diff --git a/.github/workflows/build.yml b/.github/workflows/build.yml
new file mode 100644
index 00000000..f78d664a
--- /dev/null
+++ b/.github/workflows/build.yml
@@ -0,0 +1,20 @@
+name: Build
+
+on:
+ [push]
+
+jobs:
+ build:
+ name: Test
+ runs-on: ubuntu-latest
+ if: "!contains(github.event.head_commit.message, '[ci skip]') && !contains(github.event.head_commit.message, '[skip ci]')"
+ steps:
+ - uses: actions/checkout@v2
+ with:
+ submodules: true
+ fetch-depth: 0
+ - uses: actions/setup-java@v1
+ with:
+ java-version: 1.8
+ - name: Build and Test
+ run: bash ./gradlew clean test --stacktrace
diff --git a/.gitignore b/.gitignore
new file mode 100644
index 00000000..80427507
--- /dev/null
+++ b/.gitignore
@@ -0,0 +1,43 @@
+secrets.properties
+
+###IntelliJ###
+
+*.iml
+*.ipr
+*.iws
+.idea/
+
+###Android###
+
+# Built application files
+*.apk
+*.aab
+*.ap_
+
+# Java class files
+*.class
+
+# Generated files
+bin/
+gen/
+**/**/debug/output.json
+**/**/release/output.json
+
+# Gradle files
+.gradle/
+build/
+**/release/output-metadata.json
+**/debug/output-metadata.json
+
+# Local configuration file (sdk path, etc)
+local.properties
+
+# fastlane
+secret_key_file.json
+**/**/fastlane/fastlane/**
+**/**/fastlane/metadata/**
+**/**/fastlane/report.xml
+**/**/fastlane/mappings/**
+**/**/fastlane/release_notes/**
+**/**/fastlane/latest_versions/**
+.env.default
diff --git a/.gitmodules b/.gitmodules
new file mode 100644
index 00000000..32f48167
--- /dev/null
+++ b/.gitmodules
@@ -0,0 +1,6 @@
+[submodule "msa-auth-for-android"]
+ path = msa-auth-for-android
+ url = https://github.com/SailReal/msa-auth-for-android.git
+[submodule "subsampling-scale-image-view"]
+ path = subsampling-scale-image-view
+ url = https://github.com/SailReal/subsampling-scale-image-view.git
diff --git a/LICENSE.txt b/LICENSE.txt
new file mode 100644
index 00000000..20d40b6b
--- /dev/null
+++ b/LICENSE.txt
@@ -0,0 +1,674 @@
+ GNU GENERAL PUBLIC LICENSE
+ Version 3, 29 June 2007
+
+ Copyright (C) 2007 Free Software Foundation, Inc.
+ Everyone is permitted to copy and distribute verbatim copies
+ of this license document, but changing it is not allowed.
+
+ Preamble
+
+ The GNU General Public License is a free, copyleft license for
+software and other kinds of works.
+
+ The licenses for most software and other practical works are designed
+to take away your freedom to share and change the works. By contrast,
+the GNU General Public License is intended to guarantee your freedom to
+share and change all versions of a program--to make sure it remains free
+software for all its users. We, the Free Software Foundation, use the
+GNU General Public License for most of our software; it applies also to
+any other work released this way by its authors. You can apply it to
+your programs, too.
+
+ When we speak of free software, we are referring to freedom, not
+price. Our General Public Licenses are designed to make sure that you
+have the freedom to distribute copies of free software (and charge for
+them if you wish), that you receive source code or can get it if you
+want it, that you can change the software or use pieces of it in new
+free programs, and that you know you can do these things.
+
+ To protect your rights, we need to prevent others from denying you
+these rights or asking you to surrender the rights. Therefore, you have
+certain responsibilities if you distribute copies of the software, or if
+you modify it: responsibilities to respect the freedom of others.
+
+ For example, if you distribute copies of such a program, whether
+gratis or for a fee, you must pass on to the recipients the same
+freedoms that you received. You must make sure that they, too, receive
+or can get the source code. And you must show them these terms so they
+know their rights.
+
+ Developers that use the GNU GPL protect your rights with two steps:
+(1) assert copyright on the software, and (2) offer you this License
+giving you legal permission to copy, distribute and/or modify it.
+
+ For the developers' and authors' protection, the GPL clearly explains
+that there is no warranty for this free software. For both users' and
+authors' sake, the GPL requires that modified versions be marked as
+changed, so that their problems will not be attributed erroneously to
+authors of previous versions.
+
+ Some devices are designed to deny users access to install or run
+modified versions of the software inside them, although the manufacturer
+can do so. This is fundamentally incompatible with the aim of
+protecting users' freedom to change the software. The systematic
+pattern of such abuse occurs in the area of products for individuals to
+use, which is precisely where it is most unacceptable. Therefore, we
+have designed this version of the GPL to prohibit the practice for those
+products. If such problems arise substantially in other domains, we
+stand ready to extend this provision to those domains in future versions
+of the GPL, as needed to protect the freedom of users.
