Initial open source commit 🎉
This commit is contained in:
parent
95c85b4600
commit
80444758cc
20
.github/workflows/build.yml
vendored
Normal file
20
.github/workflows/build.yml
vendored
Normal file
@ -0,0 +1,20 @@
|
||||
name: Build
|
||||
|
||||
on:
|
||||
[push]
|
||||
|
||||
jobs:
|
||||
build:
|
||||
name: Test
|
||||
runs-on: ubuntu-latest
|
||||
if: "!contains(github.event.head_commit.message, '[ci skip]') && !contains(github.event.head_commit.message, '[skip ci]')"
|
||||
steps:
|
||||
- uses: actions/checkout@v2
|
||||
with:
|
||||
submodules: true
|
||||
fetch-depth: 0
|
||||
- uses: actions/setup-java@v1
|
||||
with:
|
||||
java-version: 1.8
|
||||
- name: Build and Test
|
||||
run: bash ./gradlew clean test --stacktrace
|
43
.gitignore
vendored
Normal file
43
.gitignore
vendored
Normal file
@ -0,0 +1,43 @@
|
||||
secrets.properties
|
||||
|
||||
###IntelliJ###
|
||||
|
||||
*.iml
|
||||
*.ipr
|
||||
*.iws
|
||||
.idea/
|
||||
|
||||
###Android###
|
||||
|
||||
# Built application files
|
||||
*.apk
|
||||
*.aab
|
||||
*.ap_
|
||||
|
||||
# Java class files
|
||||
*.class
|
||||
|
||||
# Generated files
|
||||
bin/
|
||||
gen/
|
||||
**/**/debug/output.json
|
||||
**/**/release/output.json
|
||||
|
||||
# Gradle files
|
||||
.gradle/
|
||||
build/
|
||||
**/release/output-metadata.json
|
||||
**/debug/output-metadata.json
|
||||
|
||||
# Local configuration file (sdk path, etc)
|
||||
local.properties
|
||||
|
||||
# fastlane
|
||||
secret_key_file.json
|
||||
**/**/fastlane/fastlane/**
|
||||
**/**/fastlane/metadata/**
|
||||
**/**/fastlane/report.xml
|
||||
**/**/fastlane/mappings/**
|
||||
**/**/fastlane/release_notes/**
|
||||
**/**/fastlane/latest_versions/**
|
||||
.env.default
|
6
.gitmodules
vendored
Normal file
6
.gitmodules
vendored
Normal file
@ -0,0 +1,6 @@
|
||||
[submodule "msa-auth-for-android"]
|
||||
path = msa-auth-for-android
|
||||
url = https://github.com/SailReal/msa-auth-for-android.git
|
||||
[submodule "subsampling-scale-image-view"]
|
||||
path = subsampling-scale-image-view
|
||||
url = https://github.com/SailReal/subsampling-scale-image-view.git
|
674
LICENSE.txt
Normal file
674
LICENSE.txt
Normal file
@ -0,0 +1,674 @@
|
||||
GNU GENERAL PUBLIC LICENSE
|
||||
Version 3, 29 June 2007
|
||||
|
||||
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The GNU General Public License is a free, copyleft license for
|
||||
software and other kinds of works.
|
||||
|
||||
The licenses for most software and other practical works are designed
|
||||
to take away your freedom to share and change the works. By contrast,
|
||||
the GNU General Public License is intended to guarantee your freedom to
|
||||
share and change all versions of a program--to make sure it remains free
|
||||
software for all its users. We, the Free Software Foundation, use the
|
||||
GNU General Public License for most of our software; it applies also to
|
||||
any other work released this way by its authors. You can apply it to
|
||||
your programs, too.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
them if you wish), that you receive source code or can get it if you
|
||||
want it, that you can change the software or use pieces of it in new
|
||||
free programs, and that you know you can do these things.
|
||||
|
||||
To protect your rights, we need to prevent others from denying you
|
||||
these rights or asking you to surrender the rights. Therefore, you have
|
||||
certain responsibilities if you distribute copies of the software, or if
|
||||
you modify it: responsibilities to respect the freedom of others.
|
||||
|
||||
For example, if you distribute copies of such a program, whether
|
||||
gratis or for a fee, you must pass on to the recipients the same
|
||||
freedoms that you received. You must make sure that they, too, receive
|
||||
or can get the source code. And you must show them these terms so they
|
||||
know their rights.
|
||||
|
||||
Developers that use the GNU GPL protect your rights with two steps:
|
||||
(1) assert copyright on the software, and (2) offer you this License
|
||||
giving you legal permission to copy, distribute and/or modify it.
|
||||
|
||||
For the developers' and authors' protection, the GPL clearly explains
|
||||
that there is no warranty for this free software. For both users' and
|
||||
authors' sake, the GPL requires that modified versions be marked as
|
||||
changed, so that their problems will not be attributed erroneously to
|
||||
authors of previous versions.
|
||||
|
||||
Some devices are designed to deny users access to install or run
|
||||
modified versions of the software inside them, although the manufacturer
|
||||
can do so. This is fundamentally incompatible with the aim of
|
||||
protecting users' freedom to change the software. The systematic
|
||||
pattern of such abuse occurs in the area of products for individuals to
|
||||
use, which is precisely where it is most unacceptable. Therefore, we
|
||||
have designed this version of the GPL to prohibit the practice for those
|
||||
products. If such problems arise substantially in other domains, we
|
||||
stand ready to extend this provision to those domains in future versions
|
||||
of the GPL, as needed to protect the freedom of users.
|
||||
|
||||
Finally, every program is threatened constantly by software patents.
|
||||
States should not allow patents to restrict development and use of
|
||||
software on general-purpose computers, but in those that do, we wish to
|
||||
avoid the special danger that patents applied to a free program could
|
||||
make it effectively proprietary. To prevent this, the GPL assures that
|
||||
patents cannot be used to render the program non-free.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow.
|
||||
|
||||
TERMS AND CONDITIONS
|
||||
|
||||
0. Definitions.
|
||||
|
||||
"This License" refers to version 3 of the GNU General Public License.
|
||||
|
||||
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||
works, such as semiconductor masks.
|
||||
|
||||
"The Program" refers to any copyrightable work licensed under this
|
||||
License. Each licensee is addressed as "you". "Licensees" and
|
||||
"recipients" may be individuals or organizations.
|
||||
|
||||
To "modify" a work means to copy from or adapt all or part of the work
|
||||
in a fashion requiring copyright permission, other than the making of an
|
||||
exact copy. The resulting work is called a "modified version" of the
|
||||
earlier work or a work "based on" the earlier work.
|
||||
|
||||
A "covered work" means either the unmodified Program or a work based
|
||||
on the Program.
|
||||
|
||||
To "propagate" a work means to do anything with it that, without
|
||||
permission, would make you directly or secondarily liable for
|
||||
infringement under applicable copyright law, except executing it on a
|
||||
computer or modifying a private copy. Propagation includes copying,
|
||||
distribution (with or without modification), making available to the
|
||||
public, and in some countries other activities as well.
|
||||
|
||||
To "convey" a work means any kind of propagation that enables other
|
||||
parties to make or receive copies. Mere interaction with a user through
|
||||
a computer network, with no transfer of a copy, is not conveying.
|
||||
|
||||
An interactive user interface displays "Appropriate Legal Notices"
|
||||
to the extent that it includes a convenient and prominently visible
|
||||
feature that (1) displays an appropriate copyright notice, and (2)
|
||||
tells the user that there is no warranty for the work (except to the
|
||||
extent that warranties are provided), that licensees may convey the
|
||||
work under this License, and how to view a copy of this License. If
|
||||
the interface presents a list of user commands or options, such as a
|
||||
menu, a prominent item in the list meets this criterion.
|
||||
|
||||
1. Source Code.
|
||||
|
||||
The "source code" for a work means the preferred form of the work
|
||||
for making modifications to it. "Object code" means any non-source
|
||||
form of a work.
|
||||
|
||||
A "Standard Interface" means an interface that either is an official
|
||||
standard defined by a recognized standards body, or, in the case of
|
||||
interfaces specified for a particular programming language, one that
|
||||
is widely used among developers working in that language.
|
||||
|
||||
The "System Libraries" of an executable work include anything, other
|
||||
than the work as a whole, that (a) is included in the normal form of
|
||||
packaging a Major Component, but which is not part of that Major
|
||||
Component, and (b) serves only to enable use of the work with that
|
||||
Major Component, or to implement a Standard Interface for which an
|
||||
implementation is available to the public in source code form. A
|
||||
"Major Component", in this context, means a major essential component
|
||||
(kernel, window system, and so on) of the specific operating system
|
||||
(if any) on which the executable work runs, or a compiler used to
|
||||
produce the work, or an object code interpreter used to run it.
|
||||
|
||||
The "Corresponding Source" for a work in object code form means all
|
||||
the source code needed to generate, install, and (for an executable
|
||||
work) run the object code and to modify the work, including scripts to
|
||||
control those activities. However, it does not include the work's
|
||||
System Libraries, or general-purpose tools or generally available free
|
||||
programs which are used unmodified in performing those activities but
|
||||
which are not part of the work. For example, Corresponding Source
|
||||
includes interface definition files associated with source files for
|
||||
the work, and the source code for shared libraries and dynamically
|
||||
linked subprograms that the work is specifically designed to require,
|
||||
such as by intimate data communication or control flow between those
|
||||
subprograms and other parts of the work.
|
||||
|
||||
The Corresponding Source need not include anything that users
|
||||
can regenerate automatically from other parts of the Corresponding
|
||||
Source.
|
||||
|
||||
The Corresponding Source for a work in source code form is that
|
||||
same work.
|
||||
|
||||
2. Basic Permissions.
|
||||
|
||||
All rights granted under this License are granted for the term of
|
||||
copyright on the Program, and are irrevocable provided the stated
|
||||
conditions are met. This License explicitly affirms your unlimited
|
||||
permission to run the unmodified Program. The output from running a
|
||||
covered work is covered by this License only if the output, given its
|
||||
content, constitutes a covered work. This License acknowledges your
|
||||
rights of fair use or other equivalent, as provided by copyright law.
|
||||
|
||||
You may make, run and propagate covered works that you do not
|
||||
convey, without conditions so long as your license otherwise remains
|
||||
in force. You may convey covered works to others for the sole purpose
|
||||
of having them make modifications exclusively for you, or provide you
|
||||
with facilities for running those works, provided that you comply with
|
||||
the terms of this License in conveying all material for which you do
|
||||
not control copyright. Those thus making or running the covered works
|
||||
for you must do so exclusively on your behalf, under your direction
|
||||
and control, on terms that prohibit them from making any copies of
|
||||
your copyrighted material outside their relationship with you.
|
||||
|
||||
Conveying under any other circumstances is permitted solely under
|
||||
the conditions stated below. Sublicensing is not allowed; section 10
|
||||
makes it unnecessary.
|
||||
|
||||
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||
|
||||
No covered work shall be deemed part of an effective technological
|
||||
measure under any applicable law fulfilling obligations under article
|
||||
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||
similar laws prohibiting or restricting circumvention of such
|
||||
measures.
|
||||
|
||||
When you convey a covered work, you waive any legal power to forbid
|
||||
circumvention of technological measures to the extent such circumvention
|
||||
is effected by exercising rights under this License with respect to
|
||||
the covered work, and you disclaim any intention to limit operation or
|
||||
modification of the work as a means of enforcing, against the work's
|
||||
users, your or third parties' legal rights to forbid circumvention of
|
||||
technological measures.
|
||||
|
||||
4. Conveying Verbatim Copies.
|
||||
|
||||
You may convey verbatim copies of the Program's source code as you
|
||||
receive it, in any medium, provided that you conspicuously and
|
||||
appropriately publish on each copy an appropriate copyright notice;
|
||||
keep intact all notices stating that this License and any
|
||||
non-permissive terms added in accord with section 7 apply to the code;
|
||||
keep intact all notices of the absence of any warranty; and give all
|
||||
recipients a copy of this License along with the Program.
|
||||
|
||||
You may charge any price or no price for each copy that you convey,
|
||||
and you may offer support or warranty protection for a fee.
|
||||
|
||||
5. Conveying Modified Source Versions.
|
||||
|
||||
You may convey a work based on the Program, or the modifications to
|
||||
produce it from the Program, in the form of source code under the
|
||||
terms of section 4, provided that you also meet all of these conditions:
|
||||
|
||||
a) The work must carry prominent notices stating that you modified
|
||||
it, and giving a relevant date.
|
||||
|
||||
b) The work must carry prominent notices stating that it is
|
||||
released under this License and any conditions added under section
|
||||
7. This requirement modifies the requirement in section 4 to
|
||||
"keep intact all notices".
|
||||
|
||||
c) You must license the entire work, as a whole, under this
|
||||
License to anyone who comes into possession of a copy. This
|
||||
License will therefore apply, along with any applicable section 7
|
||||
additional terms, to the whole of the work, and all its parts,
|
||||
regardless of how they are packaged. This License gives no
|
||||
permission to license the work in any other way, but it does not
|
||||
invalidate such permission if you have separately received it.
|
||||
|
||||
d) If the work has interactive user interfaces, each must display
|
||||
Appropriate Legal Notices; however, if the Program has interactive
|
||||
interfaces that do not display Appropriate Legal Notices, your
|
||||
work need not make them do so.
|
||||
|
||||
A compilation of a covered work with other separate and independent
|
||||
works, which are not by their nature extensions of the covered work,
|
||||
and which are not combined with it such as to form a larger program,
|
||||
in or on a volume of a storage or distribution medium, is called an
|
||||
"aggregate" if the compilation and its resulting copyright are not
|
||||
used to limit the access or legal rights of the compilation's users
|
||||
beyond what the individual works permit. Inclusion of a covered work
|
||||
in an aggregate does not cause this License to apply to the other
|
||||
parts of the aggregate.
|
||||
|
||||
6. Conveying Non-Source Forms.
|
||||
|
||||
You may convey a covered work in object code form under the terms
|
||||
of sections 4 and 5, provided that you also convey the
|
||||
machine-readable Corresponding Source under the terms of this License,
|
||||
in one of these ways:
|
||||
|
||||
a) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by the
|
||||
Corresponding Source fixed on a durable physical medium
|
||||
customarily used for software interchange.
|
||||
|
||||
b) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by a
|
||||
written offer, valid for at least three years and valid for as
|
||||
long as you offer spare parts or customer support for that product
|
||||
model, to give anyone who possesses the object code either (1) a
|
||||
copy of the Corresponding Source for all the software in the
|
||||
product that is covered by this License, on a durable physical
|
||||
medium customarily used for software interchange, for a price no
|
||||
more than your reasonable cost of physically performing this
|
||||
conveying of source, or (2) access to copy the
|
||||
Corresponding Source from a network server at no charge.
|
||||
|
||||
c) Convey individual copies of the object code with a copy of the
|
||||
written offer to provide the Corresponding Source. This
|
||||
alternative is allowed only occasionally and noncommercially, and
|
||||
only if you received the object code with such an offer, in accord
|
||||
with subsection 6b.
|
||||
|
||||
d) Convey the object code by offering access from a designated
|
||||
place (gratis or for a charge), and offer equivalent access to the
|
||||
Corresponding Source in the same way through the same place at no
|
||||
further charge. You need not require recipients to copy the
|
||||
Corresponding Source along with the object code. If the place to
|
||||
copy the object code is a network server, the Corresponding Source
|
||||
may be on a different server (operated by you or a third party)
|
||||
that supports equivalent copying facilities, provided you maintain
|
||||
clear directions next to the object code saying where to find the
|
||||
Corresponding Source. Regardless of what server hosts the
|
||||
Corresponding Source, you remain obligated to ensure that it is
|
||||
available for as long as needed to satisfy these requirements.
|
||||
|
||||
e) Convey the object code using peer-to-peer transmission, provided
|
||||
you inform other peers where the object code and Corresponding
|
||||
Source of the work are being offered to the general public at no
|
||||
charge under subsection 6d.
|
||||
|
||||
A separable portion of the object code, whose source code is excluded
|
||||
from the Corresponding Source as a System Library, need not be
|
||||
included in conveying the object code work.
|
||||
|
||||
A "User Product" is either (1) a "consumer product", which means any
|
||||
tangible personal property which is normally used for personal, family,
|
||||
or household purposes, or (2) anything designed or sold for incorporation
|
||||
into a dwelling. In determining whether a product is a consumer product,
|
||||
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||
product received by a particular user, "normally used" refers to a
|
||||
typical or common use of that class of product, regardless of the status
|
||||
of the particular user or of the way in which the particular user
|
||||
actually uses, or expects or is expected to use, the product. A product
|
||||
is a consumer product regardless of whether the product has substantial
|
||||
commercial, industrial or non-consumer uses, unless such uses represent
|
||||
the only significant mode of use of the product.
|
||||
|
||||
"Installation Information" for a User Product means any methods,
|
||||
procedures, authorization keys, or other information required to install
|
||||
and execute modified versions of a covered work in that User Product from
|
||||
a modified version of its Corresponding Source. The information must
|
||||
suffice to ensure that the continued functioning of the modified object
|
||||
code is in no case prevented or interfered with solely because
|
||||
modification has been made.
|
||||
|
||||
If you convey an object code work under this section in, or with, or
|
||||
specifically for use in, a User Product, and the conveying occurs as
|
||||
part of a transaction in which the right of possession and use of the
|
||||
User Product is transferred to the recipient in perpetuity or for a
|
||||
fixed term (regardless of how the transaction is characterized), the
|
||||
Corresponding Source conveyed under this section must be accompanied
|
||||
by the Installation Information. But this requirement does not apply
|
||||
if neither you nor any third party retains the ability to install
|
||||
modified object code on the User Product (for example, the work has
|
||||
been installed in ROM).
|
||||
|
||||
The requirement to provide Installation Information does not include a
|
||||
requirement to continue to provide support service, warranty, or updates
|
||||
for a work that has been modified or installed by the recipient, or for
|
||||
the User Product in which it has been modified or installed. Access to a
|
||||
network may be denied when the modification itself materially and
|
||||
adversely affects the operation of the network or violates the rules and
|
||||
protocols for communication across the network.
|
||||
|
||||
Corresponding Source conveyed, and Installation Information provided,
|
||||
in accord with this section must be in a format that is publicly
|
||||
documented (and with an implementation available to the public in
|
||||
source code form), and must require no special password or key for
|
||||
unpacking, reading or copying.
|
||||
|
||||
7. Additional Terms.
|
||||
|
||||
"Additional permissions" are terms that supplement the terms of this
|
||||
License by making exceptions from one or more of its conditions.
|
||||
Additional permissions that are applicable to the entire Program shall
|
||||
be treated as though they were included in this License, to the extent
|
||||
that they are valid under applicable law. If additional permissions
|
||||
apply only to part of the Program, that part may be used separately
|
||||
under those permissions, but the entire Program remains governed by
|
||||
this License without regard to the additional permissions.
|
||||
|
||||
When you convey a copy of a covered work, you may at your option
|
||||
remove any additional permissions from that copy, or from any part of
|
||||
it. (Additional permissions may be written to require their own
|
||||
removal in certain cases when you modify the work.) You may place
|
||||
additional permissions on material, added by you to a covered work,
|
||||
for which you have or can give appropriate copyright permission.
|
||||
|
||||
Notwithstanding any other provision of this License, for material you
|
||||
add to a covered work, you may (if authorized by the copyright holders of
|
||||
that material) supplement the terms of this License with terms:
|
||||
|
||||
a) Disclaiming warranty or limiting liability differently from the
|
||||
terms of sections 15 and 16 of this License; or
|
||||
|
||||
b) Requiring preservation of specified reasonable legal notices or
|
||||
author attributions in that material or in the Appropriate Legal
|
||||
Notices displayed by works containing it; or
|
||||
|
||||
c) Prohibiting misrepresentation of the origin of that material, or
|
||||
requiring that modified versions of such material be marked in
|
||||
reasonable ways as different from the original version; or
|
||||
|
||||
d) Limiting the use for publicity purposes of names of licensors or
|
||||
authors of the material; or
|
||||
|
||||
e) Declining to grant rights under trademark law for use of some
|
||||
trade names, trademarks, or service marks; or
|
||||
|
||||
f) Requiring indemnification of licensors and authors of that
|
||||
material by anyone who conveys the material (or modified versions of
|
||||
it) with contractual assumptions of liability to the recipient, for
|
||||
any liability that these contractual assumptions directly impose on
|
||||
those licensors and authors.
|
||||
|
||||
All other non-permissive additional terms are considered "further
|
||||
restrictions" within the meaning of section 10. If the Program as you
|
||||
received it, or any part of it, contains a notice stating that it is
|
||||
governed by this License along with a term that is a further
|
||||
restriction, you may remove that term. If a license document contains
|
||||
a further restriction but permits relicensing or conveying under this
|
||||
License, you may add to a covered work material governed by the terms
|
||||
of that license document, provided that the further restriction does
|
||||
not survive such relicensing or conveying.
|
||||
|
||||
If you add terms to a covered work in accord with this section, you
|
||||
must place, in the relevant source files, a statement of the
|
||||
additional terms that apply to those files, or a notice indicating
|
||||
where to find the applicable terms.
|
||||
|
||||
Additional terms, permissive or non-permissive, may be stated in the
|
||||
form of a separately written license, or stated as exceptions;
|
||||
the above requirements apply either way.
|
||||
|
||||
8. Termination.
|
||||
|
||||
You may not propagate or modify a covered work except as expressly
|
||||
provided under this License. Any attempt otherwise to propagate or
|
||||
modify it is void, and will automatically terminate your rights under
|
||||
this License (including any patent licenses granted under the third
|
||||
paragraph of section 11).
|
||||
|
||||
However, if you cease all violation of this License, then your
|
||||
license from a particular copyright holder is reinstated (a)
|
||||
provisionally, unless and until the copyright holder explicitly and
|
||||
finally terminates your license, and (b) permanently, if the copyright
|
||||
holder fails to notify you of the violation by some reasonable means
|
||||
prior to 60 days after the cessation.
|
||||
|
||||
Moreover, your license from a particular copyright holder is
|
||||
reinstated permanently if the copyright holder notifies you of the
|
||||
violation by some reasonable means, this is the first time you have
|
||||
received notice of violation of this License (for any work) from that
|
||||
copyright holder, and you cure the violation prior to 30 days after
|
||||
your receipt of the notice.
|
||||
|
||||
Termination of your rights under this section does not terminate the
|
||||
licenses of parties who have received copies or rights from you under
|
||||
this License. If your rights have been terminated and not permanently
|
||||
reinstated, you do not qualify to receive new licenses for the same
|
||||
material under section 10.
|
||||
|
||||
9. Acceptance Not Required for Having Copies.
|
||||
|
||||
You are not required to accept this License in order to receive or
|
||||
run a copy of the Program. Ancillary propagation of a covered work
|
||||
occurring solely as a consequence of using peer-to-peer transmission
|
||||
to receive a copy likewise does not require acceptance. However,
|
||||
nothing other than this License grants you permission to propagate or
|
||||
modify any covered work. These actions infringe copyright if you do
|
||||
not accept this License. Therefore, by modifying or propagating a
|
||||
covered work, you indicate your acceptance of this License to do so.
|
||||
|
||||
10. Automatic Licensing of Downstream Recipients.
|
||||
|
||||
Each time you convey a covered work, the recipient automatically
|
||||
receives a license from the original licensors, to run, modify and
|
||||
propagate that work, subject to this License. You are not responsible
|
||||
for enforcing compliance by third parties with this License.
|
||||
|
||||
An "entity transaction" is a transaction transferring control of an
|
||||
organization, or substantially all assets of one, or subdividing an
|
||||
organization, or merging organizations. If propagation of a covered
|
||||
work results from an entity transaction, each party to that
|
||||
transaction who receives a copy of the work also receives whatever
|
||||
licenses to the work the party's predecessor in interest had or could
|
||||
give under the previous paragraph, plus a right to possession of the
|
||||
Corresponding Source of the work from the predecessor in interest, if
|
||||
the predecessor has it or can get it with reasonable efforts.
|
||||
|
||||
You may not impose any further restrictions on the exercise of the
|
||||
rights granted or affirmed under this License. For example, you may
|
||||
not impose a license fee, royalty, or other charge for exercise of
|
||||
rights granted under this License, and you may not initiate litigation
|
||||
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||
any patent claim is infringed by making, using, selling, offering for
|
||||
sale, or importing the Program or any portion of it.
|
||||
|
||||
11. Patents.
|
||||
|
||||
A "contributor" is a copyright holder who authorizes use under this
|
||||
License of the Program or a work on which the Program is based. The
|
||||
work thus licensed is called the contributor's "contributor version".
|
||||
|
||||
A contributor's "essential patent claims" are all patent claims
|
||||
owned or controlled by the contributor, whether already acquired or
|
||||
hereafter acquired, that would be infringed by some manner, permitted
|
||||
by this License, of making, using, or selling its contributor version,
|
||||
but do not include claims that would be infringed only as a
|
||||
consequence of further modification of the contributor version. For
|
||||
purposes of this definition, "control" includes the right to grant
|
||||
patent sublicenses in a manner consistent with the requirements of
|
||||
this License.
|
||||
|
||||
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||
patent license under the contributor's essential patent claims, to
|
||||
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||
propagate the contents of its contributor version.
|
||||
|
||||
In the following three paragraphs, a "patent license" is any express
|
||||
agreement or commitment, however denominated, not to enforce a patent
|
||||
(such as an express permission to practice a patent or covenant not to
|
||||
sue for patent infringement). To "grant" such a patent license to a
|
||||
party means to make such an agreement or commitment not to enforce a
|
||||
patent against the party.
|
||||
|
||||
If you convey a covered work, knowingly relying on a patent license,
|
||||
and the Corresponding Source of the work is not available for anyone
|
||||
to copy, free of charge and under the terms of this License, through a
|
||||
publicly available network server or other readily accessible means,
|
||||
then you must either (1) cause the Corresponding Source to be so
|
||||
available, or (2) arrange to deprive yourself of the benefit of the
|
||||
patent license for this particular work, or (3) arrange, in a manner
|
||||
consistent with the requirements of this License, to extend the patent
|
||||
license to downstream recipients. "Knowingly relying" means you have
|
||||
actual knowledge that, but for the patent license, your conveying the
|
||||
covered work in a country, or your recipient's use of the covered work
|
||||
in a country, would infringe one or more identifiable patents in that
|
||||
country that you have reason to believe are valid.
|
||||
|
||||
If, pursuant to or in connection with a single transaction or
|
||||
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||
covered work, and grant a patent license to some of the parties
|
||||
receiving the covered work authorizing them to use, propagate, modify
|
||||
or convey a specific copy of the covered work, then the patent license
|
||||
you grant is automatically extended to all recipients of the covered
|
||||
work and works based on it.
|
||||
|
||||
A patent license is "discriminatory" if it does not include within
|
||||
the scope of its coverage, prohibits the exercise of, or is
|
||||
conditioned on the non-exercise of one or more of the rights that are
|
||||
specifically granted under this License. You may not convey a covered
|
||||
work if you are a party to an arrangement with a third party that is
|
||||
in the business of distributing software, under which you make payment
|
||||
to the third party based on the extent of your activity of conveying
|
||||
the work, and under which the third party grants, to any of the
|
||||
parties who would receive the covered work from you, a discriminatory
|
||||
patent license (a) in connection with copies of the covered work
|
||||
conveyed by you (or copies made from those copies), or (b) primarily
|
||||
for and in connection with specific products or compilations that
|
||||
contain the covered work, unless you entered into that arrangement,
|
||||
or that patent license was granted, prior to 28 March 2007.
|
||||
|
||||
Nothing in this License shall be construed as excluding or limiting
|
||||
any implied license or other defenses to infringement that may
|
||||
otherwise be available to you under applicable patent law.
|
||||
|
||||
12. No Surrender of Others' Freedom.
|
||||
|
||||
If conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot convey a
|
||||
covered work so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you may
|
||||
not convey it at all. For example, if you agree to terms that obligate you
|
||||
to collect a royalty for further conveying from those to whom you convey
|
||||
the Program, the only way you could satisfy both those terms and this
|
||||
License would be to refrain entirely from conveying the Program.
|
||||
|
||||
13. Use with the GNU Affero General Public License.
|
||||
|
||||
Notwithstanding any other provision of this License, you have
|
||||
permission to link or combine any covered work with a work licensed
|
||||
under version 3 of the GNU Affero General Public License into a single
|
||||
combined work, and to convey the resulting work. The terms of this
|
||||
License will continue to apply to the part which is the covered work,
|
||||
but the special requirements of the GNU Affero General Public License,
|
||||
section 13, concerning interaction through a network will apply to the
|
||||
combination as such.
|
||||
|
||||
14. Revised Versions of this License.
|
||||
|
||||
The Free Software Foundation may publish revised and/or new versions of
|
||||
the GNU General Public License from time to time. Such new versions will
|
||||
be similar in spirit to the present version, but may differ in detail to
|
||||
address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the
|
||||
Program specifies that a certain numbered version of the GNU General
|
||||
Public License "or any later version" applies to it, you have the
|
||||
option of following the terms and conditions either of that numbered
|
||||
version or of any later version published by the Free Software
|
||||
Foundation. If the Program does not specify a version number of the
|
||||
GNU General Public License, you may choose any version ever published
|
||||
by the Free Software Foundation.
|
||||
|
||||
If the Program specifies that a proxy can decide which future
|
||||
versions of the GNU General Public License can be used, that proxy's
|
||||
public statement of acceptance of a version permanently authorizes you
|
||||
to choose that version for the Program.
|
||||
|
||||
Later license versions may give you additional or different
|
||||
permissions. However, no additional obligations are imposed on any
|
||||
author or copyright holder as a result of your choosing to follow a
|
||||
later version.
|
||||
|
||||
15. Disclaimer of Warranty.
|
||||
|
||||
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||
|
||||
16. Limitation of Liability.
|
||||
|
||||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||
SUCH DAMAGES.
|
||||
|
||||
17. Interpretation of Sections 15 and 16.
|
||||
|
||||
If the disclaimer of warranty and limitation of liability provided
|
||||
above cannot be given local legal effect according to their terms,
|
||||
reviewing courts shall apply local law that most closely approximates
|
||||
an absolute waiver of all civil liability in connection with the
|
||||
Program, unless a warranty or assumption of liability accompanies a
|
||||
copy of the Program in return for a fee.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
How to Apply These Terms to Your New Programs
|
||||
|
||||
If you develop a new program, and you want it to be of the greatest
|
||||
possible use to the public, the best way to achieve this is to make it
|
||||
free software which everyone can redistribute and change under these terms.
|
||||
|
||||
To do so, attach the following notices to the program. It is safest
|
||||
to attach them to the start of each source file to most effectively
|
||||
state the exclusion of warranty; and each file should have at least
|
||||
the "copyright" line and a pointer to where the full notice is found.
|
||||
|
||||
<one line to give the program's name and a brief idea of what it does.>
|
||||
Copyright (C) <year> <name of author>
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
Also add information on how to contact you by electronic and paper mail.
|
||||
|
||||
If the program does terminal interaction, make it output a short
|
||||
notice like this when it starts in an interactive mode:
|
||||
|
||||
<program> Copyright (C) <year> <name of author>
|
||||
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||
This is free software, and you are welcome to redistribute it
|
||||
under certain conditions; type `show c' for details.
|
||||
|
||||
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||
parts of the General Public License. Of course, your program's commands
|
||||
might be different; for a GUI interface, you would use an "about box".
|
||||
|
||||
You should also get your employer (if you work as a programmer) or school,
|
||||
if any, to sign a "copyright disclaimer" for the program, if necessary.
|
||||
For more information on this, and how to apply and follow the GNU GPL, see
|
||||
<http://www.gnu.org/licenses/>.
|
||||
|
||||
The GNU General Public License does not permit incorporating your program
|
||||
into proprietary programs. If your program is a subroutine library, you
|
||||
may consider it more useful to permit linking proprietary applications with
|
||||
the library. If this is what you want to do, use the GNU Lesser General
|
||||
Public License instead of this License. But first, please read
|
||||
<http://www.gnu.org/philosophy/why-not-lgpl.html>.
|
29
README.md
29
README.md
@ -4,12 +4,31 @@
|
||||
[](https://community.cryptomator.org)
|
||||
[](https://docs.cryptomator.org)
|
||||
|
||||
Cryptomator for Android is available on Google play: [Download Cryptomator for Android](https://play.google.com/store/apps/details?id=org.cryptomator)
|
||||
Cryptomator offers multi-platform transparent client-side encryption of your files in the cloud.
|
||||
|
||||
## Open Core
|
||||
Cryptomator for Android is currently available in the following distribution channels:
|
||||
|
||||
Cryptomator for Android is an _open core_ project. This repository is used for collecting issues regarding the Android app of Cryptomator.
|
||||
1. [Using Google Play](https://play.google.com/store/apps/details?id=org.cryptomator)
|
||||
2. [Using Cryptomator's Website](https://cryptomator.org/android/)
|
||||
3. Building from source using Gradle (instructions below)
|
||||
|
||||
You can find the open source Java crypto library to access Cryptomator vaults at this repository: [cryptomator/cryptolib](https://github.com/cryptomator/cryptolib)
|
||||
## Building
|
||||
|
||||
For more information on the security details visit [cryptomator.org](https://cryptomator.org/architecture/).
|
||||
### Dependencies
|
||||
|
||||
* Git
|
||||
* JDK 8
|
||||
* Gradle
|
||||
|
||||
### Run Git and Gradle
|
||||
|
||||
```
|
||||
git submodule init && git submodule update // (not necessary if cloned using --recurse-submodules)
|
||||
./gradlew assembleLicenseDebug
|
||||
```
|
||||
|
||||
Before connecting to Onedrive or Dropbox you have to enter valid API keys in [secrets.properties](https://github.com/cryptomator/android/blob/master/secrets.properties).
|
||||
|
||||
## License
|
||||
|
||||
This project is dual-licensed under the GPLv3 for FOSS projects as well as a commercial license for independent software vendors and resellers. If you want to modify this application under different conditions, feel free to contact our support team.
|
||||
|
61
build.gradle
Normal file
61
build.gradle
Normal file
@ -0,0 +1,61 @@
|
||||
apply from: 'buildsystem/ci.gradle'
|
||||
apply from: 'buildsystem/dependencies.gradle'
|
||||
apply plugin: "com.vanniktech.android.junit.jacoco"
|
||||
|
||||
buildscript {
|
||||
ext.kotlin_version = '1.4.21'
|
||||
repositories {
|
||||
jcenter()
|
||||
mavenCentral()
|
||||
google()
|
||||
}
|
||||
dependencies {
|
||||
classpath 'com.android.tools.build:gradle:4.1.1'
|
||||
classpath 'org.greenrobot:greendao-gradle-plugin:3.3.0'
|
||||
classpath 'com.fernandocejas.frodo:frodo-plugin:0.8.3'
|
||||
classpath 'com.vanniktech:gradle-android-junit-jacoco-plugin:0.16.0'
|
||||
classpath "org.jetbrains.kotlin:kotlin-gradle-plugin:$kotlin_version"
|
||||
classpath "de.mannodermaus.gradle.plugins:android-junit5:1.7.0.0"
|
||||
}
|
||||
}
|
||||
|
||||
def getVersionCode = { ->
|
||||
try {
|
||||
def branchName = new ByteArrayOutputStream()
|
||||
exec {
|
||||
commandLine 'git', 'rev-parse', '--abbrev-ref', 'HEAD'
|
||||
standardOutput = branchName
|
||||
}
|
||||
def appBuild = new ByteArrayOutputStream()
|
||||
exec {
|
||||
commandLine 'git', 'rev-list', '--count', branchName.toString().trim()
|
||||
standardOutput = appBuild
|
||||
}
|
||||
return Integer.parseInt(appBuild.toString().trim()) + 1958 // adding 1958 for legacy reasons
|
||||
}
|
||||
catch (ignored) {
|
||||
return -1
|
||||
}
|
||||
}
|
||||
|
||||
allprojects {
|
||||
ext {
|
||||
androidApplicationId = 'org.cryptomator'
|
||||
androidVersionCode = getVersionCode()
|
||||
androidVersionName = '1.5.11-SNAPSHOT'
|
||||
}
|
||||
repositories {
|
||||
mavenCentral()
|
||||
maven {
|
||||
url "https://maven.google.com"
|
||||
}
|
||||
flatDir {
|
||||
dirs '../libs'
|
||||
}
|
||||
google()
|
||||
}
|
||||
}
|
||||
|
||||
task clean(type: Delete) {
|
||||
delete rootProject.buildDir
|
||||
}
|
13
buildsystem/ci.gradle
Normal file
13
buildsystem/ci.gradle
Normal file
@ -0,0 +1,13 @@
|
||||
def ciServer = 'TRAVIS'
|
||||
def executingOnCI = "true" == System.getenv(ciServer)
|
||||
|
||||
// Since for CI we always do full clean builds, we don't want to pre-dex
|
||||
// See http://tools.android.com/tech-docs/new-build-system/tips
|
||||
subprojects {
|
||||
project.plugins.whenPluginAdded { plugin ->
|
||||
if ('com.android.build.gradle.AppPlugin' == plugin.class.name ||
|
||||
'com.android.build.gradle.LibraryPlugin' == plugin.class.name) {
|
||||
project.android.dexOptions.preDexLibraries = !executingOnCI
|
||||
}
|
||||
}
|
||||
}
|
154
buildsystem/dependencies.gradle
Normal file
154
buildsystem/dependencies.gradle
Normal file
@ -0,0 +1,154 @@
|
||||
allprojects {
|
||||
repositories {
|
||||
jcenter()
|
||||
}
|
||||
}
|
||||
|
||||
ext {
|
||||
androidBuildToolsVersion = "29.0.2"
|
||||
androidMinSdkVersion = 23
|
||||
androidTargetSdkVersion = 29
|
||||
androidCompileSdkVersion = 29
|
||||
|
||||
// android and java libs
|
||||
androidVersion = '4.1.1.4'
|
||||
multidexVersion = '2.0.1'
|
||||
javaxAnnotationVersion = '1.0'
|
||||
|
||||
// support lib
|
||||
androidSupportAnnotationsVersion = '1.1.0'
|
||||
androidSupportAppcompatVersion = '1.2.0' // check https://stackoverflow.com/questions/41025200/android-view-inflateexception-error-inflating-class-android-webkit-webview/57968071#57968071 !!!!!!
|
||||
androidSupportDesignVersion = '1.2.1'
|
||||
|
||||
// app frameworks and utilities
|
||||
|
||||
rxJavaVersion = '2.2.20'
|
||||
rxAndroidVersion = '2.1.1'
|
||||
rxBindingVersion = '2.2.0'
|
||||
|
||||
daggerVersion = '2.30.1'
|
||||
|
||||
gsonVersion = '2.8.6'
|
||||
|
||||
okHttpVersion = '4.9.0'
|
||||
okHttpDigestVersion = '2.5'
|
||||
|
||||
velocityVersion = '1.7'
|
||||
|
||||
timberVersion = '4.7.1'
|
||||
|
||||
zxcvbnVersion = '1.3.1'
|
||||
|
||||
scaleImageViewVersion = '3.10.0'
|
||||
|
||||
lruFileCacheVersion = '1.0'
|
||||
|
||||
// KEEP IN SYNC WITH GENERATOR VERSION IN root build.gradle
|
||||
greenDaoVersion = '3.3.0'
|
||||
|
||||
// cloud provider libs
|
||||
|
||||
// do not update to 1.4.0 until dropping minsdk 4.x
|
||||
cryptolibVersion = '1.3.0'
|
||||
|
||||
dropboxVersion = '3.1.5'
|
||||
|
||||
googleApiServicesVersion = 'v3-rev197-1.25.0'
|
||||
googlePlayServicesVersion = '19.0.0'
|
||||
googleClientVersion = '1.31.1'
|
||||
|
||||
msgraphVersion = '2.5.0'
|
||||
msaAuthVersion = '0.10.0'
|
||||
|
||||
commonsCodecVersion = '1.15'
|
||||
|
||||
recyclerViewFastScrollVersion = '2.0.1'
|
||||
|
||||
// testing dependencies
|
||||
|
||||
jUnitVersion = '5.7.0'
|
||||
jUnit4Version = '4.13.1'
|
||||
assertJVersion = '1.7.1'
|
||||
mockitoVersion = '3.6.28'
|
||||
mockitoInlineVersion = '3.6.28'
|
||||
hamcrestVersion = '1.3'
|
||||
dexmakerVersion = '1.0'
|
||||
espressoVersion = '3.3.0'
|
||||
testingSupportLibVersion = '0.1'
|
||||
runnerVersion = '1.3.0'
|
||||
rulesVersion = '1.3.0'
|
||||
contributionVersion = '3.3.0'
|
||||
uiautomatorVersion = '2.2.0'
|
||||
|
||||
androidxCoreVersion = '1.3.2'
|
||||
androidxFragmentVersion = '1.2.5'
|
||||
androidxViewpagerVersion = '1.0.0'
|
||||
androidxSwiperefreshVersion = '1.1.0'
|
||||
androidxPreferenceVersion = '1.0.0' // 1.1.0 and 1.1.2 does have a bug with the text size
|
||||
androidxRecyclerViewVersion = '1.1.0'
|
||||
androidxDocumentfileVersion = '1.0.1'
|
||||
androidxBiometricVersion = '1.0.1'
|
||||
androidxTestCoreVersion = '1.3.0'
|
||||
|
||||
jsonWebTokenApiVersion = '0.11.2'
|
||||
|
||||
dependencies = [
|
||||
android : "com.google.android:android:${androidVersion}",
|
||||
androidAnnotations : "androidx.annotation:annotation:${androidSupportAnnotationsVersion}",
|
||||
appcompat : "androidx.appcompat:appcompat:${androidSupportAppcompatVersion}",
|
||||
androidxBiometric : "androidx.biometric:biometric:${androidxBiometricVersion}",
|
||||
androidxCore : "androidx.core:core-ktx:${androidxCoreVersion}",
|
||||
androidxFragment : "androidx.fragment:fragment-ktx:${androidxFragmentVersion}",
|
||||
androidxViewpager : "androidx.viewpager:viewpager:${androidxViewpagerVersion}",
|
||||
androidxSwiperefresh : "androidx.swiperefreshlayout:swiperefreshlayout:${androidxSwiperefreshVersion}",
|
||||
androidxPreference : "androidx.preference:preference:${androidxPreferenceVersion}",
|
||||
documentFile : "androidx.documentfile:documentfile:${androidxDocumentfileVersion}",
|
||||
recyclerView : "androidx.recyclerview:recyclerview:${androidxRecyclerViewVersion}",
|
||||
androidxTestCore : "androidx.test:core:${androidxTestCoreVersion}",
|
||||
commonsCodec : "commons-codec:commons-codec:${commonsCodecVersion}",
|
||||
cryptolib : "org.cryptomator:cryptolib:${cryptolibVersion}",
|
||||
dagger : "com.google.dagger:dagger:${daggerVersion}",
|
||||
daggerCompiler : "com.google.dagger:dagger-compiler:${daggerVersion}",
|
||||
design : "com.google.android.material:material:${androidSupportDesignVersion}",
|
||||
dropbox : "com.dropbox.core:dropbox-core-sdk:${dropboxVersion}",
|
||||
espresso : "androidx.test.espresso:espresso-core:${espressoVersion}",
|
||||
googleApiClientAndroid: "com.google.api-client:google-api-client-android:${googleClientVersion}",
|
||||
googleApiServicesDrive: "com.google.apis:google-api-services-drive:${googleApiServicesVersion}",
|
||||
googlePlayServicesAuth: "com.google.android.gms:play-services-auth:${googlePlayServicesVersion}",
|
||||
greenDao : "org.greenrobot:greendao:${greenDaoVersion}",
|
||||
gson : "com.google.code.gson:gson:${gsonVersion}",
|
||||
hamcrest : "org.hamcrest:hamcrest-all:${hamcrestVersion}",
|
||||
javaxAnnotation : "javax.annotation:jsr250-api:${javaxAnnotationVersion}",
|
||||
junit : "org.junit.jupiter:junit-jupiter:${jUnitVersion}",
|
||||
junitApi : "org.junit.jupiter:junit-jupiter-api:${jUnitVersion}",
|
||||
junitEngine : "org.junit.jupiter:junit-jupiter-engine:${jUnitVersion}",
|
||||
junitParams : "org.junit.jupiter:junit-jupiter-params:${jUnitVersion}",
|
||||
junit4 : "org.junit.jupiter:junit-jupiter:${jUnit4Version}",
|
||||
junit4Engine : "org.junit.vintage:junit-vintage-engine:${jUnitVersion}",
|
||||
msgraph : "com.microsoft.graph:microsoft-graph:${msgraphVersion}",
|
||||
msaAuth : "com.microsoft.graph:msa-auth-for-android-adapter:${msaAuthVersion}",
|
||||
mockito : "org.mockito:mockito-core:${mockitoVersion}",
|
||||
mockitoInline : "org.mockito:mockito-inline:${mockitoInlineVersion}",
|
||||
multidex : "androidx.multidex:multidex:${multidexVersion}",
|
||||
okHttp : "com.squareup.okhttp3:okhttp:${okHttpVersion}",
|
||||
okHttpDigest : "com.burgstaller:okhttp-digest:${okHttpDigestVersion}",
|
||||
recyclerViewFastScroll: "com.simplecityapps:recyclerview-fastscroll:${recyclerViewFastScrollVersion}",
|
||||
rxJava : "io.reactivex.rxjava2:rxjava:${rxJavaVersion}",
|
||||
rxAndroid : "io.reactivex.rxjava2:rxandroid:${rxAndroidVersion}",
|
||||
rxBinding : "com.jakewharton.rxbinding2:rxbinding:${rxBindingVersion}",
|
||||
testingSupportLib : "com.android.support.test:testing-support-lib:${testingSupportLibVersion}",
|
||||
timber : "com.jakewharton.timber:timber:${timberVersion}",
|
||||
velocity : "org.apache.velocity:velocity:${velocityVersion}",
|
||||
runner : "androidx.test:runner:${runnerVersion}",
|
||||
rules : "androidx.test:rules:${rulesVersion}",
|
||||
contribution : "androidx.test.espresso:espresso-contrib:${contributionVersion}",
|
||||
uiAutomator : "androidx.test.uiautomator:uiautomator:${uiautomatorVersion}",
|
||||
zxcvbn : "com.nulab-inc:zxcvbn:${zxcvbnVersion}",
|
||||
scaleImageView : "com.davemorrissey.labs:subsampling-scale-image-view:${scaleImageViewVersion}",
|
||||
lruFileCache : "com.tomclaw.cache:cache:${lruFileCacheVersion}",
|
||||
jsonWebTokenApi : "io.jsonwebtoken:jjwt-api:${jsonWebTokenApiVersion}",
|
||||
jsonWebTokenImpl : "io.jsonwebtoken:jjwt-impl:${jsonWebTokenApiVersion}",
|
||||
jsonWebTokenJson : "io.jsonwebtoken:jjwt-orgjson:${jsonWebTokenApiVersion}"
|
||||
]
|
||||
|
||||
}
|
1
data/.gitignore
vendored
Executable file
1
data/.gitignore
vendored
Executable file
@ -0,0 +1 @@
|
||||
/build
|
122
data/build.gradle
Normal file
122
data/build.gradle
Normal file
@ -0,0 +1,122 @@
|
||||
apply plugin: 'org.greenrobot.greendao'
|
||||
apply plugin: 'com.android.library'
|
||||
apply plugin: 'kotlin-android'
|
||||
apply plugin: 'de.mannodermaus.android-junit5'
|
||||
|
||||
android {
|
||||
defaultPublishConfig "debug"
|
||||
|
||||
def globalConfiguration = rootProject.extensions.getByName("ext")
|
||||
|
||||
compileSdkVersion globalConfiguration["androidCompileSdkVersion"]
|
||||
buildToolsVersion globalConfiguration["androidBuildToolsVersion"]
|
||||
|
||||
defaultConfig {
|
||||
minSdkVersion globalConfiguration["androidMinSdkVersion"]
|
||||
targetSdkVersion globalConfiguration["androidTargetSdkVersion"]
|
||||
|
||||
buildConfigField 'int', 'VERSION_CODE', "${globalConfiguration["androidVersionCode"]}"
|
||||
buildConfigField "String", "VERSION_NAME", "\"${globalConfiguration["androidVersionName"]}\""
|
||||
buildConfigField "String", "ONEDRIVE_API_KEY", "\"" + getApiKey('ONEDRIVE_API_KEY') + "\""
|
||||
}
|
||||
|
||||
compileOptions {
|
||||
sourceCompatibility JavaVersion.VERSION_1_8
|
||||
targetCompatibility JavaVersion.VERSION_1_8
|
||||
}
|
||||
|
||||
lintOptions {
|
||||
quiet true
|
||||
abortOnError false
|
||||
ignoreWarnings true
|
||||
}
|
||||
|
||||
flavorDimensions "version"
|
||||
|
||||
productFlavors {
|
||||
playstore {
|
||||
dimension "version"
|
||||
}
|
||||
|
||||
license {
|
||||
dimension "version"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
greendao {
|
||||
schemaVersion 3
|
||||
}
|
||||
|
||||
configurations.all {
|
||||
// Check for updates every build (use for cryptolib snapshot)
|
||||
//resolutionStrategy.cacheChangingModulesFor 0, 'seconds'
|
||||
}
|
||||
|
||||
dependencies {
|
||||
def dependencies = rootProject.ext.dependencies
|
||||
|
||||
implementation project(':domain')
|
||||
implementation project(':util')
|
||||
implementation project(':msa-auth-for-android')
|
||||
|
||||
// cryptomator
|
||||
implementation dependencies.cryptolib
|
||||
|
||||
// greendao
|
||||
api dependencies.greenDao
|
||||
// dagger
|
||||
annotationProcessor dependencies.daggerCompiler
|
||||
implementation dependencies.dagger
|
||||
// cloud
|
||||
implementation dependencies.dropbox
|
||||
implementation dependencies.googlePlayServicesAuth
|
||||
implementation(dependencies.googleApiServicesDrive) {
|
||||
exclude module: 'guava-jdk5'
|
||||
exclude module: 'httpclient'
|
||||
}
|
||||
implementation(dependencies.googleApiClientAndroid) {
|
||||
exclude module: 'guava-jdk5'
|
||||
exclude module: 'httpclient'
|
||||
}
|
||||
implementation dependencies.msgraph
|
||||
|
||||
// rest
|
||||
implementation dependencies.rxJava
|
||||
implementation dependencies.rxAndroid
|
||||
implementation dependencies.okHttp
|
||||
implementation dependencies.okHttpDigest
|
||||
implementation dependencies.androidAnnotations
|
||||
compileOnly dependencies.javaxAnnotation
|
||||
implementation dependencies.gson
|
||||
|
||||
implementation dependencies.commonsCodec
|
||||
|
||||
implementation dependencies.documentFile
|
||||
|
||||
implementation dependencies.lruFileCache
|
||||
|
||||
implementation "org.jetbrains.kotlin:kotlin-stdlib-jdk8:$kotlin_version"
|
||||
|
||||
// test
|
||||
testImplementation dependencies.junit
|
||||
testImplementation dependencies.junitApi
|
||||
testRuntimeOnly dependencies.junitEngine
|
||||
testImplementation dependencies.junitParams
|
||||
|
||||
testImplementation dependencies.junit4
|
||||
testRuntimeOnly dependencies.junit4Engine
|
||||
|
||||
testImplementation dependencies.mockito
|
||||
testImplementation dependencies.hamcrest
|
||||
}
|
||||
|
||||
configurations {
|
||||
all*.exclude group: 'com.google.android', module: 'android'
|
||||
}
|
||||
|
||||
static def getApiKey(key) {
|
||||
Properties props = new Properties()
|
||||
props.load(new FileInputStream(new File('secrets.properties')))
|
||||
return props[key]
|
||||
}
|
8
data/src/main/AndroidManifest.xml
Normal file
8
data/src/main/AndroidManifest.xml
Normal file
@ -0,0 +1,8 @@
|
||||
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
|
||||
package="org.cryptomator.data">
|
||||
|
||||
<uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" />
|
||||
<uses-permission android:name="android.permission.ACCESS_WIFI_STATE" />
|
||||
|
||||
<application android:allowBackup="true" />
|
||||
</manifest>
|
@ -0,0 +1,45 @@
|
||||
package org.cryptomator.data.cloud;
|
||||
|
||||
import org.cryptomator.data.cloud.crypto.CryptoCloudContentRepositoryFactory;
|
||||
import org.cryptomator.data.cloud.dropbox.DropboxCloudContentRepositoryFactory;
|
||||
import org.cryptomator.data.cloud.googledrive.GoogleDriveCloudContentRepositoryFactory;
|
||||
import org.cryptomator.data.cloud.local.LocalStorageContentRepositoryFactory;
|
||||
import org.cryptomator.data.cloud.onedrive.OnedriveCloudContentRepositoryFactory;
|
||||
import org.cryptomator.data.cloud.webdav.WebDavCloudContentRepositoryFactory;
|
||||
import org.cryptomator.data.repository.CloudContentRepositoryFactory;
|
||||
import org.jetbrains.annotations.NotNull;
|
||||
|
||||
import java.util.Iterator;
|
||||
|
||||
import javax.inject.Inject;
|
||||
import javax.inject.Singleton;
|
||||
|
||||
import static java.util.Arrays.asList;
|
||||
|
||||
@Singleton
|
||||
public class CloudContentRepositoryFactories implements Iterable<CloudContentRepositoryFactory> {
|
||||
|
||||
private final Iterable<CloudContentRepositoryFactory> factories;
|
||||
|
||||
@Inject
|
||||
public CloudContentRepositoryFactories(DropboxCloudContentRepositoryFactory dropboxFactory, //
|
||||
GoogleDriveCloudContentRepositoryFactory googleDriveFactory, //
|
||||
OnedriveCloudContentRepositoryFactory oneDriveFactory, //
|
||||
CryptoCloudContentRepositoryFactory cryptoFactory, //
|
||||
LocalStorageContentRepositoryFactory localStorageFactory, //
|
||||
WebDavCloudContentRepositoryFactory webDavFactory) {
|
||||
|
||||
factories = asList(dropboxFactory, //
|
||||
googleDriveFactory, //
|
||||
oneDriveFactory, //
|
||||
cryptoFactory, //
|
||||
localStorageFactory, //
|
||||
webDavFactory);
|
||||
}
|
||||
|
||||
@NotNull
|
||||
@Override
|
||||
public Iterator<CloudContentRepositoryFactory> iterator() {
|
||||
return factories.iterator();
|
||||
}
|
||||
}
|
@ -0,0 +1,224 @@
|
||||
package org.cryptomator.data.cloud;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
import org.cryptomator.domain.usecases.ProgressAware;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.DownloadState;
|
||||
import org.cryptomator.domain.usecases.cloud.UploadState;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.OutputStream;
|
||||
import java.util.List;
|
||||
|
||||
public abstract class InterceptingCloudContentRepository<CloudType extends Cloud, NodeType extends CloudNode, DirType extends CloudFolder, FileType extends CloudFile>
|
||||
implements CloudContentRepository<CloudType, NodeType, DirType, FileType> {
|
||||
|
||||
private final CloudContentRepository<CloudType, NodeType, DirType, FileType> delegate;
|
||||
|
||||
protected InterceptingCloudContentRepository(CloudContentRepository<CloudType, NodeType, DirType, FileType> delegate) {
|
||||
this.delegate = delegate;
|
||||
}
|
||||
|
||||
protected abstract void throwWrappedIfRequired(Exception e) throws BackendException;
|
||||
|
||||
@Override
|
||||
public DirType root(CloudType cloud) throws BackendException {
|
||||
try {
|
||||
return delegate.root(cloud);
|
||||
} catch (BackendException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
} catch (RuntimeException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public DirType resolve(CloudType cloud, String path) throws BackendException {
|
||||
try {
|
||||
return delegate.resolve(cloud, path);
|
||||
} catch (BackendException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
} catch (RuntimeException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public FileType file(DirType parent, String name) throws BackendException {
|
||||
try {
|
||||
return delegate.file(parent, name);
|
||||
} catch (BackendException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
} catch (RuntimeException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public FileType file(DirType parent, String name, Optional<Long> size) throws BackendException {
|
||||
try {
|
||||
return delegate.file(parent, name, size);
|
||||
} catch (BackendException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
} catch (RuntimeException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public DirType folder(DirType parent, String name) throws BackendException {
|
||||
try {
|
||||
return delegate.folder(parent, name);
|
||||
} catch (BackendException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
} catch (RuntimeException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean exists(NodeType node) throws BackendException {
|
||||
try {
|
||||
return delegate.exists(node);
|
||||
} catch (BackendException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
} catch (RuntimeException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public List<? extends CloudNode> list(DirType folder) throws BackendException {
|
||||
try {
|
||||
return delegate.list(folder);
|
||||
} catch (BackendException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
} catch (RuntimeException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public DirType create(DirType folder) throws BackendException {
|
||||
try {
|
||||
return delegate.create(folder);
|
||||
} catch (BackendException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
} catch (RuntimeException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public DirType move(DirType source, DirType target) throws BackendException {
|
||||
try {
|
||||
return delegate.move(source, target);
|
||||
} catch (BackendException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
} catch (RuntimeException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public FileType move(FileType source, FileType target) throws BackendException {
|
||||
try {
|
||||
return delegate.move(source, target);
|
||||
} catch (BackendException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
} catch (RuntimeException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public FileType write(FileType file, DataSource data, ProgressAware<UploadState> progressAware, boolean replace, long size) throws BackendException {
|
||||
try {
|
||||
return delegate.write(file, data, progressAware, replace, size);
|
||||
} catch (BackendException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
} catch (RuntimeException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void read(FileType file, Optional<File> encryptedTmpFile, OutputStream data, ProgressAware<DownloadState> progressAware) throws BackendException {
|
||||
try {
|
||||
delegate.read(file, encryptedTmpFile, data, progressAware);
|
||||
} catch (BackendException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
} catch (RuntimeException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void delete(NodeType node) throws BackendException {
|
||||
try {
|
||||
delegate.delete(node);
|
||||
} catch (BackendException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
} catch (RuntimeException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public String checkAuthenticationAndRetrieveCurrentAccount(CloudType cloud) throws BackendException {
|
||||
try {
|
||||
return delegate.checkAuthenticationAndRetrieveCurrentAccount(cloud);
|
||||
} catch (BackendException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
} catch (RuntimeException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void logout(CloudType cloud) throws BackendException {
|
||||
try {
|
||||
delegate.logout(cloud);
|
||||
} catch (BackendException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
} catch (RuntimeException e) {
|
||||
throwWrappedIfRequired(e);
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
}
|
@ -0,0 +1,28 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import com.google.common.io.BaseEncoding;
|
||||
|
||||
import java.security.MessageDigest;
|
||||
import java.security.NoSuchAlgorithmException;
|
||||
|
||||
/**
|
||||
* Utility class for generating a suffix for the backup file to make it unique to its original master key file.
