.R
import org.cryptomator.presentation.model.CloudModel
import org.cryptomator.presentation.model.CloudTypeModel
import org.cryptomator.presentation.model.LocalStorageModel
+import org.cryptomator.presentation.model.OnedriveCloudModel
import org.cryptomator.presentation.model.PCloudModel
import org.cryptomator.presentation.model.S3CloudModel
import org.cryptomator.presentation.model.WebDavCloudModel
@@ -29,6 +30,7 @@ class CloudConnectionSettingsBottomSheet : BaseBottomSheet bindViewForOnedrive(cloudModel as OnedriveCloudModel)
CloudTypeModel.WEBDAV -> bindViewForWebDAV(cloudModel as WebDavCloudModel)
CloudTypeModel.PCLOUD -> bindViewForPCloud(cloudModel as PCloudModel)
CloudTypeModel.S3 -> bindViewForS3(cloudModel as S3CloudModel)
@@ -57,6 +59,11 @@ class CloudConnectionSettingsBottomSheet : BaseBottomSheet
@string/screen_settings_cloud_settings_label
+ OneDrive connections
WebDAV connections
pCloud connections
S3 connections
diff --git a/presentation/src/notFoss/java/org/cryptomator/presentation/presenter/AuthenticateCloudPresenter.kt b/presentation/src/notFoss/java/org/cryptomator/presentation/presenter/AuthenticateCloudPresenter.kt
index 7e12859b..f0454849 100644
--- a/presentation/src/notFoss/java/org/cryptomator/presentation/presenter/AuthenticateCloudPresenter.kt
+++ b/presentation/src/notFoss/java/org/cryptomator/presentation/presenter/AuthenticateCloudPresenter.kt
@@ -9,9 +9,16 @@ import android.widget.Toast
import com.dropbox.core.android.Auth
import com.google.api.client.googleapis.extensions.android.gms.auth.GoogleAccountCredential
import com.google.api.services.drive.DriveScopes
-import org.cryptomator.data.cloud.onedrive.OnedriveClientFactory
-import org.cryptomator.data.cloud.onedrive.graph.ClientException
-import org.cryptomator.data.cloud.onedrive.graph.ICallback
+import com.microsoft.identity.client.AuthenticationCallback
+import com.microsoft.identity.client.IAccount
+import com.microsoft.identity.client.IAuthenticationResult
+import com.microsoft.identity.client.IMultipleAccountPublicClientApplication
+import com.microsoft.identity.client.IPublicClientApplication
+import com.microsoft.identity.client.PublicClientApplication
+import com.microsoft.identity.client.exception.MsalClientException
+import com.microsoft.identity.client.exception.MsalException
+import com.microsoft.identity.client.exception.MsalServiceException
+import com.microsoft.identity.client.exception.MsalUiRequiredException
import org.cryptomator.data.util.X509CertificateHelper
import org.cryptomator.domain.Cloud
import org.cryptomator.domain.CloudType
@@ -35,7 +42,6 @@ import org.cryptomator.generator.Callback
import org.cryptomator.presentation.BuildConfig
import org.cryptomator.presentation.R
import org.cryptomator.presentation.exception.ExceptionHandlers
-import org.cryptomator.presentation.exception.PermissionNotGrantedException
import org.cryptomator.presentation.intent.AuthenticateCloudIntent
import org.cryptomator.presentation.intent.Intents
import org.cryptomator.presentation.model.CloudModel
@@ -151,10 +157,6 @@ class AuthenticateCloudPresenter @Inject constructor( //
finish()
}
- private fun failAuthentication(error: PermissionNotGrantedException) {
- finishWithResult(error)
- }
-
private inner class DropboxAuthStrategy : AuthStrategy {
private var authenticationStarted = false
@@ -271,29 +273,106 @@ class AuthenticateCloudPresenter @Inject constructor( //
private fun startAuthentication(cloud: CloudModel) {
authenticationStarted = true
- val authenticationAdapter = OnedriveClientFactory.getAuthAdapter(context(), (cloud.toCloud() as OnedriveCloud).accessToken())
- authenticationAdapter.login(activity(), object : ICallback {
- override fun success(accessToken: String?) {
- if (accessToken == null) {
- Timber.tag("AuthicateCloudPrester").e("Onedrive access token is empty")
+
+ PublicClientApplication.createMultipleAccountPublicClientApplication(
+ context(),
+ R.raw.auth_config_onedrive,
+ object : IPublicClientApplication.IMultipleAccountApplicationCreatedListener {
+ override fun onCreated(application: IMultipleAccountPublicClientApplication) {
+ application.getAccounts(object : IPublicClientApplication.LoadAccountsCallback {
+ override fun onTaskCompleted(accounts: List) {
+ if (accounts.isEmpty()) {
+ application.acquireToken(activity(), onedriveScopes(), getAuthInteractiveCallback(cloud))
+ } else {