+
+ Finally, every program is threatened constantly by software patents.
+States should not allow patents to restrict development and use of
+software on general-purpose computers, but in those that do, we wish to
+avoid the special danger that patents applied to a free program could
+make it effectively proprietary. To prevent this, the GPL assures that
+patents cannot be used to render the program non-free.
+
+ The precise terms and conditions for copying, distribution and
+modification follow.
+
+ TERMS AND CONDITIONS
+
+ 0. Definitions.
+
+ "This License" refers to version 3 of the GNU General Public License.
+
+ "Copyright" also means copyright-like laws that apply to other kinds of
+works, such as semiconductor masks.
+
+ "The Program" refers to any copyrightable work licensed under this
+License. Each licensee is addressed as "you". "Licensees" and
+"recipients" may be individuals or organizations.
+
+ To "modify" a work means to copy from or adapt all or part of the work
+in a fashion requiring copyright permission, other than the making of an
+exact copy. The resulting work is called a "modified version" of the
+earlier work or a work "based on" the earlier work.
+
+ A "covered work" means either the unmodified Program or a work based
+on the Program.
+
+ To "propagate" a work means to do anything with it that, without
+permission, would make you directly or secondarily liable for
+infringement under applicable copyright law, except executing it on a
+computer or modifying a private copy. Propagation includes copying,
+distribution (with or without modification), making available to the
+public, and in some countries other activities as well.
+
+ To "convey" a work means any kind of propagation that enables other
+parties to make or receive copies. Mere interaction with a user through
+a computer network, with no transfer of a copy, is not conveying.
+
+ An interactive user interface displays "Appropriate Legal Notices"
+to the extent that it includes a convenient and prominently visible
+feature that (1) displays an appropriate copyright notice, and (2)
+tells the user that there is no warranty for the work (except to the
+extent that warranties are provided), that licensees may convey the
+work under this License, and how to view a copy of this License. If
+the interface presents a list of user commands or options, such as a
+menu, a prominent item in the list meets this criterion.
+
+ 1. Source Code.
+
+ The "source code" for a work means the preferred form of the work
+for making modifications to it. "Object code" means any non-source
+form of a work.
+
+ A "Standard Interface" means an interface that either is an official
+standard defined by a recognized standards body, or, in the case of
+interfaces specified for a particular programming language, one that
+is widely used among developers working in that language.
+
+ The "System Libraries" of an executable work include anything, other
+than the work as a whole, that (a) is included in the normal form of
+packaging a Major Component, but which is not part of that Major
+Component, and (b) serves only to enable use of the work with that
+Major Component, or to implement a Standard Interface for which an
+implementation is available to the public in source code form. A
+"Major Component", in this context, means a major essential component
+(kernel, window system, and so on) of the specific operating system
+(if any) on which the executable work runs, or a compiler used to
+produce the work, or an object code interpreter used to run it.
+
+ The "Corresponding Source" for a work in object code form means all
+the source code needed to generate, install, and (for an executable
+work) run the object code and to modify the work, including scripts to
+control those activities. However, it does not include the work's
+System Libraries, or general-purpose tools or generally available free
+programs which are used unmodified in performing those activities but
+which are not part of the work. For example, Corresponding Source
+includes interface definition files associated with source files for
+the work, and the source code for shared libraries and dynamically
+linked subprograms that the work is specifically designed to require,
+such as by intimate data communication or control flow between those
+subprograms and other parts of the work.
+
+ The Corresponding Source need not include anything that users
+can regenerate automatically from other parts of the Corresponding
+Source.
+
+ The Corresponding Source for a work in source code form is that
+same work.
+
+ 2. Basic Permissions.
+
+ All rights granted under this License are granted for the term of
+copyright on the Program, and are irrevocable provided the stated
+conditions are met. This License explicitly affirms your unlimited
+permission to run the unmodified Program. The output from running a
+covered work is covered by this License only if the output, given its
+content, constitutes a covered work. This License acknowledges your
+rights of fair use or other equivalent, as provided by copyright law.
+
+ You may make, run and propagate covered works that you do not
+convey, without conditions so long as your license otherwise remains
+in force. You may convey covered works to others for the sole purpose
+of having them make modifications exclusively for you, or provide you
+with facilities for running those works, provided that you comply with
+the terms of this License in conveying all material for which you do
+not control copyright. Those thus making or running the covered works
+for you must do so exclusively on your behalf, under your direction
+and control, on terms that prohibit them from making any copies of
+your copyrighted material outside their relationship with you.
+
+ Conveying under any other circumstances is permitted solely under
+the conditions stated below. Sublicensing is not allowed; section 10
+makes it unnecessary.