|
||||
*/
|
||||
class BackupFileIdSuffixGenerator {
|
||||
|
||||
/**
|
||||
* Computes the SHA-256 digest of the given byte array and returns a file suffix containing the first 4 bytes in hex string format.
|
||||
*
|
||||
* @param fileBytes the input byte for which the digest is computed
|
||||
* @return "." + first 4 bytes of SHA-256 digest in hex string format
|
||||
*/
|
||||
static String generate(byte[] fileBytes) {
|
||||
try {
|
||||
MessageDigest md = MessageDigest.getInstance("SHA-256");
|
||||
byte[] digest = md.digest(fileBytes);
|
||||
return "." + BaseEncoding.base16().encode(digest, 0, 4);
|
||||
} catch (NoSuchAlgorithmException e) {
|
||||
throw new IllegalStateException("Every Java Platform must support the Message Digest algorithm SHA-256", e);
|
||||
}
|
||||
}
|
||||
}
|
@ -0,0 +1,71 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudType;
|
||||
import org.cryptomator.domain.Vault;
|
||||
|
||||
public class CryptoCloud implements Cloud {
|
||||
|
||||
private final Vault vault;
|
||||
|
||||
CryptoCloud(Vault vault) {
|
||||
this.vault = vault;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Long id() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public CloudType type() {
|
||||
return CloudType.CRYPTO;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean configurationMatches(Cloud cloud) {
|
||||
return cloud instanceof CryptoCloud && configurationMatches((CryptoCloud) cloud);
|
||||
}
|
||||
|
||||
private boolean configurationMatches(CryptoCloud cloud) {
|
||||
return vault.equals(cloud.vault);
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean predefined() {
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean persistent() {
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean requiresNetwork() {
|
||||
return false;
|
||||
}
|
||||
|
||||
public Vault getVault() {
|
||||
return vault;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean equals(Object obj) {
|
||||
if (obj == null || getClass() != obj.getClass())
|
||||
return false;
|
||||
if (obj == this)
|
||||
return true;
|
||||
return internalEquals((CryptoCloud) obj);
|
||||
}
|
||||
|
||||
@Override
|
||||
public int hashCode() {
|
||||
return vault.hashCode();
|
||||
}
|
||||
|
||||
private boolean internalEquals(CryptoCloud obj) {
|
||||
return vault != null && vault.equals(obj.vault);
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,135 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import static java.lang.String.format;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.OutputStream;
|
||||
import java.util.List;
|
||||
|
||||
import org.cryptomator.cryptolib.api.Cryptor;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
|
||||
import org.cryptomator.domain.exception.FatalBackendException;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
import org.cryptomator.domain.usecases.ProgressAware;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.DownloadState;
|
||||
import org.cryptomator.domain.usecases.cloud.UploadState;
|
||||
import org.cryptomator.util.Optional;
|
||||
import org.cryptomator.util.Supplier;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
class CryptoCloudContentRepository implements CloudContentRepository<CryptoCloud, CryptoNode, CryptoFolder, CryptoFile> {
|
||||
|
||||
private final CryptoImplDecorator cryptoImpl;
|
||||
|
||||
CryptoCloudContentRepository(Context context, CloudContentRepository cloudContentRepository, CryptoCloud cloud, Supplier<Cryptor> cryptor) {
|
||||
CloudFolder vaultLocation;
|
||||
try {
|
||||
vaultLocation = cloudContentRepository.resolve(cloud.getVault().getCloud(), cloud.getVault().getPath());
|
||||
} catch (BackendException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
|
||||
switch (cloud.getVault().getVersion()) {
|
||||
case 7:
|
||||
this.cryptoImpl = new CryptoImplVaultFormat7(context, cryptor, cloudContentRepository, vaultLocation, new DirIdCacheFormat7());
|
||||
break;
|
||||
case 6:
|
||||
case 5:
|
||||
this.cryptoImpl = new CryptoImplVaultFormatPre7(context, cryptor, cloudContentRepository, vaultLocation, new DirIdCacheFormatPre7());
|
||||
break;
|
||||
default:
|
||||
throw new IllegalStateException(format("No CryptoImpl for vault version %d.", cloud.getVault().getVersion()));
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public synchronized CryptoFolder root(CryptoCloud cloud) throws BackendException {
|
||||
return cryptoImpl.root(cloud);
|
||||
}
|
||||
|
||||
@Override
|
||||
public CryptoFolder resolve(CryptoCloud cloud, String path) throws BackendException {
|
||||
return cryptoImpl.resolve(cloud, path);
|
||||
}
|
||||
|
||||
@Override
|
||||
public CryptoFile file(CryptoFolder parent, String name) throws BackendException {
|
||||
return cryptoImpl.file(parent, name);
|
||||
}
|
||||
|
||||
@Override
|
||||
public CryptoFile file(CryptoFolder parent, String name, Optional<Long> size) throws BackendException {
|
||||
return cryptoImpl.file(parent, name, size);
|
||||
}
|
||||
|
||||
@Override
|
||||
public CryptoFolder folder(CryptoFolder parent, String name) throws BackendException {
|
||||
return cryptoImpl.folder(parent, name);
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean exists(CryptoNode node) throws BackendException {
|
||||
return cryptoImpl.exists(node);
|
||||
}
|
||||
|
||||
@Override
|
||||
public List<CryptoNode> list(CryptoFolder folder) throws BackendException {
|
||||
return cryptoImpl.list(folder);
|
||||
}
|
||||
|
||||
@Override
|
||||
public CryptoFolder create(CryptoFolder folder) throws BackendException {
|
||||
try {
|
||||
return cryptoImpl.create(folder);
|
||||
} catch (CloudNodeAlreadyExistsException e) {
|
||||
throw new CloudNodeAlreadyExistsException(folder.getName());
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public CryptoFolder move(CryptoFolder source, CryptoFolder target) throws BackendException {
|
||||
try {
|
||||
return cryptoImpl.move(source, target);
|
||||
} catch (CloudNodeAlreadyExistsException e) {
|
||||
throw new CloudNodeAlreadyExistsException(target.getName());
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public CryptoFile move(CryptoFile source, CryptoFile target) throws BackendException {
|
||||
try {
|
||||
return cryptoImpl.move(source, target);
|
||||
} catch (CloudNodeAlreadyExistsException e) {
|
||||
throw new CloudNodeAlreadyExistsException(target.getName());
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public CryptoFile write(CryptoFile file, DataSource data, ProgressAware<UploadState> progressAware, boolean replace, long length) throws BackendException {
|
||||
return cryptoImpl.write(file, data, progressAware, replace, length);
|
||||
}
|
||||
|
||||
@Override
|
||||
public void read(CryptoFile file, Optional<File> tmpEncryptedFile, OutputStream data, ProgressAware<DownloadState> progressAware) throws BackendException {
|
||||
cryptoImpl.read(file, data, progressAware);
|
||||
}
|
||||
|
||||
@Override
|
||||
public void delete(CryptoNode node) throws BackendException {
|
||||
cryptoImpl.delete(node);
|
||||
}
|
||||
|
||||
@Override
|
||||
public String checkAuthenticationAndRetrieveCurrentAccount(CryptoCloud cloud) throws BackendException {
|
||||
return cryptoImpl.currentAccount(cloud);
|
||||
}
|
||||
|
||||
@Override
|
||||
public void logout(CryptoCloud cloud) throws BackendException {
|
||||
// empty
|
||||
}
|
||||
}
|
@ -0,0 +1,80 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import org.cryptomator.cryptolib.api.Cryptor;
|
||||
import org.cryptomator.data.repository.CloudContentRepositoryFactory;
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.Vault;
|
||||
import org.cryptomator.domain.exception.MissingCryptorException;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import javax.inject.Inject;
|
||||
import javax.inject.Singleton;
|
||||
|
||||
import dagger.Lazy;
|
||||
|
||||
import static java.lang.String.format;
|
||||
import static org.cryptomator.domain.CloudType.CRYPTO;
|
||||
|
||||
@Singleton
|
||||
public class CryptoCloudContentRepositoryFactory implements CloudContentRepositoryFactory {
|
||||
|
||||
private final Lazy<CloudContentRepository> cloudContentRepository;
|
||||
private final Cryptors cryptors;
|
||||
private final Context context;
|
||||
|
||||
@Inject
|
||||
public CryptoCloudContentRepositoryFactory(Lazy<CloudContentRepository> cloudContentRepository, Cryptors cryptors, Context context) {
|
||||
this.cloudContentRepository = cloudContentRepository;
|
||||
this.cryptors = cryptors;
|
||||
this.context = context;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean supports(Cloud cloud) {
|
||||
return cloud.type() == CRYPTO;
|
||||
}
|
||||
|
||||
@Override
|
||||
public CloudContentRepository cloudContentRepositoryFor(Cloud cloud) {
|
||||
CryptoCloud cryptoCloud = (CryptoCloud) cloud;
|
||||
Vault vault = cryptoCloud.getVault();
|
||||
return new CryptoCloudContentRepository(context, cloudContentRepository.get(), cryptoCloud, cryptors.get(vault));
|
||||
}
|
||||
|
||||
public void deregisterCryptor(Vault vault) {
|
||||
deregisterCryptor(vault, true);
|
||||
}
|
||||
|
||||
public void deregisterCryptor(Vault vault, boolean assertPresent) {
|
||||
Optional<Cryptor> cryptor = cryptors.remove(vault);
|
||||
if (cryptor.isAbsent()) {
|
||||
if (assertPresent) {
|
||||
throw new IllegalStateException(format("No cryptor registered for vault %s", vault));
|
||||
}
|
||||
} else {
|
||||
cryptor.get().destroy();
|
||||
}
|
||||
}
|
||||
|
||||
public boolean cryptorIsRegisteredFor(Vault vault) {
|
||||
try {
|
||||
assertCryptorRegisteredFor(vault);
|
||||
return true;
|
||||
} catch (MissingCryptorException e) {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
public void assertCryptorRegisteredFor(Vault vault) throws MissingCryptorException {
|
||||
cryptors.get(vault).get();
|
||||
}
|
||||
|
||||
void registerCryptor(Vault vault, Cryptor cryptor) {
|
||||
if (!cryptors.putIfAbsent(vault, cryptor)) {
|
||||
throw new IllegalStateException(format("Cryptor already registered for vault %s", vault));
|
||||
}
|
||||
}
|
||||
}
|
@ -0,0 +1,216 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import static android.R.attr.version;
|
||||
import static java.text.Normalizer.normalize;
|
||||
import static org.cryptomator.data.cloud.crypto.CryptoConstants.DATA_DIR_NAME;
|
||||
import static org.cryptomator.data.cloud.crypto.CryptoConstants.MASTERKEY_BACKUP_FILE_EXT;
|
||||
import static org.cryptomator.data.cloud.crypto.CryptoConstants.MASTERKEY_FILE_NAME;
|
||||
import static org.cryptomator.data.cloud.crypto.CryptoConstants.MAX_VAULT_VERSION;
|
||||
import static org.cryptomator.data.cloud.crypto.CryptoConstants.MIN_VAULT_VERSION;
|
||||
import static org.cryptomator.data.cloud.crypto.CryptoConstants.ROOT_DIR_ID;
|
||||
import static org.cryptomator.data.cloud.crypto.CryptoConstants.VERSION_WITH_NORMALIZED_PASSWORDS;
|
||||
import static org.cryptomator.domain.Vault.aCopyOf;
|
||||
import static org.cryptomator.domain.usecases.ProgressAware.NO_OP_PROGRESS_AWARE;
|
||||
|
||||
import java.io.ByteArrayOutputStream;
|
||||
import java.text.Normalizer;
|
||||
|
||||
import javax.inject.Inject;
|
||||
import javax.inject.Singleton;
|
||||
|
||||
import org.cryptomator.cryptolib.Cryptors;
|
||||
import org.cryptomator.cryptolib.api.Cryptor;
|
||||
import org.cryptomator.cryptolib.api.CryptorProvider;
|
||||
import org.cryptomator.cryptolib.api.InvalidPassphraseException;
|
||||
import org.cryptomator.cryptolib.api.KeyFile;
|
||||
import org.cryptomator.cryptolib.api.UnsupportedVaultFormatException;
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
import org.cryptomator.domain.Vault;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
import org.cryptomator.domain.usecases.cloud.ByteArrayDataSource;
|
||||
import org.cryptomator.domain.usecases.vault.UnlockToken;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
@Singleton
|
||||
public class CryptoCloudFactory {
|
||||
|
||||
private final CryptorProvider cryptorProvider;
|
||||
private final CloudContentRepository cloudContentRepository;
|
||||
private final CryptoCloudContentRepositoryFactory cryptoCloudContentRepositoryFactory;
|
||||
|
||||
@Inject
|
||||
public CryptoCloudFactory( //
|
||||
CloudContentRepository cloudContentRepository, //
|
||||
CryptoCloudContentRepositoryFactory cryptoCloudContentRepositoryFactory, //
|
||||
CryptorProvider cryptorProvider) {
|
||||
this.cryptorProvider = cryptorProvider;
|
||||
this.cloudContentRepository = cloudContentRepository;
|
||||
this.cryptoCloudContentRepositoryFactory = cryptoCloudContentRepositoryFactory;
|
||||
}
|
||||
|
||||
public void create(CloudFolder location, CharSequence password) throws BackendException {
|
||||
Cryptor cryptor = cryptorProvider.createNew();
|
||||
try {
|
||||
KeyFile keyFile = cryptor.writeKeysToMasterkeyFile(normalizePassword(password, version), MAX_VAULT_VERSION);
|
||||
writeKeyFile(location, keyFile);
|
||||
createRootFolder(location, cryptor);
|
||||
} finally {
|
||||
cryptor.destroy();
|
||||
}
|
||||
}
|
||||
|
||||
private void createRootFolder(CloudFolder location, Cryptor cryptor) throws BackendException {
|
||||
CloudFolder dFolder = cloudContentRepository.folder(location, DATA_DIR_NAME);
|
||||
dFolder = cloudContentRepository.create(dFolder);
|
||||
String rootDirHash = cryptor.fileNameCryptor().hashDirectoryId(ROOT_DIR_ID);
|
||||
CloudFolder lvl1Folder = cloudContentRepository.folder(dFolder, rootDirHash.substring(0, 2));
|
||||
lvl1Folder = cloudContentRepository.create(lvl1Folder);
|
||||
CloudFolder lvl2Folder = cloudContentRepository.folder(lvl1Folder, rootDirHash.substring(2));
|
||||
cloudContentRepository.create(lvl2Folder);
|
||||
}
|
||||
|
||||
public Cloud decryptedViewOf(Vault vault) throws BackendException {
|
||||
return new CryptoCloud(aCopyOf(vault).build());
|
||||
}
|
||||
|
||||
public Vault unlock(Vault vault, CharSequence password) throws BackendException {
|
||||
return unlock(createUnlockToken(vault), password);
|
||||
}
|
||||
|
||||
public Vault unlock(UnlockToken token, CharSequence password) throws BackendException {
|
||||
UnlockTokenImpl impl = (UnlockTokenImpl) token;
|
||||
Cryptor cryptor = cryptorFor(impl.getKeyFile(), password);
|
||||
cryptoCloudContentRepositoryFactory.registerCryptor(impl.getVault(), cryptor);
|
||||
|
||||
return aCopyOf(token.getVault()) //
|
||||
.withVersion(impl.getKeyFile().getVersion()) //
|
||||
.build();
|
||||
}
|
||||
|
||||
public UnlockTokenImpl createUnlockToken(Vault vault) throws BackendException {
|
||||
CloudFolder vaultLocation = cloudContentRepository.resolve(vault.getCloud(), vault.getPath());
|
||||
return createUnlockToken(vault, vaultLocation);
|
||||
}
|
||||
|
||||
private UnlockTokenImpl createUnlockToken(Vault vault, CloudFolder location) throws BackendException {
|
||||
byte[] keyFileData = readKeyFileData(location);
|
||||
UnlockTokenImpl unlockToken = new UnlockTokenImpl(vault, keyFileData);
|
||||
assertVaultVersionIsSupported(unlockToken.getKeyFile().getVersion());
|
||||
return unlockToken;
|
||||
}
|
||||
|
||||
private Cryptor cryptorFor(KeyFile keyFile, CharSequence password) {
|
||||
return cryptorProvider.createFromKeyFile(keyFile, normalizePassword(password, keyFile.getVersion()), keyFile.getVersion());
|
||||
}
|
||||
|
||||
private CloudFolder vaultLocation(Vault vault) throws BackendException {
|
||||
return cloudContentRepository.resolve(vault.getCloud(), vault.getPath());
|
||||
}
|
||||
|
||||
public boolean isVaultPasswordValid(Vault vault, CharSequence password) throws BackendException {
|
||||
try {
|
||||
// create a cryptor, which checks the password, then destroy it immediately
|
||||
cryptorFor(createUnlockToken(vault).getKeyFile(), password).destroy();
|
||||
return true;
|
||||
} catch (InvalidPassphraseException e) {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
public void lock(Vault vault) {
|
||||
cryptoCloudContentRepositoryFactory.deregisterCryptor(vault);
|
||||
}
|
||||
|
||||
private void assertVaultVersionIsSupported(int version) {
|
||||
if (version < MIN_VAULT_VERSION) {
|
||||
throw new UnsupportedVaultFormatException(version, MIN_VAULT_VERSION);
|
||||
} else if (version > MAX_VAULT_VERSION) {
|
||||
throw new UnsupportedVaultFormatException(version, MAX_VAULT_VERSION);
|
||||
}
|
||||
}
|
||||
|
||||
private void writeKeyFile(CloudFolder location, KeyFile keyFile) throws BackendException {
|
||||
byte[] data = keyFile.serialize();
|
||||
cloudContentRepository.write(masterkeyFile(location), ByteArrayDataSource.from(data), NO_OP_PROGRESS_AWARE, false, data.length);
|
||||
}
|
||||
|
||||
private byte[] readKeyFileData(CloudFolder location) throws BackendException {
|
||||
ByteArrayOutputStream data = new ByteArrayOutputStream();
|
||||
cloudContentRepository.read(masterkeyFile(location), Optional.empty(), data, NO_OP_PROGRESS_AWARE);
|
||||
return data.toByteArray();
|
||||
}
|
||||
|
||||
private CloudFile masterkeyFile(CloudFolder location) throws BackendException {
|
||||
return cloudContentRepository.file(location, MASTERKEY_FILE_NAME);
|
||||
}
|
||||
|
||||
private CloudFile masterkeyBackupFile(CloudFolder location, byte[] data) throws BackendException {
|
||||
String fileName = MASTERKEY_FILE_NAME + BackupFileIdSuffixGenerator.generate(data) + MASTERKEY_BACKUP_FILE_EXT;
|
||||
return cloudContentRepository.file(location, fileName);
|
||||
}
|
||||
|
||||
public void changePassword(Vault vault, String oldPassword, String newPassword) throws BackendException {
|
||||
CloudFolder vaultLocation = vaultLocation(vault);
|
||||
ByteArrayOutputStream dataOutputStream = new ByteArrayOutputStream();
|
||||
cloudContentRepository.read(masterkeyFile(vaultLocation), Optional.empty(), dataOutputStream, NO_OP_PROGRESS_AWARE);
|
||||
|
||||
byte[] data = dataOutputStream.toByteArray();
|
||||
int vaultVersion = KeyFile.parse(data).getVersion();
|
||||
|
||||
createBackupMasterKeyFile(data, vaultLocation);
|
||||
createNewMasterKeyFile(data, vaultVersion, oldPassword, newPassword, vaultLocation);
|
||||
}
|
||||
|
||||
private static class UnlockTokenImpl implements UnlockToken {
|
||||
|
||||
private final Vault vault;
|
||||
private final byte[] keyFileData;
|
||||
|
||||
private UnlockTokenImpl(Vault vault, byte[] keyFileData) {
|
||||
this.vault = vault;
|
||||
this.keyFileData = keyFileData;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Vault getVault() {
|
||||
return vault;
|
||||
}
|
||||
|
||||
public KeyFile getKeyFile() {
|
||||
return KeyFile.parse(keyFileData);
|
||||
}
|
||||
}
|
||||
|
||||
private void createBackupMasterKeyFile(byte[] data, CloudFolder vaultLocation) throws BackendException {
|
||||
cloudContentRepository.write( //
|
||||
masterkeyBackupFile(vaultLocation, data), //
|
||||
ByteArrayDataSource.from(data), //
|
||||
NO_OP_PROGRESS_AWARE, //
|
||||
true, //
|
||||
data.length);
|
||||
}
|
||||
|
||||
private void createNewMasterKeyFile(byte[] data, int vaultVersion, String oldPassword, String newPassword, CloudFolder vaultLocation) throws BackendException {
|
||||
byte[] newMasterKeyFile = Cryptors.changePassphrase(cryptorProvider, //
|
||||
data, //
|
||||
normalizePassword(oldPassword, vaultVersion), //
|
||||
normalizePassword(newPassword, vaultVersion));
|
||||
cloudContentRepository.write(masterkeyFile(vaultLocation), //
|
||||
ByteArrayDataSource.from(newMasterKeyFile), //
|
||||
NO_OP_PROGRESS_AWARE, //
|
||||
true, //
|
||||
newMasterKeyFile.length);
|
||||
}
|
||||
|
||||
private CharSequence normalizePassword(CharSequence password, int vaultVersion) {
|
||||
if (vaultVersion >= VERSION_WITH_NORMALIZED_PASSWORDS) {
|
||||
return normalize(password, Normalizer.Form.NFC);
|
||||
} else {
|
||||
return password;
|
||||
}
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,14 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
class CryptoConstants {
|
||||
|
||||
static final String ROOT_DIR_ID = "";
|
||||
static final String DATA_DIR_NAME = "d";
|
||||
static final String MASTERKEY_FILE_NAME = "masterkey.cryptomator";
|
||||
static final String MASTERKEY_BACKUP_FILE_EXT = ".bkup";
|
||||
|
||||
static final int MAX_VAULT_VERSION = 7;
|
||||
static final int VERSION_WITH_NORMALIZED_PASSWORDS = 6;
|
||||
static final int MIN_VAULT_VERSION = 5;
|
||||
|
||||
}
|
@ -0,0 +1,80 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.util.Date;
|
||||
|
||||
class CryptoFile implements CloudFile, CryptoNode {
|
||||
|
||||
private final String name;
|
||||
private final String path;
|
||||
private final Optional<Long> size;
|
||||
private final CloudFile cloudFile;
|
||||
private final CryptoFolder parent;
|
||||
|
||||
public CryptoFile(CryptoFolder parent, String name, String path, Optional<Long> size, CloudFile cloudFile) {
|
||||
this.parent = parent;
|
||||
this.name = name;
|
||||
this.path = path;
|
||||
this.size = size;
|
||||
this.cloudFile = cloudFile;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return parent.getCloud();
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getName() {
|
||||
return name;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getPath() {
|
||||
return path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public CryptoFolder getParent() {
|
||||
return parent;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Long> getSize() {
|
||||
return size;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Date> getModified() {
|
||||
return cloudFile.getModified();
|
||||
}
|
||||
|
||||
/**
|
||||
* @return The actual file in the underlying, i.e. decorated, CloudContentRepository
|
||||
*/
|
||||
CloudFile getCloudFile() {
|
||||
return cloudFile;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean equals(Object obj) {
|
||||
if (obj == null || getClass() != obj.getClass())
|
||||
return false;
|
||||
if (obj == this)
|
||||
return true;
|
||||
return internalEquals((CryptoFile) obj);
|
||||
}
|
||||
|
||||
private boolean internalEquals(CryptoFile obj) {
|
||||
return path != null && path.equals(obj.path);
|
||||
}
|
||||
|
||||
@Override
|
||||
public int hashCode() {
|
||||
return path == null ? 0 : path.hashCode();
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,70 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
|
||||
class CryptoFolder implements CloudFolder, CryptoNode {
|
||||
|
||||
private final String name;
|
||||
private final String path;
|
||||
private final CryptoFolder parent;
|
||||
private final CloudFile dirFile;
|
||||
|
||||
CryptoFolder(CryptoFolder parent, String name, String path, CloudFile dirFile) {
|
||||
this.parent = parent;
|
||||
this.name = name;
|
||||
this.path = path;
|
||||
this.dirFile = dirFile;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return parent.getCloud();
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getName() {
|
||||
return name;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getPath() {
|
||||
return path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public CryptoFolder getParent() {
|
||||
return parent;
|
||||
}
|
||||
|
||||
/**
|
||||
* @return the file containing the directory id, in the underlying, i.e. decorated, CloudContentRepository
|
||||
*/
|
||||
CloudFile getDirFile() {
|
||||
return dirFile;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean equals(Object obj) {
|
||||
if (obj == null || getClass() != obj.getClass())
|
||||
return false;
|
||||
if (obj == this)
|
||||
return true;
|
||||
return internalEquals((CryptoFolder) obj);
|
||||
}
|
||||
|
||||
private boolean internalEquals(CryptoFolder obj) {
|
||||
return path != null && path.equals(obj.path);
|
||||
}
|
||||
|
||||
@Override
|
||||
public int hashCode() {
|
||||
return path == null ? 0 : path.hashCode();
|
||||
}
|
||||
|
||||
@Override
|
||||
public CryptoFolder withCloud(Cloud cloud) {
|
||||
return new CryptoFolder(parent.withCloud(cloud), name, path, dirFile);
|
||||
}
|
||||
}
|
@ -0,0 +1,424 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import org.cryptomator.cryptolib.Cryptors;
|
||||
import org.cryptomator.cryptolib.DecryptingReadableByteChannel;
|
||||
import org.cryptomator.cryptolib.EncryptingWritableByteChannel;
|
||||
import org.cryptomator.cryptolib.api.Cryptor;
|
||||
import org.cryptomator.data.cloud.crypto.DirIdCache.DirIdInfo;
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
|
||||
import org.cryptomator.domain.exception.EmptyDirFileException;
|
||||
import org.cryptomator.domain.exception.FatalBackendException;
|
||||
import org.cryptomator.domain.exception.NoDirFileException;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
import org.cryptomator.domain.usecases.DownloadFileReplacingProgressAware;
|
||||
import org.cryptomator.domain.usecases.ProgressAware;
|
||||
import org.cryptomator.domain.usecases.UploadFileReplacingProgressAware;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.DownloadState;
|
||||
import org.cryptomator.domain.usecases.cloud.FileBasedDataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.Progress;
|
||||
import org.cryptomator.domain.usecases.cloud.UploadState;
|
||||
import org.cryptomator.util.Optional;
|
||||
import org.cryptomator.util.Supplier;
|
||||
|
||||
import java.io.ByteArrayOutputStream;
|
||||
import java.io.File;
|
||||
import java.io.FileInputStream;
|
||||
import java.io.FileOutputStream;
|
||||
import java.io.IOException;
|
||||
import java.io.InputStream;
|
||||
import java.io.OutputStream;
|
||||
import java.nio.ByteBuffer;
|
||||
import java.nio.channels.Channels;
|
||||
import java.nio.channels.ReadableByteChannel;
|
||||
import java.nio.channels.WritableByteChannel;
|
||||
import java.util.Collections;
|
||||
import java.util.LinkedList;
|
||||
import java.util.List;
|
||||
import java.util.Queue;
|
||||
import java.util.UUID;
|
||||
|
||||
import static org.cryptomator.data.cloud.crypto.CryptoConstants.DATA_DIR_NAME;
|
||||
import static org.cryptomator.domain.usecases.ProgressAware.NO_OP_PROGRESS_AWARE;
|
||||
import static org.cryptomator.domain.usecases.cloud.Progress.progress;
|
||||
|
||||
abstract class CryptoImplDecorator {
|
||||
|
||||
final CloudContentRepository cloudContentRepository;
|
||||
final Context context;
|
||||
final DirIdCache dirIdCache;
|
||||
|
||||
private final Supplier<Cryptor> cryptor;
|
||||
private final CloudFolder storageLocation;
|
||||
|
||||
private RootCryptoFolder root;
|
||||
|
||||
CryptoImplDecorator(Context context, Supplier<Cryptor> cryptor, CloudContentRepository cloudContentRepository, CloudFolder storageLocation, DirIdCache dirIdCache) {
|
||||
this.context = context;
|
||||
this.cryptor = cryptor;
|
||||
this.cloudContentRepository = cloudContentRepository;
|
||||
this.storageLocation = storageLocation;
|
||||
this.dirIdCache = dirIdCache;
|
||||
}
|
||||
|
||||
abstract CryptoFolder folder(CryptoFolder cryptoParent, String cleartextName) throws BackendException;
|
||||
|
||||
abstract String decryptName(String dirId, String encryptedName);
|
||||
|
||||
abstract String encryptName(CryptoFolder cryptoParent, String name) throws BackendException;
|
||||
|
||||
abstract Optional<String> extractEncryptedName(String ciphertextName);
|
||||
|
||||
abstract List<CryptoNode> list(CryptoFolder cryptoFolder) throws BackendException;
|
||||
|
||||
abstract String encryptFolderName(CryptoFolder cryptoFolder, String name) throws BackendException;
|
||||
|
||||
abstract CryptoSymlink symlink(CryptoFolder cryptoParent, String cleartextName, String target) throws BackendException;
|
||||
|
||||
abstract CryptoFolder create(CryptoFolder folder) throws BackendException;
|
||||
|
||||
abstract CryptoFolder move(CryptoFolder source, CryptoFolder target) throws BackendException;
|
||||
|
||||
abstract CryptoFile move(CryptoFile source, CryptoFile target) throws BackendException;
|
||||
|
||||
abstract void delete(CloudNode node) throws BackendException;
|
||||
|
||||
abstract CryptoFile write(CryptoFile cryptoFile, DataSource data, ProgressAware<UploadState> progressAware, boolean replace, long length) throws BackendException;
|
||||
|
||||
abstract String loadDirId(CryptoFolder folder) throws BackendException, EmptyDirFileException;
|
||||
|
||||
abstract DirIdInfo createDirIdInfo(CryptoFolder folder) throws BackendException;
|
||||
|
||||
private String dirHash(String directoryId) {
|
||||
return cryptor().fileNameCryptor().hashDirectoryId(directoryId);
|
||||
}
|
||||
|
||||
private CloudFolder dataFolder() throws BackendException {
|
||||
return cloudContentRepository.folder(storageLocation, DATA_DIR_NAME);
|
||||
}
|
||||
|
||||
String path(CloudFolder base, String name) {
|
||||
return base.getPath() + "/" + name;
|
||||
}
|
||||
|
||||
File getInternalCache() {
|
||||
return context.getCacheDir();
|
||||
}
|
||||
|
||||
List<CryptoFolder> deepCollectSubfolders(CryptoFolder source) throws BackendException {
|
||||
Queue<CryptoFolder> queue = new LinkedList<>();
|
||||
queue.add(source);
|
||||
|
||||
List<CryptoFolder> result = new LinkedList<>();
|
||||
while (!queue.isEmpty()) {
|
||||
CryptoFolder folder = queue.remove();
|
||||
List<CryptoFolder> subfolders = shallowCollectSubfolders(folder);
|
||||
queue.addAll(subfolders);
|
||||
result.addAll(subfolders);
|
||||
}
|
||||
|
||||
Collections.reverse(result);
|
||||
|
||||
return result;
|
||||
}
|
||||
|
||||
private List<CryptoFolder> shallowCollectSubfolders(CryptoFolder source) throws BackendException {
|
||||
List<CryptoFolder> result = new LinkedList<>();
|
||||
|
||||
try {
|
||||
List<CryptoNode> list = list(source);
|
||||
for (CloudNode node : list) {
|
||||
if (node instanceof CryptoFolder) {
|
||||
result.add((CryptoFolder) node);
|
||||
}
|
||||
}
|
||||
} catch (NoDirFileException e) {
|
||||
// Ignoring because nothing can be done if the dir-file doesn't exists in the cloud
|
||||
}
|
||||
|
||||
return result;
|
||||
}
|
||||
|
||||
public RootCryptoFolder root(CryptoCloud cryptoCloud) throws BackendException {
|
||||
if (root == null) {
|
||||
root = new RootCryptoFolder(cryptoCloud);
|
||||
}
|
||||
return root;
|
||||
}
|
||||
|
||||
public CryptoFolder resolve(CryptoCloud cloud, String path) throws BackendException {
|
||||
if (path.startsWith("/")) {
|
||||
path = path.substring(1);
|
||||
}
|
||||
String[] names = path.split("/");
|
||||
CryptoFolder folder = root(cloud);
|
||||
for (String name : names) {
|
||||
folder = folder(folder, name);
|
||||
}
|
||||
return folder;
|
||||
}
|
||||
|
||||
public CryptoFile file(CryptoFolder cryptoParent, String cleartextName) throws BackendException {
|
||||
return file(cryptoParent, cleartextName, Optional.empty());
|
||||
}
|
||||
|
||||
public CryptoFile file(CryptoFolder cryptoParent, String cleartextName, Optional<Long> cleartextSize) throws BackendException {
|
||||
String ciphertextName = encryptFileName(cryptoParent, cleartextName);
|
||||
return file(cryptoParent, cleartextName, ciphertextName, cleartextSize);
|
||||
}
|
||||
|
||||
private CryptoFile file(CryptoFolder cryptoParent, String cleartextName, String ciphertextName, Optional<Long> cleartextSize) throws BackendException {
|
||||
Optional<Long> ciphertextSize;
|
||||
if (cleartextSize.isPresent()) {
|
||||
ciphertextSize = Optional.of(Cryptors.ciphertextSize(cleartextSize.get(), cryptor()) + cryptor().fileHeaderCryptor().headerSize());
|
||||
} else {
|
||||
ciphertextSize = Optional.empty();
|
||||
}
|
||||
CloudFile cloudFile = cloudContentRepository.file(dirIdInfo(cryptoParent).getCloudFolder(), ciphertextName, ciphertextSize);
|
||||
return file(cryptoParent, cleartextName, cloudFile, cleartextSize);
|
||||
}
|
||||
|
||||
CryptoFile file(CryptoFile cryptoFile, CloudFile cloudFile, Optional<Long> cleartextSize) throws BackendException {
|
||||
return file(cryptoFile.getParent(), cryptoFile.getName(), cloudFile, cleartextSize);
|
||||
}
|
||||
|
||||
CryptoFile file(CryptoFolder cryptoParent, String cleartextName, CloudFile cloudFile, Optional<Long> cleartextSize) throws BackendException {
|
||||
return new CryptoFile(cryptoParent, cleartextName, path(cryptoParent, cleartextName), cleartextSize, cloudFile);
|
||||
}
|
||||
|
||||
private String encryptFileName(CryptoFolder cryptoParent, String name) throws BackendException {
|
||||
return encryptName(cryptoParent, name);
|
||||
}
|
||||
|
||||
CryptoFolder folder(CryptoFolder cryptoParent, String cleartextName, CloudFile dirFile) throws BackendException {
|
||||
return new CryptoFolder(cryptoParent, cleartextName, path(cryptoParent, cleartextName), dirFile);
|
||||
}
|
||||
|
||||
CryptoFolder folder(CryptoFolder cryptoFolder, CloudFile dirFile) throws BackendException {
|
||||
return new CryptoFolder(cryptoFolder.getParent(), cryptoFolder.getName(), cryptoFolder.getPath(), dirFile);
|
||||
}
|
||||
|
||||
boolean exists(CloudNode node) throws BackendException {
|
||||
if (node instanceof CryptoFolder) {
|
||||
return exists((CryptoFolder) node);
|
||||
} else if (node instanceof CryptoFile) {
|
||||
return exists((CryptoFile) node);
|
||||
} else if (node instanceof CryptoSymlink) {
|
||||
return exists((CryptoSymlink) node);
|
||||
} else {
|
||||
throw new IllegalArgumentException("Unexpected CloudNode type: " + node.getClass());
|
||||
}
|
||||
}
|
||||
|
||||
private boolean exists(CryptoFolder folder) throws BackendException {
|
||||
return cloudContentRepository.exists(folder.getDirFile()) && cloudContentRepository.exists(dirIdInfo(folder).getCloudFolder());
|
||||
}
|
||||
|
||||
private boolean exists(CryptoFile file) throws BackendException {
|
||||
return cloudContentRepository.exists(file.getCloudFile());
|
||||
}
|
||||
|
||||
private boolean exists(CryptoSymlink symlink) throws BackendException {
|
||||
return cloudContentRepository.exists(symlink.getCloudFile());
|
||||
}
|
||||
|
||||
void assertCryptoFolderAlreadyExists(CryptoFolder cryptoFolder) throws BackendException {
|
||||
if (cloudContentRepository.exists(cryptoFolder.getDirFile()) //
|
||||
|| cloudContentRepository.exists(file(cryptoFolder.getParent(), cryptoFolder.getName()))) {
|
||||
throw new CloudNodeAlreadyExistsException(cryptoFolder.getName());
|
||||
}
|
||||
}
|
||||
|
||||
void assertCryptoFileAlreadyExists(CryptoFile cryptoFile) throws BackendException {
|
||||
if (cloudContentRepository.exists(cryptoFile.getCloudFile()) //
|
||||
|| cloudContentRepository.exists(folder(cryptoFile.getParent(), cryptoFile.getName()).getDirFile())) {
|
||||
throw new CloudNodeAlreadyExistsException("CloudNode already exists and replace is false");
|
||||
}
|
||||
}
|
||||
|
||||
private CryptoFile writeFromTmpFile(DataSource originalDataSource, final CryptoFile cryptoFile, File encryptedFile, final ProgressAware<UploadState> progressAware, boolean replace)
|
||||
throws BackendException, IOException {
|
||||
CryptoFile targetFile = targetFile(cryptoFile, replace);
|
||||
return file(targetFile, //
|
||||
cloudContentRepository.write( //
|
||||
targetFile.getCloudFile(), //
|
||||
originalDataSource.decorate(FileBasedDataSource.from(encryptedFile)), //
|
||||
new UploadFileReplacingProgressAware(cryptoFile, progressAware), //
|
||||
replace, //
|
||||
encryptedFile.length()), //
|
||||
cryptoFile.getSize());
|
||||
}
|
||||
|
||||
private CryptoFile targetFile(CryptoFile cryptoFile, boolean replace) throws BackendException {
|
||||
if (replace || !cloudContentRepository.exists(cryptoFile)) {
|
||||
return cryptoFile;
|
||||
}
|
||||
return firstNonExistingAutoRenamedFile(cryptoFile);
|
||||
}
|
||||
|
||||
private CryptoFile firstNonExistingAutoRenamedFile(CryptoFile original) throws BackendException {
|
||||
String name = original.getName();
|
||||
String nameWithoutExtension = nameWithoutExtension(name);
|
||||
String extension = extension(name);
|
||||
int counter = 1;
|
||||
CryptoFile result;
|
||||
do {
|
||||
String newFileName = nameWithoutExtension + " (" + counter + ")" + extension;
|
||||
result = file(original.getParent(), newFileName, original.getSize());
|
||||
counter++;
|
||||
} while (cloudContentRepository.exists(result));
|
||||
return result;
|
||||
}
|
||||
|
||||
String nameWithoutExtension(String name) {
|
||||
int lastDot = name.lastIndexOf(".");
|
||||
if (lastDot == -1) {
|
||||
return name;
|
||||
}
|
||||
return name.substring(0, lastDot);
|
||||
}
|
||||
|
||||
String extension(String name) {
|
||||
int lastDot = name.lastIndexOf(".");
|
||||
if (lastDot == -1) {
|
||||
return "";
|
||||
}
|
||||
return name.substring(lastDot + 1);
|
||||
}
|
||||
|
||||
public void read(CryptoFile cryptoFile, OutputStream data, ProgressAware<DownloadState> progressAware) throws BackendException {
|
||||
CloudFile ciphertextFile = cryptoFile.getCloudFile();
|
||||
try {
|
||||
File encryptedTmpFile = readToTmpFile(cryptoFile, ciphertextFile, progressAware);
|
||||
progressAware.onProgress(Progress.started(DownloadState.decryption(cryptoFile)));
|
||||
try (ReadableByteChannel readableByteChannel = Channels.newChannel(new FileInputStream(encryptedTmpFile));
|
||||
ReadableByteChannel decryptingReadableByteChannel = new DecryptingReadableByteChannel(readableByteChannel, cryptor(), true)) {
|
||||
ByteBuffer buff = ByteBuffer.allocate(cryptor().fileContentCryptor().ciphertextChunkSize());
|
||||
long cleartextSize = cryptoFile.getSize().orElse(Long.MAX_VALUE);
|
||||
long decrypted = 0;
|
||||
int read;
|
||||
while ((read = decryptingReadableByteChannel.read(buff)) > 0) {
|
||||
buff.flip();
|
||||
data.write(buff.array(), 0, buff.remaining());
|
||||
decrypted += read;
|
||||
progressAware.onProgress(progress(DownloadState.decryption(cryptoFile)).between(0).and(cleartextSize).withValue(decrypted));
|
||||
}
|
||||
} finally {
|
||||
encryptedTmpFile.delete();
|
||||
progressAware.onProgress(Progress.completed(DownloadState.decryption(cryptoFile)));
|
||||
}
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
private File readToTmpFile(CryptoFile cryptoFile, CloudFile file, ProgressAware progressAware) throws BackendException, IOException {
|
||||
File encryptedTmpFile = File.createTempFile(UUID.randomUUID().toString(), ".crypto", getInternalCache());
|
||||
try (OutputStream encryptedData = new FileOutputStream(encryptedTmpFile)) {
|
||||
cloudContentRepository.read(file, Optional.of(encryptedTmpFile), encryptedData, new DownloadFileReplacingProgressAware(cryptoFile, progressAware));
|
||||
return encryptedTmpFile;
|
||||
}
|
||||
}
|
||||
|
||||
public String currentAccount(Cloud cloud) throws BackendException {
|
||||
return cloudContentRepository.checkAuthenticationAndRetrieveCurrentAccount(cloud);
|
||||
}
|
||||
|
||||
DirIdInfo dirIdInfo(CryptoFolder folder) throws BackendException {
|
||||
DirIdInfo dirIdInfo = dirIdCache.get(folder);
|
||||
if (dirIdInfo == null) {
|
||||
return createDirIdInfo(folder);
|
||||
}
|
||||
return dirIdInfo;
|
||||
}
|
||||
|
||||
DirIdInfo createDirIdInfoFor(String dirId) throws BackendException {
|
||||
String dirHash = dirHash(dirId);
|
||||
CloudFolder lvl2Dir = lvl2Dir(dirHash);
|
||||
return new DirIdInfo(dirId, lvl2Dir);
|
||||
}
|
||||
|
||||
byte[] loadContentsOfDirFile(CryptoFolder folder) throws BackendException, EmptyDirFileException {
|
||||
try (ByteArrayOutputStream out = new ByteArrayOutputStream()) {
|
||||
cloudContentRepository.read(folder.getDirFile(), Optional.empty(), out, NO_OP_PROGRESS_AWARE);
|
||||
if (dirfileIsEmpty(out)) {
|
||||
throw new EmptyDirFileException(folder.getName(), folder.getDirFile().getPath());
|
||||
}
|
||||
return out.toByteArray();
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
String newDirId() {
|
||||
return UUID.randomUUID().toString();
|
||||
}
|
||||
|
||||
boolean dirfileIsEmpty(ByteArrayOutputStream out) {
|
||||
return out.size() == 0;
|
||||
}
|
||||
|
||||
private CloudFolder lvl2Dir(String dirHash) throws BackendException {
|
||||
return cloudContentRepository.folder(lvl1Dir(dirHash), dirHash.substring(2));
|
||||
}
|
||||
|
||||
private CloudFolder lvl1Dir(String dirHash) throws BackendException {
|
||||
return cloudContentRepository.folder(dataFolder(), dirHash.substring(0, 2));
|
||||
}
|
||||
|
||||
Cryptor cryptor() {
|
||||
return cryptor.get();
|
||||
}
|
||||
|
||||
CloudFolder storageLocation() {
|
||||
return storageLocation;
|
||||
}
|
||||
|
||||
void addFolderToCache(CryptoFolder result, DirIdCache.DirIdInfo dirInfo) {
|
||||
dirIdCache.put(result, dirInfo);
|
||||
}
|
||||
|
||||
void evictFromCache(CryptoFolder cryptoFolder) {
|
||||
dirIdCache.evict(cryptoFolder);
|
||||
}
|
||||
|
||||
CryptoFile writeShortNameFile(CryptoFile cryptoFile, DataSource data, ProgressAware<UploadState> progressAware, boolean replace, long length) throws BackendException {
|
||||
if (!replace) {
|
||||
assertCryptoFileAlreadyExists(cryptoFile);
|
||||
}
|
||||
try (InputStream stream = data.open(context)) {
|
||||
File encryptedTmpFile = File.createTempFile(UUID.randomUUID().toString(), ".crypto", getInternalCache());
|
||||
try (WritableByteChannel writableByteChannel = Channels.newChannel(new FileOutputStream(encryptedTmpFile));
|
||||
WritableByteChannel encryptingWritableByteChannel = new EncryptingWritableByteChannel(writableByteChannel, cryptor())) {
|
||||
progressAware.onProgress(Progress.started(UploadState.encryption(cryptoFile)));
|
||||
ByteBuffer buff = ByteBuffer.allocate(cryptor().fileContentCryptor().cleartextChunkSize());
|
||||
long ciphertextSize = Cryptors.ciphertextSize(cryptoFile.getSize().get(), cryptor()) + cryptor().fileHeaderCryptor().headerSize();
|
||||
int read;
|
||||
long encrypted = 0;
|
||||
while ((read = stream.read(buff.array())) > 0) {
|
||||
buff.limit(read);
|
||||
int written = encryptingWritableByteChannel.write(buff);
|
||||
buff.flip();
|
||||
encrypted += written;
|
||||
progressAware.onProgress(progress(UploadState.encryption(cryptoFile)).between(0).and(ciphertextSize).withValue(encrypted));
|
||||
}
|
||||
encryptingWritableByteChannel.close();
|
||||
progressAware.onProgress(Progress.completed(UploadState.encryption(cryptoFile)));
|
||||
return writeFromTmpFile(data, cryptoFile, encryptedTmpFile, progressAware, replace);
|
||||
} catch (Throwable e) {
|
||||
throw e;
|
||||
} finally {
|
||||
encryptedTmpFile.delete();
|
||||
}
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
}
|
@ -0,0 +1,546 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import com.google.common.io.BaseEncoding;
|
||||
|
||||
import org.cryptomator.cryptolib.Cryptors;
|
||||
import org.cryptomator.cryptolib.EncryptingWritableByteChannel;
|
||||
import org.cryptomator.cryptolib.api.AuthenticationFailedException;
|
||||
import org.cryptomator.cryptolib.api.Cryptor;
|
||||
import org.cryptomator.cryptolib.common.MessageDigestSupplier;
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
|
||||
import org.cryptomator.domain.exception.EmptyDirFileException;
|
||||
import org.cryptomator.domain.exception.FatalBackendException;
|
||||
import org.cryptomator.domain.exception.NoDirFileException;
|
||||
import org.cryptomator.domain.exception.NoSuchCloudFileException;
|
||||
import org.cryptomator.domain.exception.SymLinkException;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
import org.cryptomator.domain.usecases.ProgressAware;
|
||||
import org.cryptomator.domain.usecases.UploadFileReplacingProgressAware;
|
||||
import org.cryptomator.domain.usecases.cloud.ByteArrayDataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.FileBasedDataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.Progress;
|
||||
import org.cryptomator.domain.usecases.cloud.UploadState;
|
||||
import org.cryptomator.util.Optional;
|
||||
import org.cryptomator.util.Supplier;
|
||||
|
||||
import java.io.ByteArrayOutputStream;
|
||||
import java.io.File;
|
||||
import java.io.FileOutputStream;
|
||||
import java.io.IOException;
|
||||
import java.io.InputStream;
|
||||
import java.nio.ByteBuffer;
|
||||
import java.nio.channels.Channels;
|
||||
import java.nio.channels.WritableByteChannel;
|
||||
import java.util.ArrayList;
|
||||
import java.util.Collections;
|
||||
import java.util.List;
|
||||
import java.util.UUID;
|
||||
import java.util.regex.Matcher;
|
||||
import java.util.regex.Pattern;
|
||||
|
||||
import timber.log.Timber;
|
||||
|
||||
import static org.cryptomator.domain.usecases.ProgressAware.NO_OP_PROGRESS_AWARE;
|
||||
import static org.cryptomator.domain.usecases.cloud.Progress.progress;
|
||||
import static org.cryptomator.util.Encodings.UTF_8;
|
||||
|
||||
final class CryptoImplVaultFormat7 extends CryptoImplDecorator {
|
||||
|
||||
private static final int SHORT_NAMES_MAX_LENGTH = 220;
|
||||
private static final String CLOUD_NODE_EXT = ".c9r";
|
||||
private static final String LONG_NODE_FILE_EXT = ".c9s";
|
||||
private static final String CLOUD_FOLDER_DIR_FILE_PRE = "dir";
|
||||
private static final String LONG_NODE_FILE_CONTENT_CONTENTS = "contents";
|
||||
private static final String LONG_NODE_FILE_CONTENT_NAME = "name";
|
||||
private static final String CLOUD_NODE_SYMLINK_PRE = "symlink";
|
||||
private static final Pattern BASE64_ENCRYPTED_NAME_PATTERN = Pattern.compile("^([A-Za-z0-9+/\\-_]{4})*([A-Za-z0-9+/\\-]{4}|[A-Za-z0-9+/\\-_]{3}=|[A-Za-z0-9+/\\-_]{2}==)?$");
|
||||
|
||||
private static final BaseEncoding BASE64 = BaseEncoding.base64Url();
|
||||
|
||||
CryptoImplVaultFormat7(Context context, Supplier<Cryptor> cryptor, CloudContentRepository cloudContentRepository, CloudFolder storageLocation, DirIdCache dirIdCache) {
|
||||
super(context, cryptor, cloudContentRepository, storageLocation, dirIdCache);
|
||||
}
|
||||
|
||||
@Override
|
||||
CryptoFolder folder(CryptoFolder cryptoParent, String cleartextName) throws BackendException {
|
||||
String dirFileName = encryptFolderName(cryptoParent, cleartextName);
|
||||
CloudFolder dirFolder = cloudContentRepository.folder(dirIdInfo(cryptoParent).getCloudFolder(), dirFileName);
|
||||
CloudFile dirFile = cloudContentRepository.file(dirFolder, CLOUD_FOLDER_DIR_FILE_PRE + CLOUD_NODE_EXT);
|
||||
return folder(cryptoParent, cleartextName, dirFile);
|
||||
}
|
||||
|
||||
@Override
|
||||
String encryptName(CryptoFolder cryptoFolder, String name) throws BackendException {
|
||||
String ciphertextName = cryptor() //
|
||||
.fileNameCryptor() //
|
||||
.encryptFilename(BASE64, name, dirIdInfo(cryptoFolder).getId().getBytes(UTF_8)) + CLOUD_NODE_EXT;
|
||||
|
||||
if (ciphertextName.length() > SHORT_NAMES_MAX_LENGTH) {
|
||||
ciphertextName = deflate(cryptoFolder, ciphertextName);
|
||||
}
|
||||
return ciphertextName;
|
||||
}
|
||||
|
||||
private String deflate(CryptoFolder cryptoParent, String longFileName) throws BackendException {
|
||||
byte[] longFilenameBytes = longFileName.getBytes(UTF_8);
|
||||
byte[] hash = MessageDigestSupplier.SHA1.get().digest(longFilenameBytes);
|
||||
String shortFileName = BASE64.encode(hash) + LONG_NODE_FILE_EXT;
|
||||
|
||||
CloudFolder dirFolder = cloudContentRepository.folder(dirIdInfo(cryptoParent).getCloudFolder(), shortFileName);
|
||||
|
||||
// if folder already exists in case of renaming
|
||||
if (!cloudContentRepository.exists(dirFolder)) {
|
||||
dirFolder = cloudContentRepository.create(dirFolder);
|
||||
}
|
||||
|
||||
byte[] data = longFileName.getBytes(UTF_8);
|
||||
CloudFile cloudFile = cloudContentRepository.file(dirFolder, LONG_NODE_FILE_CONTENT_NAME + LONG_NODE_FILE_EXT, Optional.of((long) data.length));
|
||||
cloudContentRepository.write(cloudFile, ByteArrayDataSource.from(data), NO_OP_PROGRESS_AWARE, true, data.length);
|
||||
return shortFileName;
|
||||
}
|
||||
|
||||
private CloudFile metadataFile(CloudNode cloudNode) throws BackendException {
|
||||
CloudFolder cloudFolder;
|
||||
|
||||
if (cloudNode instanceof CloudFile) {
|
||||
cloudFolder = cloudNode.getParent();
|
||||
} else if (cloudNode instanceof CloudFolder) {
|
||||
cloudFolder = (CloudFolder) cloudNode;
|
||||
} else {
|
||||
throw new IllegalStateException("Should be file or folder");
|
||||
}
|
||||
|
||||
return cloudContentRepository.file(cloudFolder, LONG_NODE_FILE_CONTENT_NAME + LONG_NODE_FILE_EXT);
|
||||
}
|
||||
|
||||
private String inflate(CloudNode cloudNode) throws BackendException {
|
||||
CloudFile metadataFile = metadataFile(cloudNode);
|
||||
ByteArrayOutputStream out = new ByteArrayOutputStream();
|
||||
cloudContentRepository.read(metadataFile, Optional.empty(), out, NO_OP_PROGRESS_AWARE);
|
||||
return new String(out.toByteArray(), UTF_8);
|
||||
}
|
||||
|
||||
@Override
|
||||
String decryptName(String dirId, String encryptedName) {
|
||||
Optional<String> ciphertextName = extractEncryptedName(encryptedName);
|
||||
if (ciphertextName.isPresent()) {
|
||||
return cryptor().fileNameCryptor().decryptFilename(BASE64, ciphertextName.get(), dirId.getBytes(UTF_8));
|
||||
} else {
|
||||
return null;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
List<CryptoNode> list(CryptoFolder cryptoFolder) throws BackendException {
|
||||
dirIdCache.evictSubFoldersOf(cryptoFolder);
|
||||
|
||||
DirIdCache.DirIdInfo dirIdInfo = dirIdInfo(cryptoFolder);
|
||||