+ accounts.find { account -> account.username == cloud.username() }?.let {
+ application.acquireTokenSilentAsync(
+ onedriveScopes(),
+ it,
+ "https://login.microsoftonline.com/common",
+ getAuthSilentCallback(cloud, application)
+ )
+ } ?: application.acquireToken(activity(), onedriveScopes(), getAuthInteractiveCallback(cloud))
+ }
+ }
+
+ override fun onError(e: MsalException) {
+ Timber.tag("AuthenticateCloudPresenter").e(e, "Error to get accounts")
+ failAuthentication(cloud.name())
+ }
+ })
+ }
+
+ override fun onError(e: MsalException) {
+ Timber.tag("AuthenticateCloudPresenter").i(e, "Error in configuration")
failAuthentication(cloud.name())
- } else {
- showProgress(ProgressModel(ProgressStateModel.AUTHENTICATION))
- handleAuthenticationResult(cloud, accessToken)
+ }
+ })
+ }
+
+ private fun getAuthSilentCallback(cloud: CloudModel, application: IMultipleAccountPublicClientApplication): AuthenticationCallback {
+ return object : AuthenticationCallback {
+
+ override fun onSuccess(authenticationResult: IAuthenticationResult) {
+ Timber.tag("AuthenticateCloudPresenter").i("Successfully authenticated")
+ handleAuthenticationResult(cloud, authenticationResult.accessToken)
+ }
+
+ override fun onError(e: MsalException) {
+ Timber.tag("AuthenticateCloudPresenter").e(e, "Failed to acquireToken")
+ when (e) {
+ is MsalClientException -> {
+ /* Exception inside MSAL, more info inside MsalError.java */
+ failAuthentication(cloud.name())
+ }
+ is MsalServiceException -> {
+ /* Exception when communicating with the STS, likely config issue */
+ failAuthentication(cloud.name())
+ }
+ is MsalUiRequiredException -> {
+ /* Tokens expired or no session, retry with interactive */
+ application.acquireToken(activity(), onedriveScopes(), getAuthInteractiveCallback(cloud))
+ }
}
}
- override fun failure(ex: ClientException) {
- Timber.tag("AuthicateCloudPrester").e(ex)
+ override fun onCancel() {
+ Timber.tag("AuthenticateCloudPresenter").i("User cancelled login")
+ }
+ }
+ }
+
+ private fun getAuthInteractiveCallback(cloud: CloudModel): AuthenticationCallback {
+ return object : AuthenticationCallback {
+
+ override fun onSuccess(authenticationResult: IAuthenticationResult) {
+ Timber.tag("AuthenticateCloudPresenter").i("Successfully authenticated")
+ handleAuthenticationResult(cloud, authenticationResult.accessToken, authenticationResult.account.username)
+ }
+
+ override fun onError(e: MsalException) {
+ Timber.tag("AuthenticateCloudPresenter").e(e, "Successfully authenticated")
failAuthentication(cloud.name())
}
- })
+
+ override fun onCancel() {
+ Timber.tag("AuthenticateCloudPresenter").i("User cancelled login")
+ }
+ }
}
private fun handleAuthenticationResult(cloud: CloudModel, accessToken: String) {
getUsernameAndSuceedAuthentication( //
OnedriveCloud.aCopyOf(cloud.toCloud() as OnedriveCloud) //
- .withAccessToken(accessToken) //
+ .withAccessToken(encrypt(accessToken)) //
+ .build()
+ )
+ }
+
+ private fun handleAuthenticationResult(cloud: CloudModel, accessToken: String, username: String) {
+ getUsernameAndSuceedAuthentication( //
+ OnedriveCloud.aCopyOf(cloud.toCloud() as OnedriveCloud) //
+ .withAccessToken(encrypt(accessToken)) //
+ .withUsername(username)
.build()
)
}
@@ -558,6 +637,10 @@ class AuthenticateCloudPresenter @Inject constructor( //
companion object {
const val WEBDAV_ACCEPTED_UNTRUSTED_CERTIFICATE = "acceptedUntrustedCertificate"
+
+ fun onedriveScopes(): Array {
+ return arrayOf("User.Read", "Files.ReadWrite")
+ }
}
init {
diff --git a/settings.gradle b/settings.gradle
index 6398dc17..cf7883a7 100644
--- a/settings.gradle
+++ b/settings.gradle
@@ -1,8 +1,7 @@
-include ':generator', ':presentation', ':generator-api', ':domain', ':data', ':util', ':msa-auth-for-android', ':pcloud-sdk-java-root', ':pcloud-sdk-java', ':subsampling-image-view'
+include ':generator', ':presentation', ':generator-api', ':domain', ':data', ':util', ':pcloud-sdk-java-root', ':pcloud-sdk-java', ':subsampling-image-view'
var libFolder = new File(rootDir, 'lib')
-project(':msa-auth-for-android').projectDir = file(new File(libFolder, 'msa-auth-for-android'))
project(':pcloud-sdk-java-root').projectDir = file(new File(libFolder, 'pcloud-sdk-java'))
project(':pcloud-sdk-java').projectDir = file(new File(libFolder, 'pcloud-sdk-java/java-core'))
project(':subsampling-image-view').projectDir = file(new File(libFolder, 'subsampling-scale-image-view/library'))