+
+ 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
+
+ No covered work shall be deemed part of an effective technological
+measure under any applicable law fulfilling obligations under article
+11 of the WIPO copyright treaty adopted on 20 December 1996, or
+similar laws prohibiting or restricting circumvention of such
+measures.
+
+ When you convey a covered work, you waive any legal power to forbid
+circumvention of technological measures to the extent such circumvention
+is effected by exercising rights under this License with respect to
+the covered work, and you disclaim any intention to limit operation or
+modification of the work as a means of enforcing, against the work's
+users, your or third parties' legal rights to forbid circumvention of
+technological measures.
+
+ 4. Conveying Verbatim Copies.
+
+ You may convey verbatim copies of the Program's source code as you
+receive it, in any medium, provided that you conspicuously and
+appropriately publish on each copy an appropriate copyright notice;
+keep intact all notices stating that this License and any
+non-permissive terms added in accord with section 7 apply to the code;
+keep intact all notices of the absence of any warranty; and give all
+recipients a copy of this License along with the Program.
+
+ You may charge any price or no price for each copy that you convey,
+and you may offer support or warranty protection for a fee.
+
+ 5. Conveying Modified Source Versions.
+
+ You may convey a work based on the Program, or the modifications to
+produce it from the Program, in the form of source code under the
+terms of section 4, provided that you also meet all of these conditions:
+
+ a) The work must carry prominent notices stating that you modified
+ it, and giving a relevant date.
+
+ b) The work must carry prominent notices stating that it is
+ released under this License and any conditions added under section
+ 7. This requirement modifies the requirement in section 4 to
+ "keep intact all notices".
+
+ c) You must license the entire work, as a whole, under this
+ License to anyone who comes into possession of a copy. This
+ License will therefore apply, along with any applicable section 7
+ additional terms, to the whole of the work, and all its parts,
+ regardless of how they are packaged. This License gives no
+ permission to license the work in any other way, but it does not
+ invalidate such permission if you have separately received it.
+
+ d) If the work has interactive user interfaces, each must display
+ Appropriate Legal Notices; however, if the Program has interactive
+ interfaces that do not display Appropriate Legal Notices, your
+ work need not make them do so.
+
+ A compilation of a covered work with other separate and independent
+works, which are not by their nature extensions of the covered work,
+and which are not combined with it such as to form a larger program,
+in or on a volume of a storage or distribution medium, is called an
+"aggregate" if the compilation and its resulting copyright are not
+used to limit the access or legal rights of the compilation's users
+beyond what the individual works permit. Inclusion of a covered work
+in an aggregate does not cause this License to apply to the other
+parts of the aggregate.
+
+ 6. Conveying Non-Source Forms.
+
+ You may convey a covered work in object code form under the terms
+of sections 4 and 5, provided that you also convey the
+machine-readable Corresponding Source under the terms of this License,
+in one of these ways:
+
+ a) Convey the object code in, or embodied in, a physical product
+ (including a physical distribution medium), accompanied by the
+ Corresponding Source fixed on a durable physical medium
+ customarily used for software interchange.
+
+ b) Convey the object code in, or embodied in, a physical product
+ (including a physical distribution medium), accompanied by a
+ written offer, valid for at least three years and valid for as
+ long as you offer spare parts or customer support for that product
+ model, to give anyone who possesses the object code either (1) a
+ copy of the Corresponding Source for all the software in the
+ product that is covered by this License, on a durable physical
+ medium customarily used for software interchange, for a price no
+ more than your reasonable cost of physically performing this
+ conveying of source, or (2) access to copy the
+ Corresponding Source from a network server at no charge.
+
+ c) Convey individual copies of the object code with a copy of the
+ written offer to provide the Corresponding Source. This
+ alternative is allowed only occasionally and noncommercially, and
+ only if you received the object code with such an offer, in accord
+ with subsection 6b.
+
+ d) Convey the object code by offering access from a designated
+ place (gratis or for a charge), and offer equivalent access to the
+ Corresponding Source in the same way through the same place at no
+ further charge. You need not require recipients to copy the
+ Corresponding Source along with the object code. If the place to
+ copy the object code is a network server, the Corresponding Source
+ may be on a different server (operated by you or a third party)
+ that supports equivalent copying facilities, provided you maintain
+ clear directions next to the object code saying where to find the
+ Corresponding Source. Regardless of what server hosts the
+ Corresponding Source, you remain obligated to ensure that it is
+ available for as long as needed to satisfy these requirements.
+
+ e) Convey the object code using peer-to-peer transmission, provided
+ you inform other peers where the object code and Corresponding
+ Source of the work are being offered to the general public at no
+ charge under subsection 6d.
+
+ A separable portion of the object code, whose source code is excluded
+from the Corresponding Source as a System Library, need not be
+included in conveying the object code work.