String dirId = dirIdInfo(cryptoFolder).getId();
|
||||
CloudFolder lvl2Dir = dirIdInfo.getCloudFolder();
|
||||
|
||||
List<CloudNode> ciphertextNodes;
|
||||
|
||||
try {
|
||||
ciphertextNodes = cloudContentRepository.list(lvl2Dir);
|
||||
} catch (NoSuchCloudFileException e) {
|
||||
if (cryptoFolder instanceof RootCryptoFolder) {
|
||||
Timber.tag("CryptoFs").e("No lvl2Dir exists for root folder in %s", lvl2Dir.getPath());
|
||||
throw new FatalBackendException(String.format("No lvl2Dir exists for root folder in %s", lvl2Dir.getPath()), e);
|
||||
} else if (cloudContentRepository.exists(cloudContentRepository.file(cryptoFolder.getDirFile().getParent(), CLOUD_NODE_SYMLINK_PRE + CLOUD_NODE_EXT))) {
|
||||
throw new SymLinkException();
|
||||
} else if (!cloudContentRepository.exists(cryptoFolder.getDirFile())) {
|
||||
Timber.tag("CryptoFs").e("No dir file exists in %s", cryptoFolder.getDirFile().getPath());
|
||||
throw new NoDirFileException(cryptoFolder.getName(), cryptoFolder.getDirFile().getPath());
|
||||
}
|
||||
return Collections.emptyList();
|
||||
}
|
||||
|
||||
List<CryptoNode> result = new ArrayList<>();
|
||||
for (CloudNode node : ciphertextNodes) {
|
||||
ciphertextToCleartextNode(cryptoFolder, dirId, node).ifPresent(result::add);
|
||||
}
|
||||
|
||||
return result;
|
||||
}
|
||||
|
||||
private Optional<CryptoNode> ciphertextToCleartextNode(CryptoFolder cryptoFolder, String dirId, CloudNode cloudNode) throws BackendException {
|
||||
String ciphertextName = cloudNode.getName();
|
||||
Optional<CloudFile> longNameFolderDirFile = Optional.empty();
|
||||
Optional<CloudFile> longNameFile = Optional.empty();
|
||||
|
||||
if (ciphertextName.endsWith(CLOUD_NODE_EXT)) {
|
||||
ciphertextName = nameWithoutExtension(ciphertextName);
|
||||
} else if (ciphertextName.endsWith(LONG_NODE_FILE_EXT)) {
|
||||
Optional<String> ciphertextNameOption = longNodeCiphertextName(cloudNode);
|
||||
if (ciphertextNameOption.isPresent()) {
|
||||
ciphertextName = ciphertextNameOption.get();
|
||||
} else {
|
||||
return Optional.empty();
|
||||
}
|
||||
|
||||
List<CloudNode> subfiles = cloudContentRepository.list((CloudFolder) cloudNode);
|
||||
|
||||
for (CloudNode cloudNode1 : subfiles) {
|
||||
switch (cloudNode1.getName()) {
|
||||
case LONG_NODE_FILE_CONTENT_CONTENTS + CLOUD_NODE_EXT:
|
||||
longNameFile = Optional.of((CloudFile) cloudNode1);
|
||||
break;
|
||||
case CLOUD_FOLDER_DIR_FILE_PRE + CLOUD_NODE_EXT:
|
||||
longNameFolderDirFile = Optional.of((CloudFile) cloudNode1);
|
||||
break;
|
||||
case CLOUD_NODE_SYMLINK_PRE + CLOUD_NODE_EXT:
|
||||
return Optional.empty();
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
try {
|
||||
String cleartextName = decryptName(dirId, ciphertextName);
|
||||
|
||||
if (cleartextName == null) {
|
||||
Timber.tag("CryptoFs").w("Failed to parse cipher text name of: %s", cloudNode.getPath());
|
||||
return Optional.empty();
|
||||
}
|
||||
|
||||
return cloudNodeFromName(cloudNode, cryptoFolder, cleartextName, longNameFile, longNameFolderDirFile);
|
||||
} catch (AuthenticationFailedException e) {
|
||||
Timber.tag("CryptoFs").w(e, "File/Folder name authentication failed: %s", cloudNode.getPath());
|
||||
return Optional.empty();
|
||||
} catch (IllegalArgumentException e) {
|
||||
Timber.tag("CryptoFs").w(e, "Illegal ciphertext filename/folder: %s", cloudNode.getPath());
|
||||
return Optional.empty();
|
||||
}
|
||||
}
|
||||
|
||||
private Optional<CryptoNode> cloudNodeFromName(CloudNode cloudNode, CryptoFolder cryptoFolder, String cleartextName, Optional<CloudFile> longNameFile, Optional<CloudFile> dirFile) throws BackendException {
|
||||
if (cloudNode instanceof CloudFile) {
|
||||
CloudFile cloudFile = (CloudFile) cloudNode;
|
||||
Optional<Long> cleartextSize = Optional.empty();
|
||||
if (cloudFile.getSize().isPresent()) {
|
||||
long ciphertextSizeWithoutHeader = cloudFile.getSize().get() - cryptor().fileHeaderCryptor().headerSize();
|
||||
if (ciphertextSizeWithoutHeader >= 0) {
|
||||
cleartextSize = Optional.of(Cryptors.cleartextSize(ciphertextSizeWithoutHeader, cryptor()));
|
||||
}
|
||||
}
|
||||
return Optional.of(file(cryptoFolder, cleartextName, cloudFile, cleartextSize));
|
||||
} else if (cloudNode instanceof CloudFolder) {
|
||||
if (longNameFile.isPresent()) {
|
||||
// long file
|
||||
Optional<Long> cleartextSize = Optional.empty();
|
||||
if (longNameFile.get().getSize().isPresent()) {
|
||||
long ciphertextSizeWithoutHeader = longNameFile.get().getSize().get() - cryptor().fileHeaderCryptor().headerSize();
|
||||
if (ciphertextSizeWithoutHeader >= 0) {
|
||||
cleartextSize = Optional.of(Cryptors.cleartextSize(ciphertextSizeWithoutHeader, cryptor()));
|
||||
}
|
||||
}
|
||||
|
||||
return Optional.of(file(cryptoFolder, cleartextName, longNameFile.get(), cleartextSize));
|
||||
} else {
|
||||
// folder
|
||||
if (dirFile.isPresent()) {
|
||||
return Optional.of(folder(cryptoFolder, cleartextName, dirFile.get()));
|
||||
} else {
|
||||
CloudFile constructedDirFile = cloudContentRepository.file((CloudFolder) cloudNode, "dir" + CLOUD_NODE_EXT);
|
||||
return Optional.of(folder(cryptoFolder, cleartextName, constructedDirFile));
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return Optional.empty();
|
||||
}
|
||||
|
||||
private Optional<String> longNodeCiphertextName(CloudNode cloudNode) {
|
||||
try {
|
||||
String ciphertextName = inflate(cloudNode);
|
||||
ciphertextName = nameWithoutExtension(ciphertextName);
|
||||
return Optional.of(ciphertextName);
|
||||
} catch (NoSuchCloudFileException e) {
|
||||
Timber.tag("CryptoFs").e("Missing %s%s for cloud node: %s", LONG_NODE_FILE_CONTENT_NAME, LONG_NODE_FILE_EXT, cloudNode.getPath());
|
||||
return Optional.empty();
|
||||
} catch (BackendException e) {
|
||||
Timber.tag("CryptoFs").e(e, "Failed to read %s%s for cloud node: %s", LONG_NODE_FILE_CONTENT_NAME, LONG_NODE_FILE_EXT, cloudNode.getPath());
|
||||
return Optional.empty();
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
DirIdCache.DirIdInfo createDirIdInfo(CryptoFolder folder) throws BackendException {
|
||||
String dirId = loadDirId(folder);
|
||||
return dirIdCache.put(folder, createDirIdInfoFor(dirId));
|
||||
}
|
||||
|
||||
@Override
|
||||
String encryptFolderName(CryptoFolder cryptoFolder, String name) throws BackendException {
|
||||
return encryptName(cryptoFolder, name);
|
||||
}
|
||||
|
||||
@Override
|
||||
CryptoSymlink symlink(CryptoFolder cryptoParent, String cleartextName, String target) throws BackendException {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
String loadDirId(CryptoFolder folder) throws BackendException, EmptyDirFileException {
|
||||
CloudFile dirFile = null;
|
||||
|
||||
if (folder.getDirFile() != null) {
|
||||
dirFile = folder.getDirFile();
|
||||
}
|
||||
|
||||
if (RootCryptoFolder.isRoot(folder)) {
|
||||
return CryptoConstants.ROOT_DIR_ID;
|
||||
} else if (dirFile != null && cloudContentRepository.exists(dirFile)) {
|
||||
return new String(loadContentsOfDirFile(dirFile), UTF_8);
|
||||
} else {
|
||||
return newDirId();
|
||||
}
|
||||
}
|
||||
|
||||
private byte[] loadContentsOfDirFile(CloudFile file) throws BackendException, EmptyDirFileException {
|
||||
try (ByteArrayOutputStream out = new ByteArrayOutputStream()) {
|
||||
cloudContentRepository.read(file, Optional.empty(), out, NO_OP_PROGRESS_AWARE);
|
||||
if (dirfileIsEmpty(out)) {
|
||||
throw new EmptyDirFileException(file.getName(), file.getPath());
|
||||
}
|
||||
return out.toByteArray();
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
CryptoFolder create(CryptoFolder folder) throws BackendException {
|
||||
boolean shortName = false;
|
||||
if (folder.getDirFile().getParent().getName().endsWith(LONG_NODE_FILE_EXT)) {
|
||||
assertCryptoLongDirFileAlreadyExists(folder);
|
||||
} else {
|
||||
assertCryptoFolderAlreadyExists(folder);
|
||||
shortName = true;
|
||||
}
|
||||
|
||||
DirIdCache.DirIdInfo dirIdInfo = dirIdInfo(folder);
|
||||
CloudFolder createdCloudFolder = cloudContentRepository.create(dirIdInfo.getCloudFolder());
|
||||
|
||||
CloudFolder dirFolder = folder.getDirFile().getParent();
|
||||
CloudFile dirFile = folder.getDirFile();
|
||||
if (shortName) {
|
||||
dirFolder = cloudContentRepository.create(dirFolder);
|
||||
dirFile = cloudContentRepository.file(dirFolder, folder.getDirFile().getName());
|
||||
}
|
||||
|
||||
byte[] dirId = dirIdInfo.getId().getBytes(UTF_8);
|
||||
CloudFile createdDirFile = cloudContentRepository.write(dirFile, ByteArrayDataSource.from(dirId), NO_OP_PROGRESS_AWARE, false, dirId.length);
|
||||
CryptoFolder result = folder(folder, createdDirFile);
|
||||
addFolderToCache(result, dirIdInfo.withCloudFolder(createdCloudFolder));
|
||||
return result;
|
||||
}
|
||||
|
||||
@Override
|
||||
Optional<String> extractEncryptedName(String ciphertextName) {
|
||||
final Matcher matcher = BASE64_ENCRYPTED_NAME_PATTERN.matcher(ciphertextName);
|
||||
if (matcher.find(0)) {
|
||||
return Optional.of(matcher.group());
|
||||
} else {
|
||||
return Optional.empty();
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
CryptoFolder move(CryptoFolder source, CryptoFolder target) throws BackendException {
|
||||
boolean shortName = false;
|
||||
if (target.getDirFile().getParent().getName().endsWith(LONG_NODE_FILE_EXT)) {
|
||||
assertCryptoLongDirFileAlreadyExists(target);
|
||||
} else {
|
||||
assertCryptoFolderAlreadyExists(target);
|
||||
shortName = true;
|
||||
}
|
||||
|
||||
CloudFile targetDirFile = target.getDirFile();
|
||||
if (shortName) {
|
||||
CloudFolder targetDirFolder = cloudContentRepository.create(target.getDirFile().getParent());
|
||||
targetDirFile = cloudContentRepository.file(targetDirFolder, target.getDirFile().getName());
|
||||
}
|
||||
|
||||
CryptoFolder result = folder(target.getParent(), target.getName(), cloudContentRepository.move(source.getDirFile(), targetDirFile));
|
||||
|
||||
cloudContentRepository.delete(source.getDirFile().getParent());
|
||||
|
||||
evictFromCache(source);
|
||||
evictFromCache(target);
|
||||
|
||||
return result;
|
||||
}
|
||||
|
||||
@Override
|
||||
CryptoFile move(CryptoFile source, CryptoFile target) throws BackendException {
|
||||
if (source.getCloudFile().getParent().getName().endsWith(LONG_NODE_FILE_EXT)) {
|
||||
CloudFolder targetDirFolder = cloudContentRepository.folder(target.getCloudFile().getParent(), target.getCloudFile().getName());
|
||||
CryptoFile cryptoFile;
|
||||
if (target.getCloudFile().getName().endsWith(LONG_NODE_FILE_EXT)) {
|
||||
assertCryptoLongDirFileAlreadyExists(targetDirFolder);
|
||||
cryptoFile = moveLongFileToLongFile(source, target, targetDirFolder);
|
||||
} else {
|
||||
assertCryptoFileAlreadyExists(target);
|
||||
cryptoFile = moveLongFileToShortFile(source, target);
|
||||
}
|
||||
CloudFolder sourceDirFolder = cloudContentRepository.folder(source.getCloudFile().getParent().getParent(), source.getCloudFile().getParent().getName());
|
||||
cloudContentRepository.delete(sourceDirFolder);
|
||||
return cryptoFile;
|
||||
} else {
|
||||
CloudFolder targetDirFolder = cloudContentRepository.folder(target.getCloudFile().getParent(), target.getCloudFile().getName());
|
||||
if (target.getCloudFile().getName().endsWith(LONG_NODE_FILE_EXT)) {
|
||||
assertCryptoLongDirFileAlreadyExists(targetDirFolder);
|
||||
return moveShortFileToLongFile(source, target, targetDirFolder);
|
||||
} else {
|
||||
assertCryptoFileAlreadyExists(target);
|
||||
return file(target, cloudContentRepository.move(source.getCloudFile(), target.getCloudFile()), source.getSize());
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
private CryptoFile moveLongFileToLongFile(CryptoFile source, CryptoFile target, CloudFolder targetDirFolder) throws BackendException {
|
||||
CloudFile sourceFile = cloudContentRepository.file(source.getCloudFile().getParent(), LONG_NODE_FILE_CONTENT_CONTENTS + CLOUD_NODE_EXT);
|
||||
CloudFile movedFile = cloudContentRepository.move(sourceFile, cloudContentRepository.file(targetDirFolder, LONG_NODE_FILE_CONTENT_CONTENTS + CLOUD_NODE_EXT));
|
||||
return file(target, movedFile, movedFile.getSize());
|
||||
}
|
||||
|
||||
private CryptoFile moveLongFileToShortFile(CryptoFile source, CryptoFile target) throws BackendException {
|
||||
CloudFile sourceFile = cloudContentRepository.file(source.getCloudFile().getParent(), LONG_NODE_FILE_CONTENT_CONTENTS + CLOUD_NODE_EXT);
|
||||
CloudFile movedFile = cloudContentRepository.move(sourceFile, target.getCloudFile());
|
||||
return file(target, movedFile, movedFile.getSize());
|
||||
}
|
||||
|
||||
private CryptoFile moveShortFileToLongFile(CryptoFile source, CryptoFile target, CloudFolder targetDirFolder) throws BackendException {
|
||||
CloudFile movedFile = cloudContentRepository.move(source.getCloudFile(), cloudContentRepository.file(targetDirFolder, LONG_NODE_FILE_CONTENT_CONTENTS + CLOUD_NODE_EXT));
|
||||
return file(target, movedFile, movedFile.getSize());
|
||||
}
|
||||
|
||||
@Override
|
||||
void delete(CloudNode node) throws BackendException {
|
||||
if (node instanceof CryptoFolder) {
|
||||
CryptoFolder cryptoFolder = (CryptoFolder) node;
|
||||
List<CryptoFolder> cryptoSubfolders = deepCollectSubfolders(cryptoFolder);
|
||||
for (CryptoFolder cryptoSubfolder : cryptoSubfolders) {
|
||||
try {
|
||||
cloudContentRepository.delete(dirIdInfo(cryptoSubfolder).getCloudFolder());
|
||||
} catch (NoSuchCloudFileException e) {
|
||||
// Ignoring because nothing can be done if the dir-file doesn't exists in the cloud
|
||||
}
|
||||
}
|
||||
|
||||
try {
|
||||
cloudContentRepository.delete(dirIdInfo(cryptoFolder).getCloudFolder());
|
||||
} catch (NoSuchCloudFileException e) {
|
||||
// Ignoring because nothing can be done if the dir-file doesn't exists in the cloud
|
||||
}
|
||||
|
||||
cloudContentRepository.delete(cryptoFolder.getDirFile().getParent());
|
||||
|
||||
evictFromCache(cryptoFolder);
|
||||
} else if (node instanceof CryptoFile) {
|
||||
CryptoFile cryptoFile = (CryptoFile) node;
|
||||
if (cryptoFile.getCloudFile().getParent().getName().endsWith(LONG_NODE_FILE_EXT)) {
|
||||
cloudContentRepository.delete(cryptoFile.getCloudFile().getParent());
|
||||
} else {
|
||||
cloudContentRepository.delete(cryptoFile.getCloudFile());
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public CryptoFile write(CryptoFile cryptoFile, DataSource data, ProgressAware<UploadState> progressAware, boolean replace, long length) throws BackendException {
|
||||
if (cryptoFile.getCloudFile().getName().endsWith(LONG_NODE_FILE_EXT)) {
|
||||
return writeLongFile(cryptoFile, data, progressAware, replace, length);
|
||||
} else {
|
||||
return writeShortNameFile(cryptoFile, data, progressAware, replace, length);
|
||||
}
|
||||
}
|
||||
|
||||
private CryptoFile writeLongFile(CryptoFile cryptoFile, DataSource data, ProgressAware<UploadState> progressAware, boolean replace, long length) throws BackendException {
|
||||
CloudFolder dirFolder = cloudContentRepository.folder(cryptoFile.getCloudFile().getParent(), cryptoFile.getCloudFile().getName());
|
||||
CloudFile cloudFile = cloudContentRepository.file(dirFolder, LONG_NODE_FILE_CONTENT_CONTENTS + CLOUD_NODE_EXT, data.size(context));
|
||||
|
||||
assertCryptoLongDirFileAlreadyExists(dirFolder);
|
||||
|
||||
try (InputStream stream = data.open(context)) {
|
||||
File encryptedTmpFile = File.createTempFile(UUID.randomUUID().toString(), ".crypto", getInternalCache());
|
||||
try (WritableByteChannel writableByteChannel = Channels.newChannel(new FileOutputStream(encryptedTmpFile)); //
|
||||
WritableByteChannel encryptingWritableByteChannel = new EncryptingWritableByteChannel(writableByteChannel, cryptor())) {
|
||||
progressAware.onProgress(Progress.started(UploadState.encryption(cloudFile)));
|
||||
ByteBuffer buff = ByteBuffer.allocate(cryptor().fileContentCryptor().cleartextChunkSize());
|
||||
long ciphertextSize = Cryptors.ciphertextSize(cloudFile.getSize().get(), cryptor()) + cryptor().fileHeaderCryptor().headerSize();
|
||||
int read;
|
||||
long encrypted = 0;
|
||||
while ((read = stream.read(buff.array())) > 0) {
|
||||
buff.limit(read);
|
||||
int written = encryptingWritableByteChannel.write(buff);
|
||||
buff.flip();
|
||||
encrypted += written;
|
||||
progressAware.onProgress(progress(UploadState.encryption(cloudFile)).between(0).and(ciphertextSize).withValue(encrypted));
|
||||
}
|
||||
encryptingWritableByteChannel.close();
|
||||
progressAware.onProgress(Progress.completed(UploadState.encryption(cloudFile)));
|
||||
|
||||
CloudFile targetFile = targetFile(cryptoFile, cloudFile, replace);
|
||||
|
||||
return file(cryptoFile, //
|
||||
cloudContentRepository.write( //
|
||||
targetFile, //
|
||||
data.decorate(FileBasedDataSource.from(encryptedTmpFile)), //
|
||||
new UploadFileReplacingProgressAware(cryptoFile, progressAware), //
|
||||
replace, //
|
||||
encryptedTmpFile.length()), //
|
||||
cryptoFile.getSize());
|
||||
} catch (Throwable e) {
|
||||
throw e;
|
||||
} finally {
|
||||
encryptedTmpFile.delete();
|
||||
}
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
private CloudFile targetFile(CryptoFile cryptoFile, CloudFile cloudFile, boolean replace) throws BackendException {
|
||||
if (replace || !cloudContentRepository.exists(cloudFile)) {
|
||||
return cloudFile;
|
||||
}
|
||||
return firstNonExistingAutoRenamedFile(cryptoFile);
|
||||
}
|
||||
|
||||
private CloudFile firstNonExistingAutoRenamedFile(CryptoFile original) throws BackendException {
|
||||
String name = original.getName();
|
||||
String nameWithoutExtension = nameWithoutExtension(name);
|
||||
String extension = extension(name);
|
||||
|
||||
if (!extension.isEmpty()) {
|
||||
extension = "." + extension;
|
||||
}
|
||||
|
||||
int counter = 1;
|
||||
CryptoFile result;
|
||||
CloudFile cloudFile;
|
||||
do {
|
||||
String newFileName = nameWithoutExtension + " (" + counter + ")" + extension;
|
||||
result = file(original.getParent(), newFileName, original.getSize());
|
||||
counter++;
|
||||
|
||||
CloudFolder dirFolder = cloudContentRepository.folder(result.getCloudFile().getParent(), result.getCloudFile().getName());
|
||||
cloudFile = cloudContentRepository.file(dirFolder, LONG_NODE_FILE_CONTENT_CONTENTS + CLOUD_NODE_EXT, result.getSize());
|
||||
} while (cloudContentRepository.exists(cloudFile));
|
||||
return cloudFile;
|
||||
}
|
||||
|
||||
private void assertCryptoLongDirFileAlreadyExists(CloudFolder cryptoFolder) throws BackendException {
|
||||
if (cloudContentRepository.exists(cloudContentRepository.file(cryptoFolder, CLOUD_FOLDER_DIR_FILE_PRE + CLOUD_NODE_EXT))) {
|
||||
throw new CloudNodeAlreadyExistsException("CloudNode already exists and replace is false");
|
||||
}
|
||||
}
|
||||
}
|
@ -0,0 +1,270 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import org.apache.commons.codec.binary.Base32;
|
||||
import org.apache.commons.codec.binary.BaseNCodec;
|
||||
import org.cryptomator.cryptolib.Cryptors;
|
||||
import org.cryptomator.cryptolib.api.AuthenticationFailedException;
|
||||
import org.cryptomator.cryptolib.api.Cryptor;
|
||||
import org.cryptomator.cryptolib.common.MessageDigestSupplier;
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
import org.cryptomator.domain.exception.AlreadyExistException;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.exception.EmptyDirFileException;
|
||||
import org.cryptomator.domain.exception.NoSuchCloudFileException;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
import org.cryptomator.domain.usecases.ProgressAware;
|
||||
import org.cryptomator.domain.usecases.cloud.ByteArrayDataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.UploadState;
|
||||
import org.cryptomator.util.Optional;
|
||||
import org.cryptomator.util.Supplier;
|
||||
|
||||
import java.io.ByteArrayOutputStream;
|
||||
import java.util.ArrayList;
|
||||
import java.util.List;
|
||||
import java.util.regex.Matcher;
|
||||
import java.util.regex.Pattern;
|
||||
|
||||
import timber.log.Timber;
|
||||
|
||||
import static org.cryptomator.domain.usecases.ProgressAware.NO_OP_PROGRESS_AWARE;
|
||||
import static org.cryptomator.util.Encodings.UTF_8;
|
||||
|
||||
final class CryptoImplVaultFormatPre7 extends CryptoImplDecorator {
|
||||
|
||||
private static final int SHORT_NAMES_MAX_LENGTH = 129;
|
||||
private static final String DIR_PREFIX = "0";
|
||||
private static final String SYMLINK_PREFIX = "1S";
|
||||
private static final String LONG_NAME_FILE_EXT = ".lng";
|
||||
private static final String METADATA_DIR_NAME = "m";
|
||||
|
||||
private static final BaseNCodec BASE32 = new Base32();
|
||||
private static final Pattern BASE32_ENCRYPTED_NAME_PATTERN = Pattern.compile("^(0|1S)?(([A-Z2-7]{8})*[A-Z2-7=]{8})$");
|
||||
|
||||
CryptoImplVaultFormatPre7(Context context, Supplier<Cryptor> cryptor, CloudContentRepository cloudContentRepository, CloudFolder storageLocation, DirIdCache dirIdCache) {
|
||||
super(context, cryptor, cloudContentRepository, storageLocation, dirIdCache);
|
||||
}
|
||||
|
||||
@Override
|
||||
CryptoFolder folder(CryptoFolder cryptoParent, String cleartextName) throws BackendException {
|
||||
String dirFileName = encryptFolderName(cryptoParent, cleartextName);
|
||||
CloudFile dirFile = cloudContentRepository.file(dirIdInfo(cryptoParent).getCloudFolder(), dirFileName);
|
||||
return folder(cryptoParent, cleartextName, dirFile);
|
||||
}
|
||||
|
||||
@Override
|
||||
CryptoFolder create(CryptoFolder folder) throws BackendException {
|
||||
assertCryptoFolderAlreadyExists(folder);
|
||||
DirIdCache.DirIdInfo dirIdInfo = dirIdInfo(folder);
|
||||
CloudFolder createdCloudFolder = cloudContentRepository.create(dirIdInfo.getCloudFolder());
|
||||
byte[] dirId = dirIdInfo.getId().getBytes(UTF_8);
|
||||
CloudFile createdDirFile = cloudContentRepository.write(folder.getDirFile(), ByteArrayDataSource.from(dirId), NO_OP_PROGRESS_AWARE, false, dirId.length);
|
||||
CryptoFolder result = folder(folder, createdDirFile);
|
||||
addFolderToCache(result, dirIdInfo.withCloudFolder(createdCloudFolder));
|
||||
return result;
|
||||
}
|
||||
|
||||
@Override
|
||||
String encryptName(CryptoFolder cryptoParent, String name) throws BackendException {
|
||||
return encryptName(cryptoParent, name, "");
|
||||
}
|
||||
|
||||
private String encryptName(CryptoFolder cryptoParent, String name, String prefix) throws BackendException {
|
||||
String ciphertextName = prefix + cryptor().fileNameCryptor().encryptFilename(name, dirIdInfo(cryptoParent).getId().getBytes(UTF_8));
|
||||
if (ciphertextName.length() > SHORT_NAMES_MAX_LENGTH) {
|
||||
ciphertextName = deflate(ciphertextName);
|
||||
}
|
||||
return ciphertextName;
|
||||
}
|
||||
|
||||
private String deflate(String longFileName) throws BackendException {
|
||||
byte[] longFilenameBytes = longFileName.getBytes(UTF_8);
|
||||
byte[] hash = MessageDigestSupplier.SHA1.get().digest(longFilenameBytes);
|
||||
String shortFileName = BASE32.encodeAsString(hash) + LONG_NAME_FILE_EXT;
|
||||
CloudFile metadataFile = metadataFile(shortFileName);
|
||||
byte[] data = longFileName.getBytes(UTF_8);
|
||||
try {
|
||||
cloudContentRepository.create(metadataFile.getParent());
|
||||
} catch (AlreadyExistException e) {
|
||||
}
|
||||
cloudContentRepository.write(metadataFile, ByteArrayDataSource.from(data), NO_OP_PROGRESS_AWARE, true, data.length);
|
||||
return shortFileName;
|
||||
}
|
||||
|
||||
private String inflate(String shortFileName) throws BackendException {
|
||||
CloudFile metadataFile = metadataFile(shortFileName);
|
||||
ByteArrayOutputStream out = new ByteArrayOutputStream();
|
||||
cloudContentRepository.read(metadataFile, Optional.empty(), out, NO_OP_PROGRESS_AWARE);
|
||||
return new String(out.toByteArray(), UTF_8);
|
||||
}
|
||||
|
||||
private CloudFile inflatePermanently(CloudFile cloudFile, String longFileName) throws BackendException {
|
||||
Timber.tag("CryptoFs").i("inflatePermanently: %s -> %s", cloudFile.getName(), longFileName);
|
||||
CloudFile newCiphertextFile = cloudContentRepository.file(cloudFile.getParent(), longFileName);
|
||||
cloudContentRepository.move(cloudFile, newCiphertextFile);
|
||||
return newCiphertextFile;
|
||||
}
|
||||
|
||||
private CloudFile metadataFile(String shortFilename) throws BackendException {
|
||||
CloudFolder firstLevelFolder = cloudContentRepository.folder(metadataFolder(), shortFilename.substring(0, 2));
|
||||
CloudFolder secondLevelFolder = cloudContentRepository.folder(firstLevelFolder, shortFilename.substring(2, 4));
|
||||
return cloudContentRepository.file(secondLevelFolder, shortFilename);
|
||||
}
|
||||
|
||||
private CloudFolder metadataFolder() throws BackendException {
|
||||
return cloudContentRepository.folder(storageLocation(), METADATA_DIR_NAME);
|
||||
}
|
||||
|
||||
@Override
|
||||
List<CryptoNode> list(CryptoFolder cryptoFolder) throws BackendException {
|
||||
DirIdCache.DirIdInfo dirIdInfo = dirIdInfo(cryptoFolder);
|
||||
String dirId = dirIdInfo(cryptoFolder).getId();
|
||||
CloudFolder lvl2Dir = dirIdInfo.getCloudFolder();
|
||||
List<CloudNode> ciphertextNodes = cloudContentRepository.list(lvl2Dir);
|
||||
List<CryptoNode> result = new ArrayList<>();
|
||||
for (CloudNode node : ciphertextNodes) {
|
||||
if (node instanceof CloudFile) {
|
||||
ciphertextToCleartextNode(cryptoFolder, dirId, node).ifPresent(result::add);
|
||||
}
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
||||
private Optional<CryptoNode> ciphertextToCleartextNode(CryptoFolder cryptoFolder, String dirId, CloudNode cloudNode) throws BackendException {
|
||||
CloudFile cloudFile = (CloudFile) cloudNode;
|
||||
String ciphertextName = cloudFile.getName();
|
||||
if (ciphertextName.endsWith(LONG_NAME_FILE_EXT)) {
|
||||
try {
|
||||
ciphertextName = inflate(ciphertextName);
|
||||
if (ciphertextName.length() <= SHORT_NAMES_MAX_LENGTH) {
|
||||
cloudFile = inflatePermanently(cloudFile, ciphertextName);
|
||||
}
|
||||
} catch (NoSuchCloudFileException e) {
|
||||
Timber.tag("CryptoFs").e("Missing mFile: %s", ciphertextName);
|
||||
return Optional.empty();
|
||||
} catch (BackendException e) {
|
||||
Timber.tag("CryptoFs").e(e, "Failed to read mFile: %s", ciphertextName);
|
||||
return Optional.empty();
|
||||
}
|
||||
}
|
||||
String cleartextName;
|
||||
try {
|
||||
cleartextName = decryptName(dirId, ciphertextName.toUpperCase());
|
||||
} catch (AuthenticationFailedException e) {
|
||||
Timber.tag("CryptoFs").w("File name authentication failed: %s", cloudFile.getPath());
|
||||
return Optional.empty();
|
||||
} catch (IllegalArgumentException e) {
|
||||
Timber.tag("CryptoFs").d("Illegal ciphertext filename: %s", cloudFile.getPath());
|
||||
return Optional.empty();
|
||||
}
|
||||
if (cleartextName == null || ciphertextName.startsWith(SYMLINK_PREFIX)) {
|
||||
return Optional.empty();
|
||||
} else if (ciphertextName.startsWith(DIR_PREFIX)) {
|
||||
return Optional.of(folder(cryptoFolder, cleartextName, cloudFile));
|
||||
} else {
|
||||
Optional<Long> cleartextSize = Optional.empty();
|
||||
if (cloudFile.getSize().isPresent()) {
|
||||
long ciphertextSizeWithoutHeader = cloudFile.getSize().get() - cryptor().fileHeaderCryptor().headerSize();
|
||||
if (ciphertextSizeWithoutHeader >= 0) {
|
||||
cleartextSize = Optional.of(Cryptors.cleartextSize(ciphertextSizeWithoutHeader, cryptor()));
|
||||
}
|
||||
}
|
||||
return Optional.of(file(cryptoFolder, cleartextName, cloudFile, cleartextSize));
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
String decryptName(String dirId, String encryptedName) {
|
||||
Optional<String> ciphertextName = extractEncryptedName(encryptedName);
|
||||
if (ciphertextName.isPresent()) {
|
||||
return cryptor().fileNameCryptor().decryptFilename(ciphertextName.get(), dirId.getBytes(UTF_8));
|
||||
} else {
|
||||
return null;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
Optional<String> extractEncryptedName(String ciphertextName) {
|
||||
Matcher matcher = BASE32_ENCRYPTED_NAME_PATTERN.matcher(ciphertextName);
|
||||
if (matcher.find(0)) {
|
||||
return Optional.of(matcher.group(2));
|
||||
} else {
|
||||
return Optional.empty();
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
CryptoSymlink symlink(CryptoFolder cryptoParent, String cleartextName, String target) throws BackendException {
|
||||
String ciphertextName = encryptSymlinkName(cryptoParent, cleartextName);
|
||||
CloudFile cloudFile = cloudContentRepository.file(dirIdInfo(cryptoParent).getCloudFolder(), ciphertextName);
|
||||
return new CryptoSymlink(cryptoParent, cleartextName, path(cryptoParent, cleartextName), target, cloudFile);
|
||||
}
|
||||
|
||||
private String encryptSymlinkName(CryptoFolder cryptoFolder, String name) throws BackendException {
|
||||
return encryptName(cryptoFolder, name, SYMLINK_PREFIX);
|
||||
}
|
||||
|
||||
@Override
|
||||
String encryptFolderName(CryptoFolder cryptoFolder, String name) throws BackendException {
|
||||
return encryptName(cryptoFolder, name, DIR_PREFIX);
|
||||
}
|
||||
|
||||
@Override
|
||||
CryptoFolder move(CryptoFolder source, CryptoFolder target) throws BackendException {
|
||||
assertCryptoFolderAlreadyExists(target);
|
||||
CryptoFolder result = folder(target.getParent(), target.getName(), cloudContentRepository.move(source.getDirFile(), target.getDirFile()));
|
||||
|
||||
evictFromCache(source);
|
||||
evictFromCache(target);
|
||||
return result;
|
||||
}
|
||||
|
||||
@Override
|
||||
CryptoFile move(CryptoFile source, CryptoFile target) throws BackendException {
|
||||
assertCryptoFileAlreadyExists(target);
|
||||
return file(target, cloudContentRepository.move(source.getCloudFile(), target.getCloudFile()), source.getSize());
|
||||
}
|
||||
|
||||
@Override
|
||||
void delete(CloudNode node) throws BackendException {
|
||||
if (node instanceof CryptoFolder) {
|
||||
CryptoFolder cryptoFolder = (CryptoFolder) node;
|
||||
List<CryptoFolder> cryptoSubfolders = deepCollectSubfolders(cryptoFolder);
|
||||
for (CryptoFolder cryptoSubfolder : cryptoSubfolders) {
|
||||
cloudContentRepository.delete(dirIdInfo(cryptoSubfolder).getCloudFolder());
|
||||
}
|
||||
cloudContentRepository.delete(dirIdInfo(cryptoFolder).getCloudFolder());
|
||||
cloudContentRepository.delete(cryptoFolder.getDirFile());
|
||||
evictFromCache(cryptoFolder);
|
||||
} else if (node instanceof CryptoFile) {
|
||||
CryptoFile cryptoFile = (CryptoFile) node;
|
||||
cloudContentRepository.delete(cryptoFile.getCloudFile());
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
String loadDirId(CryptoFolder folder) throws BackendException, EmptyDirFileException {
|
||||
if (RootCryptoFolder.isRoot(folder)) {
|
||||
return CryptoConstants.ROOT_DIR_ID;
|
||||
} else if (cloudContentRepository.exists(folder.getDirFile())) {
|
||||
return new String(loadContentsOfDirFile(folder), UTF_8);
|
||||
} else {
|
||||
return newDirId();
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
DirIdCache.DirIdInfo createDirIdInfo(CryptoFolder folder) throws BackendException {
|
||||
String dirId = loadDirId(folder);
|
||||
return dirIdCache.put(folder, createDirIdInfoFor(dirId));
|
||||
}
|
||||
|
||||
@Override
|
||||
public CryptoFile write(CryptoFile cryptoFile, DataSource data, ProgressAware<UploadState> progressAware, boolean replace, long length) throws BackendException {
|
||||
return writeShortNameFile(cryptoFile, data, progressAware, replace, length);
|
||||
}
|
||||
}
|
@ -0,0 +1,6 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
|
||||
interface CryptoNode extends CloudNode {
|
||||
}
|
@ -0,0 +1,80 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.util.Date;
|
||||
|
||||
class CryptoSymlink implements CloudFile, CryptoNode {
|
||||
|
||||
private final String name;
|
||||
private final String path;
|
||||
private final String target;
|
||||
private final CloudFile cloudFile;
|
||||
private final CryptoFolder parent;
|
||||
|
||||
public CryptoSymlink(CryptoFolder parent, String name, String path, String target, CloudFile cloudFile) {
|
||||
this.parent = parent;
|
||||
this.name = name;
|
||||
this.path = path;
|
||||
this.target = target;
|
||||
this.cloudFile = cloudFile;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return parent.getCloud();
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getName() {
|
||||
return name;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getPath() {
|
||||
return path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public CryptoFolder getParent() {
|
||||
return parent;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Long> getSize() {
|
||||
return Optional.of((long) target.length());
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Date> getModified() {
|
||||
return cloudFile.getModified();
|
||||
}
|
||||
|
||||
/**
|
||||
* @return The actual file in the underlying, i.e. decorated, CloudContentRepository
|
||||
*/
|
||||
CloudFile getCloudFile() {
|
||||
return cloudFile;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean equals(Object obj) {
|
||||
if (obj == null || getClass() != obj.getClass())
|
||||
return false;
|
||||
if (obj == this)
|
||||
return true;
|
||||
return internalEquals((CryptoSymlink) obj);
|
||||
}
|
||||
|
||||
private boolean internalEquals(CryptoSymlink obj) {
|
||||
return path != null && path.equals(obj.path);
|
||||
}
|
||||
|
||||
@Override
|
||||
public int hashCode() {
|
||||
return path == null ? 0 : path.hashCode();
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,144 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import java.util.Iterator;
|
||||
import java.util.Map;
|
||||
import java.util.concurrent.ConcurrentHashMap;
|
||||
import java.util.concurrent.ConcurrentMap;
|
||||
|
||||
import org.cryptomator.cryptolib.api.Cryptor;
|
||||
import org.cryptomator.domain.Vault;
|
||||
import org.cryptomator.domain.exception.MissingCryptorException;
|
||||
import org.cryptomator.util.Optional;
|
||||
import org.cryptomator.util.Supplier;
|
||||
|
||||
public abstract class Cryptors {
|
||||
|
||||
Cryptors() {
|
||||
}
|
||||
|
||||
public abstract boolean isEmpty();
|
||||
|
||||
public abstract int size();
|
||||
|
||||
public abstract Supplier<Cryptor> get(Vault vault);
|
||||
|
||||
public abstract Optional<Cryptor> remove(Vault vault);
|
||||
|
||||
public abstract boolean putIfAbsent(Vault vault, Cryptor cryptor);
|
||||
|
||||
public static class Delegating extends Cryptors {
|
||||
|
||||
private final Cryptors.Default fallback = new Cryptors.Default();
|
||||
|
||||
private volatile Cryptors.Default delegate;
|
||||
|
||||
public synchronized void setDelegate(Cryptors.Default delegate) {
|
||||
delegate.putAll(fallback.cryptors);
|
||||
this.delegate = delegate;
|
||||
}
|
||||
|
||||
public synchronized void removeDelegate() {
|
||||
fallback.putAll(delegate.cryptors);
|
||||
this.delegate = null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public synchronized boolean isEmpty() {
|
||||
return delegate().isEmpty();
|
||||
}
|
||||
|
||||
@Override
|
||||
public synchronized int size() {
|
||||
return delegate().size();
|
||||
}
|
||||
|
||||
@Override
|
||||
public synchronized Supplier<Cryptor> get(Vault vault) {
|
||||
return delegate().get(vault);
|
||||
}
|
||||
|
||||
@Override
|
||||
public synchronized Optional<Cryptor> remove(Vault vault) {
|
||||
return delegate().remove(vault);
|
||||
}
|
||||
|
||||
@Override
|
||||
public synchronized boolean putIfAbsent(Vault vault, Cryptor cryptor) {
|
||||
return delegate().putIfAbsent(vault, cryptor);
|
||||
}
|
||||
|
||||
private synchronized Cryptors delegate() {
|
||||
if (delegate == null) {
|
||||
return fallback;
|
||||
} else {
|
||||
return delegate;
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
public static class Default extends Cryptors {
|
||||
|
||||
private final ConcurrentMap<Vault, Cryptor> cryptors = new ConcurrentHashMap<>();
|
||||
|
||||
private Runnable onChangeListener = () -> {
|
||||
};
|
||||
|
||||
public boolean isEmpty() {
|
||||
return cryptors.isEmpty();
|
||||
}
|
||||
|
||||
public int size() {
|
||||
return cryptors.size();
|
||||
}
|
||||
|
||||
public Supplier<Cryptor> get(final Vault vault) {
|
||||
return () -> {
|
||||
Cryptor cryptor = cryptors.get(vault);
|
||||
if (cryptor == null) {
|
||||
throw new MissingCryptorException();
|
||||
} else {
|
||||
return cryptor;
|
||||
}
|
||||
};
|
||||
}
|
||||
|
||||
public Optional<Cryptor> remove(Vault vault) {
|
||||
Optional<Cryptor> result = Optional.ofNullable(cryptors.remove(vault));
|
||||
if (result.isPresent()) {
|
||||
onChangeListener.run();
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
||||
public boolean putIfAbsent(Vault vault, Cryptor cryptor) {
|
||||
if (cryptors.putIfAbsent(vault, cryptor) == null) {
|
||||
onChangeListener.run();
|
||||
return true;
|
||||
} else {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
public void setOnChangeListener(Runnable onChangeListener) {
|
||||
this.onChangeListener = onChangeListener;
|
||||
}
|
||||
|
||||
public void putAll(Map<Vault, Cryptor> cryptors) {
|
||||
this.cryptors.putAll(cryptors);
|
||||
onChangeListener.run();
|
||||
}
|
||||
|
||||
public void destroyAll() {
|
||||
while (!isEmpty()) {
|
||||
Iterator<Cryptor> cryptorIterator = cryptors.values().iterator();
|
||||
while (cryptorIterator.hasNext()) {
|
||||
cryptorIterator.next().destroy();
|
||||
cryptorIterator.remove();
|
||||
}
|
||||
}
|
||||
onChangeListener.run();
|
||||
}
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,23 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import javax.inject.Singleton;
|
||||
|
||||
import dagger.Module;
|
||||
import dagger.Provides;
|
||||
|
||||
@Module
|
||||
public class CryptorsModule {
|
||||
|
||||
private final Cryptors cryptors;
|
||||
|
||||
public CryptorsModule(Cryptors cryptors) {
|
||||
this.cryptors = cryptors;
|
||||
}
|
||||
|
||||
@Singleton
|
||||
@Provides
|
||||
public Cryptors provideCryptors() {
|
||||
return cryptors;
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,38 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
|
||||
interface DirIdCache {
|
||||
|
||||
DirIdInfo get(CryptoFolder folder);
|
||||
|
||||
DirIdInfo put(CryptoFolder folder, DirIdInfo dirIdInfo);
|
||||
|
||||
void evict(CryptoFolder folder);
|
||||
|
||||
void evictSubFoldersOf(CryptoFolder cryptoFolder);
|
||||
|
||||
class DirIdInfo {
|
||||
|
||||
private final String id;
|
||||
private final CloudFolder cloudFolder;
|
||||
|
||||
DirIdInfo(String id, CloudFolder cloudFolder) {
|
||||
this.id = id;
|
||||
this.cloudFolder = cloudFolder;
|
||||
}
|
||||
|
||||
public String getId() {
|
||||
return id;
|
||||
}
|
||||
|
||||
public CloudFolder getCloudFolder() {
|
||||
return cloudFolder;
|
||||
}
|
||||
|
||||
DirIdInfo withCloudFolder(CloudFolder cloudFolder) {
|
||||
return new DirIdInfo(id, cloudFolder);
|
||||
}
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,78 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import java.util.Map;
|
||||
|
||||
import android.util.LruCache;
|
||||
|
||||
class DirIdCacheFormat7 implements DirIdCache {
|
||||
|
||||
private static final int MAX_SIZE = 1024;
|
||||
|
||||
private final LruCache<DirIdCacheKey, DirIdInfo> cache = new LruCache<>(MAX_SIZE);
|
||||
|
||||
DirIdCacheFormat7() {
|
||||
}
|
||||
|
||||
@Override
|
||||
public DirIdInfo get(CryptoFolder folder) {
|
||||
return cache.get(DirIdCacheKey.toKey(folder));
|
||||
}
|
||||
|
||||
@Override
|
||||
public DirIdInfo put(CryptoFolder folder, DirIdInfo dirIdInfo) {
|
||||
DirIdCacheKey key = DirIdCacheKey.toKey(folder);
|
||||
cache.put(key, dirIdInfo);
|
||||
return dirIdInfo;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void evict(CryptoFolder folder) {
|
||||
DirIdCacheKey key = DirIdCacheKey.toKey(folder);
|
||||
cache.remove(key);
|
||||
}
|
||||
|
||||
@Override
|
||||
public void evictSubFoldersOf(CryptoFolder folder) {
|
||||
Map<DirIdCacheKey, DirIdInfo> cacheSnapshot = cache.snapshot();
|
||||
for (Map.Entry<DirIdCacheKey, DirIdInfo> cacheEntry : cacheSnapshot.entrySet()) {
|
||||
if (cacheEntry.getKey().path.startsWith(folder.getPath() + "/")) {
|
||||
cache.remove(cacheEntry.getKey());
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
private static class DirIdCacheKey {
|
||||
|
||||
static DirIdCacheKey toKey(CryptoFolder folder) {
|
||||
return new DirIdCacheKey(folder.getPath());
|
||||
}
|
||||
|
||||
private final String path;
|
||||
|
||||
private DirIdCacheKey(String path) {
|
||||
this.path = path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean equals(Object obj) {
|
||||
if (obj == this)
|
||||
return true;
|
||||
if (obj == null || getClass() != obj.getClass())
|
||||
return false;
|
||||
return internalEquals((DirIdCacheKey) obj);
|
||||
}
|
||||
|
||||
private boolean internalEquals(DirIdCacheKey o) {
|
||||
return (path == null ? o.path == null : path.equals(o.path));
|
||||
}
|
||||
|
||||
@Override
|
||||
public int hashCode() {
|
||||
final int prime = 31;
|
||||
int hash = 1940604225;
|
||||
hash = hash * prime + (path == null ? 0 : path.hashCode());
|
||||
return hash;
|
||||
}
|
||||
|
||||
}
|
||||
}
|
@ -0,0 +1,86 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import android.util.LruCache;
|
||||
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
|
||||
import java.util.Date;
|
||||
|
||||
class DirIdCacheFormatPre7 implements DirIdCache {
|
||||
|
||||
private static final int MAX_SIZE = 1024;
|
||||
|
||||
private final LruCache<DirIdCacheKey, DirIdInfo> cache = new LruCache<>(MAX_SIZE);
|
||||
|
||||
DirIdCacheFormatPre7() {
|
||||
}
|
||||
|
||||
public DirIdInfo get(CryptoFolder folder) {
|
||||
return cache.get(DirIdCacheKey.toKey(folder));
|
||||
}
|
||||
|
||||
public DirIdInfo put(CryptoFolder folder, DirIdInfo dirIdInfo) {
|
||||
DirIdCacheKey key = DirIdCacheKey.toKey(folder);
|
||||
cache.put(key, dirIdInfo);
|
||||
cache.remove(key.withoutModified());
|
||||
return dirIdInfo;
|
||||
}
|
||||
|
||||
public void evict(CryptoFolder folder) {
|
||||
DirIdCacheKey key = DirIdCacheKey.toKey(folder);
|
||||
cache.remove(key);
|
||||
cache.remove(key.withoutModified());
|
||||
}
|
||||
|
||||
@Override
|
||||
public void evictSubFoldersOf(CryptoFolder cryptoFolder) {
|
||||
// no implementation needed
|
||||
}
|
||||
|
||||
private static class DirIdCacheKey {
|
||||
|
||||
static DirIdCacheKey toKey(CryptoFolder folder) {
|
||||
return new DirIdCacheKey(folder.getDirFile());
|
||||
}
|
||||
|
||||
private final String path;
|
||||
private final Date modified;
|
||||
|
||||
private DirIdCacheKey(CloudFile dirFile) {
|
||||
this.path = dirFile == null ? null : dirFile.getPath();
|
||||
this.modified = dirFile == null ? null : dirFile.getModified().orElse(null);
|
||||
}
|
||||
|
||||
private DirIdCacheKey(String path) {
|
||||
this.path = path;
|
||||
this.modified = null;
|
||||
}
|
||||
|
||||
DirIdCacheKey withoutModified() {
|
||||
return new DirIdCacheKey(path);
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean equals(Object obj) {
|
||||
if (obj == this)
|
||||
return true;
|
||||
if (obj == null || getClass() != obj.getClass())
|
||||
return false;
|
||||
return internalEquals((DirIdCacheKey) obj);
|
||||
}
|
||||
|
||||
private boolean internalEquals(DirIdCacheKey o) {
|
||||
return (path == null ? o.path == null : path.equals(o.path)) //
|
||||
&& (modified == null ? o.modified == null : modified.equals(o.modified));
|
||||
}
|
||||
|
||||
@Override
|
||||
public int hashCode() {
|
||||
final int prime = 31;
|
||||
int hash = 1940604225;
|
||||
hash = hash * prime + (path == null ? 0 : path.hashCode());
|
||||
hash = hash * prime + (modified == null ? 0 : modified.hashCode());
|
||||
return hash;
|
||||
}
|
||||
}
|
||||
}
|
@ -0,0 +1,27 @@
|
||||
package org.cryptomator.data.cloud.crypto;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
|
||||
class RootCryptoFolder extends CryptoFolder {
|
||||
|
||||
public static boolean isRoot(CryptoFolder folder) {
|
||||
return folder instanceof RootCryptoFolder;
|
||||
}
|
||||
|
||||
private final CryptoCloud cloud;
|
||||
|
||||
public RootCryptoFolder(CryptoCloud cloud) {
|
||||
super(null, "", "", null);
|
||||
this.cloud = cloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return cloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
public CryptoFolder withCloud(Cloud cloud) {
|
||||
return new RootCryptoFolder((CryptoCloud) cloud);
|
||||
}
|
||||
}
|
@ -0,0 +1,56 @@
|
||||
package org.cryptomator.data.cloud.dropbox;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import com.dropbox.core.DbxRequestConfig;
|
||||
import com.dropbox.core.http.OkHttp3Requestor;
|
||||
import com.dropbox.core.v2.DbxClientV2;
|
||||
|
||||
import org.cryptomator.data.BuildConfig;
|
||||
import org.cryptomator.data.cloud.okhttplogging.HttpLoggingInterceptor;
|
||||
|
||||
import java.util.Locale;
|
||||
|
||||
import okhttp3.Interceptor;
|
||||
import okhttp3.OkHttpClient;
|
||||
import timber.log.Timber;
|
||||
|
||||
import static org.cryptomator.data.util.NetworkTimeout.CONNECTION;
|
||||
import static org.cryptomator.data.util.NetworkTimeout.READ;
|
||||
import static org.cryptomator.data.util.NetworkTimeout.WRITE;
|
||||
|
||||
class DropboxClientFactory {
|
||||
|
||||
private DbxClientV2 sDbxClient;
|
||||
|
||||
public DbxClientV2 getClient(String accessToken, Context context) {
|
||||
if (sDbxClient == null) {
|
||||
sDbxClient = createDropboxClient(accessToken, context);
|
||||
}
|
||||
return sDbxClient;
|
||||
}
|
||||
|
||||
private DbxClientV2 createDropboxClient(String accessToken, Context context) {
|
||||
String userLocale = Locale.getDefault().toString();
|
||||
|
||||
OkHttpClient okHttpClient = new OkHttpClient() //
|
||||
.newBuilder() //
|
||||
.connectTimeout(CONNECTION.getTimeout(), CONNECTION.getUnit()) //
|
||||
.readTimeout(READ.getTimeout(), READ.getUnit()) //
|
||||
.writeTimeout(WRITE.getTimeout(), WRITE.getUnit()) //
|
||||
.addInterceptor(httpLoggingInterceptor(context)) //
|
||||
.build();
|
||||
|
||||
DbxRequestConfig requestConfig = DbxRequestConfig //
|
||||
.newBuilder("Cryptomator-Android/" + BuildConfig.VERSION_NAME) //
|
||||
.withUserLocale(userLocale) //
|
||||
.withHttpRequestor(new OkHttp3Requestor(okHttpClient)) //
|
||||
.build();
|
||||
|
||||
return new DbxClientV2(requestConfig, accessToken);
|
||||
}
|
||||
|
||||
private static Interceptor httpLoggingInterceptor(Context context) {
|
||||
return new HttpLoggingInterceptor(message -> Timber.tag("OkHttp").d(message), context);
|
||||
}
|
||||
}
|
@ -0,0 +1,213 @@
|
||||
package org.cryptomator.data.cloud.dropbox;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import com.dropbox.core.DbxException;
|
||||
import com.dropbox.core.InvalidAccessTokenException;
|
||||
import com.dropbox.core.NetworkIOException;
|
||||
import com.dropbox.core.v2.files.CreateFolderErrorException;
|
||||
import com.dropbox.core.v2.files.DeleteErrorException;
|
||||
import com.dropbox.core.v2.files.DownloadErrorException;
|
||||
import com.dropbox.core.v2.files.ListFolderErrorException;
|
||||
import com.dropbox.core.v2.files.RelocationErrorException;
|
||||
|
||||
import org.cryptomator.data.cloud.InterceptingCloudContentRepository;
|
||||
import org.cryptomator.domain.DropboxCloud;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
|
||||
import org.cryptomator.domain.exception.FatalBackendException;
|
||||
import org.cryptomator.domain.exception.NetworkConnectionException;
|
||||
import org.cryptomator.domain.exception.NoSuchCloudFileException;
|
||||
import org.cryptomator.domain.exception.authentication.WrongCredentialsException;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
import org.cryptomator.domain.usecases.ProgressAware;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.DownloadState;
|
||||
import org.cryptomator.domain.usecases.cloud.UploadState;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.IOException;
|
||||
import java.io.OutputStream;
|
||||
import java.util.List;
|
||||
|
||||
import static org.cryptomator.util.ExceptionUtil.contains;
|
||||
import static org.cryptomator.util.ExceptionUtil.extract;
|
||||
|
||||
class DropboxCloudContentRepository extends InterceptingCloudContentRepository<DropboxCloud, DropboxNode, DropboxFolder, DropboxFile> {
|
||||
|
||||
private final DropboxCloud cloud;
|
||||
|
||||
public DropboxCloudContentRepository(DropboxCloud cloud, Context context) {
|
||||
super(new Intercepted(cloud, context));
|
||||
this.cloud = cloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
protected void throwWrappedIfRequired(Exception e) throws BackendException {
|
||||
throwConnectionErrorIfRequired(e);
|
||||
throwWrongCredentialsExceptionIfRequired(e);
|
||||
}
|
||||
|
||||
private void throwConnectionErrorIfRequired(Exception e) throws NetworkConnectionException {
|
||||
if (contains(e, NetworkIOException.class)) {
|
||||
throw new NetworkConnectionException(e);
|
||||
}
|
||||
}
|
||||
|
||||
private void throwWrongCredentialsExceptionIfRequired(Exception e) {