+
+ A "User Product" is either (1) a "consumer product", which means any
+tangible personal property which is normally used for personal, family,
+or household purposes, or (2) anything designed or sold for incorporation
+into a dwelling. In determining whether a product is a consumer product,
+doubtful cases shall be resolved in favor of coverage. For a particular
+product received by a particular user, "normally used" refers to a
+typical or common use of that class of product, regardless of the status
+of the particular user or of the way in which the particular user
+actually uses, or expects or is expected to use, the product. A product
+is a consumer product regardless of whether the product has substantial
+commercial, industrial or non-consumer uses, unless such uses represent
+the only significant mode of use of the product.
+
+ "Installation Information" for a User Product means any methods,
+procedures, authorization keys, or other information required to install
+and execute modified versions of a covered work in that User Product from
+a modified version of its Corresponding Source. The information must
+suffice to ensure that the continued functioning of the modified object
+code is in no case prevented or interfered with solely because
+modification has been made.
+
+ If you convey an object code work under this section in, or with, or
+specifically for use in, a User Product, and the conveying occurs as
+part of a transaction in which the right of possession and use of the
+User Product is transferred to the recipient in perpetuity or for a
+fixed term (regardless of how the transaction is characterized), the
+Corresponding Source conveyed under this section must be accompanied
+by the Installation Information. But this requirement does not apply
+if neither you nor any third party retains the ability to install
+modified object code on the User Product (for example, the work has
+been installed in ROM).
+
+ The requirement to provide Installation Information does not include a
+requirement to continue to provide support service, warranty, or updates
+for a work that has been modified or installed by the recipient, or for
+the User Product in which it has been modified or installed. Access to a
+network may be denied when the modification itself materially and
+adversely affects the operation of the network or violates the rules and
+protocols for communication across the network.
+
+ Corresponding Source conveyed, and Installation Information provided,
+in accord with this section must be in a format that is publicly
+documented (and with an implementation available to the public in
+source code form), and must require no special password or key for
+unpacking, reading or copying.
+
+ 7. Additional Terms.
+
+ "Additional permissions" are terms that supplement the terms of this
+License by making exceptions from one or more of its conditions.
+Additional permissions that are applicable to the entire Program shall
+be treated as though they were included in this License, to the extent
+that they are valid under applicable law. If additional permissions
+apply only to part of the Program, that part may be used separately
+under those permissions, but the entire Program remains governed by
+this License without regard to the additional permissions.
+
+ When you convey a copy of a covered work, you may at your option
+remove any additional permissions from that copy, or from any part of
+it. (Additional permissions may be written to require their own
+removal in certain cases when you modify the work.) You may place
+additional permissions on material, added by you to a covered work,
+for which you have or can give appropriate copyright permission.
+
+ Notwithstanding any other provision of this License, for material you
+add to a covered work, you may (if authorized by the copyright holders of
+that material) supplement the terms of this License with terms:
+
+ a) Disclaiming warranty or limiting liability differently from the
+ terms of sections 15 and 16 of this License; or
+
+ b) Requiring preservation of specified reasonable legal notices or
+ author attributions in that material or in the Appropriate Legal
+ Notices displayed by works containing it; or
+
+ c) Prohibiting misrepresentation of the origin of that material, or
+ requiring that modified versions of such material be marked in
+ reasonable ways as different from the original version; or
+
+ d) Limiting the use for publicity purposes of names of licensors or
+ authors of the material; or
+
+ e) Declining to grant rights under trademark law for use of some
+ trade names, trademarks, or service marks; or
+
+ f) Requiring indemnification of licensors and authors of that
+ material by anyone who conveys the material (or modified versions of
+ it) with contractual assumptions of liability to the recipient, for
+ any liability that these contractual assumptions directly impose on
+ those licensors and authors.
+
+ All other non-permissive additional terms are considered "further
+restrictions" within the meaning of section 10. If the Program as you
+received it, or any part of it, contains a notice stating that it is
+governed by this License along with a term that is a further
+restriction, you may remove that term. If a license document contains
+a further restriction but permits relicensing or conveying under this
+License, you may add to a covered work material governed by the terms
+of that license document, provided that the further restriction does
+not survive such relicensing or conveying.
+
+ If you add terms to a covered work in accord with this section, you
+must place, in the relevant source files, a statement of the
+additional terms that apply to those files, or a notice indicating
+where to find the applicable terms.
+
+ Additional terms, permissive or non-permissive, may be stated in the
+form of a separately written license, or stated as exceptions;
+the above requirements apply either way.
+
+ 8. Termination.
+
+ You may not propagate or modify a covered work except as expressly
+provided under this License. Any attempt otherwise to propagate or
+modify it is void, and will automatically terminate your rights under
+this License (including any patent licenses granted under the third
+paragraph of section 11).
+
+ However, if you cease all violation of this License, then your
+license from a particular copyright holder is reinstated (a)
+provisionally, unless and until the copyright holder explicitly and
+finally terminates your license, and (b) permanently, if the copyright
+holder fails to notify you of the violation by some reasonable means
+prior to 60 days after the cessation.
+
+ Moreover, your license from a particular copyright holder is
+reinstated permanently if the copyright holder notifies you of the
+violation by some reasonable means, this is the first time you have
+received notice of violation of this License (for any work) from that
+copyright holder, and you cure the violation prior to 30 days after
+your receipt of the notice.
+
+ Termination of your rights under this section does not terminate the
+licenses of parties who have received copies or rights from you under
+this License. If your rights have been terminated and not permanently
+reinstated, you do not qualify to receive new licenses for the same
+material under section 10.
+
+ 9. Acceptance Not Required for Having Copies.
+
+ You are not required to accept this License in order to receive or
+run a copy of the Program. Ancillary propagation of a covered work
+occurring solely as a consequence of using peer-to-peer transmission
+to receive a copy likewise does not require acceptance. However,
+nothing other than this License grants you permission to propagate or
+modify any covered work. These actions infringe copyright if you do
+not accept this License. Therefore, by modifying or propagating a
+covered work, you indicate your acceptance of this License to do so.
+
+ 10. Automatic Licensing of Downstream Recipients.
+
+ Each time you convey a covered work, the recipient automatically
+receives a license from the original licensors, to run, modify and
+propagate that work, subject to this License. You are not responsible
+for enforcing compliance by third parties with this License.
+
+ An "entity transaction" is a transaction transferring control of an
+organization, or substantially all assets of one, or subdividing an
+organization, or merging organizations. If propagation of a covered
+work results from an entity transaction, each party to that
+transaction who receives a copy of the work also receives whatever
+licenses to the work the party's predecessor in interest had or could
+give under the previous paragraph, plus a right to possession of the
+Corresponding Source of the work from the predecessor in interest, if
+the predecessor has it or can get it with reasonable efforts.
+
+ You may not impose any further restrictions on the exercise of the
+rights granted or affirmed under this License. For example, you may
+not impose a license fee, royalty, or other charge for exercise of
+rights granted under this License, and you may not initiate litigation
+(including a cross-claim or counterclaim in a lawsuit) alleging that
+any patent claim is infringed by making, using, selling, offering for
+sale, or importing the Program or any portion of it.
+
+ 11. Patents.
+
+ A "contributor" is a copyright holder who authorizes use under this
+License of the Program or a work on which the Program is based. The
+work thus licensed is called the contributor's "contributor version".
+
+ A contributor's "essential patent claims" are all patent claims
+owned or controlled by the contributor, whether already acquired or
+hereafter acquired, that would be infringed by some manner, permitted
+by this License, of making, using, or selling its contributor version,
+but do not include claims that would be infringed only as a
+consequence of further modification of the contributor version. For
+purposes of this definition, "control" includes the right to grant
+patent sublicenses in a manner consistent with the requirements of
+this License.
+
+ Each contributor grants you a non-exclusive, worldwide, royalty-free
+patent license under the contributor's essential patent claims, to
+make, use, sell, offer for sale, import and otherwise run, modify and
+propagate the contents of its contributor version.
+
+ In the following three paragraphs, a "patent license" is any express
+agreement or commitment, however denominated, not to enforce a patent
+(such as an express permission to practice a patent or covenant not to
+sue for patent infringement). To "grant" such a patent license to a
+party means to make such an agreement or commitment not to enforce a
+patent against the party.
+
+ If you convey a covered work, knowingly relying on a patent license,
+and the Corresponding Source of the work is not available for anyone
+to copy, free of charge and under the terms of this License, through a
+publicly available network server or other readily accessible means,
+then you must either (1) cause the Corresponding Source to be so
+available, or (2) arrange to deprive yourself of the benefit of the
+patent license for this particular work, or (3) arrange, in a manner
+consistent with the requirements of this License, to extend the patent
+license to downstream recipients. "Knowingly relying" means you have
+actual knowledge that, but for the patent license, your conveying the
+covered work in a country, or your recipient's use of the covered work
+in a country, would infringe one or more identifiable patents in that
+country that you have reason to believe are valid.
+
+ If, pursuant to or in connection with a single transaction or
+arrangement, you convey, or propagate by procuring conveyance of, a
+covered work, and grant a patent license to some of the parties
+receiving the covered work authorizing them to use, propagate, modify
+or convey a specific copy of the covered work, then the patent license
+you grant is automatically extended to all recipients of the covered
+work and works based on it.
+
+ A patent license is "discriminatory" if it does not include within
+the scope of its coverage, prohibits the exercise of, or is
+conditioned on the non-exercise of one or more of the rights that are
+specifically granted under this License. You may not convey a covered
+work if you are a party to an arrangement with a third party that is
+in the business of distributing software, under which you make payment
+to the third party based on the extent of your activity of conveying
+the work, and under which the third party grants, to any of the
+parties who would receive the covered work from you, a discriminatory
+patent license (a) in connection with copies of the covered work
+conveyed by you (or copies made from those copies), or (b) primarily
+for and in connection with specific products or compilations that
+contain the covered work, unless you entered into that arrangement,
+or that patent license was granted, prior to 28 March 2007.