|
||||
if (contains(e, InvalidAccessTokenException.class)) {
|
||||
throw new WrongCredentialsException(cloud);
|
||||
}
|
||||
}
|
||||
|
||||
private static class Intercepted implements CloudContentRepository<DropboxCloud, DropboxNode, DropboxFolder, DropboxFile> {
|
||||
|
||||
private final DropboxImpl cloud;
|
||||
|
||||
public Intercepted(DropboxCloud cloud, Context context) {
|
||||
this.cloud = new DropboxImpl(cloud, context);
|
||||
}
|
||||
|
||||
public DropboxFolder root(DropboxCloud cloud) {
|
||||
return this.cloud.root();
|
||||
}
|
||||
|
||||
@Override
|
||||
public DropboxFolder resolve(DropboxCloud cloud, String path) {
|
||||
return this.cloud.resolve(path);
|
||||
}
|
||||
|
||||
@Override
|
||||
public DropboxFile file(DropboxFolder parent, String name) {
|
||||
return cloud.file(parent, name);
|
||||
}
|
||||
|
||||
@Override
|
||||
public DropboxFile file(DropboxFolder parent, String name, Optional<Long> size) throws BackendException {
|
||||
return cloud.file(parent, name, size);
|
||||
}
|
||||
|
||||
@Override
|
||||
public DropboxFolder folder(DropboxFolder parent, String name) {
|
||||
return cloud.folder(parent, name);
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean exists(DropboxNode node) throws BackendException {
|
||||
try {
|
||||
return cloud.exists(node);
|
||||
} catch (DbxException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public List<DropboxNode> list(DropboxFolder folder) throws BackendException {
|
||||
try {
|
||||
return cloud.list(folder);
|
||||
} catch (DbxException e) {
|
||||
if (e instanceof ListFolderErrorException) {
|
||||
if (((ListFolderErrorException) e).errorValue.getPathValue().isNotFound()) {
|
||||
throw new NoSuchCloudFileException();
|
||||
}
|
||||
}
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public DropboxFolder create(DropboxFolder folder) throws BackendException {
|
||||
try {
|
||||
return cloud.create(folder);
|
||||
} catch (DbxException e) {
|
||||
if (e instanceof CreateFolderErrorException) {
|
||||
throw new CloudNodeAlreadyExistsException(folder.getName());
|
||||
}
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public DropboxFolder move(DropboxFolder source, DropboxFolder target) throws BackendException {
|
||||
try {
|
||||
return (DropboxFolder) cloud.move(source, target);
|
||||
} catch (DbxException e) {
|
||||
if (e instanceof RelocationErrorException) {
|
||||
if (extract(e, RelocationErrorException.class).get().errorValue.isFromLookup()) {
|
||||
throw new NoSuchCloudFileException(source.getName());
|
||||
}
|
||||
throw new CloudNodeAlreadyExistsException(target.getName());
|
||||
}
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public DropboxFile move(DropboxFile source, DropboxFile target) throws BackendException {
|
||||
try {
|
||||
return (DropboxFile) cloud.move(source, target);
|
||||
} catch (DbxException e) {
|
||||
if (e instanceof RelocationErrorException) {
|
||||
throw new CloudNodeAlreadyExistsException(target.getName());
|
||||
}
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public DropboxFile write(DropboxFile uploadFile, DataSource data, ProgressAware<UploadState> progressAware, boolean replace, long size) throws BackendException {
|
||||
try {
|
||||
return cloud.write(uploadFile, data, progressAware, replace, size);
|
||||
} catch (IOException | DbxException e) {
|
||||
if (contains(e, NoSuchCloudFileException.class)) {
|
||||
throw new NoSuchCloudFileException(uploadFile.getName());
|
||||
}
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void read(DropboxFile file, Optional<File> encryptedTmpFile, OutputStream data, ProgressAware<DownloadState> progressAware) throws BackendException {
|
||||
try {
|
||||
cloud.read(file, encryptedTmpFile, data, progressAware);
|
||||
} catch (IOException | DbxException e) {
|
||||
if (contains(e, DownloadErrorException.class)) {
|
||||
if (extract(e, DownloadErrorException.class).get().errorValue.getPathValue().isNotFound()) {
|
||||
throw new NoSuchCloudFileException(file.getName());
|
||||
}
|
||||
}
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void delete(DropboxNode node) throws BackendException {
|
||||
try {
|
||||
cloud.delete(node);
|
||||
} catch (DbxException e) {
|
||||
if (contains(e, DeleteErrorException.class)) {
|
||||
if (extract(e, DeleteErrorException.class).get().errorValue.getPathLookupValue().isNotFound()) {
|
||||
throw new NoSuchCloudFileException(node.getName());
|
||||
}
|
||||
}
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public String checkAuthenticationAndRetrieveCurrentAccount(DropboxCloud cloud) throws BackendException {
|
||||
try {
|
||||
return this.cloud.currentAccount();
|
||||
} catch (DbxException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void logout(DropboxCloud cloud) throws BackendException {
|
||||
// empty
|
||||
}
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,35 @@
|
||||
package org.cryptomator.data.cloud.dropbox;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import org.cryptomator.data.repository.CloudContentRepositoryFactory;
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.DropboxCloud;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
|
||||
import javax.inject.Inject;
|
||||
import javax.inject.Singleton;
|
||||
|
||||
import static org.cryptomator.domain.CloudType.DROPBOX;
|
||||
|
||||
@Singleton
|
||||
public class DropboxCloudContentRepositoryFactory implements CloudContentRepositoryFactory {
|
||||
|
||||
private final Context context;
|
||||
|
||||
@Inject
|
||||
public DropboxCloudContentRepositoryFactory(Context context) {
|
||||
this.context = context;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean supports(Cloud cloud) {
|
||||
return cloud.type() == DROPBOX;
|
||||
}
|
||||
|
||||
@Override
|
||||
public CloudContentRepository cloudContentRepositoryFor(Cloud cloud) {
|
||||
return new DropboxCloudContentRepository((DropboxCloud) cloud, context);
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,39 @@
|
||||
package org.cryptomator.data.cloud.dropbox;
|
||||
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import com.dropbox.core.v2.files.FileMetadata;
|
||||
import com.dropbox.core.v2.files.FolderMetadata;
|
||||
import com.dropbox.core.v2.files.Metadata;
|
||||
|
||||
class DropboxCloudNodeFactory {
|
||||
|
||||
public static DropboxFile from(DropboxFolder parent, FileMetadata metadata) {
|
||||
return new DropboxFile(parent, metadata.getName(), metadata.getPathDisplay(), Optional.ofNullable(metadata.getSize()), Optional.ofNullable(metadata.getServerModified()));
|
||||
}
|
||||
|
||||
public static DropboxFile file(DropboxFolder parent, String name, Optional<Long> size, String path) {
|
||||
return new DropboxFile(parent, name, path, size, Optional.empty());
|
||||
}
|
||||
|
||||
public static DropboxFolder from(DropboxFolder parent, FolderMetadata metadata) {
|
||||
return new DropboxFolder(parent, metadata.getName(), getNodePath(parent, metadata.getName()));
|
||||
}
|
||||
|
||||
private static String getNodePath(DropboxFolder parent, String name) {
|
||||
return parent.getPath() + "/" + name;
|
||||
}
|
||||
|
||||
public static DropboxFolder folder(DropboxFolder parent, String name, String path) {
|
||||
return new DropboxFolder(parent, name, path);
|
||||
}
|
||||
|
||||
public static DropboxNode from(DropboxFolder parent, Metadata metadata) {
|
||||
if (metadata instanceof FileMetadata) {
|
||||
return from(parent, (FileMetadata) metadata);
|
||||
} else {
|
||||
return from(parent, (FolderMetadata) metadata);
|
||||
}
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,55 @@
|
||||
package org.cryptomator.data.cloud.dropbox;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.util.Date;
|
||||
|
||||
class DropboxFile implements CloudFile, DropboxNode {
|
||||
|
||||
private final DropboxFolder parent;
|
||||
private final String name;
|
||||
private final String path;
|
||||
private final Optional<Long> size;
|
||||
private final Optional<Date> modified;
|
||||
|
||||
public DropboxFile(DropboxFolder parent, String name, String path, Optional<Long> size, Optional<Date> modified) {
|
||||
this.parent = parent;
|
||||
this.name = name;
|
||||
this.path = path;
|
||||
this.size = size;
|
||||
this.modified = modified;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return parent.getCloud();
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getName() {
|
||||
return name;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getPath() {
|
||||
return path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public DropboxFolder getParent() {
|
||||
return parent;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Long> getSize() {
|
||||
return size;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Date> getModified() {
|
||||
return modified;
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,42 @@
|
||||
package org.cryptomator.data.cloud.dropbox;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
|
||||
class DropboxFolder implements CloudFolder, DropboxNode {
|
||||
|
||||
private final DropboxFolder parent;
|
||||
private final String name;
|
||||
private final String path;
|
||||
|
||||
public DropboxFolder(DropboxFolder parent, String name, String path) {
|
||||
this.parent = parent;
|
||||
this.name = name;
|
||||
this.path = path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return parent.getCloud();
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getName() {
|
||||
return name;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getPath() {
|
||||
return path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public DropboxFolder getParent() {
|
||||
return parent;
|
||||
}
|
||||
|
||||
@Override
|
||||
public DropboxFolder withCloud(Cloud cloud) {
|
||||
return new DropboxFolder(parent.withCloud(cloud), name, path);
|
||||
}
|
||||
}
|
@ -0,0 +1,468 @@
|
||||
package org.cryptomator.data.cloud.dropbox;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import com.dropbox.core.DbxException;
|
||||
import com.dropbox.core.NetworkIOException;
|
||||
import com.dropbox.core.RetryException;
|
||||
import com.dropbox.core.v2.DbxClientV2;
|
||||
import com.dropbox.core.v2.files.CommitInfo;
|
||||
import com.dropbox.core.v2.files.CreateFolderResult;
|
||||
import com.dropbox.core.v2.files.FileMetadata;
|
||||
import com.dropbox.core.v2.files.FolderMetadata;
|
||||
import com.dropbox.core.v2.files.GetMetadataErrorException;
|
||||
import com.dropbox.core.v2.files.ListFolderResult;
|
||||
import com.dropbox.core.v2.files.Metadata;
|
||||
import com.dropbox.core.v2.files.RelocationResult;
|
||||
import com.dropbox.core.v2.files.UploadSessionCursor;
|
||||
import com.dropbox.core.v2.files.UploadSessionFinishErrorException;
|
||||
import com.dropbox.core.v2.files.UploadSessionLookupErrorException;
|
||||
import com.dropbox.core.v2.files.WriteMode;
|
||||
import com.dropbox.core.v2.users.FullAccount;
|
||||
import com.tomclaw.cache.DiskLruCache;
|
||||
|
||||
import org.cryptomator.data.util.TransferredBytesAwareInputStream;
|
||||
import org.cryptomator.data.util.TransferredBytesAwareOutputStream;
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
import org.cryptomator.domain.DropboxCloud;
|
||||
import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
|
||||
import org.cryptomator.domain.exception.FatalBackendException;
|
||||
import org.cryptomator.domain.exception.authentication.AuthenticationException;
|
||||
import org.cryptomator.domain.exception.authentication.NoAuthenticationProvidedException;
|
||||
import org.cryptomator.domain.usecases.ProgressAware;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.DownloadState;
|
||||
import org.cryptomator.domain.usecases.cloud.Progress;
|
||||
import org.cryptomator.domain.usecases.cloud.UploadState;
|
||||
import org.cryptomator.util.Optional;
|
||||
import org.cryptomator.util.SharedPreferencesHandler;
|
||||
import org.cryptomator.util.crypto.CredentialCryptor;
|
||||
import org.cryptomator.util.file.LruFileCacheUtil;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.IOException;
|
||||
import java.io.InputStream;
|
||||
import java.io.OutputStream;
|
||||
import java.util.ArrayList;
|
||||
import java.util.List;
|
||||
|
||||
import timber.log.Timber;
|
||||
|
||||
import static org.cryptomator.domain.usecases.cloud.Progress.progress;
|
||||
import static org.cryptomator.util.file.LruFileCacheUtil.Cache.DROPBOX;
|
||||
import static org.cryptomator.util.file.LruFileCacheUtil.retrieveFromLruCache;
|
||||
import static org.cryptomator.util.file.LruFileCacheUtil.storeToLruCache;
|
||||
|
||||
class DropboxImpl {
|
||||
|
||||
private static final long CHUNKED_UPLOAD_CHUNK_SIZE = 8L << 20;
|
||||
private static final int CHUNKED_UPLOAD_MAX_ATTEMPTS = 5;
|
||||
|
||||
private final DropboxClientFactory clientFactory = new DropboxClientFactory();
|
||||
private final DropboxCloud cloud;
|
||||
private final RootDropboxFolder root;
|
||||
private final Context context;
|
||||
private final SharedPreferencesHandler sharedPreferencesHandler;
|
||||
|
||||
private DiskLruCache diskLruCache;
|
||||
|
||||
DropboxImpl(DropboxCloud cloud, Context context) {
|
||||
if (cloud.accessToken() == null) {
|
||||
throw new NoAuthenticationProvidedException(cloud);
|
||||
}
|
||||
this.cloud = cloud;
|
||||
this.root = new RootDropboxFolder(cloud);
|
||||
this.context = context;
|
||||
|
||||
sharedPreferencesHandler = new SharedPreferencesHandler(context);
|
||||
}
|
||||
|
||||
private DbxClientV2 client() throws AuthenticationException {
|
||||
return clientFactory.getClient(decrypt(cloud.accessToken()), context);
|
||||
}
|
||||
|
||||
private String decrypt(String password) {
|
||||
return CredentialCryptor //
|
||||
.getInstance(context) //
|
||||
.decrypt(password);
|
||||
}
|
||||
|
||||
public DropboxFolder root() {
|
||||
return root;
|
||||
}
|
||||
|
||||
public DropboxFolder resolve(String path) {
|
||||
if (path.startsWith("/")) {
|
||||
path = path.substring(1);
|
||||
}
|
||||
String[] names = path.split("/");
|
||||
DropboxFolder folder = root;
|
||||
for (String name : names) {
|
||||
folder = folder(folder, name);
|
||||
}
|
||||
return folder;
|
||||
}
|
||||
|
||||
public DropboxFile file(CloudFolder folder, String name) {
|
||||
return file(folder, name, Optional.empty());
|
||||
}
|
||||
|
||||
public DropboxFile file(CloudFolder folder, String name, Optional<Long> size) {
|
||||
return DropboxCloudNodeFactory.file( //
|
||||
(DropboxFolder) folder, //
|
||||
name, //
|
||||
size, //
|
||||
folder.getPath() + '/' + name);
|
||||
}
|
||||
|
||||
public DropboxFolder folder(CloudFolder folder, String name) {
|
||||
return DropboxCloudNodeFactory.folder( //
|
||||
(DropboxFolder) folder, //
|
||||
name, //
|
||||
folder.getPath() + '/' + name);
|
||||
}
|
||||
|
||||
public boolean exists(CloudNode node) throws AuthenticationException, DbxException {
|
||||
try {
|
||||
Metadata metadata = client() //
|
||||
.files() //
|
||||
.getMetadata(node.getPath());
|
||||
if (node instanceof CloudFolder) {
|
||||
return metadata instanceof FolderMetadata;
|
||||
} else {
|
||||
return metadata instanceof FileMetadata;
|
||||
}
|
||||
} catch (GetMetadataErrorException e) {
|
||||
if (e.errorValue.isPath()) {
|
||||
return false;
|
||||
}
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
public List<DropboxNode> list(CloudFolder folder) throws AuthenticationException, DbxException {
|
||||
List<DropboxNode> result = new ArrayList<>();
|
||||
ListFolderResult listFolderResult = null;
|
||||
do {
|
||||
if (listFolderResult == null) {
|
||||
listFolderResult = client() //
|
||||
.files() //
|
||||
.listFolder(folder.getPath());
|
||||
} else {
|
||||
String cursor = listFolderResult.getCursor();
|
||||
listFolderResult = client() //
|
||||
.files() //
|
||||
.listFolderContinue(cursor);
|
||||
}
|
||||
List<Metadata> entryMetadata = listFolderResult.getEntries();
|
||||
for (Metadata metadata : entryMetadata) {
|
||||
result.add(DropboxCloudNodeFactory.from( //
|
||||
(DropboxFolder) folder, //
|
||||
metadata));
|
||||
}
|
||||
} while (listFolderResult.getHasMore());
|
||||
return result;
|
||||
}
|
||||
|
||||
public DropboxFolder create(CloudFolder folder) throws AuthenticationException, DbxException {
|
||||
CreateFolderResult createFolderResult = client() //
|
||||
.files() //
|
||||
.createFolderV2(folder.getPath());
|
||||
|
||||
return DropboxCloudNodeFactory.from( //
|
||||
(DropboxFolder) folder.getParent(), //
|
||||
createFolderResult.getMetadata());
|
||||
}
|
||||
|
||||
public CloudNode move(CloudNode source, CloudNode target) throws AuthenticationException, DbxException {
|
||||
RelocationResult relocationResult = client() //
|
||||
.files() //
|
||||
.moveV2(source.getPath(), target.getPath());
|
||||
|
||||
return DropboxCloudNodeFactory.from( //
|
||||
(DropboxFolder) target.getParent(), //
|
||||
relocationResult.getMetadata());
|
||||
}
|
||||
|
||||
public DropboxFile write(DropboxFile file, DataSource data, final ProgressAware<UploadState> progressAware, boolean replace, long size)
|
||||
throws AuthenticationException, DbxException, IOException, CloudNodeAlreadyExistsException {
|
||||
if (exists(file) && !replace) {
|
||||
throw new CloudNodeAlreadyExistsException("CloudNode already exists and replace is false");
|
||||
}
|
||||
|
||||
progressAware.onProgress(Progress.started(UploadState.upload(file)));
|
||||
WriteMode writeMode = WriteMode.ADD;
|
||||
if (replace) {
|
||||
writeMode = WriteMode.OVERWRITE;
|
||||
}
|
||||
// "Upload the file with simple upload API if it is small enough, otherwise use chunked
|
||||
// upload API for better performance. Arbitrarily chose 2 times our chunk size as the
|
||||
// deciding factor. This should really depend on your network."
|
||||
// Source: https://github.com/dropbox/dropbox-sdk-java/blob/master/examples/upload-file/src/main/java/com/dropbox/core/examples/upload_file/Main.java
|
||||
if (size <= (2 * CHUNKED_UPLOAD_CHUNK_SIZE)) {
|
||||
uploadFile(file, data, progressAware, writeMode, size);
|
||||
} else {
|
||||
chunkedUploadFile(file, data, progressAware, writeMode, size);
|
||||
}
|
||||
FileMetadata metadata = (FileMetadata) client() //
|
||||
.files() //
|
||||
.getMetadata(file.getPath());
|
||||
|
||||
progressAware.onProgress(Progress.completed(UploadState.upload(file)));
|
||||
|
||||
return DropboxCloudNodeFactory.from( //
|
||||
file.getParent(), //
|
||||
metadata);
|
||||
}
|
||||
|
||||
private void uploadFile(final DropboxFile file, DataSource data, final ProgressAware<UploadState> progressAware, WriteMode writeMode, final long size) //
|
||||
throws AuthenticationException, DbxException, IOException {
|
||||
try (TransferredBytesAwareInputStream in = new TransferredBytesAwareInputStream(data.open(context)) {
|
||||
@Override
|
||||
public void bytesTransferred(long transferred) {
|
||||
progressAware.onProgress( //
|
||||
progress(UploadState.upload(file)) //
|
||||
.between(0) //
|
||||
.and(size) //
|
||||
.withValue(transferred));
|
||||
}
|
||||
}) {
|
||||
client() //
|
||||
.files() //
|
||||
.uploadBuilder(file.getPath()) //
|
||||
.withMode(writeMode) //
|
||||
.uploadAndFinish(in);
|
||||
}
|
||||
}
|
||||
|
||||
private void chunkedUploadFile(final DropboxFile file, DataSource data, final ProgressAware<UploadState> progressAware, WriteMode writeMode, final long size)
|
||||
throws AuthenticationException, DbxException, IOException {
|
||||
// Assert our file is at least the chunk upload size. We make this assumption in the code
|
||||
// below to simplify the logic.
|
||||
if (size < CHUNKED_UPLOAD_CHUNK_SIZE) {
|
||||
throw new FatalBackendException("File too small, use uploadFile() instead.");
|
||||
}
|
||||
|
||||
long uploaded = 0L;
|
||||
DbxException thrown = null;
|
||||
|
||||
try (InputStream stream = data.open(context)) {
|
||||
|
||||
// Chunked uploads have 3 phases, each of which can accept uploaded bytes:
|
||||
//
|
||||
// (1) Start: initiate the upload and get an upload session ID
|
||||
// (2) Append: upload chunks of the file to append to our session
|
||||
// (3) Finish: commit the upload and close the session
|
||||
//
|
||||
// We track how many bytes we uploaded to determine which phase we should be in.
|
||||
String sessionId = null;
|
||||
for (int i = 0; i < CHUNKED_UPLOAD_MAX_ATTEMPTS; i++) {
|
||||
if (i > 0) {
|
||||
Timber.v("Retrying chunked upload (" + (i + 1) + " / " + CHUNKED_UPLOAD_MAX_ATTEMPTS + " attempts)");
|
||||
}
|
||||
|
||||
try {
|
||||
// if this is a retry, make sure seek to the correct offset
|
||||
stream.skip(uploaded);
|
||||
|
||||
// (1) Start
|
||||
if (sessionId == null) {
|
||||
sessionId = client() //
|
||||
.files() //
|
||||
.uploadSessionStart() //
|
||||
.uploadAndFinish(new TransferredBytesAwareInputStream(stream) {
|
||||
@Override
|
||||
public void bytesTransferred(long transferred) {
|
||||
progressAware.onProgress( //
|
||||
progress(UploadState.upload(file)) //
|
||||
.between(0) //
|
||||
.and(size) //
|
||||
.withValue(transferred));
|
||||
}
|
||||
}, CHUNKED_UPLOAD_CHUNK_SIZE).getSessionId();
|
||||
uploaded += CHUNKED_UPLOAD_CHUNK_SIZE;
|
||||
|
||||
progressAware.onProgress( //
|
||||
progress(UploadState.upload(file)) //
|
||||
.between(0) //
|
||||
.and(size) //
|
||||
.withValue(uploaded));
|
||||
}
|
||||
|
||||
UploadSessionCursor cursor = new UploadSessionCursor(sessionId, uploaded);
|
||||
|
||||
// (2) Append
|
||||
while ((size - uploaded) > CHUNKED_UPLOAD_CHUNK_SIZE) {
|
||||
final long fullyUploaded = uploaded;
|
||||
client() //
|
||||
.files() //
|
||||
.uploadSessionAppendV2(cursor) //
|
||||
.uploadAndFinish(new TransferredBytesAwareInputStream(stream) {
|
||||
@Override
|
||||
public void bytesTransferred(long transferred) {
|
||||
progressAware.onProgress( //
|
||||
progress(UploadState.upload(file)) //
|
||||
.between(0) //
|
||||
.and(size) //
|
||||
.withValue(fullyUploaded + transferred));
|
||||
}
|
||||
}, CHUNKED_UPLOAD_CHUNK_SIZE);
|
||||
uploaded += CHUNKED_UPLOAD_CHUNK_SIZE;
|
||||
|
||||
progressAware.onProgress( //
|
||||
progress(UploadState.upload(file)) //
|
||||
.between(0) //
|
||||
.and(size) //
|
||||
.withValue(uploaded));
|
||||
|
||||
cursor = new UploadSessionCursor(sessionId, uploaded);
|
||||
}
|
||||
|
||||
// (3) Finish
|
||||
long remaining = size - uploaded;
|
||||
CommitInfo commitInfo = CommitInfo //
|
||||
.newBuilder(file.getPath()) //
|
||||
.withMode(writeMode) //
|
||||
.build();
|
||||
|
||||
client() //
|
||||
.files() //
|
||||
.uploadSessionFinish(cursor, commitInfo) //
|
||||
.uploadAndFinish(stream, remaining);
|
||||
|
||||
return;
|
||||
} catch (RetryException ex) {
|
||||
thrown = ex;
|
||||
// RetryExceptions are never automatically retried by the client for uploads. Must
|
||||
// catch this exception even if DbxRequestConfig.getMaxRetries() > 0.
|
||||
sleepQuietly(ex.getBackoffMillis());
|
||||
} catch (NetworkIOException ex) {
|
||||
thrown = ex;
|
||||
// Network issue with Dropbox (maybe a timeout?), try again.
|
||||
} catch (UploadSessionLookupErrorException ex) {
|
||||
if (ex.errorValue.isIncorrectOffset()) {
|
||||
thrown = ex;
|
||||
// Server offset into the stream doesn't match our offset (uploaded). Seek to
|
||||
// the expected offset according to the server and try again.
|
||||
uploaded = ex. //
|
||||
errorValue. //
|
||||
getIncorrectOffsetValue(). //
|
||||
getCorrectOffset();
|
||||
} else {
|
||||
throw new FatalBackendException(ex);
|
||||
}
|
||||
} catch (UploadSessionFinishErrorException ex) {
|
||||
if (ex.errorValue.isLookupFailed() && ex.errorValue.getLookupFailedValue().isIncorrectOffset()) {
|
||||
thrown = ex;
|
||||
// Server offset into the stream doesn't match our offset (uploaded). Seek to
|
||||
// the expected offset according to the server and try again.
|
||||
uploaded = ex. //
|
||||
errorValue. //
|
||||
getLookupFailedValue(). //
|
||||
getIncorrectOffsetValue(). //
|
||||
getCorrectOffset();
|
||||
} else {
|
||||
throw new FatalBackendException(ex);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
throw new FatalBackendException("Maxed out upload attempts to Dropbox.", thrown);
|
||||
}
|
||||
|
||||
public void read(CloudFile file, Optional<File> encryptedTmpFile, OutputStream data, final ProgressAware<DownloadState> progressAware) throws DbxException, IOException {
|
||||
progressAware.onProgress(Progress.started(DownloadState.download(file)));
|
||||
|
||||
Optional<String> cacheKey = Optional.empty();
|
||||
Optional<File> cacheFile = Optional.empty();
|
||||
|
||||
if (sharedPreferencesHandler.useLruCache() && createLruCache(sharedPreferencesHandler.lruCacheSize())) {
|
||||
final FileMetadata fileMetadata = (FileMetadata) client() //
|
||||
.files() //
|
||||
.getMetadata(file.getPath());
|
||||
cacheKey = Optional.of(fileMetadata.getId() + fileMetadata.getRev());
|
||||
java.io.File cachedFile = diskLruCache.get(cacheKey.get());
|
||||
cacheFile = cachedFile != null ? Optional.of(cachedFile) : Optional.empty();
|
||||
}
|
||||
|
||||
if (sharedPreferencesHandler.useLruCache() && cacheFile.isPresent()) {
|
||||
try {
|
||||
retrieveFromLruCache(cacheFile.get(), data);
|
||||
} catch (IOException e) {
|
||||
Timber.tag("DropboxImpl").w(e, "Error while retrieving content from Cache, get from web request");
|
||||
writeToData(file, data, encryptedTmpFile, cacheKey, progressAware);
|
||||
}
|
||||
} else {
|
||||
writeToData(file, data, encryptedTmpFile, cacheKey, progressAware);
|
||||
}
|
||||
|
||||
progressAware.onProgress(Progress.completed(DownloadState.download(file)));
|
||||
}
|
||||
|
||||
private void writeToData(final CloudFile file, //
|
||||
final OutputStream data, //
|
||||
final Optional<File> encryptedTmpFile, //
|
||||
final Optional<String> cacheKey, //
|
||||
final ProgressAware<DownloadState> progressAware) throws DbxException, IOException {
|
||||
try (TransferredBytesAwareOutputStream out = new TransferredBytesAwareOutputStream(data) {
|
||||
@Override
|
||||
public void bytesTransferred(long transferred) {
|
||||
progressAware.onProgress( //
|
||||
progress(DownloadState.download(file)) //
|
||||
.between(0) //
|
||||
.and(file.getSize().orElse(Long.MAX_VALUE)) //
|
||||
.withValue(transferred));
|
||||
}
|
||||
}) {
|
||||
client() //
|
||||
.files() //
|
||||
.download(file.getPath()) //
|
||||
.download(out);
|
||||
}
|
||||
|
||||
if (sharedPreferencesHandler.useLruCache() && encryptedTmpFile.isPresent() && cacheKey.isPresent()) {
|
||||
try {
|
||||
storeToLruCache(diskLruCache, cacheKey.get(), encryptedTmpFile.get());
|
||||
} catch (IOException e) {
|
||||
Timber.tag("DropboxImpl").e(e, "Failed to write downloaded file in LRU cache");
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
private boolean createLruCache(int cacheSize) {
|
||||
if (diskLruCache == null) {
|
||||
try {
|
||||
diskLruCache = DiskLruCache.create(new LruFileCacheUtil(context).resolve(DROPBOX), cacheSize);
|
||||
} catch (IOException e) {
|
||||
Timber.tag("DropboxImpl").e(e, "Failed to setup LRU cache");
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
public void delete(CloudNode node) throws AuthenticationException, DbxException {
|
||||
client() //
|
||||
.files() //
|
||||
.deleteV2(node.getPath());
|
||||
}
|
||||
|
||||
public String currentAccount() throws AuthenticationException, DbxException {
|
||||
FullAccount currentAccount = client() //
|
||||
.users() //
|
||||
.getCurrentAccount();
|
||||
return currentAccount.getName().getDisplayName();
|
||||
}
|
||||
|
||||
private static void sleepQuietly(long millis) {
|
||||
try {
|
||||
Thread.sleep(millis);
|
||||
} catch (InterruptedException ex) {
|
||||
throw new FatalBackendException("Error uploading to Dropbox: interrupted during backoff.");
|
||||
}
|
||||
}
|
||||
}
|
@ -0,0 +1,6 @@
|
||||
package org.cryptomator.data.cloud.dropbox;
|
||||
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
|
||||
interface DropboxNode extends CloudNode {
|
||||
}
|
@ -0,0 +1,24 @@
|
||||
package org.cryptomator.data.cloud.dropbox;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.DropboxCloud;
|
||||
|
||||
class RootDropboxFolder extends DropboxFolder {
|
||||
|
||||
private final DropboxCloud cloud;
|
||||
|
||||
public RootDropboxFolder(DropboxCloud cloud) {
|
||||
super(null, "", "");
|
||||
this.cloud = cloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
public DropboxCloud getCloud() {
|
||||
return cloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
public DropboxFolder withCloud(Cloud cloud) {
|
||||
return new RootDropboxFolder((DropboxCloud) cloud);
|
||||
}
|
||||
}
|
@ -0,0 +1,116 @@
|
||||
package org.cryptomator.data.cloud.googledrive;
|
||||
|
||||
import android.accounts.Account;
|
||||
import android.content.Context;
|
||||
|
||||
import com.google.android.gms.auth.GoogleAuthException;
|
||||
import com.google.android.gms.auth.GoogleAuthUtil;
|
||||
import com.google.android.gms.auth.GooglePlayServicesAvailabilityException;
|
||||
import com.google.android.gms.auth.UserRecoverableAuthException;
|
||||
import com.google.api.client.googleapis.extensions.android.gms.auth.GoogleAccountCredential;
|
||||
import com.google.api.client.googleapis.extensions.android.gms.auth.GoogleAuthIOException;
|
||||
import com.google.api.client.googleapis.extensions.android.gms.auth.GooglePlayServicesAvailabilityIOException;
|
||||
import com.google.api.client.googleapis.extensions.android.gms.auth.UserRecoverableAuthIOException;
|
||||
import com.google.api.client.http.HttpExecuteInterceptor;
|
||||
import com.google.api.client.http.HttpRequest;
|
||||
import com.google.api.client.http.HttpResponse;
|
||||
import com.google.api.client.http.HttpUnsuccessfulResponseHandler;
|
||||
import com.google.api.client.util.BackOffUtils;
|
||||
import com.google.api.client.util.Beta;
|
||||
import com.google.api.client.util.Joiner;
|
||||
import com.google.api.client.util.Preconditions;
|
||||
import com.google.api.client.util.Sleeper;
|
||||
|
||||
import org.cryptomator.data.util.NetworkTimeout;
|
||||
|
||||
import java.io.IOException;
|
||||
import java.util.Collection;
|
||||
|
||||
import static com.google.android.gms.auth.GoogleAuthUtil.GOOGLE_ACCOUNT_TYPE;
|
||||
|
||||
class FixedGoogleAccountCredential extends GoogleAccountCredential {
|
||||
|
||||
private String accountName;
|
||||
|
||||
public static FixedGoogleAccountCredential usingOAuth2(Context context, Collection<String> scopes) {
|
||||
Preconditions.checkArgument(scopes != null && scopes.iterator().hasNext());
|
||||
String scopesStr = "oauth2:" + Joiner.on(' ').join(scopes);
|
||||
return new FixedGoogleAccountCredential(context, scopesStr);
|
||||
}
|
||||
|
||||
private FixedGoogleAccountCredential(Context context, String scopesStr) {
|
||||
super(context, scopesStr);
|
||||
}
|
||||
|
||||
@Override
|
||||
public void initialize(HttpRequest request) {
|
||||
FixedRequestHandler handler = new FixedRequestHandler();
|
||||
request.setInterceptor(handler);
|
||||
request.setUnsuccessfulResponseHandler(handler);
|
||||
request.setConnectTimeout((int) NetworkTimeout.CONNECTION.asMilliseconds());
|
||||
request.setReadTimeout((int) NetworkTimeout.READ.asMilliseconds());
|
||||
}
|
||||
|
||||
void setAccountName(String accountName) {
|
||||
this.accountName = accountName;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getToken() throws IOException, GoogleAuthException {
|
||||
if (getBackOff() != null) {
|
||||
getBackOff().reset();
|
||||
}
|
||||
|
||||
while (true) {
|
||||
try {
|
||||
Account accountDetails = new Account(accountName, GOOGLE_ACCOUNT_TYPE);
|
||||
return GoogleAuthUtil.getToken(getContext(), accountDetails, getScope());
|
||||
} catch (IOException e) {
|
||||
// network or server error, so retry using back-off policy
|
||||
try {
|
||||
if (getBackOff() == null || !BackOffUtils.next(Sleeper.DEFAULT, getBackOff())) {
|
||||
throw e;
|
||||
}
|
||||
} catch (InterruptedException e2) {
|
||||
// ignore
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@Beta
|
||||
class FixedRequestHandler implements HttpExecuteInterceptor, HttpUnsuccessfulResponseHandler {
|
||||
|
||||
/** Whether we've received a 401 error code indicating the token is invalid. */
|
||||
boolean received401;
|
||||
String token;
|
||||
|
||||
@Override
|
||||
public void intercept(HttpRequest request) throws IOException {
|
||||
try {
|
||||
token = getToken();
|
||||
request.getHeaders().setAuthorization("Bearer " + token);
|
||||
} catch (GooglePlayServicesAvailabilityException e) {
|
||||
throw new GooglePlayServicesAvailabilityIOException(e);
|
||||
} catch (UserRecoverableAuthException e) {
|
||||
throw new UserRecoverableAuthIOException(e);
|
||||
} catch (GoogleAuthException e) {
|
||||
throw new GoogleAuthIOException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean handleResponse(HttpRequest request, HttpResponse response, boolean supportsRetry) throws IOException {
|
||||
if (response.getStatusCode() == 401 && !received401) {
|
||||
received401 = true;
|
||||
try {
|
||||
GoogleAuthUtil.clearToken(getContext(), token);
|
||||
} catch (GoogleAuthException e) {
|
||||
throw new IOException(e);
|
||||
}
|
||||
return true;
|
||||
}
|
||||
return false;
|
||||
}
|
||||
}
|
||||
}
|
@ -0,0 +1,34 @@
|
||||
package org.cryptomator.data.cloud.googledrive;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import com.google.api.client.extensions.android.http.AndroidHttp;
|
||||
import com.google.api.client.json.jackson2.JacksonFactory;
|
||||
import com.google.api.services.drive.Drive;
|
||||
import com.google.api.services.drive.DriveScopes;
|
||||
|
||||
import org.cryptomator.data.BuildConfig;
|
||||
import org.cryptomator.domain.exception.FatalBackendException;
|
||||
|
||||
import java.util.Collections;
|
||||
|
||||
class GoogleDriveClientFactory {
|
||||
|
||||
private final Context context;
|
||||
|
||||
GoogleDriveClientFactory(Context context) {
|
||||
this.context = context;
|
||||
}
|
||||
|
||||
Drive getClient(String accountName) throws FatalBackendException {
|
||||
try {
|
||||
FixedGoogleAccountCredential credential = FixedGoogleAccountCredential.usingOAuth2(context, Collections.singleton(DriveScopes.DRIVE));
|
||||
credential.setAccountName(accountName);
|
||||
return new Drive.Builder(AndroidHttp.newCompatibleTransport(), JacksonFactory.getDefaultInstance(), credential) //
|
||||
.setApplicationName("Cryptomator-Android/" + BuildConfig.VERSION_NAME) //
|
||||
.build();
|
||||
} catch (Exception e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
}
|
@ -0,0 +1,213 @@
|
||||
package org.cryptomator.data.cloud.googledrive;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import com.google.api.client.googleapis.extensions.android.gms.auth.UserRecoverableAuthIOException;
|
||||
import com.google.api.client.googleapis.json.GoogleJsonResponseException;
|
||||
import com.google.api.client.http.HttpStatusCodes;
|
||||
|
||||
import org.cryptomator.data.cloud.InterceptingCloudContentRepository;
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
import org.cryptomator.domain.GoogleDriveCloud;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.exception.FatalBackendException;
|
||||
import org.cryptomator.domain.exception.NetworkConnectionException;
|
||||
import org.cryptomator.domain.exception.NoSuchCloudFileException;
|
||||
import org.cryptomator.domain.exception.authentication.UserRecoverableAuthenticationException;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
import org.cryptomator.domain.usecases.ProgressAware;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.DownloadState;
|
||||
import org.cryptomator.domain.usecases.cloud.UploadState;
|
||||
import org.cryptomator.util.ExceptionUtil;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.IOException;
|
||||
import java.io.OutputStream;
|
||||
import java.net.SocketTimeoutException;
|
||||
import java.util.List;
|
||||
|
||||
import static org.cryptomator.util.ExceptionUtil.contains;
|
||||
import static org.cryptomator.util.ExceptionUtil.extract;
|
||||
|
||||
class GoogleDriveCloudContentRepository extends InterceptingCloudContentRepository<GoogleDriveCloud, GoogleDriveNode, GoogleDriveFolder, GoogleDriveFile> {
|
||||
|
||||
private final GoogleDriveCloud cloud;
|
||||
|
||||
GoogleDriveCloudContentRepository(Context context, GoogleDriveCloud cloud, GoogleDriveIdCache idCache) {
|
||||
super(new Intercepted(context, cloud, idCache));
|
||||
this.cloud = cloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
protected void throwWrappedIfRequired(Exception e) throws BackendException {
|
||||
throwConnectionErrorIfRequired(e);
|
||||
throwUserRecoverableAuthenticationExceptionIfRequired(e);
|
||||
throwNoSuchCloudFileExceptionIfRequired(e);
|
||||
}
|
||||
|
||||
private void throwUserRecoverableAuthenticationExceptionIfRequired(Exception e) {
|
||||
Optional<UserRecoverableAuthIOException> userRecoverableAuthIOException = extract(e, UserRecoverableAuthIOException.class);
|
||||
if (userRecoverableAuthIOException.isPresent()) {
|
||||
throw new UserRecoverableAuthenticationException(cloud, userRecoverableAuthIOException.get().getIntent());
|
||||
}
|
||||
}
|
||||
|
||||
private void throwConnectionErrorIfRequired(Exception e) throws NetworkConnectionException {
|
||||
if (contains(e, SocketTimeoutException.class) || contains(e, IOException.class, ExceptionUtil.thatHasMessage("NetworkError"))) {
|
||||
throw new NetworkConnectionException(e);
|
||||
}
|
||||
}
|
||||
|
||||
private void throwNoSuchCloudFileExceptionIfRequired(Exception e) throws NoSuchCloudFileException {
|
||||
if (contains(e, GoogleJsonResponseException.class)) {
|
||||
if (extract(e, GoogleJsonResponseException.class).get().getStatusCode() == HttpStatusCodes.STATUS_CODE_NOT_FOUND) {
|
||||
throw new NoSuchCloudFileException();
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
private static class Intercepted implements CloudContentRepository<GoogleDriveCloud, GoogleDriveNode, GoogleDriveFolder, GoogleDriveFile> {
|
||||
|
||||
private final GoogleDriveImpl impl;
|
||||
|
||||
public Intercepted(Context context, GoogleDriveCloud cloud, GoogleDriveIdCache idCache) {
|
||||
this.impl = new GoogleDriveImpl(context, cloud, idCache);
|
||||
}
|
||||
|
||||
@Override
|
||||
public GoogleDriveFolder root(GoogleDriveCloud cloud) throws BackendException {
|
||||
return impl.root();
|
||||
}
|
||||
|
||||
@Override
|
||||
public GoogleDriveFolder resolve(GoogleDriveCloud cloud, String path) throws BackendException {
|
||||
try {
|
||||
return impl.resolve(path);
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public GoogleDriveFile file(GoogleDriveFolder parent, String name) throws BackendException {
|
||||
try {
|
||||
return impl.file(parent, name);
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public GoogleDriveFile file(GoogleDriveFolder parent, String name, Optional<Long> size) throws BackendException {
|
||||
try {
|
||||
return impl.file(parent, name, size);
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public GoogleDriveFolder folder(GoogleDriveFolder parent, String name) throws BackendException {
|
||||
try {
|
||||
return impl.folder(parent, name);
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean exists(GoogleDriveNode node) throws BackendException {
|
||||
try {
|
||||
return impl.exists(node);
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public List<CloudNode> list(GoogleDriveFolder folder) throws BackendException {
|
||||
try {
|
||||
return impl.list(folder);
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public GoogleDriveFolder create(GoogleDriveFolder folder) throws BackendException {
|
||||
try {
|
||||
return impl.create(folder);
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public GoogleDriveFolder move(GoogleDriveFolder source, GoogleDriveFolder target) throws BackendException {
|
||||
try {
|
||||
if (source.getDriveId() == null) {
|
||||
throw new NoSuchCloudFileException(source.getName());
|
||||
}
|
||||
return (GoogleDriveFolder) impl.move(source, target);
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public GoogleDriveFile move(GoogleDriveFile source, GoogleDriveFile target) throws BackendException {
|
||||
try {
|
||||
return (GoogleDriveFile) impl.move(source, target);
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public GoogleDriveFile write(GoogleDriveFile file, DataSource data, ProgressAware<UploadState> progressAware, boolean replace, long size) throws BackendException {
|
||||
try {
|
||||
return impl.write(file, data, progressAware, replace, size);
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void read(GoogleDriveFile file, Optional<File> encryptedTmpFile, OutputStream data, ProgressAware<DownloadState> progressAware) throws BackendException {
|
||||
try {
|
||||
if (file.getDriveId() == null) {
|
||||
throw new NoSuchCloudFileException(file.getName());
|
||||
}
|
||||
impl.read(file, encryptedTmpFile, data, progressAware);
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void delete(GoogleDriveNode node) throws BackendException {
|
||||
try {
|
||||
impl.delete(node);
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public String checkAuthenticationAndRetrieveCurrentAccount(GoogleDriveCloud cloud) throws BackendException {
|
||||
try {
|
||||
return impl.currentAccount();
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void logout(GoogleDriveCloud cloud) throws BackendException {
|
||||
// empty
|
||||
}
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,35 @@
|
||||
package org.cryptomator.data.cloud.googledrive;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import org.cryptomator.data.repository.CloudContentRepositoryFactory;
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudType;
|
||||
import org.cryptomator.domain.GoogleDriveCloud;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
|
||||
import javax.inject.Inject;
|
||||
import javax.inject.Singleton;
|
||||
|
||||
@Singleton
|
||||
public class GoogleDriveCloudContentRepositoryFactory implements CloudContentRepositoryFactory {
|
||||
|
||||
private final Context context;
|
||||
private final GoogleDriveIdCache idCache;
|
||||
|
||||
@Inject
|
||||
public GoogleDriveCloudContentRepositoryFactory(Context context, GoogleDriveIdCache idCache) {
|
||||
this.context = context;
|
||||
this.idCache = idCache;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean supports(Cloud cloud) {
|
||||
return cloud.type() == CloudType.GOOGLE_DRIVE;
|
||||
}
|
||||
|
||||
@Override
|
||||
public CloudContentRepository cloudContentRepositoryFor(Cloud cloud) {
|
||||
return new GoogleDriveCloudContentRepository(context, (GoogleDriveCloud) cloud, idCache);
|
||||
}
|
||||
}
|
@ -0,0 +1,59 @@
|
||||
package org.cryptomator.data.cloud.googledrive;
|
||||
|
||||
import com.google.api.services.drive.model.File;
|
||||
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.util.Date;
|
||||
|
||||
class GoogleDriveCloudNodeFactory {
|
||||
|
||||
public static GoogleDriveFile file(GoogleDriveFolder parent, File file) {
|
||||
return new GoogleDriveFile(parent, file.getName(), getNodePath(parent, file.getName()), file.getId(), getFileSize(file), getModified(file));
|
||||
}
|
||||
|
||||
public static GoogleDriveFile file(GoogleDriveFolder parent, String name, Optional<Long> size) {
|
||||
return new GoogleDriveFile(parent, name, getNodePath(parent, name), null, size, Optional.empty());
|
||||
}
|
||||
|
||||
private static Optional<Date> getModified(File file) {
|
||||
return file.getModifiedTime() != null ? Optional.of(new Date(file.getModifiedTime().getValue())) : Optional.empty();
|
||||
}
|
||||
|
||||
private static Optional<Long> getFileSize(File file) {
|
||||
return file.getSize() != null ? Optional.of(file.getSize()) : Optional.empty();
|
||||
}
|
||||
|
||||
public static GoogleDriveFile file(GoogleDriveFolder parent, String name, Optional<Long> size, String path, String driveId) {
|
||||
return new GoogleDriveFile(parent, name, path, driveId, size, Optional.empty());
|
||||
}
|
||||
|
||||
public static GoogleDriveFolder folder(GoogleDriveFolder parent, File file) {
|
||||
return new GoogleDriveFolder(parent, file.getName(), getNodePath(parent, file.getName()), file.getId());
|
||||
}
|
||||
|
||||
public static GoogleDriveFolder folder(GoogleDriveFolder parent, String name) {
|
||||
return new GoogleDriveFolder(parent, name, getNodePath(parent, name), null);
|
||||
}
|
||||
|
||||
public static GoogleDriveFolder folder(GoogleDriveFolder parent, String name, String path, String driveId) {
|
||||
return new GoogleDriveFolder(parent, name, path, driveId);
|
||||
}
|
||||
|
||||
public static GoogleDriveNode from(GoogleDriveFolder parent, File file) {
|
||||
if (isFolder(file)) {
|
||||
return folder(parent, file);
|
||||
} else {
|
||||
return file(parent, file);
|
||||
}
|
||||
}
|
||||
|
||||
public static boolean isFolder(File file) {
|
||||
return file.getMimeType().equals("application/vnd.google-apps.folder");
|
||||
}
|
||||
|
||||
public static String getNodePath(GoogleDriveFolder parent, String name) {
|
||||
return parent.getPath() + "/" + name;
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,61 @@
|
||||
package org.cryptomator.data.cloud.googledrive;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.util.Date;
|
||||
|
||||
class GoogleDriveFile implements CloudFile, GoogleDriveNode {
|
||||
|
||||
private final GoogleDriveFolder parent;
|
||||
private final String name;
|
||||
private final String path;
|
||||
private final String driveId;
|
||||
private final Optional<Long> size;
|
||||
private final Optional<Date> modified;
|
||||
|
||||
public GoogleDriveFile(GoogleDriveFolder parent, String name, String path, String driveId, Optional<Long> size, Optional<Date> modified) {
|
||||
this.parent = parent;
|
||||
this.name = name;
|
||||
this.path = path;
|
||||
this.driveId = driveId;
|
||||
this.size = size;
|
||||
this.modified = modified;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return parent.getCloud();
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getName() {
|
||||
return name;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getPath() {
|
||||
return path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getDriveId() {
|
||||
return driveId;
|
||||
}
|
||||
|
||||
@Override
|
||||
public GoogleDriveFolder getParent() {
|
||||
return parent;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Long> getSize() {
|
||||
return size;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Date> getModified() {
|
||||
return modified;
|
||||
}
|
||||
}
|
@ -0,0 +1,49 @@
|
||||
package org.cryptomator.data.cloud.googledrive;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
|
||||
class GoogleDriveFolder implements CloudFolder, GoogleDriveNode {
|
||||
|
||||
private final GoogleDriveFolder parent;
|
||||
private final String name;
|
||||
private final String path;
|
||||
private final String driveId;
|
||||
|
||||
public GoogleDriveFolder(GoogleDriveFolder parent, String name, String path, String driveId) {
|
||||
this.parent = parent;
|
||||
this.name = name;
|
||||
this.path = path;
|
||||
this.driveId = driveId;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return parent.getCloud();
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getName() {
|
||||
return name;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getPath() {
|
||||
return path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getDriveId() {
|
||||
return driveId;
|
||||
}
|
||||
|
||||
@Override
|
||||
public GoogleDriveFolder getParent() {
|
||||
return parent;
|
||||
}
|
||||
|
||||
@Override
|
||||
public GoogleDriveFolder withCloud(Cloud cloud) {
|
||||
return new GoogleDriveFolder(parent.withCloud(cloud), name, path, driveId);
|
||||
}
|
||||
}
|
@ -0,0 +1,77 @@
|
||||
package org.cryptomator.data.cloud.googledrive;
|
||||
|
||||
import android.util.LruCache;
|
||||
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
|
||||
import javax.inject.Inject;
|
||||
|
||||
class GoogleDriveIdCache {
|
||||
|
||||
private final LruCache<String, NodeInfo> cache;
|
||||
|
||||
@Inject
|
||||
GoogleDriveIdCache() {
|
||||
cache = new LruCache<>(1000);
|
||||
}
|
||||
|
||||
public NodeInfo get(String path) {
|
||||
return cache.get(path);
|
||||
}
|
||||
|
||||
<T extends GoogleDriveIdCloudNode> T cache(T value) {
|
||||
add(value);
|
||||
return value;
|
||||
}
|
||||
|
||||
public void add(GoogleDriveIdCloudNode node) {
|
||||
add(node.getPath(), new NodeInfo(node));
|
||||
}
|
||||
|
||||
private void add(String path, NodeInfo info) {
|
||||
cache.put(path, info);
|
||||
}
|
||||
|
||||
public void remove(GoogleDriveIdCloudNode node) {
|
||||
remove(node.getPath());
|
||||
}
|
||||
|
||||
private void remove(String path) {
|
||||
removeChildren(path);
|
||||
cache.remove(path);
|
||||
}
|
||||
|
||||
private void removeChildren(String path) {
|
||||
String prefix = path + '/';
|
||||
for (String key : cache.snapshot().keySet()) {
|
||||
if (key.startsWith(prefix)) {
|
||||
cache.remove(key);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
static class NodeInfo {
|
||||
|
||||
private final String id;
|
||||
private final boolean isFolder;
|
||||
|
||||
private NodeInfo(GoogleDriveIdCloudNode node) {
|
||||
this(node.getDriveId(), node instanceof CloudFolder);
|
||||
}
|
||||
|
||||
NodeInfo(String id, boolean isFolder) {
|
||||
this.id = id;
|
||||
this.isFolder = isFolder;
|
||||
}
|
||||
|
||||
public String getId() {
|
||||
return id;
|
||||
}
|
||||
|
||||
public boolean isFolder() {
|
||||
return isFolder;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,9 @@
|
||||
package org.cryptomator.data.cloud.googledrive;
|
||||
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
|
||||
interface GoogleDriveIdCloudNode extends CloudNode {
|
||||
|
||||
String getDriveId();
|
||||
|
||||
}
|
@ -0,0 +1,448 @@
|
||||
package org.cryptomator.data.cloud.googledrive;
|
||||
|
||||
import static org.cryptomator.data.cloud.googledrive.GoogleDriveCloudNodeFactory.from;
|
||||
import static org.cryptomator.data.cloud.googledrive.GoogleDriveCloudNodeFactory.isFolder;
|
||||
import static org.cryptomator.domain.usecases.cloud.Progress.progress;
|
||||
import static org.cryptomator.util.file.LruFileCacheUtil.retrieveFromLruCache;
|
||||
import static org.cryptomator.util.file.LruFileCacheUtil.storeToLruCache;
|
||||
import static org.cryptomator.util.file.LruFileCacheUtil.Cache.GOOGLE_DRIVE;
|
||||
|
||||
import java.io.IOException;
|
||||
import java.io.OutputStream;
|
||||
import java.util.ArrayList;
|
||||
import java.util.Collections;
|
||||
import java.util.List;
|
||||
|
||||
import org.cryptomator.data.util.TransferredBytesAwareGoogleContentInputStream;
|
||||
import org.cryptomator.data.util.TransferredBytesAwareOutputStream;
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
import org.cryptomator.domain.GoogleDriveCloud;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
|
||||
import org.cryptomator.domain.exception.NoSuchCloudFileException;
|
||||
import org.cryptomator.domain.exception.authentication.NoAuthenticationProvidedException;
|
||||
import org.cryptomator.domain.usecases.ProgressAware;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.DownloadState;
|
||||
import org.cryptomator.domain.usecases.cloud.Progress;
|
||||
import org.cryptomator.domain.usecases.cloud.UploadState;
|
||||
import org.cryptomator.util.Optional;
|
||||
import org.cryptomator.util.SharedPreferencesHandler;
|
||||
import org.cryptomator.util.file.LruFileCacheUtil;
|
||||
|
||||
import com.google.api.client.googleapis.json.GoogleJsonResponseException;
|
||||
import com.google.api.client.http.HttpResponseException;
|
||||
import com.google.api.services.drive.Drive;
|
||||
import com.google.api.services.drive.model.About;
|
||||
import com.google.api.services.drive.model.File;
|
||||
import com.google.api.services.drive.model.FileList;
|
||||
import com.google.api.services.drive.model.Revision;
|
||||
import com.google.api.services.drive.model.RevisionList;
|
||||
import com.tomclaw.cache.DiskLruCache;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import timber.log.Timber;
|
||||
|
||||
class GoogleDriveImpl {
|
||||
|
||||
private static final int STATUS_REQUEST_RANGE_NOT_SATISFIABLE = 416;
|
||||
|
||||
private final GoogleDriveIdCache idCache;
|
||||
|
||||
private final Context context;
|
||||
private final GoogleDriveCloud googleDriveCloud;
|
||||
private final SharedPreferencesHandler sharedPreferencesHandler;
|
||||
private final RootGoogleDriveFolder root;
|
||||
|
||||
private DiskLruCache diskLruCache;
|
||||
|
||||
GoogleDriveImpl(Context context, GoogleDriveCloud googleDriveCloud, GoogleDriveIdCache idCache) {
|
||||
if (googleDriveCloud.accessToken() == null) {
|
||||
throw new NoAuthenticationProvidedException(googleDriveCloud);
|
||||
}
|
||||
this.context = context;
|
||||
this.googleDriveCloud = googleDriveCloud;
|
||||
this.idCache = idCache;
|
||||
this.root = new RootGoogleDriveFolder(googleDriveCloud);
|
||||
|
||||
sharedPreferencesHandler = new SharedPreferencesHandler(context);
|
||||
}
|
||||
|
||||
private Drive client() {
|
||||
return new GoogleDriveClientFactory(context) //
|
||||
.getClient(googleDriveCloud.accessToken());
|
||||
}
|
||||
|
||||
public GoogleDriveFolder root() {
|
||||
return root;
|
||||
}
|
||||
|
||||
public GoogleDriveFolder resolve(String path) throws IOException {
|
||||
if (path.startsWith("/")) {
|
||||
path = path.substring(1);
|
||||
}
|
||||
String[] names = path.split("/");
|
||||
GoogleDriveFolder folder = root;
|
||||
for (String name : names) {
|
||||
folder = folder(folder, name);
|
||||
}
|
||||
return folder;
|
||||
}
|
||||
|
||||
private Optional<File> findFile(String parentDriveId, String name) throws IOException {
|
||||
Drive.Files.List fileListQuery = client().files().list() //
|
||||
.setFields("files(id,mimeType,name,size)") //
|
||||
.setSupportsAllDrives(true);
|
||||
|
||||
if (parentDriveId != null && parentDriveId.equals("root")) {
|
||||
fileListQuery.setQ("name contains '" + name + "' and '" + parentDriveId + "' in parents and trashed = false or sharedWithMe");
|
||||
} else {
|
||||
fileListQuery.setQ("name contains '" + name + "' and '" + parentDriveId + "' in parents and trashed = false");
|
||||
}
|
||||
|
||||
FileList files = fileListQuery.execute();
|
||||
|
||||
for (File file : files.getFiles()) {
|
||||
if (name.equals(file.getName())) {
|
||||
return Optional.of(file);
|
||||
}
|
||||
}
|
||||
return Optional.empty();
|
||||
}
|
||||
|
||||
public GoogleDriveFile file(GoogleDriveFolder parent, String name) throws IOException {
|
||||
return file(parent, name, Optional.empty());
|
||||
}
|
||||
|
||||
public GoogleDriveFile file(GoogleDriveFolder parent, String name, Optional<Long> size) throws IOException {
|
||||
if (parent.getDriveId() == null) {
|
||||
return GoogleDriveCloudNodeFactory.file(parent, name, size);
|
||||
}
|
||||
String path = GoogleDriveCloudNodeFactory.getNodePath(parent, name);
|
||||
GoogleDriveIdCache.NodeInfo nodeInfo = idCache.get(path);
|
||||
if (nodeInfo != null && !nodeInfo.isFolder()) {
|
||||
return GoogleDriveCloudNodeFactory.file( //
|
||||
parent, //
|
||||
name, //
|
||||
size, //
|
||||
path, //
|
||||
nodeInfo.getId());
|
||||
}
|
||||
|
||||
Optional<File> file = findFile(parent.getDriveId(), name);
|
||||
if (file.isPresent()) {
|
||||
if (!isFolder(file.get())) {
|
||||
return idCache.cache(GoogleDriveCloudNodeFactory.file(parent, file.get()));
|
||||
}
|
||||
}
|
||||
|
||||
return GoogleDriveCloudNodeFactory.file(parent, name, size);
|
||||
}
|
||||
|
||||
public GoogleDriveFolder folder(GoogleDriveFolder parent, String name) throws IOException {
|
||||
if (parent.getDriveId() == null) {
|
||||
return GoogleDriveCloudNodeFactory.folder(parent, name);
|
||||
}
|
||||
String path = GoogleDriveCloudNodeFactory.getNodePath(parent, name);
|
||||
GoogleDriveIdCache.NodeInfo nodeInfo = idCache.get(path);
|
||||
if (nodeInfo != null && nodeInfo.isFolder()) {
|
||||
return GoogleDriveCloudNodeFactory.folder( //
|
||||
parent, //
|
||||
name, //
|
||||
path, //
|
||||
nodeInfo.getId());
|
||||
}
|
||||
Optional<File> folder = findFile(parent.getDriveId(), name);
|
||||
if (folder.isPresent()) {
|
||||
if (isFolder(folder.get())) {
|
||||
return idCache.cache( //
|
||||
GoogleDriveCloudNodeFactory.folder(parent, folder.get()));
|
||||
}
|
||||
}
|
||||
|
||||
return GoogleDriveCloudNodeFactory.folder(parent, name);
|
||||
}
|
||||
|
||||
public boolean exists(GoogleDriveNode node) throws IOException {
|
||||
try {
|
||||
Optional<File> file = findFile( //
|
||||
node.getParent().getDriveId(), //
|
||||
node.getName());
|
||||
boolean fileExists = file.isPresent();
|
||||
if (fileExists) {
|
||||
idCache.add(from( //
|
||||
node.getParent(), //
|
||||
file.get()));
|
||||
}
|
||||
return fileExists;
|
||||
} catch (GoogleJsonResponseException e) {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
public List<CloudNode> list(GoogleDriveFolder folder) throws IOException {
|
||||
List<CloudNode> result = new ArrayList<>();
|
||||
String pageToken = null;
|
||||
do {
|
||||
Drive.Files.List fileListQuery = client() //
|
||||
.files() //
|
||||
.list() //
|
||||
.setFields("nextPageToken,files(id,mimeType,modifiedTime,name,size)") //
|
||||
.setPageSize(1000) //
|
||||
.setSupportsAllDrives(true).setIncludeItemsFromAllDrives(true).setPageToken(pageToken);
|
||||
|
||||
if (folder.getDriveId().equals("root")) {
|
||||
fileListQuery.setQ("'" + folder.getDriveId() + "' in parents and trashed = false or sharedWithMe");
|
||||
} else {
|
||||
fileListQuery.setQ("'" + folder.getDriveId() + "' in parents and trashed = false");
|
||||
}
|
||||
|
||||
FileList fileList = fileListQuery.execute();
|
||||
|
||||
for (File file : fileList.getFiles()) {
|
||||
result.add(idCache.cache(from(folder, file)));
|
||||
}
|
||||
pageToken = fileList.getNextPageToken();
|
||||
} while (pageToken != null);
|
||||
return result;
|
||||
}
|
||||
|
||||
public GoogleDriveFolder create(GoogleDriveFolder folder) throws IOException {
|
||||
if (folder.getParent().getDriveId() == null) {
|
||||
folder = new GoogleDriveFolder( //
|
||||
create(folder.getParent()), //
|
||||
folder.getName(), //
|
||||
folder.getPath(), //
|
||||
folder.getDriveId());
|
||||
}
|
||||
File metadata = new File();
|
||||
metadata.setName(folder.getName());
|
||||
metadata.setMimeType("application/vnd.google-apps.folder");
|
||||
metadata.setParents( //
|
||||
Collections.singletonList(folder.getParent().getDriveId()));
|
||||
|
||||
File createdFolder = client() //
|
||||
.files() //
|
||||
.create(metadata) //
|
||||
.setFields("id,name") //
|
||||
.setSupportsAllDrives(true).execute();
|
||||
|
||||
return idCache.cache( //
|
||||
GoogleDriveCloudNodeFactory.folder( //
|
||||
folder.getParent(), //
|
||||
createdFolder));
|
||||
}
|
||||
|
||||
public GoogleDriveNode move(GoogleDriveNode source, GoogleDriveNode target) throws IOException, CloudNodeAlreadyExistsException {
|
||||
if (exists(target)) {
|
||||
throw new CloudNodeAlreadyExistsException(target.getName());
|
||||
}
|
||||
|
||||
File metadata = new File();
|
||||
metadata.setName(target.getName());
|
||||
|
||||
File movedFile = client() //
|
||||
.files() //
|
||||
.update(source.getDriveId(), metadata) //
|
||||
.setFields("id,mimeType,modifiedTime,name,size") //
|
||||
.setAddParents(target.getParent().getDriveId()) //
|
||||
.setRemoveParents(source.getParent().getDriveId()) //
|
||||
.setSupportsAllDrives(true).execute();
|
||||
|
||||
idCache.remove(source);
|
||||
return idCache.cache(from(target.getParent(), movedFile));
|
||||
}
|
||||
|
||||
public GoogleDriveFile write(final GoogleDriveFile file, DataSource data, final ProgressAware<UploadState> progressAware, boolean replace, final long size) //
|
||||
throws IOException, BackendException {
|
||||
if (exists(file) && !replace) {
|
||||
throw new CloudNodeAlreadyExistsException("CloudNode already exists and replace is false");
|
||||
}
|
||||
|
||||
if (file.getParent().getDriveId() == null) {
|
||||
throw new NoSuchCloudFileException(String.format("The parent folder of %s doesn't have a driveId. The file would remain in root folder", file.getPath()));
|
||||
}
|
||||
|
||||
File metadata = new File();
|
||||
metadata.setName(file.getName());
|
||||
|
||||
progressAware.onProgress(Progress.started(UploadState.upload(file)));
|
||||
File uploadedFile;
|
||||
if (file.getDriveId() != null && replace) {
|
||||
try (TransferredBytesAwareGoogleContentInputStream in = new TransferredBytesAwareGoogleContentInputStream(null, data.open(context), size) {
|
||||
@Override
|
||||
public void bytesTransferred(long transferred) {
|
||||
progressAware.onProgress( //
|
||||
progress(UploadState.upload(file)) //
|
||||
.between(0) //
|
||||
.and(size) //
|
||||
.withValue(transferred));
|
||||
}
|
||||
}) {
|
||||
uploadedFile = client() //
|
||||
.files() //
|
||||
.update( //
|
||||
file.getDriveId(), //
|
||||
metadata, //
|
||||
in)
|
||||
.setFields("id,modifiedTime,name,size") //
|
||||
.setSupportsAllDrives(true) //
|
||||
.execute();
|
||||
}
|
||||
} else {
|
||||
metadata.setParents( //
|
||||
Collections.singletonList(file.getParent().getDriveId()));
|
||||
|
||||
try (TransferredBytesAwareGoogleContentInputStream in = new TransferredBytesAwareGoogleContentInputStream(null, data.open(context), size) {
|
||||
@Override
|
||||
public void bytesTransferred(long transferred) {
|
||||
progressAware.onProgress( //
|
||||
progress(UploadState.upload(file)) //
|
||||
.between(0) //
|
||||
.and(size) //
|
||||
.withValue(transferred));
|
||||
}
|
||||
}) {
|
||||
uploadedFile = client() //
|
||||
.files() //
|
||||
.create(metadata, in).setFields("id,modifiedTime,name,size") //
|
||||
.setSupportsAllDrives(true) //
|
||||
.execute();
|
||||
}
|
||||
}
|
||||
progressAware.onProgress(Progress.completed(UploadState.upload(file)));
|
||||
return idCache.cache( //
|
||||
GoogleDriveCloudNodeFactory.file(file.getParent(), uploadedFile));
|
||||
}
|
||||
|
||||
public void read(final GoogleDriveFile file, Optional<java.io.File> encryptedTmpFile, OutputStream data, final ProgressAware<DownloadState> progressAware) throws IOException {
|
||||
progressAware.onProgress(Progress.started(DownloadState.download(file)));
|
||||
|
||||
Optional<String> cacheKey = Optional.empty();
|
||||
Optional<java.io.File> cacheFile = Optional.empty();
|
||||
|
||||
if (sharedPreferencesHandler.useLruCache() && createLruCache(sharedPreferencesHandler.lruCacheSize())) {
|
||||
List<Revision> revisions = new ArrayList<>();
|
||||
String pageToken = null;
|
||||
do {
|
||||
final RevisionList revisionList = client() //
|
||||
.revisions() //
|
||||
.list(file.getDriveId()) //
|
||||
.setPageToken(pageToken).execute(); //
|
||||
|
||||
revisions.addAll(revisionList.getRevisions());
|
||||
|
||||
pageToken = revisionList.getNextPageToken();
|
||||
} while (pageToken != null);
|
||||
|
||||
Collections.sort(revisions, (revision1, revision2) -> {
|
||||
Long modified1 = revision1.getModifiedTime().getValue();
|
||||
Long modified2 = revision2.getModifiedTime().getValue();
|
||||
return Integer.compare(modified1.compareTo(modified2), 0);
|
||||
});
|
||||
|
||||
int revisionIndex = revisions.size() > 0 ? revisions.size() - 1 : 0;
|
||||
cacheKey = Optional.of(file.getDriveId() + revisions.get(revisionIndex).getId());
|
||||
java.io.File cachedFile = diskLruCache.get(cacheKey.get());
|
||||
cacheFile = cachedFile != null ? Optional.of(cachedFile) : Optional.empty();
|
||||
}
|
||||
|
||||
if (sharedPreferencesHandler.useLruCache() && cacheFile.isPresent()) {
|
||||
try {
|
||||
retrieveFromLruCache(cacheFile.get(), data);
|
||||
} catch (IOException e) {
|
||||
Timber.tag("GoogleDriveImpl").w(e, "Error while retrieving content from Cache, get from web request");
|
||||
writeToDate(file, data, encryptedTmpFile, cacheKey, progressAware);
|
||||
}
|
||||
} else {
|
||||
writeToDate(file, data, encryptedTmpFile, cacheKey, progressAware);
|
||||
}
|
||||
|
||||
progressAware.onProgress(Progress.completed(DownloadState.download(file)));
|
||||
}
|
||||
|
||||
private void writeToDate(final GoogleDriveFile file, //
|
||||
final OutputStream data, //
|
||||
final Optional<java.io.File> encryptedTmpFile, //
|
||||
final Optional<String> cacheKey, //
|
||||
final ProgressAware<DownloadState> progressAware) throws IOException {
|
||||
try (TransferredBytesAwareOutputStream out = new TransferredBytesAwareOutputStream(data) {
|
||||
@Override
|
||||
public void bytesTransferred(long transferred) {
|
||||
progressAware.onProgress( //
|
||||
progress(DownloadState.download(file)) //
|
||||
.between(0) //
|
||||
.and(file.getSize().orElse(Long.MAX_VALUE)) //
|
||||
.withValue(transferred));
|
||||
}
|
||||
}) {
|
||||
client() //
|
||||
.files() //
|
||||
.get(file.getDriveId()) //
|
||||
.setAlt("media") //
|
||||
.setSupportsAllDrives(true) //
|
||||
.executeMediaAndDownloadTo(out);
|
||||
} catch (HttpResponseException e) {
|
||||
ignoreEmptyFileErrorAndRethrowOthers(e, file);
|
||||
}
|
||||
|
||||
if (sharedPreferencesHandler.useLruCache() && encryptedTmpFile.isPresent() && cacheKey.isPresent()) {
|
||||
try {
|
||||
storeToLruCache(diskLruCache, cacheKey.get(), encryptedTmpFile.get());
|
||||
} catch (IOException e) {
|
||||
Timber.tag("GoogleDriveImpl").e(e, "Failed to write downloaded file in LRU cache");
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
private boolean createLruCache(int cacheSize) {
|
||||
if (diskLruCache == null) {
|
||||
try {
|
||||
diskLruCache = DiskLruCache.create(new LruFileCacheUtil(context).resolve(GOOGLE_DRIVE), cacheSize);
|
||||
} catch (IOException e) {
|
||||
Timber.tag("GoogleDriveImpl").e(e, "Failed to setup LRU cache");
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
/*
|
||||
* Workaround a bug in gdrive which does not allow to download empty files.
|
||||
*
|
||||
* In this case an HttpResponseException with status code 416 is thrown. The filesize is checked.
|
||||
* If zero, the exception is ignored - nothing has been read, so the OutputStream is in the correct
|
||||
* state.
|
||||
*/
|
||||
private void ignoreEmptyFileErrorAndRethrowOthers(HttpResponseException e, GoogleDriveFile file) throws IOException {
|
||||
if (e.getStatusCode() == STATUS_REQUEST_RANGE_NOT_SATISFIABLE) {
|
||||
Optional<File> foundFile = findFile( //
|
||||
file.getParent().getDriveId(), //
|
||||
file.getName());
|
||||
if (sizeOfFile(foundFile) == 0) {
|
||||
return;
|
||||
}
|
||||
}
|
||||
throw e;
|
||||
}
|
||||
|
||||
private long sizeOfFile(Optional<File> foundFile) {
|
||||
if (foundFile.isAbsent() || isFolder(foundFile.get())) {
|
||||
return -1;
|
||||
}
|
||||
return foundFile.get().getSize();
|
||||
}
|
||||
|
||||
public void delete(GoogleDriveNode node) throws IOException {
|
||||
client().files().delete(node.getDriveId()).setSupportsAllDrives(true).execute();
|
||||
idCache.remove(node);
|
||||
}
|
||||
|
||||
public String currentAccount() throws IOException {
|
||||
About about = client().about().get().execute();
|
||||
return about.getUser().getDisplayName();
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,10 @@
|
||||
package org.cryptomator.data.cloud.googledrive;
|
||||
|
||||
interface GoogleDriveNode extends GoogleDriveIdCloudNode {
|
||||
|
||||
@Override
|
||||
String getDriveId();
|
||||
|
||||
@Override
|
||||
GoogleDriveFolder getParent();
|
||||
}
|
@ -0,0 +1,24 @@
|
||||
package org.cryptomator.data.cloud.googledrive;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.GoogleDriveCloud;
|
||||
|
||||
public class RootGoogleDriveFolder extends GoogleDriveFolder {
|
||||
|
||||
private final GoogleDriveCloud cloud;
|
||||
|
||||
public RootGoogleDriveFolder(GoogleDriveCloud cloud) {
|
||||
super(null, "", "", "root");
|
||||
this.cloud = cloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
public GoogleDriveCloud getCloud() {
|
||||
return cloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
public GoogleDriveFolder withCloud(Cloud cloud) {
|
||||
return new RootGoogleDriveFolder((GoogleDriveCloud) cloud);
|
||||
}
|
||||
}
|
@ -0,0 +1,62 @@
|
||||
package org.cryptomator.data.cloud.local;
|
||||
|
||||
import android.content.Context;
|
||||
import android.os.Build;
|
||||
|
||||
import org.cryptomator.data.cloud.local.file.LocalStorageContentRepository;
|
||||
import org.cryptomator.data.cloud.local.storageaccessframework.LocalStorageAccessFrameworkContentRepository;
|
||||
import org.cryptomator.data.repository.CloudContentRepositoryFactory;
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.LocalStorageCloud;
|
||||
import org.cryptomator.domain.exception.authentication.NoAuthenticationProvidedException;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
import org.cryptomator.util.file.MimeTypes;
|
||||
|
||||
import javax.inject.Inject;
|
||||
import javax.inject.Singleton;
|
||||
|
||||
import static android.Manifest.permission.READ_EXTERNAL_STORAGE;
|
||||
import static android.Manifest.permission.WRITE_EXTERNAL_STORAGE;
|
||||
import static android.content.pm.PackageManager.PERMISSION_GRANTED;
|
||||
import static androidx.core.content.ContextCompat.checkSelfPermission;
|
||||
import static org.cryptomator.domain.CloudType.LOCAL;
|
||||
|
||||
@Singleton
|
||||
public class LocalStorageContentRepositoryFactory implements CloudContentRepositoryFactory {
|
||||
|
||||
private final Context context;
|
||||
private final MimeTypes mimeTypes;
|
||||
|
||||
@Inject
|
||||
public LocalStorageContentRepositoryFactory(Context context, MimeTypes mimeTypes) {
|
||||
this.context = context;
|
||||
this.mimeTypes = mimeTypes;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean supports(Cloud cloud) {
|
||||
return cloud.type() == LOCAL;
|
||||
}
|
||||
|
||||
@Override
|
||||
public CloudContentRepository cloudContentRepositoryFor(Cloud cloud) {
|
||||
if (!hasPermissions(WRITE_EXTERNAL_STORAGE, READ_EXTERNAL_STORAGE)) {
|
||||
throw new NoAuthenticationProvidedException(cloud);
|
||||
}
|
||||
if (((LocalStorageCloud) cloud).rootUri() != null && Build.VERSION.SDK_INT >= Build.VERSION_CODES.LOLLIPOP) {
|
||||
return new LocalStorageAccessFrameworkContentRepository(context, mimeTypes, (LocalStorageCloud) cloud);
|
||||
} else {
|
||||
return new LocalStorageContentRepository(context, (LocalStorageCloud) cloud);
|
||||
}
|
||||
}
|
||||
|
||||
private boolean hasPermissions(String... permissions) {
|
||||
for (String permission : permissions) {
|
||||
if (checkSelfPermission(context, permission) != PERMISSION_GRANTED) {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,54 @@
|
||||
package org.cryptomator.data.cloud.local.file;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.util.Date;
|
||||
|
||||
class LocalFile implements CloudFile, LocalNode {
|
||||
|
||||
private final LocalFolder parent;
|
||||
private final String name;
|
||||
private final String path;
|
||||
private final Optional<Long> size;
|
||||
private final Optional<Date> modified;
|
||||
|
||||
LocalFile(LocalFolder parent, String name, String path, Optional<Long> size, Optional<Date> modified) {
|
||||
this.parent = parent;
|
||||
this.name = name;
|
||||
this.path = path;
|
||||
this.size = size;
|
||||
this.modified = modified;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return parent.getCloud();
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getName() {
|
||||
return name;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getPath() {
|
||||
return path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalFolder getParent() {
|
||||
return parent;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Long> getSize() {
|
||||
return size;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Date> getModified() {
|
||||
return modified;
|
||||
}
|
||||
}
|
@ -0,0 +1,42 @@
|
||||
package org.cryptomator.data.cloud.local.file;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
|
||||
class LocalFolder implements CloudFolder, LocalNode {
|
||||
|
||||
private final LocalFolder parent;
|
||||
private final String name;
|
||||
private final String path;
|
||||
|
||||
LocalFolder(LocalFolder parent, String name, String path) {
|
||||
this.parent = parent;
|
||||
this.name = name;
|
||||
this.path = path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return parent.getCloud();
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getName() {
|
||||
return name;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getPath() {
|
||||
return path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalFolder getParent() {
|
||||
return parent;
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalFolder withCloud(Cloud cloud) {
|
||||
return new LocalFolder(parent.withCloud(cloud), name, path);
|
||||
}
|
||||
}
|
@ -0,0 +1,6 @@
|
||||
package org.cryptomator.data.cloud.local.file;
|
||||
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
|
||||
interface LocalNode extends CloudNode {
|
||||
}
|
@ -0,0 +1,121 @@
|
||||
package org.cryptomator.data.cloud.local.file;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
import org.cryptomator.domain.LocalStorageCloud;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.exception.FatalBackendException;
|
||||
import org.cryptomator.domain.exception.NoSuchCloudFileException;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
import org.cryptomator.domain.usecases.ProgressAware;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.DownloadState;
|
||||
import org.cryptomator.domain.usecases.cloud.UploadState;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.FileNotFoundException;
|
||||
import java.io.IOException;
|
||||
import java.io.OutputStream;
|
||||
import java.util.List;
|
||||
|
||||
import static org.cryptomator.util.ExceptionUtil.contains;
|
||||
|
||||
public class LocalStorageContentRepository implements CloudContentRepository<LocalStorageCloud, LocalNode, LocalFolder, LocalFile> {
|
||||
|
||||
private final LocalStorageImpl localStorageImpl;
|
||||
|
||||
public LocalStorageContentRepository(Context context, LocalStorageCloud localStorageCloud) {
|
||||
this.localStorageImpl = new LocalStorageImpl(context, localStorageCloud);
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalFolder root(LocalStorageCloud cloud) throws BackendException {
|
||||
return localStorageImpl.root();
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalFolder resolve(LocalStorageCloud cloud, String path) throws BackendException {
|
||||
return localStorageImpl.resolve(path);
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalFile file(LocalFolder parent, String name) throws BackendException {
|
||||
return localStorageImpl.file(parent, name);
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalFile file(LocalFolder parent, String name, Optional<Long> size) throws BackendException {
|
||||
return localStorageImpl.file(parent, name, size);
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalFolder folder(LocalFolder parent, String name) throws BackendException {
|
||||
return localStorageImpl.folder(parent, name);
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean exists(LocalNode node) throws BackendException {
|
||||
return localStorageImpl.exists(node);
|
||||
}
|
||||
|
||||
@Override
|
||||
public List<CloudNode> list(LocalFolder folder) throws BackendException {
|
||||
return localStorageImpl.list(folder);
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalFolder create(LocalFolder folder) throws BackendException {
|
||||
return localStorageImpl.create(folder);
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalFolder move(LocalFolder source, LocalFolder target) throws BackendException {
|
||||
return (LocalFolder) localStorageImpl.move(source, target);
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalFile move(LocalFile source, LocalFile target) throws BackendException {
|
||||
return (LocalFile) localStorageImpl.move(source, target);
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalFile write(LocalFile file, DataSource data, ProgressAware<UploadState> progressAware, boolean replace, long size) throws BackendException {
|
||||
try {
|
||||
return localStorageImpl.write(file, data, progressAware, replace, size);
|
||||
} catch (IOException e) {
|
||||
if (contains(e, FileNotFoundException.class)) {
|
||||
throw new NoSuchCloudFileException(file.getName());
|
||||
}
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void read(LocalFile file, Optional<File> tmpEncryptedFile, OutputStream data, ProgressAware<DownloadState> progressAware) throws BackendException {
|
||||
try {
|
||||
localStorageImpl.read(file, data, progressAware);
|
||||
} catch (IOException e) {
|
||||
if (contains(e, FileNotFoundException.class)) {
|
||||
throw new NoSuchCloudFileException(file.getName());
|
||||
}
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void delete(LocalNode node) throws BackendException {
|
||||
localStorageImpl.delete(node);
|
||||
}
|
||||
|
||||
@Override
|
||||
public String checkAuthenticationAndRetrieveCurrentAccount(LocalStorageCloud cloud) throws BackendException {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void logout(LocalStorageCloud cloud) throws BackendException {
|
||||
// empty
|
||||
}
|
||||
}
|
@ -0,0 +1,193 @@
|
||||
package org.cryptomator.data.cloud.local.file;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import org.cryptomator.data.util.TransferredBytesAwareInputStream;
|
||||
import org.cryptomator.data.util.TransferredBytesAwareOutputStream;
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
import org.cryptomator.domain.LocalStorageCloud;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
|
||||
import org.cryptomator.domain.exception.FatalBackendException;
|
||||
import org.cryptomator.domain.exception.NoSuchCloudFileException;
|
||||
import org.cryptomator.domain.usecases.ProgressAware;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.DownloadState;
|
||||
import org.cryptomator.domain.usecases.cloud.Progress;
|
||||
import org.cryptomator.domain.usecases.cloud.UploadState;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.FileInputStream;
|
||||
import java.io.FileOutputStream;
|
||||
import java.io.IOException;
|
||||
import java.io.InputStream;
|
||||
import java.io.OutputStream;
|
||||
import java.util.ArrayList;
|
||||
import java.util.Date;
|
||||
import java.util.List;
|
||||
|
||||
import static org.cryptomator.data.util.CopyStream.copyStreamToStream;
|
||||
import static org.cryptomator.domain.usecases.cloud.Progress.progress;
|
||||
|
||||
class LocalStorageImpl {
|
||||
|
||||
private final Context context;
|
||||
private final RootLocalFolder root;
|
||||
|
||||
LocalStorageImpl(Context context, LocalStorageCloud localStorageCloud) {
|
||||
this.context = context;
|
||||
this.root = new RootLocalFolder(localStorageCloud);
|
||||
}
|
||||
|
||||
public LocalFolder root() {
|
||||
return root;
|
||||
}
|
||||
|
||||
public LocalFolder resolve(String path) {
|
||||
if (path.startsWith(root.getPath())) {
|
||||
path = path.substring(root.getPath().length() + 1);
|
||||
}
|
||||
String[] names = path.split("/");
|
||||
LocalFolder folder = root;
|
||||
for (String name : names) {
|
||||
folder = folder(folder, name);
|
||||
}
|
||||
return folder;
|
||||
}
|
||||
|
||||
public LocalFile file(CloudFolder folder, String name) {
|
||||
return file(folder, name, Optional.empty());
|
||||
}
|
||||
|
||||
public LocalFile file(CloudFolder folder, String name, Optional<Long> size) {
|
||||
return LocalStorageNodeFactory.file( //
|
||||
(LocalFolder) folder, //
|
||||
name, //
|
||||
folder.getPath() + '/' + name, //
|
||||
size, //
|
||||
Optional.empty());
|
||||
}
|
||||
|
||||
public LocalFolder folder(CloudFolder folder, String name) {
|
||||
return LocalStorageNodeFactory.folder( //
|
||||
(LocalFolder) folder, //
|
||||
name, //
|
||||
folder.getPath() + '/' + name);
|
||||
}
|
||||
|
||||
public boolean exists(CloudNode node) {
|
||||
return new File(node.getPath()).exists();
|
||||
}
|
||||
|
||||
public List<CloudNode> list(LocalFolder folder) throws BackendException {
|
||||
List<CloudNode> result = new ArrayList<>();
|
||||
File localDirectory = new File(folder.getPath());
|
||||
if (!exists(folder)) {
|
||||
throw new NoSuchCloudFileException();
|
||||
}
|
||||
for (File file : localDirectory.listFiles()) {
|
||||
result.add(LocalStorageNodeFactory.from(folder, file));
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
||||
public LocalFolder create(LocalFolder folder) throws BackendException {
|
||||
File createFolder = new File(folder.getPath());
|
||||
if (createFolder.exists()) {
|
||||
throw new CloudNodeAlreadyExistsException(folder.getName());
|
||||
}
|
||||
if (!createFolder.mkdirs()) {
|
||||
throw new FatalBackendException("Couldn't create a local folder at " + folder.getPath());
|
||||
}
|
||||
|
||||
return LocalStorageNodeFactory.folder( //
|
||||
folder.getParent(), //
|
||||
createFolder);
|
||||
}
|
||||
|
||||
public LocalNode move(CloudNode source, CloudNode target) throws BackendException {
|
||||
File sourceFile = new File(source.getPath());
|
||||
File targetFile = new File(target.getPath());
|
||||
if (targetFile.exists()) {
|
||||
throw new CloudNodeAlreadyExistsException(target.getName());
|
||||
}
|
||||
if (!sourceFile.exists()) {
|
||||
throw new NoSuchCloudFileException(source.getName());
|
||||
}
|
||||
if (!sourceFile.renameTo(targetFile)) {
|
||||
throw new FatalBackendException("Couldn't move " + source.getPath() + " to " + target.getPath());
|
||||
}
|
||||
return LocalStorageNodeFactory.from((LocalFolder) target.getParent(), targetFile);
|
||||
}
|
||||
|
||||
public void delete(CloudNode node) {
|
||||
File fileOrDirectory = new File(node.getPath());
|
||||
if (!deleteRecursive(fileOrDirectory)) {
|
||||
throw new FatalBackendException("Couldn't delete local CloudNode " + fileOrDirectory);
|
||||
}
|
||||
}
|
||||
|
||||
private boolean deleteRecursive(File fileOrDirectory) {
|
||||
if (fileOrDirectory.isDirectory()) {
|
||||
for (File child : fileOrDirectory.listFiles()) {
|
||||
deleteRecursive(child);
|
||||
}
|
||||
}
|
||||
return fileOrDirectory.delete();
|
||||
}
|
||||
|
||||
public LocalFile write(final CloudFile file, DataSource data, final ProgressAware<UploadState> progressAware, boolean replace, final long size) throws IOException, BackendException {
|
||||
if (exists(file) && !replace) {
|
||||
throw new CloudNodeAlreadyExistsException("CloudNode already exists and replace is false");
|
||||
}
|
||||
|
||||
progressAware.onProgress(Progress.started(UploadState.upload(file)));
|
||||
File localFile = new File(file.getPath());
|
||||
|
||||
try (OutputStream out = new FileOutputStream(localFile); TransferredBytesAwareInputStream in = new TransferredBytesAwareInputStream(data.open(context)) {
|
||||
@Override
|
||||
public void bytesTransferred(long transferred) {
|
||||
progressAware.onProgress( //
|
||||
progress(UploadState.upload(file)) //
|
||||
.between(0) //
|
||||
.and(size) //
|
||||
.withValue(transferred));
|
||||
}
|
||||
}) {
|
||||
copyStreamToStream(in, out);
|
||||
}
|
||||
|
||||
progressAware.onProgress(Progress.completed(UploadState.upload(file)));
|
||||
|
||||
return LocalStorageNodeFactory.file( //
|
||||
(LocalFolder) file.getParent(), //
|
||||
file.getName(), //
|
||||
localFile.getPath(), //
|
||||
Optional.of(localFile.length()), //
|
||||
Optional.of(new Date(localFile.lastModified())));
|
||||
}
|
||||
|
||||
public void read(final LocalFile file, OutputStream data, final ProgressAware<DownloadState> progressAware) throws IOException {
|
||||
progressAware.onProgress(Progress.started(DownloadState.download(file)));
|
||||
File localFile = new File(file.getPath());
|
||||
|
||||
try (InputStream in = new FileInputStream(localFile); TransferredBytesAwareOutputStream out = new TransferredBytesAwareOutputStream(data) {
|
||||
@Override
|
||||
public void bytesTransferred(long transferred) {
|
||||
progressAware //
|
||||
.onProgress(progress(DownloadState.download(file)) //
|
||||
.between(0) //
|
||||
.and(localFile.length()) //
|
||||
.withValue(transferred));
|
||||
}
|
||||
}) {
|
||||
copyStreamToStream(in, out);
|
||||
}
|
||||
|
||||
progressAware.onProgress(Progress.completed(DownloadState.download(file)));
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,34 @@
|
||||
package org.cryptomator.data.cloud.local.file;
|
||||
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.io.File;
|
||||
import java.util.Date;
|
||||
|
||||
class LocalStorageNodeFactory {
|
||||
|
||||
public static LocalNode from(LocalFolder parent, File file) {
|
||||
if (file.isDirectory()) {
|
||||
return folder(parent, file);
|
||||
} else {
|
||||
return file( //
|
||||
parent, //
|
||||
file.getName(), //
|
||||
file.getPath(), //
|
||||
Optional.of(file.length()), //
|
||||
Optional.of(new Date(file.lastModified())));
|
||||
}
|
||||
}
|
||||
|
||||
public static LocalFolder folder(LocalFolder parent, File file) {
|
||||
return folder(parent, file.getName(), file.getPath());
|
||||
}
|
||||
|
||||
public static LocalFolder folder(LocalFolder parent, String name, String path) {
|
||||
return new LocalFolder(parent, name, path);
|
||||
}
|
||||
|
||||
public static LocalFile file(LocalFolder folder, String name, String path, Optional<Long> size, Optional<Date> modified) {
|
||||
return new LocalFile(folder, name, path, size, modified);
|
||||
}
|
||||
}
|
@ -0,0 +1,26 @@
|
||||
package org.cryptomator.data.cloud.local.file;
|
||||
|
||||
import android.os.Environment;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.LocalStorageCloud;
|
||||
|
||||
public class RootLocalFolder extends LocalFolder {
|
||||
|
||||
private final LocalStorageCloud localStorageCloud;
|
||||
|
||||
public RootLocalFolder(LocalStorageCloud localStorageCloud) {
|
||||
super(null, "", Environment.getExternalStorageDirectory().getPath());
|
||||
this.localStorageCloud = localStorageCloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return localStorageCloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
public RootLocalFolder withCloud(Cloud cloud) {
|
||||
return new RootLocalFolder((LocalStorageCloud) cloud);
|
||||
}
|
||||
}
|
@ -0,0 +1,74 @@
|
||||
package org.cryptomator.data.cloud.local.storageaccessframework;
|
||||
|
||||
import android.util.LruCache;
|
||||
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
|
||||
class DocumentIdCache {
|
||||
|
||||
private final LruCache<String, NodeInfo> cache;
|
||||
|
||||
DocumentIdCache() {
|
||||
cache = new LruCache<>(1000);
|
||||
}
|
||||
|
||||
public NodeInfo get(String path) {
|
||||
return cache.get(path);
|
||||
}
|
||||
|
||||
<T extends LocalStorageAccessNode> T cache(T value) {
|
||||
add(value);
|
||||
return value;
|
||||
}
|
||||
|
||||
public void add(LocalStorageAccessNode node) {
|
||||
add(node.getPath(), new NodeInfo(node));
|
||||
}
|
||||
|
||||
private void add(String path, NodeInfo info) {
|
||||
cache.put(path, info);
|
||||
}
|
||||
|
||||
public void remove(LocalStorageAccessNode node) {
|
||||
remove(node.getPath());
|
||||
}
|
||||
|
||||
private void remove(String path) {
|
||||
removeChildren(path);
|
||||
cache.remove(path);
|
||||
}
|
||||
|
||||
private void removeChildren(String path) {
|
||||
String prefix = path + '/';
|
||||
for (String key : cache.snapshot().keySet()) {
|
||||
if (key.startsWith(prefix)) {
|
||||
cache.remove(key);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
static class NodeInfo {
|
||||
|
||||
private final String id;
|
||||
private final boolean isFolder;
|
||||
|
||||
private NodeInfo(LocalStorageAccessNode node) {
|
||||
this(node.getDocumentId(), node instanceof CloudFolder);
|
||||
}
|
||||
|
||||
NodeInfo(String id, boolean isFolder) {
|
||||
this.id = id;
|
||||
this.isFolder = isFolder;
|
||||
}
|
||||
|
||||
public String getId() {
|
||||
return id;
|
||||
}
|
||||
|
||||
public boolean isFolder() {
|
||||
return isFolder;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,94 @@
|
||||
package org.cryptomator.data.cloud.local.storageaccessframework;
|
||||
|
||||
import android.net.Uri;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.util.Date;
|
||||
|
||||
import static android.net.Uri.parse;
|
||||
|
||||
class LocalStorageAccessFile implements CloudFile, LocalStorageAccessNode {
|
||||
|
||||
private final LocalStorageAccessFolder parent;
|
||||
private final String name;
|
||||
private final String path;
|
||||
private final Optional<Long> size;
|
||||
private final Optional<Date> modified;
|
||||
private final String documentId;
|
||||
private final String documentUri;
|
||||
|
||||
LocalStorageAccessFile(LocalStorageAccessFolder parent, String name, String path, Optional<Long> size, Optional<Date> modified, String documentId, String documentUri) {
|
||||
this.parent = parent;
|
||||
this.name = name;
|
||||
this.path = path;
|
||||
this.size = size;
|
||||
this.modified = modified;
|
||||
this.documentId = documentId;
|
||||
this.documentUri = documentUri;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return parent.getCloud();
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getName() {
|
||||
return name;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getPath() {
|
||||
return path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Uri getUri() {
|
||||
return parse(documentUri);
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalStorageAccessFolder getParent() {
|
||||
return parent;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getDocumentId() {
|
||||
return documentId;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Long> getSize() {
|
||||
return size;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Date> getModified() {
|
||||
return modified;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean equals(Object obj) {
|
||||
if (obj == this)
|
||||
return true;
|
||||
if (obj == null || getClass() != obj.getClass())
|
||||
return false;
|
||||
return internalEquals((LocalStorageAccessFile) obj);
|
||||
}
|
||||
|
||||
private boolean internalEquals(LocalStorageAccessFile o) {
|
||||
return path.equals(o.path);
|
||||
}
|
||||
|
||||
@Override
|
||||
public int hashCode() {
|
||||
final int prime = 31;
|
||||
int hash = 56127034;
|
||||
hash = hash * prime + path.hashCode();
|
||||
return hash;
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,85 @@
|
||||
package org.cryptomator.data.cloud.local.storageaccessframework;
|
||||
|
||||
import android.net.Uri;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
|
||||
import static android.net.Uri.parse;
|
||||
|
||||
class LocalStorageAccessFolder implements CloudFolder, LocalStorageAccessNode {
|
||||
|
||||
private final LocalStorageAccessFolder parent;
|
||||
private final String name;
|
||||
private final String path;
|
||||
private final String documentId;
|
||||
private final String documentUri;
|
||||
|
||||
LocalStorageAccessFolder(LocalStorageAccessFolder parent, String name, String path, String documentId, String documentUri) {
|
||||
this.parent = parent;
|
||||
this.name = name;
|
||||
this.path = path;
|
||||
this.documentId = documentId;
|
||||
this.documentUri = documentUri;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return parent.getCloud();
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getName() {
|
||||
return name;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getPath() {
|
||||
return path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Uri getUri() {
|
||||
if (documentUri == null) {
|
||||
return null;
|
||||
}
|
||||
|
||||
return parse(documentUri);
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalStorageAccessFolder getParent() {
|
||||
return parent;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getDocumentId() {
|
||||
return documentId;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean equals(Object obj) {
|
||||
if (obj == this)
|
||||
return true;
|
||||
if (obj == null || getClass() != obj.getClass())
|
||||
return false;
|
||||
return internalEquals((LocalStorageAccessFolder) obj);
|
||||
}
|
||||
|
||||
private boolean internalEquals(LocalStorageAccessFolder o) {
|
||||
return path.equals(o.path);
|
||||
}
|
||||
|
||||
@Override
|
||||
public int hashCode() {
|
||||
final int prime = 31;
|
||||
int hash = 341797327;
|
||||
hash = hash * prime + path.hashCode();
|
||||
return hash;
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalStorageAccessFolder withCloud(Cloud cloud) {
|
||||
return new LocalStorageAccessFolder(parent.withCloud(cloud), name, path, documentId, documentUri);
|
||||
}
|
||||
}
|
@ -0,0 +1,123 @@
|
||||
package org.cryptomator.data.cloud.local.storageaccessframework;
|
||||
|
||||
import android.content.Context;
|
||||
import android.os.Build;
|
||||
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
import org.cryptomator.domain.LocalStorageCloud;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.exception.FatalBackendException;
|
||||
import org.cryptomator.domain.exception.NoSuchCloudFileException;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
import org.cryptomator.domain.usecases.ProgressAware;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.DownloadState;
|
||||
import org.cryptomator.domain.usecases.cloud.UploadState;
|
||||
import org.cryptomator.util.Optional;
|
||||
import org.cryptomator.util.file.MimeTypes;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.IOException;
|
||||
import java.io.OutputStream;
|
||||
import java.util.List;
|
||||
|
||||
import androidx.annotation.RequiresApi;
|
||||
|
||||
@RequiresApi(Build.VERSION_CODES.LOLLIPOP)
|
||||
public class LocalStorageAccessFrameworkContentRepository implements CloudContentRepository<LocalStorageCloud, LocalStorageAccessNode, LocalStorageAccessFolder, LocalStorageAccessFile> {
|
||||
|
||||
private final LocalStorageAccessFrameworkImpl localStorageAccessFramework;
|
||||
|
||||
public LocalStorageAccessFrameworkContentRepository(Context context, MimeTypes mimeTypes, LocalStorageCloud localStorageCloud) {
|
||||
this.localStorageAccessFramework = new LocalStorageAccessFrameworkImpl(context, mimeTypes, localStorageCloud, new DocumentIdCache());
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalStorageAccessFolder root(LocalStorageCloud cloud) throws BackendException {
|
||||
return localStorageAccessFramework.root();
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalStorageAccessFolder resolve(LocalStorageCloud cloud, String path) throws BackendException {
|
||||
return localStorageAccessFramework.resolve(path);
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalStorageAccessFile file(LocalStorageAccessFolder parent, String name) throws BackendException {
|
||||
return localStorageAccessFramework.file(parent, name);
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalStorageAccessFile file(LocalStorageAccessFolder parent, String name, Optional<Long> size) throws BackendException {
|
||||
return localStorageAccessFramework.file(parent, name, size);
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalStorageAccessFolder folder(LocalStorageAccessFolder parent, String name) throws BackendException {
|
||||
return localStorageAccessFramework.folder(parent, name);
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean exists(LocalStorageAccessNode node) throws BackendException {
|
||||
return localStorageAccessFramework.exists(node);
|
||||
}
|
||||
|
||||
@Override
|
||||
public List<CloudNode> list(LocalStorageAccessFolder folder) throws BackendException {
|
||||
return localStorageAccessFramework.list(folder);
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalStorageAccessFolder create(LocalStorageAccessFolder folder) throws BackendException {
|
||||
return localStorageAccessFramework.create(folder);
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalStorageAccessFolder move(LocalStorageAccessFolder source, LocalStorageAccessFolder target) throws BackendException {
|
||||
if (source.getDocumentId() == null) {
|
||||
throw new NoSuchCloudFileException(source.getName());
|
||||
}
|
||||
return (LocalStorageAccessFolder) localStorageAccessFramework.move(source, target);
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalStorageAccessFile move(LocalStorageAccessFile source, LocalStorageAccessFile target) throws BackendException {
|
||||
return (LocalStorageAccessFile) localStorageAccessFramework.move(source, target);
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalStorageAccessFile write(LocalStorageAccessFile file, DataSource data, ProgressAware<UploadState> progressAware, boolean replace, long size) throws BackendException {
|
||||
try {
|
||||
return localStorageAccessFramework.write(file, data, progressAware, replace, size);
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void read(LocalStorageAccessFile file, Optional<File> tmpEnctypted, OutputStream data, ProgressAware<DownloadState> progressAware) throws BackendException {
|
||||
try {
|
||||
if (file.getDocumentId() == null) {
|
||||
throw new NoSuchCloudFileException(file.getName());
|
||||
}
|
||||
localStorageAccessFramework.read(file, data, progressAware);
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void delete(LocalStorageAccessNode node) throws BackendException {
|
||||
localStorageAccessFramework.delete(node);
|
||||
}
|
||||
|
||||
@Override
|
||||
public String checkAuthenticationAndRetrieveCurrentAccount(LocalStorageCloud cloud) throws BackendException {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void logout(LocalStorageCloud cloud) throws BackendException {
|
||||
// empty
|
||||
}
|
||||
}
|
@ -0,0 +1,536 @@
|
||||
package org.cryptomator.data.cloud.local.storageaccessframework;
|
||||
|
||||