+
+ Nothing in this License shall be construed as excluding or limiting
+any implied license or other defenses to infringement that may
+otherwise be available to you under applicable patent law.
+
+ 12. No Surrender of Others' Freedom.
+
+ If conditions are imposed on you (whether by court order, agreement or
+otherwise) that contradict the conditions of this License, they do not
+excuse you from the conditions of this License. If you cannot convey a
+covered work so as to satisfy simultaneously your obligations under this
+License and any other pertinent obligations, then as a consequence you may
+not convey it at all. For example, if you agree to terms that obligate you
+to collect a royalty for further conveying from those to whom you convey
+the Program, the only way you could satisfy both those terms and this
+License would be to refrain entirely from conveying the Program.
+
+ 13. Use with the GNU Affero General Public License.
+
+ Notwithstanding any other provision of this License, you have
+permission to link or combine any covered work with a work licensed
+under version 3 of the GNU Affero General Public License into a single
+combined work, and to convey the resulting work. The terms of this
+License will continue to apply to the part which is the covered work,
+but the special requirements of the GNU Affero General Public License,
+section 13, concerning interaction through a network will apply to the
+combination as such.
+
+ 14. Revised Versions of this License.
+
+ The Free Software Foundation may publish revised and/or new versions of
+the GNU General Public License from time to time. Such new versions will
+be similar in spirit to the present version, but may differ in detail to
+address new problems or concerns.
+
+ Each version is given a distinguishing version number. If the
+Program specifies that a certain numbered version of the GNU General
+Public License "or any later version" applies to it, you have the
+option of following the terms and conditions either of that numbered
+version or of any later version published by the Free Software
+Foundation. If the Program does not specify a version number of the
+GNU General Public License, you may choose any version ever published
+by the Free Software Foundation.
+
+ If the Program specifies that a proxy can decide which future
+versions of the GNU General Public License can be used, that proxy's
+public statement of acceptance of a version permanently authorizes you
+to choose that version for the Program.
+
+ Later license versions may give you additional or different
+permissions. However, no additional obligations are imposed on any
+author or copyright holder as a result of your choosing to follow a
+later version.
+
+ 15. Disclaimer of Warranty.
+
+ THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
+APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
+HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
+OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
+THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
+IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
+ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
+
+ 16. Limitation of Liability.
+
+ IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
+WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
+THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
+GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
+USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
+DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
+PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
+EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
+SUCH DAMAGES.
+
+ 17. Interpretation of Sections 15 and 16.
+
+ If the disclaimer of warranty and limitation of liability provided
+above cannot be given local legal effect according to their terms,
+reviewing courts shall apply local law that most closely approximates
+an absolute waiver of all civil liability in connection with the
+Program, unless a warranty or assumption of liability accompanies a
+copy of the Program in return for a fee.
+
+ END OF TERMS AND CONDITIONS
+
+ How to Apply These Terms to Your New Programs
+
+ If you develop a new program, and you want it to be of the greatest
+possible use to the public, the best way to achieve this is to make it
+free software which everyone can redistribute and change under these terms.
+
+ To do so, attach the following notices to the program. It is safest
+to attach them to the start of each source file to most effectively
+state the exclusion of warranty; and each file should have at least
+the "copyright" line and a pointer to where the full notice is found.
+
+
+ Copyright (C)
+
+ This program is free software: you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see .
+
+Also add information on how to contact you by electronic and paper mail.
+
+ If the program does terminal interaction, make it output a short
+notice like this when it starts in an interactive mode:
+
+ Copyright (C)
+ This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
+ This is free software, and you are welcome to redistribute it
+ under certain conditions; type `show c' for details.
+
+The hypothetical commands `show w' and `show c' should show the appropriate
+parts of the General Public License. Of course, your program's commands
+might be different; for a GUI interface, you would use an "about box".
+
+ You should also get your employer (if you work as a programmer) or school,
+if any, to sign a "copyright disclaimer" for the program, if necessary.
+For more information on this, and how to apply and follow the GNU GPL, see
+.
+
+ The GNU General Public License does not permit incorporating your program
+into proprietary programs. If your program is a subroutine library, you
+may consider it more useful to permit linking proprietary applications with
+the library. If this is what you want to do, use the GNU Lesser General
+Public License instead of this License. But first, please read
+.
\ No newline at end of file
diff --git a/README.md b/README.md
index 50ef2e07..24d0ac6d 100644
--- a/README.md
+++ b/README.md
@@ -4,12 +4,31 @@
[](https://community.cryptomator.org)
[](https://docs.cryptomator.org)
-Cryptomator for Android is available on Google play: [Download Cryptomator for Android](https://play.google.com/store/apps/details?id=org.cryptomator)
+Cryptomator offers multi-platform transparent client-side encryption of your files in the cloud.