import static org.cryptomator.data.cloud.local.storageaccessframework.LocalStorageAccessFrameworkNodeFactory.from;
|
||||
import static org.cryptomator.data.util.CopyStream.closeQuietly;
|
||||
import static org.cryptomator.data.util.CopyStream.copyStreamToStream;
|
||||
import static org.cryptomator.domain.usecases.ProgressAware.NO_OP_PROGRESS_AWARE;
|
||||
import static org.cryptomator.domain.usecases.cloud.Progress.progress;
|
||||
|
||||
import java.io.FileNotFoundException;
|
||||
import java.io.FileOutputStream;
|
||||
import java.io.IOException;
|
||||
import java.io.InputStream;
|
||||
import java.io.OutputStream;
|
||||
import java.util.ArrayList;
|
||||
import java.util.List;
|
||||
|
||||
import org.cryptomator.data.util.TransferredBytesAwareInputStream;
|
||||
import org.cryptomator.data.util.TransferredBytesAwareOutputStream;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
import org.cryptomator.domain.LocalStorageCloud;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
|
||||
import org.cryptomator.domain.exception.FatalBackendException;
|
||||
import org.cryptomator.domain.exception.NoSuchCloudFileException;
|
||||
import org.cryptomator.domain.exception.NotFoundException;
|
||||
import org.cryptomator.domain.exception.authentication.NoAuthenticationProvidedException;
|
||||
import org.cryptomator.domain.usecases.ProgressAware;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.DownloadState;
|
||||
import org.cryptomator.domain.usecases.cloud.Progress;
|
||||
import org.cryptomator.domain.usecases.cloud.UploadState;
|
||||
import org.cryptomator.util.Optional;
|
||||
import org.cryptomator.util.Supplier;
|
||||
import org.cryptomator.util.file.MimeType;
|
||||
import org.cryptomator.util.file.MimeTypes;
|
||||
|
||||
import android.content.ContentResolver;
|
||||
import android.content.Context;
|
||||
import android.content.UriPermission;
|
||||
import android.database.Cursor;
|
||||
import android.net.Uri;
|
||||
import android.os.Build;
|
||||
import android.provider.DocumentsContract;
|
||||
import android.provider.DocumentsContract.Document;
|
||||
|
||||
import androidx.annotation.RequiresApi;
|
||||
import androidx.documentfile.provider.DocumentFile;
|
||||
|
||||
import timber.log.Timber;
|
||||
|
||||
@RequiresApi(Build.VERSION_CODES.LOLLIPOP)
|
||||
class LocalStorageAccessFrameworkImpl {
|
||||
|
||||
private final Context context;
|
||||
private final RootLocalStorageAccessFolder root;
|
||||
private final DocumentIdCache idCache;
|
||||
private final MimeTypes mimeTypes;
|
||||
|
||||
LocalStorageAccessFrameworkImpl(Context context, MimeTypes mimeTypes, LocalStorageCloud cloud, DocumentIdCache documentIdCache) {
|
||||
this.mimeTypes = mimeTypes;
|
||||
if (!hasUriPermissions(context, cloud.rootUri())) {
|
||||
throw new NoAuthenticationProvidedException(cloud);
|
||||
}
|
||||
this.context = context;
|
||||
this.root = new RootLocalStorageAccessFolder(cloud);
|
||||
this.idCache = documentIdCache;
|
||||
}
|
||||
|
||||
private boolean hasUriPermissions(Context context, String uri) {
|
||||
Optional<UriPermission> uriPermission = uriPermissionFor(context, uri);
|
||||
return uriPermission.isPresent() //
|
||||
&& uriPermission.get().isReadPermission() //
|
||||
&& uriPermission.get().isWritePermission();
|
||||
}
|
||||
|
||||
private Optional<UriPermission> uriPermissionFor(Context context, String uri) {
|
||||
for (UriPermission uriPermission : context.getContentResolver().getPersistedUriPermissions()) {
|
||||
if (uri.equals(uriPermission.getUri().toString())) {
|
||||
return Optional.of(uriPermission);
|
||||
}
|
||||
}
|
||||
return Optional.empty();
|
||||
}
|
||||
|
||||
public LocalStorageAccessFolder root() {
|
||||
return root;
|
||||
}
|
||||
|
||||
public LocalStorageAccessFolder resolve(String path) throws BackendException {
|
||||
if (path.startsWith("/")) {
|
||||
path = path.substring(1);
|
||||
}
|
||||
|
||||
String[] names = path.split("/");
|
||||
LocalStorageAccessFolder folder = root;
|
||||
for (String name : names) {
|
||||
folder = folder(folder, name);
|
||||
}
|
||||
return folder;
|
||||
}
|
||||
|
||||
public LocalStorageAccessFile file(LocalStorageAccessFolder parent, String name) throws BackendException {
|
||||
return file( //
|
||||
parent, //
|
||||
name, //
|
||||
Optional.empty());
|
||||
}
|
||||
|
||||
public LocalStorageAccessFile file(LocalStorageAccessFolder parent, String name, Optional<Long> size) throws BackendException {
|
||||
if (parent.getDocumentId() == null) {
|
||||
return LocalStorageAccessFrameworkNodeFactory.file( //
|
||||
parent, //
|
||||
name, //
|
||||
size);
|
||||
}
|
||||
String path = LocalStorageAccessFrameworkNodeFactory.getNodePath(parent, name);
|
||||
DocumentIdCache.NodeInfo nodeInfo = idCache.get(path);
|
||||
if (nodeInfo != null && !nodeInfo.isFolder()) {
|
||||
return LocalStorageAccessFrameworkNodeFactory.file( //
|
||||
parent, //
|
||||
name, //
|
||||
path, //
|
||||
size, //
|
||||
nodeInfo.getId());
|
||||
}
|
||||
List<LocalStorageAccessNode> cloudNodes = listFilesWithNameFilter(parent, name);
|
||||
if (cloudNodes.size() > 0) {
|
||||
LocalStorageAccessNode cloudNode = cloudNodes.get(0);
|
||||
if (cloudNode instanceof LocalStorageAccessFile) {
|
||||
return idCache.cache((LocalStorageAccessFile) cloudNode);
|
||||
}
|
||||
}
|
||||
return LocalStorageAccessFrameworkNodeFactory.file( //
|
||||
parent, //
|
||||
name, //
|
||||
size);
|
||||
}
|
||||
|
||||
public LocalStorageAccessFolder folder(LocalStorageAccessFolder parent, String name) throws BackendException {
|
||||
if (parent.getDocumentId() == null) {
|
||||
return LocalStorageAccessFrameworkNodeFactory.folder( //
|
||||
parent, //
|
||||
name);
|
||||
}
|
||||
String path = LocalStorageAccessFrameworkNodeFactory.getNodePath(parent, name);
|
||||
DocumentIdCache.NodeInfo nodeInfo = idCache.get(path);
|
||||
if (nodeInfo != null && nodeInfo.isFolder()) {
|
||||
return LocalStorageAccessFrameworkNodeFactory.folder( //
|
||||
parent, //
|
||||
name, //
|
||||
nodeInfo.getId());
|
||||
}
|
||||
List<LocalStorageAccessNode> cloudNodes = listFilesWithNameFilter(parent, name);
|
||||
if (cloudNodes.size() > 0) {
|
||||
LocalStorageAccessNode cloudNode = cloudNodes.get(0);
|
||||
if (cloudNode instanceof LocalStorageAccessFolder) {
|
||||
return idCache.cache((LocalStorageAccessFolder) cloudNode);
|
||||
}
|
||||
}
|
||||
|
||||
return LocalStorageAccessFrameworkNodeFactory.folder( //
|
||||
parent, //
|
||||
name);
|
||||
}
|
||||
|
||||
private List<LocalStorageAccessNode> listFilesWithNameFilter(LocalStorageAccessFolder parent, String name) throws BackendException {
|
||||
if (parent.getUri() == null) {
|
||||
List<LocalStorageAccessNode> parents = listFilesWithNameFilter(parent.getParent(), parent.getName());
|
||||
if (parents.isEmpty() || !(parents.get(0) instanceof LocalStorageAccessFolder)) {
|
||||
throw new NoSuchCloudFileException(name);
|
||||
}
|
||||
parent = (LocalStorageAccessFolder) parents.get(0);
|
||||
}
|
||||
Cursor childCursor = null;
|
||||
try {
|
||||
childCursor = contentResolver() //
|
||||
.query( //
|
||||
DocumentsContract.buildChildDocumentsUriUsingTree( //
|
||||
parent.getUri(), //
|
||||
parent.getDocumentId()),
|
||||
new String[] {Document.COLUMN_DISPLAY_NAME, // cursor position 0
|
||||
Document.COLUMN_MIME_TYPE, // cursor position 1
|
||||
Document.COLUMN_SIZE, // cursor position 2
|
||||
Document.COLUMN_LAST_MODIFIED, // cursor position 3
|
||||
Document.COLUMN_DOCUMENT_ID // cursor position 4
|
||||
}, //
|
||||
null, //
|
||||
null, //
|
||||
null);
|
||||
|
||||
List<LocalStorageAccessNode> result = new ArrayList<>();
|
||||
while (childCursor != null && childCursor.moveToNext()) {
|
||||
if (childCursor.getString(0).equals(name)) {
|
||||
result.add(idCache.cache(from(parent, childCursor)));
|
||||
}
|
||||
}
|
||||
return result;
|
||||
} catch (IllegalArgumentException e) {
|
||||
if (e.getMessage().contains(FileNotFoundException.class.getCanonicalName())) {
|
||||
throw new NoSuchCloudFileException(name);
|
||||
}
|
||||
throw new FatalBackendException(e);
|
||||
} finally {
|
||||
closeQuietly(childCursor);
|
||||
}
|
||||
}
|
||||
|
||||
public boolean exists(LocalStorageAccessNode node) throws BackendException {
|
||||
try {
|
||||
|
||||
List<LocalStorageAccessNode> cloudNodes = listFilesWithNameFilter( //
|
||||
node.getParent(), //
|
||||
node.getName());
|
||||
|
||||
boolean documentExists = cloudNodes.size() > 0;
|
||||
|
||||
if (documentExists) {
|
||||
idCache.add(cloudNodes.get(0));
|
||||
}
|
||||
|
||||
return documentExists;
|
||||
} catch (NoSuchCloudFileException e) {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
public List<CloudNode> list(LocalStorageAccessFolder folder) throws BackendException {
|
||||
Cursor childCursor = contentResolver() //
|
||||
.query( //
|
||||
DocumentsContract.buildChildDocumentsUriUsingTree( //
|
||||
folder.getUri(), //
|
||||
folder.getDocumentId()),
|
||||
new String[] { //
|
||||
Document.COLUMN_DISPLAY_NAME, // cursor position 0
|
||||
Document.COLUMN_MIME_TYPE, // cursor position 1
|
||||
Document.COLUMN_SIZE, // cursor position 2
|
||||
Document.COLUMN_LAST_MODIFIED, // cursor position 3
|
||||
Document.COLUMN_DOCUMENT_ID // cursor position 4
|
||||
}, null, null, null);
|
||||
|
||||
try {
|
||||
List<CloudNode> result = new ArrayList<>();
|
||||
while (childCursor != null && childCursor.moveToNext()) {
|
||||
result.add(idCache.cache(from(folder, childCursor)));
|
||||
}
|
||||
return result;
|
||||
} finally {
|
||||
closeQuietly(childCursor);
|
||||
}
|
||||
}
|
||||
|
||||
public LocalStorageAccessFolder create(LocalStorageAccessFolder folder) throws BackendException {
|
||||
if (folder //
|
||||
.getParent() //
|
||||
.getDocumentId() == null) {
|
||||
folder = new LocalStorageAccessFolder( //
|
||||
create(folder.getParent()), //
|
||||
folder.getName(), //
|
||||
folder.getPath(), //
|
||||
null, //
|
||||
null);
|
||||
}
|
||||
Uri createdDocument;
|
||||
try {
|
||||
createdDocument = DocumentsContract.createDocument( //
|
||||
contentResolver(), //
|
||||
folder.getParent().getUri(), //
|
||||
Document.MIME_TYPE_DIR, //
|
||||
folder.getName());
|
||||
} catch (FileNotFoundException e) {
|
||||
throw new NoSuchCloudFileException(folder.getName());
|
||||
}
|
||||
return idCache.cache( //
|
||||
LocalStorageAccessFrameworkNodeFactory.folder( //
|
||||
folder.getParent(), //
|
||||
buildDocumentFile(createdDocument)));
|
||||
}
|
||||
|
||||
public LocalStorageAccessNode move(LocalStorageAccessNode source, LocalStorageAccessNode target) throws BackendException {
|
||||
if (exists(target)) {
|
||||
throw new CloudNodeAlreadyExistsException(target.getName());
|
||||
}
|
||||
|
||||
idCache.remove(source);
|
||||
idCache.remove(target);
|
||||
boolean isRename = !source //
|
||||
.getName() //
|
||||
.equals(target.getName());
|
||||
boolean isMove = !source //
|
||||
.getParent() //
|
||||
.equals(target.getParent());
|
||||
LocalStorageAccessNode renamedSource = source;
|
||||
if (isRename) {
|
||||
renamedSource = rename(source, target.getName());
|
||||
}
|
||||
if (isMove) {
|
||||
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.N) {
|
||||
return idCache.cache( //
|
||||
moveForApiStartingFrom24(renamedSource, target));
|
||||
} else {
|
||||
return idCache.cache( //
|
||||
moveForApiBelow24(renamedSource, target));
|
||||
}
|
||||
}
|
||||
return renamedSource;
|
||||
}
|
||||
|
||||
private LocalStorageAccessNode rename(LocalStorageAccessNode source, String name) throws NoSuchCloudFileException {
|
||||
Uri newUri = null;
|
||||
try {
|
||||
newUri = DocumentsContract.renameDocument( //
|
||||
contentResolver(), //
|
||||
source.getUri(), //
|
||||
name);
|
||||
} catch (FileNotFoundException e) {
|
||||
// Bug in Android 9 see #460
|
||||
if (Build.VERSION.SDK_INT != Build.VERSION_CODES.P) {
|
||||
throw new NoSuchCloudFileException(source.getName());
|
||||
}
|
||||
}
|
||||
|
||||
// Bug in Android 9 see #460
|
||||
if (Build.VERSION.SDK_INT == Build.VERSION_CODES.P) {
|
||||
try {
|
||||
List<LocalStorageAccessNode> cloudNodes = listFilesWithNameFilter( //
|
||||
source.getParent(), //
|
||||
name);
|
||||
|
||||
newUri = cloudNodes.get(0).getUri();
|
||||
} catch (BackendException e) {
|
||||
Timber.tag("LocalStgeAccessFrkImpl").e(e);
|
||||
}
|
||||
}
|
||||
|
||||
return LocalStorageAccessFrameworkNodeFactory.from( //
|
||||
source.getParent(), //
|
||||
buildDocumentFile(newUri));
|
||||
}
|
||||
|
||||
@RequiresApi(api = Build.VERSION_CODES.N)
|
||||
private LocalStorageAccessNode moveForApiStartingFrom24(LocalStorageAccessNode source, LocalStorageAccessNode target) throws NoSuchCloudFileException {
|
||||
Uri movedTargetUri;
|
||||
try {
|
||||
movedTargetUri = DocumentsContract.moveDocument( //
|
||||
contentResolver(), //
|
||||
source.getUri(), //
|
||||
source.getParent().getUri(), //
|
||||
target.getParent().getUri());
|
||||
} catch (FileNotFoundException e) {
|
||||
throw new NoSuchCloudFileException(source.getName());
|
||||
}
|
||||
return from( //
|
||||
target.getParent(), //
|
||||
buildDocumentFile(movedTargetUri));
|
||||
}
|
||||
|
||||
private LocalStorageAccessNode moveForApiBelow24(LocalStorageAccessNode source, LocalStorageAccessNode target) throws BackendException {
|
||||
try {
|
||||
LocalStorageAccessNode result;
|
||||
if (source instanceof CloudFolder) {
|
||||
result = moveForApiBelow24( //
|
||||
(LocalStorageAccessFolder) source, //
|
||||
(LocalStorageAccessFolder) target);
|
||||
} else {
|
||||
result = moveForApiBelow24( //
|
||||
(LocalStorageAccessFile) source, //
|
||||
(LocalStorageAccessFile) target);
|
||||
}
|
||||
delete(source);
|
||||
return result;
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
private LocalStorageAccessFolder moveForApiBelow24(LocalStorageAccessFolder source, LocalStorageAccessFolder target) throws IOException, BackendException {
|
||||
if (!exists(target.getParent())) {
|
||||
throw new NoSuchCloudFileException(target.getParent().getPath());
|
||||
}
|
||||
LocalStorageAccessFolder createdFolder = create(target);
|
||||
for (CloudNode child : list(source)) {
|
||||
if (child instanceof CloudFolder) {
|
||||
moveForApiBelow24( //
|
||||
(LocalStorageAccessFolder) child, //
|
||||
folder(target, child.getName()));
|
||||
} else {
|
||||
moveForApiBelow24( //
|
||||
(LocalStorageAccessFile) child, //
|
||||
file(target, child.getName()));
|
||||
}
|
||||
}
|
||||
return createdFolder;
|
||||
}
|
||||
|
||||
private LocalStorageAccessFile moveForApiBelow24(final LocalStorageAccessFile source, LocalStorageAccessFile target) throws IOException, BackendException {
|
||||
DataSource dataSource = new DataSource() {
|
||||
@Override
|
||||
public void close() throws IOException {
|
||||
// do nothing
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Long> size(Context context) {
|
||||
return source.getSize();
|
||||
}
|
||||
|
||||
@Override
|
||||
public InputStream open(Context context) throws IOException {
|
||||
return contentResolver().openInputStream(source.getUri());
|
||||
}
|
||||
|
||||
@Override
|
||||
public DataSource decorate(DataSource delegate) {
|
||||
return delegate;
|
||||
}
|
||||
};
|
||||
return write(target, dataSource, NO_OP_PROGRESS_AWARE, true, source.getSize().get());
|
||||
}
|
||||
|
||||
public LocalStorageAccessFile write( //
|
||||
LocalStorageAccessFile file, //
|
||||
final DataSource data, //
|
||||
final ProgressAware<UploadState> progressAware, //
|
||||
final boolean replace, //
|
||||
final long size) throws IOException, BackendException {
|
||||
|
||||
progressAware.onProgress(Progress.started(UploadState.upload(file)));
|
||||
Optional<Uri> fileUri = existingFileUri(file);
|
||||
if (fileUri.isPresent() && !replace) {
|
||||
throw new CloudNodeAlreadyExistsException("CloudNode already exists and replace is false");
|
||||
}
|
||||
|
||||
if (file.getParent().getUri() == null) {
|
||||
LocalStorageAccessFolder parent = (LocalStorageAccessFolder) listFilesWithNameFilter(file.getParent().getParent(), file.getParent().getName()).get(0);
|
||||
String tmpFileUri = fileUri.isPresent() ? fileUri.get().toString() : "";
|
||||
file = new LocalStorageAccessFile(parent, file.getName(), file.getPath(), file.getSize(), file.getModified(), file.getDocumentId(), tmpFileUri);
|
||||
}
|
||||
|
||||
final LocalStorageAccessFile tmpFile = file;
|
||||
|
||||
Uri uploadUri = fileUri.orElseGet(createNewDocumentSupplier(tmpFile));
|
||||
if (uploadUri == null) {
|
||||
throw new NotFoundException(tmpFile.getName());
|
||||
}
|
||||
|
||||
try (OutputStream out = contentResolver().openOutputStream(uploadUri); //
|
||||
TransferredBytesAwareInputStream in = new TransferredBytesAwareInputStream(data.open(context)) {
|
||||
@Override
|
||||
public void bytesTransferred(long transferred) {
|
||||
progressAware //
|
||||
.onProgress(progress(UploadState.upload(tmpFile)) //
|
||||
.between(0) //
|
||||
.and(size) //
|
||||
.withValue(transferred));
|
||||
}
|
||||
}) {
|
||||
if (out instanceof FileOutputStream) {
|
||||
((FileOutputStream) out).getChannel().truncate(0);
|
||||
}
|
||||
|
||||
copyStreamToStream(in, out);
|
||||
}
|
||||
|
||||
progressAware.onProgress(Progress.completed(UploadState.upload(file)));
|
||||
|
||||
return LocalStorageAccessFrameworkNodeFactory.file( //
|
||||
file.getParent(), //
|
||||
buildDocumentFile(uploadUri));
|
||||
}
|
||||
|
||||
private Supplier<Uri> createNewDocumentSupplier(final LocalStorageAccessFile file) {
|
||||
return () -> {
|
||||
MimeType mimeType = mimeTypes.fromFilename(file.getName()) //
|
||||
.orElse(MimeType.APPLICATION_OCTET_STREAM);
|
||||
try {
|
||||
return DocumentsContract.createDocument( //
|
||||
contentResolver(), //
|
||||
file.getParent().getUri(), //
|
||||
mimeType.toString(), //
|
||||
file.getName());
|
||||
} catch (FileNotFoundException e) {
|
||||
return null;
|
||||
}
|
||||
};
|
||||
}
|
||||
|
||||
private Optional<Uri> existingFileUri(LocalStorageAccessFile file) throws BackendException {
|
||||
List<LocalStorageAccessNode> nodes = listFilesWithNameFilter( //
|
||||
file.getParent(), //
|
||||
file.getName());
|
||||
if (nodes.size() > 0) {
|
||||
return Optional.of(nodes.get(0).getUri());
|
||||
} else {
|
||||
return Optional.empty();
|
||||
}
|
||||
}
|
||||
|
||||
public void read(final LocalStorageAccessFile file, final OutputStream data, final ProgressAware<DownloadState> progressAware) throws IOException {
|
||||
progressAware.onProgress(Progress.started(DownloadState.download(file)));
|
||||
|
||||
try (InputStream in = contentResolver().openInputStream(file.getUri()); //
|
||||
TransferredBytesAwareOutputStream out = new TransferredBytesAwareOutputStream(data) {
|
||||
@Override
|
||||
public void bytesTransferred(long transferred) {
|
||||
progressAware.onProgress(progress(DownloadState.download(file)) //
|
||||
.between(0) //
|
||||
.and(file.getSize().orElse(Long.MAX_VALUE)) //
|
||||
.withValue(transferred));
|
||||
}
|
||||
}) {
|
||||
copyStreamToStream(in, out);
|
||||
}
|
||||
|
||||
progressAware.onProgress(Progress.completed(DownloadState.download(file)));
|
||||
}
|
||||
|
||||
public void delete(LocalStorageAccessNode node) throws NoSuchCloudFileException {
|
||||
try {
|
||||
DocumentsContract.deleteDocument( //
|
||||
contentResolver(), //
|
||||
node.getUri());
|
||||
} catch (FileNotFoundException e) {
|
||||
throw new NoSuchCloudFileException(node.getName());
|
||||
}
|
||||
idCache.remove(node);
|
||||
}
|
||||
|
||||
private DocumentFile buildDocumentFile(Uri fileUri) {
|
||||
return DocumentFile.fromSingleUri(context, fileUri);
|
||||
}
|
||||
|
||||
private ContentResolver contentResolver() {
|
||||
return context.getContentResolver();
|
||||
}
|
||||
}
|
@ -0,0 +1,124 @@
|
||||
package org.cryptomator.data.cloud.local.storageaccessframework;
|
||||
|
||||
import android.database.Cursor;
|
||||
import android.os.Build;
|
||||
import android.provider.DocumentsContract;
|
||||
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.util.Date;
|
||||
|
||||
import androidx.annotation.RequiresApi;
|
||||
import androidx.documentfile.provider.DocumentFile;
|
||||
|
||||
@RequiresApi(Build.VERSION_CODES.LOLLIPOP)
|
||||
class LocalStorageAccessFrameworkNodeFactory {
|
||||
|
||||
public static LocalStorageAccessNode from(LocalStorageAccessFolder parent, Cursor cursor) {
|
||||
if (isFolder(cursor)) {
|
||||
return folder(parent, cursor);
|
||||
} else {
|
||||
return file(parent, cursor);
|
||||
}
|
||||
}
|
||||
|
||||
private static LocalStorageAccessFile file(LocalStorageAccessFolder parent, Cursor cursor) {
|
||||
return new LocalStorageAccessFile( //
|
||||
parent, //
|
||||
cursor.getString(0), //
|
||||
getNodePath(parent, cursor.getString(0)), //
|
||||
Optional.of(cursor.getLong(2)), //
|
||||
Optional.of(new Date(cursor.getLong(3))), //
|
||||
cursor.getString(4), //
|
||||
getDocumentUri(parent, cursor.getString(4)));
|
||||
}
|
||||
|
||||
private static LocalStorageAccessFolder folder(LocalStorageAccessFolder parent, Cursor cursor) {
|
||||
return new LocalStorageAccessFolder(parent, //
|
||||
cursor.getString(0), //
|
||||
getNodePath(parent, cursor.getString(0)), //
|
||||
cursor.getString(4), //
|
||||
getDocumentUri(parent, cursor.getString(4)));
|
||||
}
|
||||
|
||||
public static LocalStorageAccessNode from(LocalStorageAccessFolder parent, DocumentFile documentFile) {
|
||||
if (isFolder(documentFile)) {
|
||||
return folder(parent, documentFile);
|
||||
} else {
|
||||
return file(parent, documentFile);
|
||||
}
|
||||
}
|
||||
|
||||
public static LocalStorageAccessFolder folder(LocalStorageAccessFolder parent, DocumentFile directory) {
|
||||
return new LocalStorageAccessFolder(parent, //
|
||||
directory.getName(), //
|
||||
getNodePath(parent, directory.getName()), //
|
||||
DocumentsContract.getDocumentId(directory.getUri()), //
|
||||
directory.getUri().toString());
|
||||
}
|
||||
|
||||
public static LocalStorageAccessFile file(LocalStorageAccessFolder parent, DocumentFile documentFile) {
|
||||
return new LocalStorageAccessFile( //
|
||||
parent, //
|
||||
documentFile.getName(), //
|
||||
getNodePath(parent, documentFile.getName()), //
|
||||
Optional.of(documentFile.length()), //
|
||||
Optional.of(new Date(documentFile.lastModified())), //
|
||||
DocumentsContract.getTreeDocumentId(documentFile.getUri()), //
|
||||
documentFile.getUri().toString());
|
||||
}
|
||||
|
||||
public static LocalStorageAccessFile file(LocalStorageAccessFolder parent, String name, Optional<Long> size) {
|
||||
return new LocalStorageAccessFile(//
|
||||
parent, //
|
||||
name, //
|
||||
getNodePath(parent, name), //
|
||||
size, //
|
||||
Optional.empty(), //
|
||||
null, //
|
||||
null);
|
||||
}
|
||||
|
||||
public static LocalStorageAccessFile file(LocalStorageAccessFolder parent, String name, String path, Optional<Long> size, String documentId) {
|
||||
return new LocalStorageAccessFile(parent, //
|
||||
name, //
|
||||
path, //
|
||||
size, //
|
||||
Optional.empty(), //
|
||||
documentId, //
|
||||
getDocumentUri(parent, documentId));
|
||||
}
|
||||
|
||||
public static LocalStorageAccessFolder folder(LocalStorageAccessFolder parent, String name) {
|
||||
return new LocalStorageAccessFolder(parent, //
|
||||
name, //
|
||||
getNodePath(parent, name), //
|
||||
null, //
|
||||
null);
|
||||
}
|
||||
|
||||
public static LocalStorageAccessFolder folder(LocalStorageAccessFolder parent, String name, String documentId) {
|
||||
return new LocalStorageAccessFolder(parent, //
|
||||
name, //
|
||||
getNodePath(parent, name), //
|
||||
documentId, //
|
||||
getDocumentUri(parent, documentId));
|
||||
}
|
||||
|
||||
private static String getDocumentUri(LocalStorageAccessFolder parent, String documentId) {
|
||||
return DocumentsContract.buildDocumentUriUsingTree(parent.getUri(), documentId).toString();
|
||||
}
|
||||
|
||||
private static boolean isFolder(DocumentFile file) {
|
||||
return file.isDirectory();
|
||||
}
|
||||
|
||||
private static boolean isFolder(Cursor cursor) {
|
||||
return cursor.getString(1).equals(DocumentsContract.Document.MIME_TYPE_DIR);
|
||||
}
|
||||
|
||||
public static String getNodePath(LocalStorageAccessFolder parent, String name) {
|
||||
return parent.getPath() + "/" + name;
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,15 @@
|
||||
package org.cryptomator.data.cloud.local.storageaccessframework;
|
||||
|
||||
import android.net.Uri;
|
||||
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
|
||||
public interface LocalStorageAccessNode extends CloudNode {
|
||||
|
||||
Uri getUri();
|
||||
|
||||
LocalStorageAccessFolder getParent();
|
||||
|
||||
String getDocumentId();
|
||||
|
||||
}
|
@ -0,0 +1,41 @@
|
||||
package org.cryptomator.data.cloud.local.storageaccessframework;
|
||||
|
||||
import android.os.Build;
|
||||
import android.provider.DocumentsContract;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.LocalStorageCloud;
|
||||
|
||||
import androidx.annotation.RequiresApi;
|
||||
|
||||
import static android.net.Uri.parse;
|
||||
|
||||
@RequiresApi(api = Build.VERSION_CODES.LOLLIPOP)
|
||||
public class RootLocalStorageAccessFolder extends LocalStorageAccessFolder {
|
||||
|
||||
private final LocalStorageCloud localStorageCloud;
|
||||
|
||||
public RootLocalStorageAccessFolder(LocalStorageCloud localStorageCloud) {
|
||||
super(null, //
|
||||
"", //
|
||||
"", //
|
||||
DocumentsContract.getTreeDocumentId( //
|
||||
parse(localStorageCloud.rootUri())), //
|
||||
DocumentsContract.buildChildDocumentsUriUsingTree( //
|
||||
parse(localStorageCloud.rootUri()), //
|
||||
DocumentsContract.getTreeDocumentId( //
|
||||
parse(localStorageCloud.rootUri())))
|
||||
.toString());
|
||||
this.localStorageCloud = localStorageCloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return localStorageCloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
public LocalStorageAccessFolder withCloud(Cloud cloud) {
|
||||
return new RootLocalStorageAccessFolder((LocalStorageCloud) cloud);
|
||||
}
|
||||
}
|
@ -0,0 +1,20 @@
|
||||
package org.cryptomator.data.cloud.okhttplogging;
|
||||
|
||||
import java.util.HashSet;
|
||||
import java.util.Set;
|
||||
|
||||
class HeaderNames {
|
||||
|
||||
private final Set<String> lowercaseNames = new HashSet<>();
|
||||
|
||||
public HeaderNames(String... headerNames) {
|
||||
for (String headerName : headerNames) {
|
||||
lowercaseNames.add(headerName.toLowerCase());
|
||||
}
|
||||
}
|
||||
|
||||
public boolean contains(String headerName) {
|
||||
return lowercaseNames.contains(headerName.toLowerCase());
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,147 @@
|
||||
package org.cryptomator.data.cloud.okhttplogging;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import org.jetbrains.annotations.NotNull;
|
||||
|
||||
import java.io.IOException;
|
||||
|
||||
import okhttp3.Connection;
|
||||
import okhttp3.Headers;
|
||||
import okhttp3.Interceptor;
|
||||
import okhttp3.Protocol;
|
||||
import okhttp3.Request;
|
||||
import okhttp3.RequestBody;
|
||||
import okhttp3.Response;
|
||||
|
||||
import static android.preference.PreferenceManager.getDefaultSharedPreferences;
|
||||
import static java.lang.String.format;
|
||||
import static java.util.concurrent.TimeUnit.NANOSECONDS;
|
||||
|
||||
public final class HttpLoggingInterceptor implements Interceptor {
|
||||
|
||||
private static final HeaderNames EXCLUDED_HEADERS = new HeaderNames(//
|
||||
// headers excluded because they are logged separately:
|
||||
"Content-Type", "Content-Length",
|
||||
// headers excluded because they contain sensitive information:
|
||||
"Authorization", //
|
||||
"WWW-Authenticate", //
|
||||
"Cookie", //
|
||||
"Set-Cookie" //
|
||||
);
|
||||
|
||||
public interface Logger {
|
||||
void log(String message);
|
||||
}
|
||||
|
||||
public HttpLoggingInterceptor(Logger logger, Context context) {
|
||||
this.logger = logger;
|
||||
this.context = context;
|
||||
}
|
||||
|
||||
private final Logger logger;
|
||||
private final Context context;
|
||||
|
||||
@NotNull
|
||||
@Override
|
||||
public Response intercept(@NotNull Chain chain) throws IOException {
|
||||
if (debugModeEnabled(context)) {
|
||||
return proceedWithLogging(chain);
|
||||
} else {
|
||||
return chain.proceed(chain.request());
|
||||
}
|
||||
}
|
||||
|
||||
private Response proceedWithLogging(Chain chain) throws IOException {
|
||||
Request request = chain.request();
|
||||
logRequest(request, chain);
|
||||
return getAndLogResponse(request, chain);
|
||||
}
|
||||
|
||||
private void logRequest(Request request, Chain chain) throws IOException {
|
||||
logRequestStart(request, chain);
|
||||
logContentTypeAndLength(request);
|
||||
logHeaders(request.headers());
|
||||
logRequestEnd(request);
|
||||
}
|
||||
|
||||
private Response getAndLogResponse(Request request, Chain chain) throws IOException {
|
||||
long startOfRequestMs = System.nanoTime();
|
||||
Response response = getResponseLoggingExceptions(request, chain);
|
||||
long requestDurationMs = NANOSECONDS.toMillis(System.nanoTime() - startOfRequestMs);
|
||||
logResponse(response, requestDurationMs);
|
||||
return response;
|
||||
}
|
||||
|
||||
private Response getResponseLoggingExceptions(Request request, Chain chain) throws IOException {
|
||||
try {
|
||||
return chain.proceed(request);
|
||||
} catch (Exception e) {
|
||||
logger.log("<-- HTTP FAILED: " + e);
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
private void logResponse(Response response, long requestDurationMs) {
|
||||
logResponseStart(response, requestDurationMs);
|
||||
logHeaders(response.headers());
|
||||
logger.log("<-- END HTTP");
|
||||
}
|
||||
|
||||
private void logRequestStart(Request request, Chain chain) throws IOException {
|
||||
Connection connection = chain.connection();
|
||||
Protocol protocol = connection != null ? connection.protocol() : Protocol.HTTP_1_1;
|
||||
String bodyLength = hasBody(request) ? request.body().contentLength() + "-byte body" : "unknown length";
|
||||
|
||||
logger.log(format("--> %s %s %s (%s)", //
|
||||
request.method(), //
|
||||
request.url(), //
|
||||
protocol, //
|
||||
bodyLength //
|
||||
));
|
||||
}
|
||||
|
||||
private void logContentTypeAndLength(Request request) throws IOException {
|
||||
// Request body headers are only present when installed as a network interceptor. Force
|
||||
// them to be included (when available) so there values are known.
|
||||
if (hasBody(request)) {
|
||||
RequestBody body = request.body();
|
||||
if (body.contentType() != null) {
|
||||
logger.log("Content-Type: " + body.contentType());
|
||||
}
|
||||
if (body.contentLength() != -1) {
|
||||
logger.log("Content-Length: " + body.contentLength());
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
private void logRequestEnd(Request request) {
|
||||
logger.log("--> END " + request.method());
|
||||
}
|
||||
|
||||
private void logResponseStart(Response response, long requestDurationMs) {
|
||||
logger.log("<-- " + response.code() + ' ' + response.message() + ' ' + response.request().url() + " (" + requestDurationMs + "ms" + ')');
|
||||
}
|
||||
|
||||
private boolean hasBody(Request request) {
|
||||
return request.body() != null;
|
||||
}
|
||||
|
||||
private void logHeaders(Headers headers) {
|
||||
for (int i = 0, count = headers.size(); i < count; i++) {
|
||||
String name = headers.name(i);
|
||||
if (isExcludedHeader(name)) {
|
||||
continue;
|
||||
}
|
||||
logger.log(name + ": " + headers.value(i));
|
||||
}
|
||||
}
|
||||
|
||||
private static boolean debugModeEnabled(Context context) {
|
||||
return getDefaultSharedPreferences(context).getBoolean("debugMode", false);
|
||||
}
|
||||
|
||||
private boolean isExcludedHeader(String name) {
|
||||
return EXCLUDED_HEADERS.contains(name);
|
||||
}
|
||||
}
|
@ -0,0 +1,25 @@
|
||||
package org.cryptomator.data.cloud.onedrive;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import org.cryptomator.data.BuildConfig;
|
||||
import org.cryptomator.data.cloud.onedrive.graph.MSAAuthAndroidAdapter;
|
||||
|
||||
public class MSAAuthAndroidAdapterImpl extends MSAAuthAndroidAdapter {
|
||||
|
||||
private static final String[] SCOPES = new String[] {"https://graph.microsoft.com/Files.ReadWrite", "offline_access", "openid"};
|
||||
|
||||
public MSAAuthAndroidAdapterImpl(Context context, String refreshToken) {
|
||||
super(context, refreshToken);
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getClientId() {
|
||||
return BuildConfig.ONEDRIVE_API_KEY;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String[] getScopes() {
|
||||
return SCOPES;
|
||||
}
|
||||
}
|
@ -0,0 +1,78 @@
|
||||
package org.cryptomator.data.cloud.onedrive;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import com.microsoft.graph.authentication.IAuthenticationProvider;
|
||||
import com.microsoft.graph.core.DefaultClientConfig;
|
||||
import com.microsoft.graph.models.extensions.IGraphServiceClient;
|
||||
import com.microsoft.graph.requests.extensions.GraphServiceClient;
|
||||
|
||||
import org.cryptomator.data.cloud.okhttplogging.HttpLoggingInterceptor;
|
||||
import org.cryptomator.data.cloud.onedrive.graph.IAuthenticationAdapter;
|
||||
|
||||
import java.util.concurrent.atomic.AtomicReference;
|
||||
|
||||
import okhttp3.Interceptor;
|
||||
import okhttp3.OkHttpClient;
|
||||
import timber.log.Timber;
|
||||
|
||||
import static org.cryptomator.data.util.NetworkTimeout.CONNECTION;
|
||||
import static org.cryptomator.data.util.NetworkTimeout.READ;
|
||||
import static org.cryptomator.data.util.NetworkTimeout.WRITE;
|
||||
|
||||
public class OnedriveClientFactory {
|
||||
|
||||
private final AtomicReference<IGraphServiceClient> graphServiceClient = new AtomicReference<>();
|
||||
private final IAuthenticationAdapter authenticationAdapter;
|
||||
|
||||
private static OnedriveClientFactory instance;
|
||||
|
||||
private final Context context;
|
||||
|
||||
private OnedriveClientFactory(Context context, String refreshToken) {
|
||||
this.context = context;
|
||||
this.authenticationAdapter = new MSAAuthAndroidAdapterImpl(context, refreshToken);
|
||||
}
|
||||
|
||||
public static OnedriveClientFactory instance(Context context, String accessToken) {
|
||||
if (instance == null) {
|
||||
instance = new OnedriveClientFactory(context, accessToken);
|
||||
}
|
||||
return instance;
|
||||
}
|
||||
|
||||
public IGraphServiceClient client() {
|
||||
if (graphServiceClient.get() == null) {
|
||||
|
||||
OkHttpClient.Builder builder = new OkHttpClient() //
|
||||
.newBuilder() //
|
||||
.connectTimeout(CONNECTION.getTimeout(), CONNECTION.getUnit()) //
|
||||
.readTimeout(READ.getTimeout(), READ.getUnit()) //
|
||||
.writeTimeout(WRITE.getTimeout(), WRITE.getUnit()) //
|
||||
.addInterceptor(httpLoggingInterceptor(context));
|
||||
|
||||
OnedriveHttpProvider onedriveHttpProvider = new OnedriveHttpProvider(new DefaultClientConfig() {
|
||||
@Override
|
||||
public IAuthenticationProvider getAuthenticationProvider() {
|
||||
return getAuthenticationAdapter();
|
||||
}
|
||||
}, builder.build());
|
||||
|
||||
graphServiceClient.set(GraphServiceClient //
|
||||
.builder() //
|
||||
.authenticationProvider(getAuthenticationAdapter()) //
|
||||
.httpProvider(onedriveHttpProvider) //
|
||||
.buildClient());
|
||||
}
|
||||
return graphServiceClient.get();
|
||||
}
|
||||
|
||||
private static Interceptor httpLoggingInterceptor(Context context) {
|
||||
return new HttpLoggingInterceptor(message -> Timber.tag("OkHttp").d(message), context);
|
||||
}
|
||||
|
||||
public synchronized IAuthenticationAdapter getAuthenticationAdapter() {
|
||||
return authenticationAdapter;
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,165 @@
|
||||
package org.cryptomator.data.cloud.onedrive;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import com.microsoft.graph.core.GraphErrorCodes;
|
||||
|
||||
import org.cryptomator.data.cloud.InterceptingCloudContentRepository;
|
||||
import org.cryptomator.data.cloud.onedrive.graph.ClientException;
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
import org.cryptomator.domain.OnedriveCloud;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.exception.FatalBackendException;
|
||||
import org.cryptomator.domain.exception.NetworkConnectionException;
|
||||
import org.cryptomator.domain.exception.NoSuchCloudFileException;
|
||||
import org.cryptomator.domain.exception.authentication.WrongCredentialsException;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
import org.cryptomator.domain.usecases.ProgressAware;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.DownloadState;
|
||||
import org.cryptomator.domain.usecases.cloud.UploadState;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.IOException;
|
||||
import java.io.OutputStream;
|
||||
import java.net.SocketTimeoutException;
|
||||
import java.util.List;
|
||||
|
||||
import static org.cryptomator.util.ExceptionUtil.contains;
|
||||
|
||||
class OnedriveCloudContentRepository extends InterceptingCloudContentRepository<OnedriveCloud, OnedriveNode, OnedriveFolder, OnedriveFile> {
|
||||
|
||||
private final OnedriveCloud cloud;
|
||||
|
||||
public OnedriveCloudContentRepository(OnedriveCloud cloud, Context context) {
|
||||
super(new Intercepted(cloud, context));
|
||||
this.cloud = cloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
protected void throwWrappedIfRequired(Exception e) throws BackendException {
|
||||
throwNetworkConnectionExceptionIfRequired(e);
|
||||
throwWrongCredentialsExceptionIfRequired(e);
|
||||
}
|
||||
|
||||
private void throwNetworkConnectionExceptionIfRequired(Exception e) throws NetworkConnectionException {
|
||||
if (contains(e, SocketTimeoutException.class)) {
|
||||
throw new NetworkConnectionException(e);
|
||||
}
|
||||
}
|
||||
|
||||
private void throwWrongCredentialsExceptionIfRequired(Exception e) {
|
||||
if (isAuthenticationError(e)) {
|
||||
throw new WrongCredentialsException(cloud);
|
||||
}
|
||||
}
|
||||
|
||||
private boolean isAuthenticationError(Throwable e) {
|
||||
return e != null //
|
||||
&& ((e instanceof ClientException && ((ClientException) e).errorCode().equals(GraphErrorCodes.AUTHENTICATION_FAILURE)) //
|
||||
|| isAuthenticationError(e.getCause()));
|
||||
}
|
||||
|
||||
private static class Intercepted implements CloudContentRepository<OnedriveCloud, OnedriveNode, OnedriveFolder, OnedriveFile> {
|
||||
|
||||
private final OnedriveImpl oneDriveImpl;
|
||||
|
||||
public Intercepted(OnedriveCloud cloud, Context context) {
|
||||
this.oneDriveImpl = new OnedriveImpl(cloud, context, new OnedriveIdCache());
|
||||
}
|
||||
|
||||
@Override
|
||||
public OnedriveFolder root(OnedriveCloud cloud) {
|
||||
return oneDriveImpl.root();
|
||||
}
|
||||
|
||||
@Override
|
||||
public OnedriveFolder resolve(OnedriveCloud cloud, String path) {
|
||||
return oneDriveImpl.resolve(path);
|
||||
}
|
||||
|
||||
@Override
|
||||
public OnedriveFile file(OnedriveFolder parent, String name) {
|
||||
return oneDriveImpl.file(parent, name);
|
||||
}
|
||||
|
||||
@Override
|
||||
public OnedriveFile file(OnedriveFolder parent, String name, Optional<Long> size) {
|
||||
return oneDriveImpl.file(parent, name, size);
|
||||
}
|
||||
|
||||
@Override
|
||||
public OnedriveFolder folder(OnedriveFolder parent, String name) {
|
||||
return oneDriveImpl.folder(parent, name);
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean exists(OnedriveNode node) throws BackendException {
|
||||
return oneDriveImpl.exists(node);
|
||||
}
|
||||
|
||||
@Override
|
||||
public List<CloudNode> list(OnedriveFolder folder) throws BackendException {
|
||||
return oneDriveImpl.list(folder);
|
||||
}
|
||||
|
||||
@Override
|
||||
public OnedriveFolder create(OnedriveFolder folder) throws BackendException {
|
||||
return oneDriveImpl.create(folder);
|
||||
}
|
||||
|
||||
@Override
|
||||
public OnedriveFolder move(OnedriveFolder source, OnedriveFolder target) throws BackendException {
|
||||
return (OnedriveFolder) oneDriveImpl.move(source, target);
|
||||
}
|
||||
|
||||
@Override
|
||||
public OnedriveFile move(OnedriveFile source, OnedriveFile target) throws BackendException {
|
||||
return (OnedriveFile) oneDriveImpl.move(source, target);
|
||||
}
|
||||
|
||||
@Override
|
||||
public OnedriveFile write(OnedriveFile file, DataSource data, ProgressAware<UploadState> progressAware, boolean replace, long size) throws BackendException {
|
||||
try {
|
||||
return oneDriveImpl.write(file, data, progressAware, replace, size);
|
||||
} catch (BackendException e) {
|
||||
if (contains(e, NoSuchCloudFileException.class)) {
|
||||
throw new NoSuchCloudFileException(file.getName());
|
||||
}
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void read(OnedriveFile file, Optional<File> tmpEncryptedFile, OutputStream data, ProgressAware<DownloadState> progressAware) throws BackendException {
|
||||
try {
|
||||
oneDriveImpl.read(file, tmpEncryptedFile, data, progressAware);
|
||||
} catch (IOException | BackendException e) {
|
||||
if (contains(e, NoSuchCloudFileException.class)) {
|
||||
throw new NoSuchCloudFileException(file.getName());
|
||||
} else if (e instanceof IOException) {
|
||||
throw new FatalBackendException(e);
|
||||
} else if (e instanceof BackendException) {
|
||||
throw (BackendException) e;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void delete(OnedriveNode node) throws BackendException {
|
||||
oneDriveImpl.delete(node);
|
||||
}
|
||||
|
||||
@Override
|
||||
public String checkAuthenticationAndRetrieveCurrentAccount(OnedriveCloud cloud) throws BackendException {
|
||||
return oneDriveImpl.currentAccount();
|
||||
}
|
||||
|
||||
@Override
|
||||
public void logout(OnedriveCloud cloud) {
|
||||
oneDriveImpl.logout();
|
||||
}
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,34 @@
|
||||
package org.cryptomator.data.cloud.onedrive;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import org.cryptomator.data.repository.CloudContentRepositoryFactory;
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.OnedriveCloud;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
|
||||
import javax.inject.Inject;
|
||||
import javax.inject.Singleton;
|
||||
|
||||
import static org.cryptomator.domain.CloudType.ONEDRIVE;
|
||||
|
||||
@Singleton
|
||||
public class OnedriveCloudContentRepositoryFactory implements CloudContentRepositoryFactory {
|
||||
|
||||
private final Context context;
|
||||
|
||||
@Inject
|
||||
public OnedriveCloudContentRepositoryFactory(Context context) {
|
||||
this.context = context;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean supports(Cloud cloud) {
|
||||
return cloud.type() == ONEDRIVE;
|
||||
}
|
||||
|
||||
@Override
|
||||
public CloudContentRepository cloudContentRepositoryFor(Cloud cloud) {
|
||||
return new OnedriveCloudContentRepository((OnedriveCloud) cloud, context);
|
||||
}
|
||||
}
|
@ -0,0 +1,77 @@
|
||||
package org.cryptomator.data.cloud.onedrive;
|
||||
|
||||
import com.microsoft.graph.models.extensions.DriveItem;
|
||||
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.util.Date;
|
||||
|
||||
class OnedriveCloudNodeFactory {
|
||||
|
||||
public static OnedriveNode from(OnedriveFolder parent, DriveItem item) {
|
||||
if (isFolder(item)) {
|
||||
return folder(parent, item);
|
||||
} else {
|
||||
return file(parent, item);
|
||||
}
|
||||
}
|
||||
|
||||
private static OnedriveFile file(OnedriveFolder parent, DriveItem item) {
|
||||
return new OnedriveFile(parent, item.name, getNodePath(parent, item.name), Optional.ofNullable(item.size), lastModified(item));
|
||||
}
|
||||
|
||||
public static OnedriveFile file(OnedriveFolder parent, DriveItem item, Optional<Date> lastModified) {
|
||||
return new OnedriveFile(parent, item.name, getNodePath(parent, item.name), Optional.ofNullable(item.size), lastModified);
|
||||
}
|
||||
|
||||
public static OnedriveFile file(OnedriveFolder parent, String name, Optional<Long> size) {
|
||||
return new OnedriveFile(parent, name, getNodePath(parent, name), size, Optional.empty());
|
||||
}
|
||||
|
||||
public static OnedriveFile file(OnedriveFolder parent, String name, Optional<Long> size, String path) {
|
||||
return new OnedriveFile(parent, name, path, size, Optional.empty());
|
||||
}
|
||||
|
||||
public static OnedriveFolder folder(OnedriveFolder parent, DriveItem item) {
|
||||
return new OnedriveFolder(parent, item.name, getNodePath(parent, item.name));
|
||||
}
|
||||
|
||||
public static OnedriveFolder folder(OnedriveFolder parent, String name) {
|
||||
return new OnedriveFolder(parent, name, getNodePath(parent, name));
|
||||
}
|
||||
|
||||
public static OnedriveFolder folder(OnedriveFolder parent, String name, String path) {
|
||||
return new OnedriveFolder(parent, name, path);
|
||||
}
|
||||
|
||||
private static String getNodePath(OnedriveFolder parent, String name) {
|
||||
return parent.getPath() + "/" + name;
|
||||
}
|
||||
|
||||
public static String getId(DriveItem item) {
|
||||
return item.remoteItem != null //
|
||||
? item.remoteItem.id //
|
||||
: item.id;
|
||||
}
|
||||
|
||||
public static String getDriveId(DriveItem item) {
|
||||
return item.remoteItem != null //
|
||||
? item.remoteItem.parentReference.driveId //
|
||||
: item.parentReference != null //
|
||||
? item.parentReference.driveId //
|
||||
: null;
|
||||
}
|
||||
|
||||
public static boolean isFolder(DriveItem item) {
|
||||
return item.folder != null || (item.remoteItem != null && item.remoteItem.folder != null);
|
||||
}
|
||||
|
||||
private static Optional<Date> lastModified(DriveItem item) {
|
||||
if (item.lastModifiedDateTime == null) {
|
||||
return Optional.empty();
|
||||
} else {
|
||||
return Optional.of(item.lastModifiedDateTime.getTime());
|
||||
}
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,59 @@
|
||||
package org.cryptomator.data.cloud.onedrive;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.util.Date;
|
||||
|
||||
class OnedriveFile implements CloudFile, OnedriveNode {
|
||||
|
||||
private final OnedriveFolder parent;
|
||||
private final String name;
|
||||
private final String path;
|
||||
private final Optional<Long> size;
|
||||
private final Optional<Date> modified;
|
||||
|
||||
public OnedriveFile(OnedriveFolder parent, String name, String path, Optional<Long> size, Optional<Date> modified) {
|
||||
this.parent = parent;
|
||||
this.name = name;
|
||||
this.path = path;
|
||||
this.size = size;
|
||||
this.modified = modified;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isFolder() {
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return parent.getCloud();
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getName() {
|
||||
return name;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getPath() {
|
||||
return path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public OnedriveFolder getParent() {
|
||||
return parent;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Long> getSize() {
|
||||
return size;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Date> getModified() {
|
||||
return modified;
|
||||
}
|
||||
}
|
@ -0,0 +1,47 @@
|
||||
package org.cryptomator.data.cloud.onedrive;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
|
||||
class OnedriveFolder implements CloudFolder, OnedriveNode {
|
||||
|
||||
private final OnedriveFolder parent;
|
||||
private final String name;
|
||||
private final String path;
|
||||
|
||||
public OnedriveFolder(OnedriveFolder parent, String name, String path) {
|
||||
this.parent = parent;
|
||||
this.name = name;
|
||||
this.path = path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isFolder() {
|
||||
return true;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return parent.getCloud();
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getName() {
|
||||
return name;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getPath() {
|
||||
return path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public OnedriveFolder getParent() {
|
||||
return parent;
|
||||
}
|
||||
|
||||
@Override
|
||||
public OnedriveFolder withCloud(Cloud cloud) {
|
||||
return new OnedriveFolder(parent.withCloud(cloud), name, path);
|
||||
}
|
||||
}
|
@ -0,0 +1,577 @@
|
||||
// ------------------------------------------------------------------------------
|
||||
// Copyright (c) 2015 Microsoft Corporation
|
||||
//
|
||||
// Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||
// of this software and associated documentation files (the "Software"), to deal
|
||||
// in the Software without restriction, including without limitation the rights
|
||||
// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||
// copies of the Software, and to permit persons to whom the Software is
|
||||
// furnished to do so, subject to the following conditions:
|
||||
//
|
||||
// The above copyright notice and this permission notice shall be included in
|
||||
// all copies or substantial portions of the Software.