-## Open Core
+Cryptomator for Android is currently available in the following distribution channels:
-Cryptomator for Android is an _open core_ project. This repository is used for collecting issues regarding the Android app of Cryptomator.
+1. [Using Google Play](https://play.google.com/store/apps/details?id=org.cryptomator)
+2. [Using Cryptomator's Website](https://cryptomator.org/android/)
+3. Building from source using Gradle (instructions below)
-You can find the open source Java crypto library to access Cryptomator vaults at this repository: [cryptomator/cryptolib](https://github.com/cryptomator/cryptolib)
+## Building
-For more information on the security details visit [cryptomator.org](https://cryptomator.org/architecture/).
+### Dependencies
+
+* Git
+* JDK 8
+* Gradle
+
+### Run Git and Gradle
+
+```
+git submodule init && git submodule update // (not necessary if cloned using --recurse-submodules)
+./gradlew assembleLicenseDebug
+```
+
+Before connecting to Onedrive or Dropbox you have to enter valid API keys in [secrets.properties](https://github.com/cryptomator/android/blob/master/secrets.properties).
+
+## License
+
+This project is dual-licensed under the GPLv3 for FOSS projects as well as a commercial license for independent software vendors and resellers. If you want to modify this application under different conditions, feel free to contact our support team.
diff --git a/build.gradle b/build.gradle
new file mode 100644
index 00000000..87f09f0c
--- /dev/null
+++ b/build.gradle
@@ -0,0 +1,61 @@
+apply from: 'buildsystem/ci.gradle'
+apply from: 'buildsystem/dependencies.gradle'
+apply plugin: "com.vanniktech.android.junit.jacoco"
+
+buildscript {
+ ext.kotlin_version = '1.4.21'
+ repositories {
+ jcenter()
+ mavenCentral()
+ google()
+ }
+ dependencies {
+ classpath 'com.android.tools.build:gradle:4.1.1'
+ classpath 'org.greenrobot:greendao-gradle-plugin:3.3.0'
+ classpath 'com.fernandocejas.frodo:frodo-plugin:0.8.3'
+ classpath 'com.vanniktech:gradle-android-junit-jacoco-plugin:0.16.0'
+ classpath "org.jetbrains.kotlin:kotlin-gradle-plugin:$kotlin_version"
+ classpath "de.mannodermaus.gradle.plugins:android-junit5:1.7.0.0"
+ }
+}
+
+def getVersionCode = { ->
+ try {
+ def branchName = new ByteArrayOutputStream()
+ exec {
+ commandLine 'git', 'rev-parse', '--abbrev-ref', 'HEAD'
+ standardOutput = branchName
+ }
+ def appBuild = new ByteArrayOutputStream()
+ exec {
+ commandLine 'git', 'rev-list', '--count', branchName.toString().trim()
+ standardOutput = appBuild
+ }
+ return Integer.parseInt(appBuild.toString().trim()) + 1958 // adding 1958 for legacy reasons
+ }
+ catch (ignored) {
+ return -1
+ }
+}
+
+allprojects {
+ ext {
+ androidApplicationId = 'org.cryptomator'
+ androidVersionCode = getVersionCode()
+ androidVersionName = '1.5.11-SNAPSHOT'
+ }
+ repositories {
+ mavenCentral()
+ maven {
+ url "https://maven.google.com"
+ }
+ flatDir {
+ dirs '../libs'
+ }
+ google()
+ }
+}
+
+task clean(type: Delete) {
+ delete rootProject.buildDir
+}
diff --git a/buildsystem/ci.gradle b/buildsystem/ci.gradle
new file mode 100644
index 00000000..1800ee45
--- /dev/null
+++ b/buildsystem/ci.gradle
@@ -0,0 +1,13 @@
+def ciServer = 'TRAVIS'
+def executingOnCI = "true" == System.getenv(ciServer)
+
+// Since for CI we always do full clean builds, we don't want to pre-dex
+// See http://tools.android.com/tech-docs/new-build-system/tips
+subprojects {
+ project.plugins.whenPluginAdded { plugin ->
+ if ('com.android.build.gradle.AppPlugin' == plugin.class.name ||
+ 'com.android.build.gradle.LibraryPlugin' == plugin.class.name) {
+ project.android.dexOptions.preDexLibraries = !executingOnCI
+ }
+ }
+}
diff --git a/buildsystem/dependencies.gradle b/buildsystem/dependencies.gradle
new file mode 100644
index 00000000..2d941c03
--- /dev/null
+++ b/buildsystem/dependencies.gradle
@@ -0,0 +1,154 @@
+allprojects {
+ repositories {
+ jcenter()
+ }
+}
+
+ext {
+ androidBuildToolsVersion = "29.0.2"
+ androidMinSdkVersion = 23
+ androidTargetSdkVersion = 29
+ androidCompileSdkVersion = 29
+
+ // android and java libs
+ androidVersion = '4.1.1.4'
+ multidexVersion = '2.0.1'
+ javaxAnnotationVersion = '1.0'
+
+ // support lib
+ androidSupportAnnotationsVersion = '1.1.0'
+ androidSupportAppcompatVersion = '1.2.0' // check https://stackoverflow.com/questions/41025200/android-view-inflateexception-error-inflating-class-android-webkit-webview/57968071#57968071 !!!!!!