|
||||
//
|
||||
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF WILDCARD_MIME_TYPE KIND, EXPRESS OR
|
||||
// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR WILDCARD_MIME_TYPE CLAIM, DAMAGES OR OTHER
|
||||
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||
// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||||
// THE SOFTWARE.
|
||||
// ------------------------------------------------------------------------------
|
||||
package org.cryptomator.data.cloud.onedrive;
|
||||
|
||||
import java.io.BufferedInputStream;
|
||||
import java.io.BufferedOutputStream;
|
||||
import java.io.ByteArrayInputStream;
|
||||
import java.io.IOException;
|
||||
import java.io.InputStream;
|
||||
import java.io.OutputStream;
|
||||
import java.io.UnsupportedEncodingException;
|
||||
import java.net.URL;
|
||||
import java.util.Collections;
|
||||
import java.util.List;
|
||||
import java.util.Map;
|
||||
import java.util.Scanner;
|
||||
import java.util.concurrent.TimeUnit;
|
||||
|
||||
import com.google.common.annotations.VisibleForTesting;
|
||||
import com.microsoft.graph.authentication.IAuthenticationProvider;
|
||||
import com.microsoft.graph.concurrency.ICallback;
|
||||
import com.microsoft.graph.concurrency.IExecutors;
|
||||
import com.microsoft.graph.concurrency.IProgressCallback;
|
||||
import com.microsoft.graph.core.ClientException;
|
||||
import com.microsoft.graph.core.Constants;
|
||||
import com.microsoft.graph.core.DefaultConnectionConfig;
|
||||
import com.microsoft.graph.core.IClientConfig;
|
||||
import com.microsoft.graph.core.IConnectionConfig;
|
||||
import com.microsoft.graph.http.GraphServiceException;
|
||||
import com.microsoft.graph.http.HttpMethod;
|
||||
import com.microsoft.graph.http.HttpResponseCode;
|
||||
import com.microsoft.graph.http.HttpResponseHeadersHelper;
|
||||
import com.microsoft.graph.http.IHttpProvider;
|
||||
import com.microsoft.graph.http.IHttpRequest;
|
||||
import com.microsoft.graph.http.IStatefulResponseHandler;
|
||||
import com.microsoft.graph.httpcore.HttpClients;
|
||||
import com.microsoft.graph.httpcore.ICoreAuthenticationProvider;
|
||||
import com.microsoft.graph.httpcore.middlewareoption.RedirectOptions;
|
||||
import com.microsoft.graph.httpcore.middlewareoption.RetryOptions;
|
||||
import com.microsoft.graph.logger.ILogger;
|
||||
import com.microsoft.graph.logger.LoggerLevel;
|
||||
import com.microsoft.graph.options.HeaderOption;
|
||||
import com.microsoft.graph.serializer.ISerializer;
|
||||
|
||||
import org.jetbrains.annotations.NotNull;
|
||||
|
||||
import okhttp3.MediaType;
|
||||
import okhttp3.OkHttpClient;
|
||||
import okhttp3.Protocol;
|
||||
import okhttp3.Request;
|
||||
import okhttp3.RequestBody;
|
||||
import okhttp3.Response;
|
||||
import okio.BufferedSink;
|
||||
|
||||
/**
|
||||
* Http provider based off of URLConnection.
|
||||
*/
|
||||
public class OnedriveHttpProvider implements IHttpProvider {
|
||||
|
||||
private final HttpResponseHeadersHelper responseHeadersHelper = new HttpResponseHeadersHelper();
|
||||
|
||||
/**
|
||||
* The serializer
|
||||
*/
|
||||
private final ISerializer serializer;
|
||||
|
||||
/**
|
||||
* The authentication provider
|
||||
*/
|
||||
private final IAuthenticationProvider authenticationProvider;
|
||||
|
||||
/**
|
||||
* The executors
|
||||
*/
|
||||
private final IExecutors executors;
|
||||
|
||||
/**
|
||||
* The logger
|
||||
*/
|
||||
private final ILogger logger;
|
||||
|
||||
/**
|
||||
* The connection config
|
||||
*/
|
||||
private IConnectionConfig connectionConfig;
|
||||
|
||||
/**
|
||||
* The OkHttpClient that handles all requests
|
||||
*/
|
||||
private OkHttpClient corehttpClient;
|
||||
|
||||
/**
|
||||
* Creates the DefaultHttpProvider
|
||||
*
|
||||
* @param serializer the serializer
|
||||
* @param authenticationProvider the authentication provider
|
||||
* @param executors the executors
|
||||
* @param logger the logger for diagnostic information
|
||||
*/
|
||||
public OnedriveHttpProvider(final ISerializer serializer, final IAuthenticationProvider authenticationProvider, final IExecutors executors, final ILogger logger) {
|
||||
this.serializer = serializer;
|
||||
this.authenticationProvider = authenticationProvider;
|
||||
this.executors = executors;
|
||||
this.logger = logger;
|
||||
}
|
||||
|
||||
/**
|
||||
* Creates the DefaultHttpProvider
|
||||
*
|
||||
* @param clientConfig the client configuration to use for the provider
|
||||
* @param httpClient the http client to execute the requests with
|
||||
*/
|
||||
public OnedriveHttpProvider(final IClientConfig clientConfig, final OkHttpClient httpClient) {
|
||||
this(clientConfig.getSerializer(), clientConfig.getAuthenticationProvider(), clientConfig.getExecutors(), clientConfig.getLogger());
|
||||
this.corehttpClient = httpClient;
|
||||
}
|
||||
|
||||
/**
|
||||
* Gets the serializer for this HTTP provider
|
||||
*
|
||||
* @return the serializer for this provider
|
||||
*/
|
||||
@Override
|
||||
public ISerializer getSerializer() {
|
||||
return serializer;
|
||||
}
|
||||
|
||||
/**
|
||||
* Sends the HTTP request asynchronously
|
||||
*
|
||||
* @param request the request description
|
||||
* @param callback the callback to be called after success or failure
|
||||
* @param resultClass the class of the response from the service
|
||||
* @param serializable the object to send to the service in the body of the request
|
||||
* @param <Result> the type of the response object
|
||||
* @param <Body> the type of the object to send to the service in the body of the request
|
||||
*/
|
||||
@Override
|
||||
public <Result, Body> void send(final IHttpRequest request, final ICallback<? super Result> callback, final Class<Result> resultClass, final Body serializable) {
|
||||
final IProgressCallback<? super Result> progressCallback;
|
||||
if (callback instanceof IProgressCallback) {
|
||||
progressCallback = (IProgressCallback<? super Result>) callback;
|
||||
} else {
|
||||
progressCallback = null;
|
||||
}
|
||||
|
||||
executors.performOnBackground(() -> {
|
||||
try {
|
||||
executors.performOnForeground(sendRequestInternal(request, resultClass, serializable, progressCallback, null), callback);
|
||||
} catch (final ClientException e) {
|
||||
executors.performOnForeground(e, callback);
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Sends the HTTP request
|
||||
*
|
||||
* @param request the request description
|
||||
* @param resultClass the class of the response from the service
|
||||
* @param serializable the object to send to the service in the body of the request
|
||||
* @param <Result> the type of the response object
|
||||
* @param <Body> the type of the object to send to the service in the body of the request
|
||||
* @return the result from the request
|
||||
* @throws ClientException an exception occurs if the request was unable to complete for any reason
|
||||
*/
|
||||
@Override
|
||||
public <Result, Body> Result send(final IHttpRequest request, final Class<Result> resultClass, final Body serializable) throws ClientException {
|
||||
return send(request, resultClass, serializable, null);
|
||||
}
|
||||
|
||||
/**
|
||||
* Sends the HTTP request
|
||||
*
|
||||
* @param request the request description
|
||||
* @param resultClass the class of the response from the service
|
||||
* @param serializable the object to send to the service in the body of the request
|
||||
* @param handler the handler for stateful response
|
||||
* @param <Result> the type of the response object
|
||||
* @param <Body> the type of the object to send to the service in the body of the request
|
||||
* @param <DeserializeType> the response handler for stateful response
|
||||
* @return the result from the request
|
||||
* @throws ClientException this exception occurs if the request was unable to complete for any reason
|
||||
*/
|
||||
public <Result, Body, DeserializeType> Result send(final IHttpRequest request, final Class<Result> resultClass, final Body serializable, final IStatefulResponseHandler<Result, DeserializeType> handler)
|
||||
throws ClientException {
|
||||
return sendRequestInternal(request, resultClass, serializable, null, handler);
|
||||
}
|
||||
|
||||
/**
|
||||
* Sends the HTTP request
|
||||
*
|
||||
* @param request the request description
|
||||
* @param resultClass the class of the response from the service
|
||||
* @param serializable the object to send to the service in the body of the request
|
||||
* @param progress the progress callback for the request
|
||||
* @param <Result> the type of the response object
|
||||
* @param <Body> the type of the object to send to the service in the body of the request
|
||||
* @return the result from the request
|
||||
* @throws ClientException an exception occurs if the request was unable to complete for any reason
|
||||
*/
|
||||
public <Result, Body> Request getHttpRequest(final IHttpRequest request, final Class<Result> resultClass, final Body serializable, final IProgressCallback<? super Result> progress) throws ClientException {
|
||||
final int defaultBufferSize = 4096;
|
||||
|
||||
final URL requestUrl = request.getRequestUrl();
|
||||
logger.logDebug("Starting to send request, URL " + requestUrl.toString());
|
||||
|
||||
if (this.connectionConfig == null) {
|
||||
this.connectionConfig = new DefaultConnectionConfig();
|
||||
}
|
||||
|
||||
// Request level middleware options
|
||||
RedirectOptions redirectOptions = new RedirectOptions(request.getMaxRedirects() > 0 ? request.getMaxRedirects() : this.connectionConfig.getMaxRedirects(),
|
||||
request.getShouldRedirect() != null ? request.getShouldRedirect() : this.connectionConfig.getShouldRedirect());
|
||||
RetryOptions retryOptions = new RetryOptions(request.getShouldRetry() != null ? request.getShouldRetry() : this.connectionConfig.getShouldRetry(),
|
||||
request.getMaxRetries() > 0 ? request.getMaxRetries() : this.connectionConfig.getMaxRetries(), request.getDelay() > 0 ? request.getDelay() : this.connectionConfig.getDelay());
|
||||
|
||||
Request coreHttpRequest = convertIHttpRequestToOkHttpRequest(request);
|
||||
Request.Builder corehttpRequestBuilder = coreHttpRequest.newBuilder().tag(RedirectOptions.class, redirectOptions).tag(RetryOptions.class, retryOptions);
|
||||
|
||||
String contenttype = null;
|
||||
|
||||
logger.logDebug("Request Method " + request.getHttpMethod().toString());
|
||||
List<HeaderOption> requestHeaders = request.getHeaders();
|
||||
|
||||
for (HeaderOption headerOption : requestHeaders) {
|
||||
if (headerOption.getName().equalsIgnoreCase(Constants.CONTENT_TYPE_HEADER_NAME)) {
|
||||
contenttype = headerOption.getValue().toString();
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
final byte[] bytesToWrite;
|
||||
corehttpRequestBuilder.addHeader("Accept", "*/*");
|
||||
if (serializable == null) {
|
||||
// Send an empty body through with a POST request
|
||||
// This ensures that the Content-Length header is properly set
|
||||
if (request.getHttpMethod() == HttpMethod.POST) {
|
||||
bytesToWrite = new byte[0];
|
||||
if (contenttype == null) {
|
||||
contenttype = Constants.BINARY_CONTENT_TYPE;
|
||||
}
|
||||
} else {
|
||||
bytesToWrite = null;
|
||||
}
|
||||
} else if (serializable instanceof byte[]) {
|
||||
logger.logDebug("Sending byte[] as request body");
|
||||
bytesToWrite = (byte[]) serializable;
|
||||
|
||||
// If the user hasn't specified a Content-Type for the request
|
||||
if (!hasHeader(requestHeaders, Constants.CONTENT_TYPE_HEADER_NAME)) {
|
||||
corehttpRequestBuilder.addHeader(Constants.CONTENT_TYPE_HEADER_NAME, Constants.BINARY_CONTENT_TYPE);
|
||||
contenttype = Constants.BINARY_CONTENT_TYPE;
|
||||
}
|
||||
} else {
|
||||
logger.logDebug("Sending " + serializable.getClass().getName() + " as request body");
|
||||
final String serializeObject = serializer.serializeObject(serializable);
|
||||
try {
|
||||
bytesToWrite = serializeObject.getBytes(Constants.JSON_ENCODING);
|
||||
} catch (final UnsupportedEncodingException ex) {
|
||||
final ClientException clientException = new ClientException("Unsupported encoding problem: ", ex);
|
||||
logger.logError("Unsupported encoding problem: " + ex.getMessage(), ex);
|
||||
throw clientException;
|
||||
}
|
||||
|
||||
// If the user hasn't specified a Content-Type for the request
|
||||
if (!hasHeader(requestHeaders, Constants.CONTENT_TYPE_HEADER_NAME)) {
|
||||
corehttpRequestBuilder.addHeader(Constants.CONTENT_TYPE_HEADER_NAME, Constants.JSON_CONTENT_TYPE);
|
||||
contenttype = Constants.JSON_CONTENT_TYPE;
|
||||
}
|
||||
}
|
||||
|
||||
RequestBody requestBody = null;
|
||||
// Handle cases where we've got a body to process.
|
||||
if (bytesToWrite != null) {
|
||||
final String mediaContentType = contenttype;
|
||||
requestBody = new RequestBody() {
|
||||
@Override
|
||||
public long contentLength() {
|
||||
return bytesToWrite.length;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void writeTo(@NotNull BufferedSink sink) throws IOException {
|
||||
OutputStream out = sink.outputStream();
|
||||
int writtenSoFar = 0;
|
||||
BufferedOutputStream bos = new BufferedOutputStream(out);
|
||||
int toWrite;
|
||||
do {
|
||||
toWrite = Math.min(defaultBufferSize, bytesToWrite.length - writtenSoFar);
|
||||
bos.write(bytesToWrite, writtenSoFar, toWrite);
|
||||
writtenSoFar = writtenSoFar + toWrite;
|
||||
if (progress != null) {
|
||||
executors.performOnForeground(writtenSoFar, bytesToWrite.length, progress);
|
||||
}
|
||||
} while (toWrite > 0);
|
||||
bos.close();
|
||||
out.close();
|
||||
}
|
||||
|
||||
@Override
|
||||
public MediaType contentType() {
|
||||
return MediaType.parse(mediaContentType);
|
||||
}
|
||||
};
|
||||
}
|
||||
|
||||
corehttpRequestBuilder.method(request.getHttpMethod().toString(), requestBody);
|
||||
return corehttpRequestBuilder.build();
|
||||
}
|
||||
|
||||
/**
|
||||
* Sends the HTTP request
|
||||
*
|
||||
* @param request the request description
|
||||
* @param resultClass the class of the response from the service
|
||||
* @param serializable the object to send to the service in the body of the request
|
||||
* @param progress the progress callback for the request
|
||||
* @param handler the handler for stateful response
|
||||
* @param <Result> the type of the response object
|
||||
* @param <Body> the type of the object to send to the service in the body of the request
|
||||
* @param <DeserializeType> the response handler for stateful response
|
||||
* @return the result from the request
|
||||
* @throws ClientException an exception occurs if the request was unable to complete for any reason
|
||||
*/
|
||||
@SuppressWarnings("unchecked")
|
||||
private <Result, Body, DeserializeType> Result sendRequestInternal(final IHttpRequest request, final Class<Result> resultClass, final Body serializable, final IProgressCallback<? super Result> progress,
|
||||
final IStatefulResponseHandler<Result, DeserializeType> handler) throws ClientException {
|
||||
|
||||
try {
|
||||
if (this.connectionConfig == null) {
|
||||
this.connectionConfig = new DefaultConnectionConfig();
|
||||
}
|
||||
if (this.corehttpClient == null) {
|
||||
final ICoreAuthenticationProvider authProvider = request1 -> request1;
|
||||
this.corehttpClient = HttpClients.createDefault(authProvider).newBuilder().connectTimeout(connectionConfig.getConnectTimeout(), TimeUnit.MILLISECONDS)
|
||||
.readTimeout(connectionConfig.getReadTimeout(), TimeUnit.MILLISECONDS).followRedirects(false) // TODO https://github.com/microsoftgraph/msgraph-sdk-java/issues/516
|
||||
.protocols(Collections.singletonList(Protocol.HTTP_1_1)) // https://stackoverflow.com/questions/62031298/sockettimeout-on-java-11-but-not-on-java-8
|
||||
.build();
|
||||
}
|
||||
if (authenticationProvider != null) { // TODO https://github.com/microsoftgraph/msgraph-sdk-java/issues/517
|
||||
authenticationProvider.authenticateRequest(request);
|
||||
}
|
||||
Request coreHttpRequest = getHttpRequest(request, resultClass, serializable, progress);
|
||||
Response response = corehttpClient.newCall(coreHttpRequest).execute();
|
||||
InputStream in = null;
|
||||
boolean isBinaryStreamInput = false;
|
||||
try {
|
||||
|
||||
// Call being executed
|
||||
|
||||
if (handler != null) {
|
||||
handler.configConnection(response);
|
||||
}
|
||||
|
||||
logger.logDebug(String.format("Response code %d, %s", response.code(), response.message()));
|
||||
|
||||
if (handler != null) {
|
||||
logger.logDebug("StatefulResponse is handling the HTTP response.");
|
||||
return handler.generateResult(request, response, this.getSerializer(), this.logger);
|
||||
}
|
||||
|
||||
if (response.code() >= HttpResponseCode.HTTP_CLIENT_ERROR) {
|
||||
logger.logDebug("Handling error response");
|
||||
in = response.body().byteStream();
|
||||
handleErrorResponse(request, serializable, response);
|
||||
}
|
||||
|
||||
if (response.code() == HttpResponseCode.HTTP_NOBODY || response.code() == HttpResponseCode.HTTP_NOT_MODIFIED) {
|
||||
logger.logDebug("Handling response with no body");
|
||||
return handleEmptyResponse(responseHeadersHelper.getResponseHeadersAsMapOfStringList(response), resultClass);
|
||||
}
|
||||
|
||||
if (response.code() == HttpResponseCode.HTTP_ACCEPTED) {
|
||||
logger.logDebug("Handling accepted response");
|
||||
return handleEmptyResponse(responseHeadersHelper.getResponseHeadersAsMapOfStringList(response), resultClass);
|
||||
}
|
||||
|
||||
in = new BufferedInputStream(response.body().byteStream());
|
||||
|
||||
final Map<String, String> headers = responseHeadersHelper.getResponseHeadersAsMapStringString(response);
|
||||
|
||||
if (response.body() == null || response.body().contentLength() == 0)
|
||||
return (Result) null;
|
||||
|
||||
final String contentType = headers.get(Constants.CONTENT_TYPE_HEADER_NAME);
|
||||
if (contentType != null && resultClass != InputStream.class && contentType.contains(Constants.JSON_CONTENT_TYPE)) {
|
||||
logger.logDebug("Response json");
|
||||
return handleJsonResponse(in, responseHeadersHelper.getResponseHeadersAsMapOfStringList(response), resultClass);
|
||||
} else if (resultClass == InputStream.class) {
|
||||
logger.logDebug("Response binary");
|
||||
isBinaryStreamInput = true;
|
||||
return (Result) handleBinaryStream(in);
|
||||
} else {
|
||||
return (Result) null;
|
||||
}
|
||||
} finally {
|
||||
if (!isBinaryStreamInput) {
|
||||
try {
|
||||
if (in != null)
|
||||
in.close();
|
||||
} catch (IOException e) {
|
||||
logger.logError(e.getMessage(), e);
|
||||
}
|
||||
if (response != null)
|
||||
response.close();
|
||||
}
|
||||
}
|
||||
} catch (final GraphServiceException ex) {
|
||||
final boolean shouldLogVerbosely = logger.getLoggingLevel() == LoggerLevel.DEBUG;
|
||||
logger.logError("Graph service exception " + ex.getMessage(shouldLogVerbosely), ex);
|
||||
throw ex;
|
||||
} catch (final Exception ex) {
|
||||
final ClientException clientException = new ClientException("Error during http request", ex);
|
||||
logger.logError("Error during http request", clientException);
|
||||
throw clientException;
|
||||
}
|
||||
}
|
||||
|
||||
private Request convertIHttpRequestToOkHttpRequest(IHttpRequest request) {
|
||||
if (request != null) {
|
||||
Request.Builder requestBuilder = new Request.Builder();
|
||||
requestBuilder.url(request.getRequestUrl());
|
||||
for (final HeaderOption header : request.getHeaders()) {
|
||||
requestBuilder.addHeader(header.getName(), header.getValue().toString());
|
||||
}
|
||||
return requestBuilder.build();
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
/**
|
||||
* Handles the event of an error response
|
||||
*
|
||||
* @param request the request that caused the failed response
|
||||
* @param serializable the body of the request
|
||||
* @param connection the URL connection
|
||||
* @param <Body> the type of the request body
|
||||
* @throws IOException an exception occurs if there were any problems interacting with the connection object
|
||||
*/
|
||||
private <Body> void handleErrorResponse(final IHttpRequest request, final Body serializable, final Response response) throws IOException {
|
||||
throw GraphServiceException.createFromConnection(request, serializable, serializer, response, logger);
|
||||
}
|
||||
|
||||
/**
|
||||
* Handles the cause where the response is a binary stream
|
||||
*
|
||||
* @param in the input stream from the response
|
||||
* @return the input stream to return to the caller
|
||||
*/
|
||||
private InputStream handleBinaryStream(final InputStream in) {
|
||||
return in;
|
||||
}
|
||||
|
||||
/**
|
||||
* Handles the cause where the response is a JSON object
|
||||
*
|
||||
* @param in the input stream from the response
|
||||
* @param responseHeaders the response header
|
||||
* @param clazz the class of the response object
|
||||
* @param <Result> the type of the response object
|
||||
* @return the JSON object
|
||||
*/
|
||||
private <Result> Result handleJsonResponse(final InputStream in, Map<String, List<String>> responseHeaders, final Class<Result> clazz) {
|
||||
if (clazz == null) {
|
||||
return null;
|
||||
}
|
||||
|
||||
final String rawJson = streamToString(in);
|
||||
return getSerializer().deserializeObject(rawJson, clazz, responseHeaders);
|
||||
}
|
||||
|
||||
/**
|
||||
* Handles the case where the response body is empty
|
||||
*
|
||||
* @param responseHeaders the response headers
|
||||
* @param clazz the type of the response object
|
||||
* @return the JSON object
|
||||
*/
|
||||
private <Result> Result handleEmptyResponse(Map<String, List<String>> responseHeaders, final Class<Result> clazz) throws UnsupportedEncodingException {
|
||||
// Create an empty object to attach the response headers to
|
||||
InputStream in = new ByteArrayInputStream("{}".getBytes(Constants.JSON_ENCODING));
|
||||
return handleJsonResponse(in, responseHeaders, clazz);
|
||||
}
|
||||
|
||||
/**
|
||||
* Reads in a stream and converts it into a string
|
||||
*
|
||||
* @param input the response body stream
|
||||
* @return the string result
|
||||
*/
|
||||
public static String streamToString(final InputStream input) {
|
||||
final String httpStreamEncoding = "UTF-8";
|
||||
final String endOfFile = "\\A";
|
||||
final Scanner scanner = new Scanner(input, httpStreamEncoding);
|
||||
String scannerString = "";
|
||||
try {
|
||||
scanner.useDelimiter(endOfFile);
|
||||
scannerString = scanner.next();
|
||||
} finally {
|
||||
scanner.close();
|
||||
}
|
||||
return scannerString;
|
||||
}
|
||||
|
||||
/**
|
||||
* Searches for the given header in a list of HeaderOptions
|
||||
*
|
||||
* @param headers the list of headers to search through
|
||||
* @param header the header name to search for (case insensitive)
|
||||
* @return true if the header has already been set
|
||||
*/
|
||||
@VisibleForTesting
|
||||
static boolean hasHeader(List<HeaderOption> headers, String header) {
|
||||
for (HeaderOption option : headers) {
|
||||
if (option.getName().equalsIgnoreCase(header)) {
|
||||
return true;
|
||||
}
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
@VisibleForTesting
|
||||
public ILogger getLogger() {
|
||||
return logger;
|
||||
}
|
||||
|
||||
@VisibleForTesting
|
||||
public IExecutors getExecutors() {
|
||||
return executors;
|
||||
}
|
||||
|
||||
@VisibleForTesting
|
||||
public IAuthenticationProvider getAuthenticationProvider() {
|
||||
return authenticationProvider;
|
||||
}
|
||||
|
||||
/**
|
||||
* Get connection config for read and connect timeout in requests
|
||||
*
|
||||
* @return Connection configuration to be used for timeout values
|
||||
*/
|
||||
public IConnectionConfig getConnectionConfig() {
|
||||
if (this.connectionConfig == null) {
|
||||
this.connectionConfig = new DefaultConnectionConfig();
|
||||
}
|
||||
return connectionConfig;
|
||||
}
|
||||
|
||||
/**
|
||||
* Set connection config for read and connect timeout in requests
|
||||
*
|
||||
* @param connectionConfig Connection configuration to be used for timeout values
|
||||
*/
|
||||
public void setConnectionConfig(IConnectionConfig connectionConfig) {
|
||||
this.connectionConfig = connectionConfig;
|
||||
}
|
||||
}
|
@ -0,0 +1,89 @@
|
||||
package org.cryptomator.data.cloud.onedrive;
|
||||
|
||||
import android.util.LruCache;
|
||||
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
|
||||
import javax.inject.Inject;
|
||||
|
||||
class OnedriveIdCache {
|
||||
|
||||
private final LruCache<String, NodeInfo> cache;
|
||||
|
||||
@Inject
|
||||
OnedriveIdCache() {
|
||||
cache = new LruCache<>(1000);
|
||||
}
|
||||
|
||||
public NodeInfo get(String path) {
|
||||
return cache.get(path);
|
||||
}
|
||||
|
||||
public <T extends OnedriveIdCloudNode> T cache(T value) {
|
||||
add(value);
|
||||
return value;
|
||||
}
|
||||
|
||||
private void add(OnedriveIdCloudNode node) {
|
||||
add(node.getPath(), new NodeInfo(node));
|
||||
}
|
||||
|
||||
public void add(String path, NodeInfo info) {
|
||||
cache.put(path, info);
|
||||
}
|
||||
|
||||
public void remove(OnedriveIdCloudNode node) {
|
||||
remove(node.getPath());
|
||||
}
|
||||
|
||||
public void remove(String path) {
|
||||
removeChildren(path);
|
||||
cache.remove(path);
|
||||
}
|
||||
|
||||
void removeChildren(String path) {
|
||||
String prefix = path + '/';
|
||||
for (String key : cache.snapshot().keySet()) {
|
||||
if (key.startsWith(prefix)) {
|
||||
cache.remove(key);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
static class NodeInfo {
|
||||
|
||||
private final String id;
|
||||
private final String driveId;
|
||||
private final boolean isFolder;
|
||||
private final String cTag;
|
||||
|
||||
private NodeInfo(OnedriveIdCloudNode node) {
|
||||
this(node.getId(), node.getDriveId(), node instanceof CloudFolder, "");
|
||||
}
|
||||
|
||||
NodeInfo(String id, String driveId, boolean isFolder, String cTag) {
|
||||
this.id = id;
|
||||
this.driveId = driveId;
|
||||
this.isFolder = isFolder;
|
||||
this.cTag = cTag;
|
||||
}
|
||||
|
||||
public String getId() {
|
||||
return id;
|
||||
}
|
||||
|
||||
public String getDriveId() {
|
||||
return driveId;
|
||||
}
|
||||
|
||||
public boolean isFolder() {
|
||||
return isFolder;
|
||||
}
|
||||
|
||||
public String getcTag() {
|
||||
return cTag;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,11 @@
|
||||
package org.cryptomator.data.cloud.onedrive;
|
||||
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
|
||||
public interface OnedriveIdCloudNode extends CloudNode {
|
||||
|
||||
String getId();
|
||||
|
||||
String getDriveId();
|
||||
|
||||
}
|
@ -0,0 +1,549 @@
|
||||
package org.cryptomator.data.cloud.onedrive;
|
||||
|
||||
import android.content.Context;
|
||||
import android.net.Uri;
|
||||
|
||||
import androidx.annotation.Nullable;
|
||||
|
||||
import com.microsoft.graph.concurrency.ChunkedUploadProvider;
|
||||
import com.microsoft.graph.http.GraphServiceException;
|
||||
import com.microsoft.graph.models.extensions.DriveItem;
|
||||
import com.microsoft.graph.models.extensions.DriveItemUploadableProperties;
|
||||
import com.microsoft.graph.models.extensions.Folder;
|
||||
import com.microsoft.graph.models.extensions.IGraphServiceClient;
|
||||
import com.microsoft.graph.models.extensions.ItemReference;
|
||||
import com.microsoft.graph.models.extensions.UploadSession;
|
||||
import com.microsoft.graph.options.Option;
|
||||
import com.microsoft.graph.options.QueryOption;
|
||||
import com.microsoft.graph.requests.extensions.IDriveItemCollectionPage;
|
||||
import com.microsoft.graph.requests.extensions.IDriveItemContentStreamRequest;
|
||||
import com.microsoft.graph.requests.extensions.IDriveRequestBuilder;
|
||||
import com.tomclaw.cache.DiskLruCache;
|
||||
|
||||
import org.cryptomator.data.cloud.onedrive.graph.ClientException;
|
||||
import org.cryptomator.data.cloud.onedrive.graph.ICallback;
|
||||
import org.cryptomator.data.cloud.onedrive.graph.IProgressCallback;
|
||||
import org.cryptomator.data.util.TransferredBytesAwareOutputStream;
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
import org.cryptomator.domain.OnedriveCloud;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
|
||||
import org.cryptomator.domain.exception.FatalBackendException;
|
||||
import org.cryptomator.domain.exception.NoSuchCloudFileException;
|
||||
import org.cryptomator.domain.exception.authentication.NoAuthenticationProvidedException;
|
||||
import org.cryptomator.domain.usecases.ProgressAware;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.DownloadState;
|
||||
import org.cryptomator.domain.usecases.cloud.Progress;
|
||||
import org.cryptomator.domain.usecases.cloud.UploadState;
|
||||
import org.cryptomator.util.ExceptionUtil;
|
||||
import org.cryptomator.util.Optional;
|
||||
import org.cryptomator.util.SharedPreferencesHandler;
|
||||
import org.cryptomator.util.concurrent.CompletableFuture;
|
||||
import org.cryptomator.util.file.LruFileCacheUtil;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.IOException;
|
||||
import java.io.InputStream;
|
||||
import java.io.OutputStream;
|
||||
import java.lang.reflect.Field;
|
||||
import java.net.SocketTimeoutException;
|
||||
import java.util.ArrayList;
|
||||
import java.util.Date;
|
||||
import java.util.List;
|
||||
import java.util.concurrent.ExecutionException;
|
||||
|
||||
import timber.log.Timber;
|
||||
|
||||
import static java.util.Collections.singletonList;
|
||||
import static org.cryptomator.data.util.CopyStream.copyStreamToStream;
|
||||
import static org.cryptomator.data.util.CopyStream.toByteArray;
|
||||
import static org.cryptomator.domain.usecases.cloud.Progress.progress;
|
||||
import static org.cryptomator.util.file.LruFileCacheUtil.Cache.ONEDRIVE;
|
||||
import static org.cryptomator.util.file.LruFileCacheUtil.retrieveFromLruCache;
|
||||
import static org.cryptomator.util.file.LruFileCacheUtil.storeToLruCache;
|
||||
|
||||
class OnedriveImpl {
|
||||
|
||||
private static final long CHUNKED_UPLOAD_MAX_SIZE = 4L << 20;
|
||||
private static final int CHUNKED_UPLOAD_CHUNK_SIZE = 327680 * 32;
|
||||
private static final int CHUNKED_UPLOAD_MAX_ATTEMPTS = 5;
|
||||
|
||||
private final OnedriveCloud cloud;
|
||||
private final Context context;
|
||||
private static final String REPLACE_MODE = "replace";
|
||||
private static final String NON_REPLACING_MODE = "rename";
|
||||
private final OnedriveIdCache nodeInfoCache;
|
||||
private final OnedriveClientFactory clientFactory;
|
||||
private final SharedPreferencesHandler sharedPreferencesHandler;
|
||||
|
||||
private DiskLruCache diskLruCache;
|
||||
|
||||
OnedriveImpl(OnedriveCloud cloud, Context context, OnedriveIdCache nodeInfoCache) {
|
||||
if (cloud.accessToken() == null) {
|
||||
throw new NoAuthenticationProvidedException(cloud);
|
||||
}
|
||||
this.cloud = cloud;
|
||||
this.context = context;
|
||||
this.nodeInfoCache = nodeInfoCache;
|
||||
this.clientFactory = OnedriveClientFactory.instance(context, cloud.accessToken());
|
||||
|
||||
sharedPreferencesHandler = new SharedPreferencesHandler(context);
|
||||
}
|
||||
|
||||
private IGraphServiceClient client() {
|
||||
return clientFactory.client();
|
||||
}
|
||||
|
||||
private IDriveRequestBuilder drive(String driveId) {
|
||||
return driveId == null ? client().me().drive() : client().drives(driveId);
|
||||
}
|
||||
|
||||
public OnedriveFolder root() {
|
||||
return new RootOnedriveFolder(cloud);
|
||||
}
|
||||
|
||||
public OnedriveFolder resolve(String path) {
|
||||
if (path.startsWith("/")) {
|
||||
path = path.substring(1);
|
||||
}
|
||||
String[] names = path.split("/");
|
||||
OnedriveFolder folder = root();
|
||||
for (String name : names) {
|
||||
folder = folder(folder, name);
|
||||
}
|
||||
return folder;
|
||||
}
|
||||
|
||||
public OnedriveFile file(OnedriveFolder parent, String name) {
|
||||
return file(parent, name, Optional.empty());
|
||||
}
|
||||
|
||||
public OnedriveFile file(OnedriveFolder parent, String name, Optional<Long> size) {
|
||||
return OnedriveCloudNodeFactory.file(parent, name, size);
|
||||
}
|
||||
|
||||
public OnedriveFolder folder(OnedriveFolder parent, String name) {
|
||||
return OnedriveCloudNodeFactory.folder(parent, name);
|
||||
}
|
||||
|
||||
private DriveItem childByName(String parentId, String parentDriveId, String name) {
|
||||
try {
|
||||
return drive(parentDriveId) //
|
||||
.items(parentId) //
|
||||
.itemWithPath(Uri.encode(name)) //
|
||||
.buildRequest() //
|
||||
.get();
|
||||
} catch (GraphServiceException e) {
|
||||
if (isNotFoundError(e)) {
|
||||
return null;
|
||||
} else {
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
private boolean isNotFoundError(GraphServiceException error) {
|
||||
try {
|
||||
Field responseCodeField = GraphServiceException.class.getDeclaredField("responseCode");
|
||||
responseCodeField.setAccessible(true);
|
||||
Integer responseCode = (Integer) responseCodeField.get(error);
|
||||
return responseCode == 404;
|
||||
} catch (NoSuchFieldException e) {
|
||||
throw new IllegalStateException(e);
|
||||
} catch (IllegalAccessException e) {
|
||||
throw new IllegalStateException(e);
|
||||
}
|
||||
}
|
||||
|
||||
public boolean exists(OnedriveNode node) {
|
||||
try {
|
||||
OnedriveIdCache.NodeInfo parentNodeInfo = nodeInfo(node.getParent());
|
||||
if (parentNodeInfo == null) {
|
||||
removeNodeInfo(node);
|
||||
return false;
|
||||
}
|
||||
DriveItem item = childByName(parentNodeInfo.getId(), parentNodeInfo.getDriveId(), node.getName());
|
||||
if (item == null) {
|
||||
removeNodeInfo(node);
|
||||
return false;
|
||||
}
|
||||
cacheNodeInfo(node, item);
|
||||
return true;
|
||||
} catch (ClientException e) {
|
||||
if (ExceptionUtil.contains(e, SocketTimeoutException.class)) {
|
||||
throw e;
|
||||
}
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
public List<CloudNode> list(OnedriveFolder folder) throws BackendException {
|
||||
List<CloudNode> result = new ArrayList<>();
|
||||
OnedriveIdCache.NodeInfo nodeInfo = requireNodeInfo(folder);
|
||||
IDriveItemCollectionPage page = drive(nodeInfo.getDriveId()) //
|
||||
.items(nodeInfo.getId()) //
|
||||
.children() //
|
||||
.buildRequest() //
|
||||
.get();
|
||||
do {
|
||||
removeChildNodeInfo(folder);
|
||||
for (DriveItem item : page.getCurrentPage()) {
|
||||
result.add(cacheNodeInfo(OnedriveCloudNodeFactory.from(folder, item), item));
|
||||
}
|
||||
if (page.getNextPage() != null) {
|
||||
page = page.getNextPage() //
|
||||
.buildRequest() //
|
||||
.get();
|
||||
} else {
|
||||
page = null;
|
||||
}
|
||||
} while (page != null);
|
||||
return result;
|
||||
}
|
||||
|
||||
public OnedriveFolder create(OnedriveFolder folder) throws NoSuchCloudFileException {
|
||||
OnedriveFolder parent = folder.getParent();
|
||||
if (nodeInfo(parent) == null) {
|
||||
parent = create(folder.getParent());
|
||||
}
|
||||
|
||||
final DriveItem folderToCreate = new DriveItem();
|
||||
folderToCreate.name = folder.getName();
|
||||
folderToCreate.folder = new Folder();
|
||||
|
||||
OnedriveIdCache.NodeInfo parentNodeInfo = requireNodeInfo(parent);
|
||||
DriveItem createdFolder = drive(parentNodeInfo.getDriveId()) //
|
||||
.items(parentNodeInfo.getId()).children() //
|
||||
.buildRequest() //
|
||||
.post(folderToCreate);
|
||||
return cacheNodeInfo(OnedriveCloudNodeFactory.folder(parent, createdFolder), createdFolder);
|
||||
}
|
||||
|
||||
public OnedriveNode move(OnedriveNode source, OnedriveNode target) throws NoSuchCloudFileException, CloudNodeAlreadyExistsException {
|
||||
if (exists(target)) {
|
||||
throw new CloudNodeAlreadyExistsException(target.getName());
|
||||
}
|
||||
|
||||
final DriveItem targetItem = new DriveItem();
|
||||
targetItem.name = target.getName();
|
||||
ItemReference targetParentReference = new ItemReference();
|
||||
OnedriveIdCache.NodeInfo targetNodeInfo = nodeInfo(target.getParent());
|
||||
targetParentReference.id = targetNodeInfo == null ? null : targetNodeInfo.getId();
|
||||
targetParentReference.driveId = targetNodeInfo == null ? null : targetNodeInfo.getDriveId();
|
||||
targetItem.parentReference = targetParentReference;
|
||||
|
||||
OnedriveIdCache.NodeInfo sourceNodeInfo = requireNodeInfo(source);
|
||||
DriveItem movedItem = drive(sourceNodeInfo.getDriveId())//
|
||||
.items(sourceNodeInfo.getId()) //
|
||||
.buildRequest() //
|
||||
.patch(targetItem);
|
||||
removeNodeInfo(source);
|
||||
return cacheNodeInfo(OnedriveCloudNodeFactory.from(target.getParent(), movedItem), movedItem);
|
||||
}
|
||||
|
||||
public OnedriveFile write(final OnedriveFile file, DataSource data, final ProgressAware<UploadState> progressAware, boolean replace, final long size) throws BackendException {
|
||||
if (exists(file) && !replace) {
|
||||
throw new CloudNodeAlreadyExistsException("CloudNode already exists and replace is false");
|
||||
}
|
||||
|
||||
progressAware.onProgress(Progress.started(UploadState.upload(file)));
|
||||
String uploadMode = NON_REPLACING_MODE;
|
||||
if (replace) {
|
||||
uploadMode = REPLACE_MODE;
|
||||
}
|
||||
final Option conflictBehaviorOption = new QueryOption("@name.conflictBehavior", uploadMode);
|
||||
final CompletableFuture<DriveItem> result = new CompletableFuture<>();
|
||||
if (size <= CHUNKED_UPLOAD_MAX_SIZE) {
|
||||
uploadFile(file, data, progressAware, result, conflictBehaviorOption);
|
||||
} else {
|
||||
try {
|
||||
chunkedUploadFile(file, data, progressAware, result, conflictBehaviorOption, size);
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
progressAware.onProgress(Progress.completed(UploadState.upload(file)));
|
||||
try {
|
||||
return OnedriveCloudNodeFactory.file(file.getParent(), result.get(), Optional.of(new Date()));
|
||||
} catch (ExecutionException | InterruptedException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
private void uploadFile( //
|
||||
final OnedriveFile file, //
|
||||
DataSource data, //
|
||||
final ProgressAware<UploadState> progressAware, //
|
||||
final CompletableFuture<DriveItem> result, //
|
||||
Option conflictBehaviorOption) throws NoSuchCloudFileException {
|
||||
OnedriveIdCache.NodeInfo parentNodeInfo = requireNodeInfo(file.getParent());
|
||||
try (InputStream in = data.open(context)) {
|
||||
drive(parentNodeInfo.getDriveId()) //
|
||||
.items(parentNodeInfo.getId())//
|
||||
.itemWithPath(file.getName()) //
|
||||
.content() //
|
||||
.buildRequest(singletonList(conflictBehaviorOption)) //
|
||||
.put(toByteArray(in), new IProgressCallback<DriveItem>() {
|
||||
@Override
|
||||
public void progress(long current, long max) {
|
||||
progressAware //
|
||||
.onProgress(Progress.progress(UploadState.upload(file)) //
|
||||
.between(0) //
|
||||
.and(max) //
|
||||
.withValue(current));
|
||||
}
|
||||
|
||||
@Override
|
||||
public void success(DriveItem item) {
|
||||
progressAware.onProgress(Progress.completed(UploadState.upload(file)));
|
||||
result.complete(item);
|
||||
cacheNodeInfo(file, item);
|
||||
}
|
||||
|
||||
@Override
|
||||
public void failure(com.microsoft.graph.core.ClientException ex) {
|
||||
result.fail(ex);
|
||||
}
|
||||
});
|
||||
} catch (IOException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
|
||||
private void chunkedUploadFile( //
|
||||
final OnedriveFile file, //
|
||||
DataSource data, //
|
||||
final ProgressAware<UploadState> progressAware, //
|
||||
final CompletableFuture<DriveItem> result, //
|
||||
Option conflictBehaviorOption, //
|
||||
long size) throws IOException, NoSuchCloudFileException {
|
||||
OnedriveIdCache.NodeInfo parentNodeInfo = requireNodeInfo(file.getParent());
|
||||
UploadSession uploadSession = drive(parentNodeInfo.getDriveId()) //
|
||||
.items(parentNodeInfo.getId()) //
|
||||
.itemWithPath(file.getName()) //
|
||||
.createUploadSession(new DriveItemUploadableProperties()) //
|
||||
.buildRequest() //
|
||||
.post();
|
||||
|
||||
try (InputStream in = data.open(context)) {
|
||||
new ChunkedUploadProvider<>(uploadSession, client(), in, size, DriveItem.class) //
|
||||
.upload(singletonList(conflictBehaviorOption), new IProgressCallback<DriveItem>() {
|
||||
@Override
|
||||
public void progress(long current, long max) {
|
||||
progressAware.onProgress(Progress //
|
||||
.progress(UploadState.upload(file)) //
|
||||
.between(0) //
|
||||
.and(max) //
|
||||
.withValue(current));
|
||||
}
|
||||
|
||||
@Override
|
||||
public void success(DriveItem item) {
|
||||
progressAware.onProgress(Progress.completed(UploadState.upload(file)));
|
||||
result.complete(item);
|
||||
cacheNodeInfo(file, item);
|
||||
}
|
||||
|
||||
@Override
|
||||
public void failure(com.microsoft.graph.core.ClientException ex) {
|
||||
result.fail(ex);
|
||||
}
|
||||
}, CHUNKED_UPLOAD_CHUNK_SIZE, CHUNKED_UPLOAD_MAX_ATTEMPTS);
|
||||
}
|
||||
}
|
||||
|
||||
public void read(final OnedriveFile file, final Optional<File> encryptedTmpFile, final OutputStream data, final ProgressAware<DownloadState> progressAware) throws BackendException, IOException {
|
||||
progressAware.onProgress(Progress.started(DownloadState.download(file)));
|
||||
|
||||
Optional<String> cacheKey = Optional.empty();
|
||||
Optional<File> cacheFile = Optional.empty();
|
||||
|
||||
OnedriveIdCache.NodeInfo nodeInfo = requireNodeInfo(file);
|
||||
|
||||
if (sharedPreferencesHandler.useLruCache() && createLruCache(sharedPreferencesHandler.lruCacheSize())) {
|
||||
cacheKey = Optional.of(nodeInfo.getId() + nodeInfo.getcTag());
|
||||
java.io.File cachedFile = diskLruCache.get(cacheKey.get());
|
||||
cacheFile = cachedFile != null ? Optional.of(cachedFile) : Optional.empty();
|
||||
}
|
||||
|
||||
if (sharedPreferencesHandler.useLruCache() && cacheFile.isPresent()) {
|
||||
try {
|
||||
retrieveFromLruCache(cacheFile.get(), data);
|
||||
} catch (IOException e) {
|
||||
Timber.tag("OnedriveImpl").w(e, "Error while retrieving content from Cache, get from web request");
|
||||
writeToData(file, nodeInfo, data, encryptedTmpFile, cacheKey, progressAware);
|
||||
}
|
||||
} else {
|
||||
writeToData(file, nodeInfo, data, encryptedTmpFile, cacheKey, progressAware);
|
||||
}
|
||||
}
|
||||
|
||||
private void writeToData(final OnedriveFile file, //
|
||||
final OnedriveIdCache.NodeInfo nodeInfo, //
|
||||
final OutputStream data, //
|
||||
final Optional<File> encryptedTmpFile, //
|
||||
final Optional<String> cacheKey, //
|
||||
final ProgressAware<DownloadState> progressAware) throws IOException {
|
||||
|
||||
final IDriveItemContentStreamRequest request = drive(nodeInfo.getDriveId()) //
|
||||
.items(nodeInfo.getId()) //
|
||||
.content() //
|
||||
.buildRequest();
|
||||
|
||||
try (InputStream in = request.get(); //
|
||||
TransferredBytesAwareOutputStream out = new TransferredBytesAwareOutputStream(data) {
|
||||
@Override
|
||||
public void bytesTransferred(long transferred) {
|
||||
progressAware.onProgress( //
|
||||
progress(DownloadState.download(file)) //
|
||||
.between(0) //
|
||||
.and(file.getSize().orElse(Long.MAX_VALUE)) //
|
||||
.withValue(transferred));
|
||||
}
|
||||
}) {
|
||||
copyStreamToStream(in, out);
|
||||
}
|
||||
|
||||
if (sharedPreferencesHandler.useLruCache() && encryptedTmpFile.isPresent() && cacheKey.isPresent()) {
|
||||
try {
|
||||
storeToLruCache(diskLruCache, cacheKey.get(), encryptedTmpFile.get());
|
||||
} catch (IOException e) {
|
||||
Timber.tag("OnedriveImpl").e(e, "Failed to write downloaded file in LRU cache");
|
||||
}
|
||||
}
|
||||
|
||||
progressAware.onProgress(Progress.completed(DownloadState.download(file)));
|
||||
}
|
||||
|
||||
private boolean createLruCache(int cacheSize) {
|
||||
if (diskLruCache == null) {
|
||||
try {
|
||||
diskLruCache = DiskLruCache.create(new LruFileCacheUtil(context).resolve(ONEDRIVE), cacheSize);
|
||||
} catch (IOException e) {
|
||||
Timber.tag("OnedriveImpl").e(e, "Failed to setup LRU cache");
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
public void delete(OnedriveNode node) throws NoSuchCloudFileException {
|
||||
OnedriveIdCache.NodeInfo nodeInfo = requireNodeInfo(node);
|
||||
drive(nodeInfo.getDriveId()) //
|
||||
.items(nodeInfo.getId()) //
|
||||
.buildRequest() //
|
||||
.delete();
|
||||
removeNodeInfo(node);
|
||||
}
|
||||
|
||||
private OnedriveIdCache.NodeInfo requireNodeInfo(OnedriveNode node) throws NoSuchCloudFileException {
|
||||
OnedriveIdCache.NodeInfo result = nodeInfo(node);
|
||||
if (result == null) {
|
||||
throw new NoSuchCloudFileException(node.getPath());
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
||||
@Nullable
|
||||
private OnedriveIdCache.NodeInfo nodeInfo(OnedriveNode node) {
|
||||
OnedriveIdCache.NodeInfo result = nodeInfoCache.get(node.getPath());
|
||||
if (result == null) {
|
||||
result = loadNodeInfo(node);
|
||||
if (result == null) {
|
||||
return null;
|
||||
} else {
|
||||
nodeInfoCache.add(node.getPath(), result);
|
||||
}
|
||||
}
|
||||
if (result.isFolder() != node.isFolder()) {
|
||||
return null;
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
||||
private <T extends OnedriveNode> T cacheNodeInfo(T node, DriveItem item) {
|
||||
nodeInfoCache.add( //
|
||||
node.getPath(), new OnedriveIdCache.NodeInfo( //
|
||||
OnedriveCloudNodeFactory.getId(item), //
|
||||
OnedriveCloudNodeFactory.getDriveId(item), //
|
||||
OnedriveCloudNodeFactory.isFolder(item), //
|
||||
item.cTag //
|
||||
) //
|
||||
);
|
||||
return node;
|
||||
}
|
||||
|
||||
private void removeNodeInfo(OnedriveNode node) {
|
||||
nodeInfoCache.remove(node.getPath());
|
||||
}
|
||||
|
||||
private void removeChildNodeInfo(OnedriveFolder folder) {
|
||||
nodeInfoCache.removeChildren(folder.getPath());
|
||||
}
|
||||
|
||||
private OnedriveIdCache.NodeInfo loadNodeInfo(OnedriveNode node) {
|
||||
if (node.getParent() == null) {
|
||||
return loadRootNodeInfo();
|
||||
} else {
|
||||
return loadNonRootNodeInfo(node);
|
||||
}
|
||||
}
|
||||
|
||||
private OnedriveIdCache.NodeInfo loadRootNodeInfo() {
|
||||
DriveItem item = drive(null).root().buildRequest().get();
|
||||
return new OnedriveIdCache.NodeInfo( //
|
||||
OnedriveCloudNodeFactory.getId(item), //
|
||||
OnedriveCloudNodeFactory.getDriveId(item), //
|
||||
true, //
|
||||
item.cTag //
|
||||
);
|
||||
}
|
||||
|
||||
private OnedriveIdCache.NodeInfo loadNonRootNodeInfo(OnedriveNode node) {
|
||||
OnedriveIdCache.NodeInfo parentNodeInfo = nodeInfo(node.getParent());
|
||||
if (parentNodeInfo == null) {
|
||||
return null;
|
||||
}
|
||||
DriveItem item = childByName(parentNodeInfo.getId(), parentNodeInfo.getDriveId(), node.getName());
|
||||
|
||||
if (item == null) {
|
||||
return null;
|
||||
} else {
|
||||
String cTag = item.cTag;
|
||||
|
||||
return new OnedriveIdCache.NodeInfo( //
|
||||
OnedriveCloudNodeFactory.getId(item), //
|
||||
OnedriveCloudNodeFactory.getDriveId(item), //
|
||||
OnedriveCloudNodeFactory.isFolder(item), //
|
||||
cTag //
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
public String currentAccount() {
|
||||
return client().me().drive().buildRequest().get().owner.user.displayName;
|
||||
}
|
||||
|
||||
public void logout() {
|
||||
final CompletableFuture<Void> result = new CompletableFuture<>();
|
||||
clientFactory.getAuthenticationAdapter().logout(new ICallback<Void>() {
|
||||
@Override
|
||||
public void success(Void aVoid) {
|
||||
result.complete(null);
|
||||
}
|
||||
|
||||
@Override
|
||||
public void failure(ClientException e) {
|
||||
result.fail(e);
|
||||
}
|
||||
});
|
||||
try {
|
||||
result.get();
|
||||
} catch (InterruptedException | ExecutionException e) {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
}
|
@ -0,0 +1,15 @@
|
||||
package org.cryptomator.data.cloud.onedrive;
|
||||
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
|
||||
public interface OnedriveNode extends CloudNode {
|
||||
|
||||
boolean isFolder();
|
||||
|
||||
String getName();
|
||||
|
||||
String getPath();
|
||||
|
||||
OnedriveFolder getParent();
|
||||
|
||||
}
|
@ -0,0 +1,24 @@
|
||||
package org.cryptomator.data.cloud.onedrive;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.OnedriveCloud;
|
||||
|
||||
class RootOnedriveFolder extends OnedriveFolder {
|
||||
|
||||
private final OnedriveCloud oneDriveCloud;
|
||||
|
||||
public RootOnedriveFolder(OnedriveCloud oneDriveCloud) {
|
||||
super(null, "", "");
|
||||
this.oneDriveCloud = oneDriveCloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
public OnedriveCloud getCloud() {
|
||||
return oneDriveCloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
public RootOnedriveFolder withCloud(Cloud cloud) {
|
||||
return new RootOnedriveFolder((OnedriveCloud) cloud);
|
||||
}
|
||||
}
|
@ -0,0 +1,29 @@
|
||||
package org.cryptomator.data.cloud.onedrive.graph;
|
||||
|
||||
import com.microsoft.graph.core.GraphErrorCodes;
|
||||
|
||||
/**
|
||||
* An exception from the client.
|
||||
*/
|
||||
public class ClientException extends com.microsoft.graph.core.ClientException {
|
||||
|
||||
private static final long serialVersionUID = -10662352567392559L;
|
||||
|
||||
private final Enum<GraphErrorCodes> errorCode;
|
||||
|
||||
/**
|
||||
* Creates the client exception
|
||||
*
|
||||
* @param message the message to display
|
||||
* @param ex the exception from
|
||||
*/
|
||||
public ClientException(final String message, final Throwable ex, Enum<GraphErrorCodes> errorCode) {
|
||||
super(message, ex);
|
||||
|
||||
this.errorCode = errorCode;
|
||||
}
|
||||
|
||||
public Enum<GraphErrorCodes> errorCode() {
|
||||
return errorCode;
|
||||
}
|
||||
}
|
@ -0,0 +1,40 @@
|
||||
package org.cryptomator.data.cloud.onedrive.graph;
|
||||
|
||||
import android.app.Activity;
|
||||
|
||||
import com.microsoft.graph.authentication.IAuthenticationProvider;
|
||||
|
||||
/**
|
||||
* An authentication adapter for signing requests, logging in, and logging out.
|
||||
*/
|
||||
public interface IAuthenticationAdapter extends IAuthenticationProvider {
|
||||
|
||||
/**
|
||||
* Logs out the user
|
||||
*
|
||||
* @param callback The callback when the logout is complete or an error occurs
|
||||
*/
|
||||
void logout(final ICallback<Void> callback);
|
||||
|
||||
/**
|
||||
* Login a user by popping UI
|
||||
*
|
||||
* @param activity The current activity
|
||||
* @param callback The callback when the login is complete or an error occurs
|
||||
*/
|
||||
void login(final Activity activity, final ICallback<String> callback);
|
||||
|
||||
/**
|
||||
* Login a user with no ui
|
||||
*
|
||||
* @param callback The callback when the login is complete or an error occurs
|
||||
*/
|
||||
void loginSilent(final ICallback<Void> callback);
|
||||
|
||||
/**
|
||||
* Gets the access token for the session of a logged in user
|
||||
*
|
||||
* @return the access token
|
||||
*/
|
||||
String getAccessToken() throws ClientException;
|
||||
}
|
@ -0,0 +1,44 @@
|
||||
package org.cryptomator.data.cloud.onedrive.graph;
|
||||
|
||||
// ------------------------------------------------------------------------------
|
||||
// Copyright (c) 2017 Microsoft Corporation
|
||||
//
|
||||
// Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||
// of this software and associated documentation files (the "Software"), to deal
|
||||
// in the Software without restriction, including without limitation the rights
|
||||
// to use, copy, modify, merge, publish, distribute, sub-license, and/or sell
|
||||
// copies of the Software, and to permit persons to whom the Software is
|
||||
// furnished to do so, subject to the following conditions:
|
||||
//
|
||||
// The above copyright notice and this permission notice shall be included in
|
||||
// all copies or substantial portions of the Software.
|
||||
//
|
||||
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||
// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||||
// THE SOFTWARE.
|
||||
// ------------------------------------------------------------------------------
|
||||
|
||||
/**
|
||||
* A callback that describes how to deal with success and failure
|
||||
*
|
||||
* @param <Result> the result type of the successful action
|
||||
*/
|
||||
public interface ICallback<Result> {
|
||||
/**
|
||||
* How successful results are handled
|
||||
*
|
||||
* @param result the result
|
||||
*/
|
||||
void success(final Result result);
|
||||
|
||||
/**
|
||||
* How failures are handled
|
||||
*
|
||||
* @param ex the exception
|
||||
*/
|
||||
void failure(final ClientException ex);
|
||||
}
|
@ -0,0 +1,39 @@
|
||||
package org.cryptomator.data.cloud.onedrive.graph;
|
||||
|
||||
// ------------------------------------------------------------------------------
|
||||
// Copyright (c) 2017 Microsoft Corporation
|
||||
//
|
||||
// Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||
// of this software and associated documentation files (the "Software"), to deal
|
||||
// in the Software without restriction, including without limitation the rights
|
||||
// to use, copy, modify, merge, publish, distribute, sub-license, and/or sell
|
||||
// copies of the Software, and to permit persons to whom the Software is
|
||||
// furnished to do so, subject to the following conditions:
|
||||
//
|
||||
// The above copyright notice and this permission notice shall be included in
|
||||
// all copies or substantial portions of the Software.
|
||||
//
|
||||
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||
// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||||
// THE SOFTWARE.
|
||||
// ------------------------------------------------------------------------------
|
||||
|
||||
/**
|
||||
* A callback that describes how to deal with success, failure, and progress
|
||||
*
|
||||
* @param <Result> the result type of the successful action
|
||||
*/
|
||||
public interface IProgressCallback<Result> extends com.microsoft.graph.concurrency.IProgressCallback<Result> {
|
||||
|
||||
/**
|
||||
* How progress updates are handled for this callback
|
||||
*
|
||||
* @param current the current amount of progress
|
||||
* @param max the max amount of progress
|
||||
*/
|
||||
void progress(final long current, final long max);
|
||||
}
|
@ -0,0 +1,275 @@
|
||||
package org.cryptomator.data.cloud.onedrive.graph;
|
||||
|
||||
import android.app.Activity;
|
||||
import android.content.Context;
|
||||
|
||||
import com.microsoft.graph.http.IHttpRequest;
|
||||
import com.microsoft.graph.options.HeaderOption;
|
||||
import com.microsoft.services.msa.LiveAuthClient;
|
||||
import com.microsoft.services.msa.LiveAuthException;
|
||||
import com.microsoft.services.msa.LiveAuthListener;
|
||||
import com.microsoft.services.msa.LiveConnectSession;
|
||||
import com.microsoft.services.msa.LiveStatus;
|
||||
|
||||
import org.cryptomator.util.crypto.CredentialCryptor;
|
||||
|
||||
import java.util.Arrays;
|
||||
import java.util.concurrent.atomic.AtomicReference;
|
||||
|
||||
import timber.log.Timber;
|
||||
|
||||
import static com.microsoft.graph.core.GraphErrorCodes.AUTHENTICATION_FAILURE;
|
||||
|
||||
/**
|
||||
* Supports login, logout, and signing requests with authorization information.
|
||||
*/
|
||||
public abstract class MSAAuthAndroidAdapter implements IAuthenticationAdapter {
|
||||
|
||||
/**
|
||||
* The authorization header name.
|
||||
*/
|
||||
private static final String AUTHORIZATION_HEADER_NAME = "Authorization";
|
||||
|
||||
/**
|
||||
* The bearer prefix.
|
||||
*/
|
||||
private static final String OAUTH_BEARER_PREFIX = "bearer ";
|
||||
|
||||
/**
|
||||
* The live auth client.
|
||||
*/
|
||||
private final LiveAuthClient mLiveAuthClient;
|
||||
|
||||
/**
|
||||
* The client id for this authenticator.
|
||||
* http://graph.microsoft.io/en-us/app-registration
|
||||
*
|
||||
* @return The client id.
|
||||
*/
|
||||
protected abstract String getClientId();
|
||||
|
||||
/**
|
||||
* The scopes for this application.
|
||||
* http://graph.microsoft.io/en-us/docs/authorization/permission_scopes
|
||||
*
|
||||
* @return The scopes for this application.
|
||||
*/
|
||||
protected abstract String[] getScopes();
|
||||
|
||||
private Context context;
|
||||
|
||||
/**
|
||||
* Create a new instance of the provider
|
||||
*
|
||||
* @param context the application context instance
|
||||
* @param refreshToken
|
||||
*/
|
||||
protected MSAAuthAndroidAdapter(final Context context, String refreshToken) {
|
||||
this.context = context;
|
||||
mLiveAuthClient = new LiveAuthClient(context, getClientId(), Arrays.asList(getScopes()), MicrosoftOAuth2Endpoint.getInstance(), refreshToken);
|
||||
}
|
||||
|
||||
@Override
|
||||
public void authenticateRequest(final IHttpRequest request) {
|
||||
Timber.tag("MSAAuthAndroidAdapter").d("Authenticating request, %s", request.getRequestUrl());
|
||||
|
||||
// If the request already has an authorization header, do not intercept it.
|
||||
for (final HeaderOption option : request.getHeaders()) {
|
||||
if (option.getName().equals(AUTHORIZATION_HEADER_NAME)) {
|
||||
Timber.tag("MSAAuthAndroidAdapter").d("Found an existing authorization header!");
|
||||
return;
|
||||
}
|
||||
}
|
||||
|
||||
try {
|
||||
final String accessToken = getAccessToken();
|
||||
request.addHeader(AUTHORIZATION_HEADER_NAME, OAUTH_BEARER_PREFIX + accessToken);
|
||||
} catch (ClientException e) {
|
||||
final String message = "Unable to authenticate request, No active account found";
|
||||
final ClientException exception = new ClientException(message, e, AUTHENTICATION_FAILURE);
|
||||
Timber.tag("MSAAuthAndroidAdapter").e(exception, message);
|
||||
throw exception;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getAccessToken() throws ClientException {
|
||||
if (hasValidSession()) {
|
||||
Timber.tag("MSAAuthAndroidAdapter").d("Found account information");
|
||||
if (mLiveAuthClient.getSession().isExpired()) {
|
||||
Timber.tag("MSAAuthAndroidAdapter").d("Account access token is expired, refreshing");
|
||||
loginSilentBlocking();
|
||||
}
|
||||
return mLiveAuthClient.getSession().getAccessToken();
|
||||
} else {
|
||||
final String message = "Unable to get access token, No active account found";
|
||||
final ClientException exception = new ClientException(message, null, AUTHENTICATION_FAILURE);
|
||||
Timber.tag("MSAAuthAndroidAdapter").e(exception, message);
|
||||
throw exception;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void logout(final ICallback<Void> callback) {
|
||||
Timber.tag("MSAAuthAndroidAdapter").d("Logout started");
|
||||
|
||||
if (callback == null) {
|
||||
throw new IllegalArgumentException("callback");
|
||||
}
|
||||
|
||||
mLiveAuthClient.logout(new LiveAuthListener() {
|
||||
@Override
|
||||
public void onAuthComplete(final LiveStatus status, final LiveConnectSession session, final Object userState) {
|
||||
Timber.tag("MSAAuthAndroidAdapter").d("Logout complete");
|
||||
callback.success(null);
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onAuthError(final LiveAuthException exception, final Object userState) {
|
||||
final ClientException clientException = new ClientException("Logout failure", exception, AUTHENTICATION_FAILURE);
|
||||
Timber.tag("MSAAuthAndroidAdapter").e(clientException);
|
||||
callback.failure(clientException);
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
@Override
|
||||
public void login(final Activity activity, final ICallback<String> callback) {
|
||||
Timber.tag("MSAAuthAndroidAdapter").d("Login started");
|
||||
|
||||
if (callback == null) {
|
||||
throw new IllegalArgumentException("callback");
|
||||
}
|
||||
|
||||
if (hasValidSession()) {
|
||||
Timber.tag("MSAAuthAndroidAdapter").d("Already logged in");
|
||||
callback.success(null);
|
||||
return;
|
||||
}
|
||||
|
||||
final LiveAuthListener listener = new LiveAuthListener() {
|
||||
@Override
|
||||
public void onAuthComplete(final LiveStatus status, final LiveConnectSession session, final Object userState) {
|
||||
Timber.tag("MSAAuthAndroidAdapter").d(String.format("LiveStatus: %s, LiveConnectSession good?: %s, UserState %s", status, session != null, userState));
|
||||
|
||||
if (status == LiveStatus.NOT_CONNECTED) {
|
||||
Timber.tag("MSAAuthAndroidAdapter").d("Received invalid login failure from silent authentication, ignoring.");
|
||||
return;
|
||||
}
|
||||
|
||||
if (status == LiveStatus.CONNECTED) {
|
||||
Timber.tag("MSAAuthAndroidAdapter").d("Login completed");
|
||||
callback.success(encrypt(session.getRefreshToken()));
|
||||
return;
|
||||
}
|
||||
|
||||
final ClientException clientException = new ClientException("Unable to login successfully", null, AUTHENTICATION_FAILURE);
|
||||
Timber.tag("MSAAuthAndroidAdapter").e(clientException);
|
||||
callback.failure(clientException);
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onAuthError(final LiveAuthException exception, final Object userState) {
|
||||
final ClientException clientException = new ClientException("Login failure", exception, AUTHENTICATION_FAILURE);
|
||||
Timber.tag("MSAAuthAndroidAdapter").e(clientException);
|
||||
callback.failure(clientException);
|
||||
}
|
||||
};
|
||||
|
||||
// Make sure the login process is started with the current activity information
|
||||
activity.runOnUiThread(() -> mLiveAuthClient.login(activity, listener));
|
||||
}
|
||||
|
||||
private String encrypt(String refreshToken) {
|
||||
if (refreshToken == null)
|
||||
return null;
|
||||
return CredentialCryptor //
|
||||
.getInstance(context) //
|
||||
.encrypt(refreshToken);
|
||||
}
|
||||
|
||||
/**
|
||||
* Login a user with no ui
|
||||
*
|
||||
* @param callback The callback when the login is complete or an error occurs
|
||||
*/
|
||||
@Override
|
||||
public void loginSilent(final ICallback<Void> callback) {
|
||||
Timber.tag("MSAAuthAndroidAdapter").d("Login silent started");
|
||||
|
||||
if (callback == null) {
|
||||
throw new IllegalArgumentException("callback");
|
||||
}
|
||||
|
||||
final LiveAuthListener listener = new LiveAuthListener() {
|
||||
@Override
|
||||
public void onAuthComplete(final LiveStatus status, final LiveConnectSession session, final Object userState) {
|
||||
Timber.tag("MSAAuthAndroidAdapter").d(String.format("LiveStatus: %s, LiveConnectSession good?: %s, UserState %s", status, session != null, userState));
|
||||
|
||||
if (status == LiveStatus.CONNECTED) {
|
||||
Timber.tag("MSAAuthAndroidAdapter").d("Login completed");
|
||||
callback.success(null);
|
||||
return;
|
||||
}
|
||||
|
||||
final ClientException clientException = new ClientException("Unable to login silently", null, AUTHENTICATION_FAILURE);
|
||||
Timber.tag("MSAAuthAndroidAdapter").e(clientException);
|
||||
callback.failure(clientException);
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onAuthError(final LiveAuthException exception, final Object userState) {
|
||||
final ClientException clientException = new ClientException("Unable to login silently", null, AUTHENTICATION_FAILURE);
|
||||
Timber.tag("MSAAuthAndroidAdapter").e(clientException);
|
||||
callback.failure(clientException);
|
||||
}
|
||||
};
|
||||
|
||||
mLiveAuthClient.loginSilent(listener);
|
||||
}
|
||||
|
||||
/**
|
||||
* Login silently while blocking for the call to return
|
||||
*
|
||||
* @return the result of the login attempt
|
||||
* @throws ClientException The exception if there was an issue during the login attempt
|
||||
*/
|
||||
private Void loginSilentBlocking() throws ClientException {
|
||||
Timber.tag("MSAAuthAndroidAdapter").d("Login silent blocking started");
|
||||
final SimpleWaiter waiter = new SimpleWaiter();
|
||||
final AtomicReference<Void> returnValue = new AtomicReference<>();
|
||||
final AtomicReference<ClientException> exceptionValue = new AtomicReference<>();
|
||||
|
||||
loginSilent(new ICallback<Void>() {
|
||||
@Override
|
||||
public void success(final Void aVoid) {
|
||||
returnValue.set(aVoid);
|
||||
waiter.signal();
|
||||
}
|
||||
|
||||
@Override
|
||||
public void failure(ClientException ex) {
|
||||
exceptionValue.set(ex);
|
||||
waiter.signal();
|
||||
}
|
||||
});
|
||||
|
||||
waiter.waitForSignal();
|
||||
|
||||
// noinspection ThrowableResultOfMethodCallIgnored
|
||||
if (exceptionValue.get() != null) {
|
||||
throw exceptionValue.get();
|
||||
}
|
||||
|
||||
return returnValue.get();
|
||||
}
|
||||
|
||||
/**
|
||||
* Is the session object valid
|
||||
*
|
||||
* @return true, if the session is valid (but not necessary unexpired)
|
||||
*/
|
||||
private boolean hasValidSession() {
|
||||
return mLiveAuthClient.getSession() != null && mLiveAuthClient.getSession().getAccessToken() != null;
|
||||
}
|
||||
}
|
@ -0,0 +1,41 @@
|
||||
package org.cryptomator.data.cloud.onedrive.graph;
|
||||
|
||||
import android.net.Uri;
|
||||
|
||||
import com.microsoft.services.msa.OAuthConfig;
|
||||
|
||||
class MicrosoftOAuth2Endpoint implements OAuthConfig {
|
||||
/**
|
||||
* The current instance of this class
|
||||
*/
|
||||
private static final MicrosoftOAuth2Endpoint sInstance = new MicrosoftOAuth2Endpoint();
|
||||
|
||||
/**
|
||||
* The current instance of this class
|
||||
*
|
||||
* @return The instance
|
||||
*/
|
||||
static MicrosoftOAuth2Endpoint getInstance() {
|
||||
return sInstance;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Uri getAuthorizeUri() {
|
||||
return Uri.parse("https://login.microsoftonline.com/common/oauth2/v2.0/authorize");
|
||||
}
|
||||
|
||||
@Override
|
||||
public Uri getDesktopUri() {
|
||||
return Uri.parse("urn:ietf:wg:oauth:2.0:oob");
|
||||
}
|
||||
|
||||
@Override
|
||||
public Uri getLogoutUri() {
|
||||
return Uri.parse("https://login.microsoftonline.com/common/oauth2/v2.0/logout");
|
||||
}
|
||||
|
||||
@Override
|
||||
public Uri getTokenUri() {
|
||||
return Uri.parse("https://login.microsoftonline.com/common/oauth2/v2.0/token");
|
||||
}
|
||||
}
|
@ -0,0 +1,65 @@
|
||||
package org.cryptomator.data.cloud.onedrive.graph;
|
||||
|
||||
// ------------------------------------------------------------------------------
|
||||
// Copyright (c) 2015 Microsoft Corporation
|
||||
//
|
||||
// Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||
// of this software and associated documentation files (the "Software"), to deal
|
||||
// in the Software without restriction, including without limitation the rights
|
||||
// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||
// copies of the Software, and to permit persons to whom the Software is
|
||||
// furnished to do so, subject to the following conditions:
|
||||
//
|
||||
// The above copyright notice and this permission notice shall be included in
|
||||
// all copies or substantial portions of the Software.
|
||||
//
|
||||
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||
// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||||
// THE SOFTWARE.
|
||||
// ------------------------------------------------------------------------------
|
||||
|
||||
/**
|
||||
* A simple signal/waiter interface for synchronizing multi-threaded actions.
|
||||
*/
|
||||
public class SimpleWaiter {
|
||||
|
||||
/**
|
||||
* The internal lock object for this waiter.
|
||||
*/
|
||||
private final Object mInternalLock = new Object();
|
||||
|
||||
/**
|
||||
* Indicates if this waiter has been triggered.
|
||||
*/
|
||||
private boolean mTriggerState;
|
||||
|
||||
/**
|
||||
* BLOCKING: Waits for the signal to be triggered, or returns immediately if it has already been triggered.
|
||||
*/
|
||||
public void waitForSignal() {
|
||||
synchronized (mInternalLock) {
|
||||
if (this.mTriggerState) {
|
||||
return;
|
||||
}
|
||||
try {
|
||||
mInternalLock.wait();
|
||||
} catch (final InterruptedException e) {
|
||||
throw new RuntimeException(e);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Triggers the signal for this waiter.
|
||||
*/
|
||||
public void signal() {
|
||||
synchronized (mInternalLock) {
|
||||
mTriggerState = true;
|
||||
mInternalLock.notifyAll();
|
||||
}
|
||||
}
|
||||
}
|
@ -0,0 +1,24 @@
|
||||
package org.cryptomator.data.cloud.webdav;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.WebDavCloud;
|
||||
|
||||
public class RootWebDavFolder extends WebDavFolder {
|
||||
|
||||
private final WebDavCloud cloud;
|
||||
|
||||
public RootWebDavFolder(WebDavCloud cloud) {
|
||||
super(null, "", "");
|
||||
this.cloud = cloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return cloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
public WebDavFolder withCloud(Cloud cloud) {
|
||||
return new RootWebDavFolder((WebDavCloud) cloud);
|
||||
}
|
||||
}
|
@ -0,0 +1,236 @@
|
||||
package org.cryptomator.data.cloud.webdav;
|
||||
|
||||
import org.cryptomator.data.cloud.InterceptingCloudContentRepository;
|
||||
import org.cryptomator.data.cloud.webdav.network.ConnectionHandlerHandlerImpl;
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
import org.cryptomator.domain.WebDavCloud;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
|
||||
import org.cryptomator.domain.exception.FatalBackendException;
|
||||
import org.cryptomator.domain.exception.ForbiddenException;
|
||||
import org.cryptomator.domain.exception.NetworkConnectionException;
|
||||
import org.cryptomator.domain.exception.NoSuchCloudFileException;
|
||||
import org.cryptomator.domain.exception.NotFoundException;
|
||||
import org.cryptomator.domain.exception.NotImplementedException;
|
||||
import org.cryptomator.domain.exception.NotTrustableCertificateException;
|
||||
import org.cryptomator.domain.exception.UnauthorizedException;
|
||||
import org.cryptomator.domain.exception.authentication.WebDavCertificateUntrustedAuthenticationException;
|
||||
import org.cryptomator.domain.exception.authentication.WebDavNotSupportedException;
|
||||
import org.cryptomator.domain.exception.authentication.WebDavServerNotFoundException;
|
||||
import org.cryptomator.domain.exception.authentication.WrongCredentialsException;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
import org.cryptomator.domain.usecases.ProgressAware;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.DownloadState;
|
||||
import org.cryptomator.domain.usecases.cloud.UploadState;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.IOException;
|
||||
import java.io.OutputStream;
|
||||
import java.net.SocketTimeoutException;
|
||||
import java.net.UnknownHostException;
|
||||
import java.util.List;
|
||||
|
||||
import javax.inject.Singleton;
|
||||
import javax.net.ssl.SSLHandshakeException;
|
||||
|
||||
import static org.cryptomator.util.ExceptionUtil.contains;
|
||||
import static org.cryptomator.util.ExceptionUtil.extract;
|
||||
|
||||
@Singleton
|
||||
class WebDavCloudContentRepository extends InterceptingCloudContentRepository<WebDavCloud, WebDavNode, WebDavFolder, WebDavFile> {
|
||||
|
||||
private final WebDavCloud cloud;
|
||||
|
||||
private static final CharSequence START_OF_CERTIFICATE = "-----BEGIN CERTIFICATE-----";
|
||||
|
||||
WebDavCloudContentRepository(WebDavCloud cloud, ConnectionHandlerHandlerImpl connectionHandlerHandler) {
|
||||
super(new Intercepted(cloud, connectionHandlerHandler));
|
||||
this.cloud = cloud;
|
||||
}
|
||||
|
||||
@Override
|
||||
protected void throwWrappedIfRequired(Exception e) throws BackendException {
|
||||
throwNetworkConnectionExceptionIfRequired(e);
|
||||
throwCertificateUntrustedExceptionIfRequired(e);
|
||||
throwForbiddenExceptionIfRequired(e);
|
||||
throwUnauthorizedExceptionIfRequired(e);
|
||||
throwNotImplementedExceptionIfRequired(e);
|
||||
throwServerNotFoundExceptionIfRequired(e);
|
||||
}
|
||||
|
||||
private void throwServerNotFoundExceptionIfRequired(Exception e) {
|
||||
if (contains(e, UnknownHostException.class)) {
|
||||
throw new WebDavServerNotFoundException(cloud);
|
||||
}
|
||||
}
|
||||
|
||||
private void throwNotImplementedExceptionIfRequired(Exception e) {
|
||||
if (contains(e, NotImplementedException.class)) {
|
||||
throw new WebDavNotSupportedException(cloud);
|
||||
}
|
||||
}
|
||||
|
||||
private void throwUnauthorizedExceptionIfRequired(Exception e) {
|
||||
if (contains(e, UnauthorizedException.class)) {
|
||||
throw new WrongCredentialsException(cloud);
|
||||
}
|
||||
}
|
||||
|
||||
private void throwForbiddenExceptionIfRequired(Exception e) {
|
||||
if (contains(e, ForbiddenException.class)) {
|
||||
throw new WrongCredentialsException(cloud);
|
||||
}
|
||||
}
|
||||
|
||||
private void throwCertificateUntrustedExceptionIfRequired(Exception e) {
|
||||
Optional<NotTrustableCertificateException> notTrustableCertificateException = extract(e, NotTrustableCertificateException.class);
|
||||
if (notTrustableCertificateException.isPresent()) {
|
||||
throw new WebDavCertificateUntrustedAuthenticationException(cloud, notTrustableCertificateException.get().getMessage());
|
||||
}
|
||||
Optional<SSLHandshakeException> sslHandshakeException = extract(e, SSLHandshakeException.class);
|
||||
if (sslHandshakeException.isPresent() && containsCertificate(e.getMessage())) {
|
||||
throw new WebDavCertificateUntrustedAuthenticationException(cloud, sslHandshakeException.get().getMessage());
|
||||
}
|
||||
}
|
||||
|
||||
private boolean containsCertificate(String message) {
|
||||
return message != null && message.contains(START_OF_CERTIFICATE);
|
||||
}
|
||||
|
||||
private void throwNetworkConnectionExceptionIfRequired(Exception e) throws NetworkConnectionException {
|
||||
if (contains(e, SocketTimeoutException.class)) {
|
||||
throw new NetworkConnectionException(e);
|
||||
}
|
||||
}
|
||||
|
||||
private static class Intercepted implements CloudContentRepository<WebDavCloud, WebDavNode, WebDavFolder, WebDavFile> {
|
||||
|
||||
private final WebDavImpl webDavImpl;
|
||||
|
||||
Intercepted(WebDavCloud cloud, ConnectionHandlerHandlerImpl connectionHandler) {
|
||||
this.webDavImpl = new WebDavImpl(cloud, connectionHandler);
|
||||
}
|
||||
|
||||
public WebDavFolder root(WebDavCloud cloud) {
|
||||
return webDavImpl.root();
|
||||
}
|
||||
|
||||
@Override
|
||||
public WebDavFolder resolve(WebDavCloud cloud, String path) throws BackendException {
|
||||
return webDavImpl.resolve(path);
|
||||
}
|
||||
|
||||
@Override
|
||||
public WebDavFile file(WebDavFolder parent, String name) throws BackendException {
|
||||
return webDavImpl.file(parent, name);
|
||||
}
|
||||
|
||||
@Override
|
||||
public WebDavFile file(WebDavFolder parent, String name, Optional<Long> size) throws BackendException {
|
||||
return webDavImpl.file(parent, name, size);
|
||||
}
|
||||
|
||||
@Override
|
||||
public WebDavFolder folder(WebDavFolder parent, String name) {
|
||||
return webDavImpl.folder(parent, name);
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean exists(WebDavNode node) throws BackendException {
|
||||
return webDavImpl.exists(node);
|
||||
}
|
||||
|
||||
@Override
|
||||
public List<CloudNode> list(WebDavFolder folder) throws BackendException {
|
||||
try {
|
||||
return webDavImpl.list(folder);
|
||||
} catch (BackendException e) {
|
||||
if (contains(e, NotFoundException.class)) {
|
||||
throw new NoSuchCloudFileException();
|
||||
}
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public WebDavFolder create(WebDavFolder folder) throws BackendException {
|
||||
return webDavImpl.create(folder);
|
||||
}
|
||||
|
||||
@Override
|
||||
public WebDavFolder move(WebDavFolder source, WebDavFolder target) throws BackendException {
|
||||
try {
|
||||
return webDavImpl.move(source, target);
|
||||
} catch (BackendException e) {
|
||||
if (contains(e, NotFoundException.class)) {
|
||||
throw new NoSuchCloudFileException(source.getName());
|
||||
} else if (contains(e, CloudNodeAlreadyExistsException.class)) {
|
||||
throw new CloudNodeAlreadyExistsException(target.getName());
|
||||
}
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public WebDavFile move(WebDavFile source, WebDavFile target) throws BackendException {
|
||||
return webDavImpl.move(source, target);
|
||||
}
|
||||
|
||||
@Override
|
||||
public WebDavFile write(WebDavFile uploadFile, DataSource data, ProgressAware<UploadState> progressAware, boolean replace, long size) throws BackendException {
|
||||
try {
|
||||
return webDavImpl.write(uploadFile, data, progressAware, replace, size);
|
||||
} catch (BackendException | IOException e) {
|
||||
if (contains(e, NotFoundException.class)) {
|
||||
throw new NoSuchCloudFileException(uploadFile.getName());
|
||||
} else if (e instanceof IOException) {
|
||||
throw new FatalBackendException(e);
|
||||
} else if (e instanceof FatalBackendException) {
|
||||
throw (FatalBackendException) e;
|
||||
} else {
|
||||
throw new FatalBackendException(e);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void read(WebDavFile file, Optional<File> tmpEncryptedFile, OutputStream data, ProgressAware<DownloadState> progressAware) throws BackendException {
|
||||
try {
|
||||
webDavImpl.read(file, data, progressAware);
|
||||
} catch (BackendException | IOException e) {
|
||||
if (contains(e, NotFoundException.class)) {
|
||||
throw new NoSuchCloudFileException(file.getName());
|
||||
} else if (e instanceof IOException) {
|
||||
throw new FatalBackendException(e);
|
||||
} else if (e instanceof FatalBackendException) {
|
||||
throw (FatalBackendException) e;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public void delete(WebDavNode node) throws BackendException {
|
||||
try {
|
||||
webDavImpl.delete(node);
|
||||
} catch (BackendException e) {
|
||||
if (contains(e, NotFoundException.class)) {
|
||||
throw new NoSuchCloudFileException(node.getName());
|
||||
}
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public String checkAuthenticationAndRetrieveCurrentAccount(WebDavCloud cloud) throws BackendException {
|
||||
return webDavImpl.currentAccount();
|
||||
}
|
||||
|
||||
@Override
|
||||
public void logout(WebDavCloud cloud) {
|
||||
// empty
|
||||
}
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,36 @@
|
||||
package org.cryptomator.data.cloud.webdav;
|
||||
|
||||
import org.cryptomator.data.cloud.webdav.network.ConnectionHandlerFactory;
|
||||
import org.cryptomator.data.repository.CloudContentRepositoryFactory;
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.WebDavCloud;
|
||||
import org.cryptomator.domain.exception.authentication.NoAuthenticationProvidedException;
|
||||
import org.cryptomator.domain.repository.CloudContentRepository;
|
||||
|
||||
import javax.inject.Inject;
|
||||
|
||||
import static org.cryptomator.domain.CloudType.WEBDAV;
|
||||
|
||||
public class WebDavCloudContentRepositoryFactory implements CloudContentRepositoryFactory {
|
||||
|
||||
private final ConnectionHandlerFactory connectionHandlerFactory;
|
||||
|
||||
@Inject
|
||||
WebDavCloudContentRepositoryFactory(ConnectionHandlerFactory connectionHandlerFactory) {
|
||||
this.connectionHandlerFactory = connectionHandlerFactory;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean supports(Cloud cloud) {
|
||||
return cloud.type() == WEBDAV;
|
||||
}
|
||||
|
||||
@Override
|
||||
public CloudContentRepository cloudContentRepositoryFor(Cloud cloud) {
|
||||
WebDavCloud webDavCloud = (WebDavCloud) cloud;
|
||||
if (webDavCloud.username() == null || webDavCloud.password() == null) {
|
||||
throw new NoAuthenticationProvidedException(webDavCloud);
|
||||
}
|
||||
return new WebDavCloudContentRepository(webDavCloud, connectionHandlerFactory.createConnectionHandler(webDavCloud));
|
||||
}
|
||||
}
|
@ -0,0 +1,58 @@
|
||||
package org.cryptomator.data.cloud.webdav;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.util.Date;
|
||||
|
||||
public class WebDavFile implements CloudFile, WebDavNode {
|
||||
|
||||
private final WebDavFolder parent;
|
||||
private final String name;
|
||||
private final String path;
|
||||
private final Optional<Long> size;
|
||||
private final Optional<Date> modified;
|
||||
|
||||
public WebDavFile(WebDavFolder parent, String name, Optional<Long> size, Optional<Date> modified) {
|
||||
this(parent, name, parent.getPath() + "/" + name, size, modified);
|
||||
}
|
||||
|
||||
public WebDavFile(WebDavFolder parent, String name, String path, Optional<Long> size, Optional<Date> modified) {
|
||||
this.parent = parent;
|
||||
this.name = name;
|
||||
this.path = path;
|
||||
this.size = size;
|
||||
this.modified = modified;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return parent.getCloud();
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getName() {
|
||||
return name;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getPath() {
|
||||
return path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public WebDavFolder getParent() {
|
||||
return parent;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Long> getSize() {
|
||||
return size;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Date> getModified() {
|
||||
return modified;
|
||||
}
|
||||
}
|
@ -0,0 +1,55 @@
|
||||
package org.cryptomator.data.cloud.webdav;
|
||||
|
||||
import org.cryptomator.domain.Cloud;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
import org.jetbrains.annotations.NotNull;
|
||||
|
||||
import static java.lang.String.format;
|
||||
|
||||
public class WebDavFolder implements CloudFolder, WebDavNode {
|
||||
|
||||
private final WebDavFolder parent;
|
||||
private final String name;
|
||||
private final String path;
|
||||
|
||||
public WebDavFolder(WebDavFolder parent, String name) {
|
||||
this(parent, name, parent.getPath() + "/" + name);
|
||||
}
|
||||
|
||||
public WebDavFolder(WebDavFolder parent, String name, String path) {
|
||||
this.parent = parent;
|
||||
this.name = name;
|
||||
this.path = path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Cloud getCloud() {
|
||||
return parent.getCloud();
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getName() {
|
||||
return name;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getPath() {
|
||||
return path;
|
||||
}
|
||||
|
||||
@Override
|
||||
public WebDavFolder getParent() {
|
||||
return parent;
|
||||
}
|
||||
|
||||
@Override
|
||||
public WebDavFolder withCloud(Cloud cloud) {
|
||||
return new WebDavFolder(parent.withCloud(cloud), name, path);
|
||||
}
|
||||
|
||||
@NotNull
|
||||
@Override
|
||||
public String toString() {
|
||||
return format("WebDavFolder(%s)", path);
|
||||
}
|
||||
}
|
@ -0,0 +1,254 @@
|
||||
package org.cryptomator.data.cloud.webdav;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import org.cryptomator.data.cloud.webdav.network.ConnectionHandlerHandlerImpl;
|
||||
import org.cryptomator.data.util.CopyStream;
|
||||
import org.cryptomator.data.util.TransferredBytesAwareInputStream;
|
||||
import org.cryptomator.data.util.TransferredBytesAwareOutputStream;
|
||||
import org.cryptomator.domain.CloudFile;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
import org.cryptomator.domain.WebDavCloud;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
|
||||
import org.cryptomator.domain.exception.FatalBackendException;
|
||||
import org.cryptomator.domain.exception.NotFoundException;
|
||||
import org.cryptomator.domain.exception.ParentFolderDoesNotExistException;
|
||||
import org.cryptomator.domain.usecases.ProgressAware;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
import org.cryptomator.domain.usecases.cloud.DownloadState;
|
||||
import org.cryptomator.domain.usecases.cloud.Progress;
|
||||
import org.cryptomator.domain.usecases.cloud.UploadState;
|
||||
import org.cryptomator.util.Optional;
|
||||
|
||||
import java.io.IOException;
|
||||
import java.io.InputStream;
|
||||
import java.io.OutputStream;
|
||||
import java.util.List;
|
||||
|
||||
import okhttp3.HttpUrl;
|
||||
|
||||
import static org.cryptomator.domain.usecases.cloud.Progress.progress;
|
||||
|
||||
class WebDavImpl {
|
||||
|
||||
private final WebDavCloud cloud;
|
||||
private final HttpUrl baseUrl;
|
||||
private final RootWebDavFolder root;
|
||||
private final ConnectionHandlerHandlerImpl connectionHandler;
|
||||
|
||||
WebDavImpl(WebDavCloud cloud, ConnectionHandlerHandlerImpl connectionHandler) {
|
||||
this.cloud = cloud;
|
||||
this.baseUrl = HttpUrl.parse(cloud.url());
|
||||
this.root = new RootWebDavFolder(cloud);
|
||||
this.connectionHandler = connectionHandler;
|
||||
}
|
||||
|
||||
public WebDavFolder root() {
|
||||
return root;
|
||||
}
|
||||
|
||||
public WebDavFolder resolve(String path) {
|
||||
if (path.startsWith("/")) {
|
||||
path = path.substring(1);
|
||||
}
|
||||
String[] names = path.split("/");
|
||||
WebDavFolder folder = root;
|
||||
for (String name : names) {
|
||||
folder = folder(folder, name);
|
||||
}
|
||||
return folder;
|
||||
}
|
||||
|
||||
public WebDavFile file(CloudFolder parent, String name) {
|
||||
return file(parent, name, Optional.empty());
|
||||
}
|
||||
|
||||
public WebDavFile file(CloudFolder parent, String name, Optional<Long> size) {
|
||||
return new WebDavFile((WebDavFolder) parent, name, parent.getPath() + '/' + name, size, Optional.empty());
|
||||
}
|
||||
|
||||
public WebDavFolder folder(CloudFolder parent, String name) {
|
||||
return new WebDavFolder((WebDavFolder) parent, name, parent.getPath() + '/' + name);
|
||||
}
|
||||
|
||||
public boolean exists(CloudNode node) throws BackendException {
|
||||
try {
|
||||
return connectionHandler //
|
||||
.get(absoluteUriFrom(node.getPath()), //
|
||||
node.getParent()) != null;
|
||||
} catch (NotFoundException e) {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
public List<CloudNode> list(WebDavFolder folder) throws BackendException {
|
||||
return connectionHandler //
|
||||
.dirList(absoluteUriFrom(folder.getPath()), //
|
||||
folder);
|
||||
}
|
||||
|
||||
public WebDavFolder create(WebDavFolder folder) throws BackendException {
|
||||
try {
|
||||
return createExcludingParents(folder);
|
||||
} catch (NotFoundException | ParentFolderDoesNotExistException e) {
|
||||
create(folder.getParent());
|
||||
return createExcludingParents(folder);
|
||||
}
|
||||
}
|
||||
|
||||
private WebDavFolder createExcludingParents(WebDavFolder folder) throws BackendException {
|
||||
if (folder.getParent() == null) {
|
||||
return folder;
|
||||
} else {
|
||||
return connectionHandler.createFolder( //
|
||||
absoluteUriFrom(folder.getPath()), //
|
||||
folder);
|
||||
}
|
||||
}
|
||||
|
||||
public WebDavFolder move(CloudFolder source, CloudFolder target) throws BackendException {
|
||||
moveFileOrFolder(source, target);
|
||||
return new WebDavFolder( //
|
||||
(WebDavFolder) target.getParent() //
|
||||
, target.getName() //
|
||||
, target.getPath());
|
||||
}
|
||||
|
||||
public WebDavFile move(CloudFile source, CloudFile target) throws BackendException {
|
||||
moveFileOrFolder(source, target);
|
||||
return new WebDavFile( //
|
||||
(WebDavFolder) target.getParent() //
|
||||
, target.getName() //
|
||||
, target.getPath() //
|
||||
, source.getSize() //
|
||||
, source.getModified());
|
||||
}
|
||||
|
||||
private void moveFileOrFolder(CloudNode source, CloudNode target) throws BackendException {
|
||||
if (exists(target)) {
|
||||
throw new CloudNodeAlreadyExistsException(target.getName());
|
||||
}
|
||||
|
||||
connectionHandler //
|
||||
.move(absoluteUriFrom(source.getPath()), //
|
||||
absoluteUriFrom(target.getPath()));
|
||||
}
|
||||
|
||||
public WebDavFile write(final WebDavFile uploadFile, DataSource data, final ProgressAware<UploadState> progressAware, boolean replace, final long size) //
|
||||
throws BackendException, IOException {
|
||||
if (exists(uploadFile) && !replace) {
|
||||
throw new CloudNodeAlreadyExistsException("CloudNode already exists and replace is false");
|
||||
}
|
||||
|
||||
progressAware.onProgress(Progress.started(UploadState.upload(uploadFile)));
|
||||
|
||||
try (TransferredBytesAwareDataSource out = new TransferredBytesAwareDataSource(data) {
|
||||
@Override
|
||||
public void bytesTrasferred(long transferred) {
|
||||
progressAware.onProgress( //
|
||||
progress(UploadState.upload(uploadFile)) //
|
||||
.between(0) //
|
||||
.and(size) //
|
||||
.withValue(transferred));
|
||||
}
|
||||
}) {
|
||||
connectionHandler //
|
||||
.writeFile( //
|
||||
absoluteUriFrom(uploadFile.getPath()), out);
|
||||
}
|
||||
|
||||
WebDavFile cloudFile = (WebDavFile) connectionHandler //
|
||||
.get(absoluteUriFrom(uploadFile.getPath()), //
|
||||
uploadFile.getParent());
|
||||
|
||||
if (cloudFile == null) {
|
||||
throw new FatalBackendException("Unable to get CloudFile after upload.");
|
||||
}
|
||||
|
||||
return cloudFile;
|
||||
}
|
||||
|
||||
public void checkAuthenticationAndServerCompatibility(String url) throws BackendException {
|
||||
connectionHandler.checkAuthenticationAndServerCompatibility(url);
|
||||
}
|
||||
|
||||
private static abstract class TransferredBytesAwareDataSource implements DataSource {
|
||||
|
||||
private final DataSource data;
|
||||
|
||||
TransferredBytesAwareDataSource(DataSource data) {
|
||||
this.data = data;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Optional<Long> size(Context context) {
|
||||
return data.size(context);
|
||||
}
|
||||
|
||||
@Override
|
||||
public InputStream open(Context context) throws IOException {
|
||||
return new TransferredBytesAwareInputStream(data.open(context)) {
|
||||
@Override
|
||||
public void bytesTransferred(long transferred) {
|
||||
TransferredBytesAwareDataSource.this.bytesTrasferred(transferred);
|
||||
}
|
||||
};
|
||||
}
|
||||
|
||||
@Override
|
||||
public void close() throws IOException {
|
||||
data.close();
|
||||
}
|
||||
|
||||
public abstract void bytesTrasferred(long transferred);
|
||||
|
||||
@Override
|
||||
public DataSource decorate(DataSource delegate) {
|
||||
return delegate;
|
||||
}
|
||||
}
|
||||
|
||||
public void read(final CloudFile file, OutputStream data, final ProgressAware<DownloadState> progressAware) throws BackendException, IOException {
|
||||
progressAware.onProgress(Progress.started(DownloadState.download(file)));
|
||||
|
||||
try (InputStream in = connectionHandler.readFile(absoluteUriFrom(file.getPath())); //
|
||||
TransferredBytesAwareOutputStream out = new TransferredBytesAwareOutputStream(data) {
|
||||
@Override
|
||||
public void bytesTransferred(long transferred) {
|
||||
progressAware.onProgress( //
|
||||
progress(DownloadState.download(file)) //
|
||||
.between(0) //
|
||||
.and(file.getSize().orElse(Long.MAX_VALUE)) //
|
||||
.withValue(transferred));
|
||||
}
|
||||
}) {
|
||||
CopyStream.copyStreamToStream(in, out);
|
||||
}
|
||||
|
||||
progressAware.onProgress(Progress.completed(DownloadState.download(file)));
|
||||
}
|
||||
|
||||
public void delete(CloudNode node) throws BackendException {
|
||||
connectionHandler.delete(absoluteUriFrom(node.getPath()));
|
||||
}
|
||||
|
||||
private String absoluteUriFrom(String path) {
|
||||
path = removeLeadingSlash(path);
|
||||
|
||||
return baseUrl.newBuilder() //
|
||||
.addPathSegments(path) //
|
||||
.build() //
|
||||
.toString();
|
||||
}
|
||||
|
||||
private String removeLeadingSlash(String path) {
|
||||
return path.length() > 0 && path.charAt(0) == '/' ? path.substring(1) : path;
|
||||
}
|
||||
|
||||
public String currentAccount() throws BackendException {
|
||||
checkAuthenticationAndServerCompatibility(cloud.url());
|
||||
return cloud.url();
|
||||
}
|
||||
}
|
@ -0,0 +1,9 @@
|
||||
package org.cryptomator.data.cloud.webdav;
|
||||
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
|
||||
public interface WebDavNode extends CloudNode {
|
||||
|
||||
@Override
|
||||
WebDavFolder getParent();
|
||||
}
|
@ -0,0 +1,22 @@
|
||||
package org.cryptomator.data.cloud.webdav.network;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import org.cryptomator.domain.WebDavCloud;
|
||||
|
||||
import javax.inject.Inject;
|
||||
import javax.inject.Singleton;
|
||||
|
||||
@Singleton
|
||||
public class ConnectionHandlerFactory {
|
||||
private final Context context;
|
||||
|
||||
@Inject
|
||||
public ConnectionHandlerFactory(Context context) {
|
||||
this.context = context;
|
||||
}
|
||||
|
||||
public ConnectionHandlerHandlerImpl createConnectionHandler(WebDavCloud cloud) {
|
||||
return new ConnectionHandlerHandlerImpl(new WebDavCompatibleHttpClient(cloud, context), context);
|
||||
}
|
||||
}
|
@ -0,0 +1,57 @@
|
||||
package org.cryptomator.data.cloud.webdav.network;
|
||||
|
||||
import android.content.Context;
|
||||
|
||||
import org.cryptomator.data.cloud.webdav.WebDavFolder;
|
||||
import org.cryptomator.data.cloud.webdav.WebDavNode;
|
||||
import org.cryptomator.domain.CloudFolder;
|
||||
import org.cryptomator.domain.CloudNode;
|
||||
import org.cryptomator.domain.exception.BackendException;
|
||||
import org.cryptomator.domain.usecases.cloud.DataSource;
|
||||
|
||||
import java.io.InputStream;
|
||||
import java.util.List;
|
||||
|
||||
import javax.inject.Inject;
|
||||
|
||||
public class ConnectionHandlerHandlerImpl {
|
||||
|
||||
private final WebDavClient webDavClient;
|
||||
|
||||
@Inject
|
||||
ConnectionHandlerHandlerImpl(WebDavCompatibleHttpClient httpClient, Context context) {
|
||||
this.webDavClient = new WebDavClient(context, httpClient);
|
||||
}
|
||||
|
||||
public List<CloudNode> dirList(String url, WebDavFolder listedFolder) throws BackendException {
|
||||
return webDavClient.dirList(url, listedFolder);
|
||||
}
|
||||
|
||||
public void move(String from, String to) throws BackendException {
|
||||
webDavClient.move(from, to);
|
||||
}
|
||||
|
||||
public WebDavNode get(String url, CloudFolder parent) throws BackendException {
|
||||
return webDavClient.get(url, parent);
|
||||
}
|
||||
|
||||
public void writeFile(String url, DataSource data) throws BackendException {
|
||||
webDavClient.writeFile(url, data);
|
||||
}
|
||||
|
||||
public void delete(String url) throws BackendException {
|
||||
webDavClient.delete(url);
|
||||
}
|
||||
|
||||
public WebDavFolder createFolder(String path, WebDavFolder folder) throws BackendException {
|
||||
return webDavClient.createFolder(path, folder);
|
||||
}
|
||||
|
||||
public InputStream readFile(String url) throws BackendException {
|
||||
return webDavClient.readFile(url);
|
||||
}
|
||||
|
||||
public void checkAuthenticationAndServerCompatibility(String url) throws BackendException {
|
||||
webDavClient.checkAuthenticationAndServerCompatibility(url);
|
||||
}
|
||||
}
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user