+ androidSupportDesignVersion = '1.2.1'
+
+ // app frameworks and utilities
+
+ rxJavaVersion = '2.2.20'
+ rxAndroidVersion = '2.1.1'
+ rxBindingVersion = '2.2.0'
+
+ daggerVersion = '2.30.1'
+
+ gsonVersion = '2.8.6'
+
+ okHttpVersion = '4.9.0'
+ okHttpDigestVersion = '2.5'
+
+ velocityVersion = '1.7'
+
+ timberVersion = '4.7.1'
+
+ zxcvbnVersion = '1.3.1'
+
+ scaleImageViewVersion = '3.10.0'
+
+ lruFileCacheVersion = '1.0'
+
+ // KEEP IN SYNC WITH GENERATOR VERSION IN root build.gradle
+ greenDaoVersion = '3.3.0'
+
+ // cloud provider libs
+
+ // do not update to 1.4.0 until dropping minsdk 4.x
+ cryptolibVersion = '1.3.0'
+
+ dropboxVersion = '3.1.5'
+
+ googleApiServicesVersion = 'v3-rev197-1.25.0'
+ googlePlayServicesVersion = '19.0.0'
+ googleClientVersion = '1.31.1'
+
+ msgraphVersion = '2.5.0'
+ msaAuthVersion = '0.10.0'
+
+ commonsCodecVersion = '1.15'
+
+ recyclerViewFastScrollVersion = '2.0.1'
+
+ // testing dependencies
+
+ jUnitVersion = '5.7.0'
+ jUnit4Version = '4.13.1'
+ assertJVersion = '1.7.1'
+ mockitoVersion = '3.6.28'
+ mockitoInlineVersion = '3.6.28'
+ hamcrestVersion = '1.3'
+ dexmakerVersion = '1.0'
+ espressoVersion = '3.3.0'
+ testingSupportLibVersion = '0.1'
+ runnerVersion = '1.3.0'
+ rulesVersion = '1.3.0'
+ contributionVersion = '3.3.0'
+ uiautomatorVersion = '2.2.0'
+
+ androidxCoreVersion = '1.3.2'
+ androidxFragmentVersion = '1.2.5'
+ androidxViewpagerVersion = '1.0.0'
+ androidxSwiperefreshVersion = '1.1.0'
+ androidxPreferenceVersion = '1.0.0' // 1.1.0 and 1.1.2 does have a bug with the text size
+ androidxRecyclerViewVersion = '1.1.0'
+ androidxDocumentfileVersion = '1.0.1'
+ androidxBiometricVersion = '1.0.1'
+ androidxTestCoreVersion = '1.3.0'
+
+ jsonWebTokenApiVersion = '0.11.2'
+
+ dependencies = [
+ android : "com.google.android:android:${androidVersion}",
+ androidAnnotations : "androidx.annotation:annotation:${androidSupportAnnotationsVersion}",
+ appcompat : "androidx.appcompat:appcompat:${androidSupportAppcompatVersion}",
+ androidxBiometric : "androidx.biometric:biometric:${androidxBiometricVersion}",
+ androidxCore : "androidx.core:core-ktx:${androidxCoreVersion}",
+ androidxFragment : "androidx.fragment:fragment-ktx:${androidxFragmentVersion}",
+ androidxViewpager : "androidx.viewpager:viewpager:${androidxViewpagerVersion}",
+ androidxSwiperefresh : "androidx.swiperefreshlayout:swiperefreshlayout:${androidxSwiperefreshVersion}",
+ androidxPreference : "androidx.preference:preference:${androidxPreferenceVersion}",
+ documentFile : "androidx.documentfile:documentfile:${androidxDocumentfileVersion}",
+ recyclerView : "androidx.recyclerview:recyclerview:${androidxRecyclerViewVersion}",
+ androidxTestCore : "androidx.test:core:${androidxTestCoreVersion}",
+ commonsCodec : "commons-codec:commons-codec:${commonsCodecVersion}",
+ cryptolib : "org.cryptomator:cryptolib:${cryptolibVersion}",
+ dagger : "com.google.dagger:dagger:${daggerVersion}",
+ daggerCompiler : "com.google.dagger:dagger-compiler:${daggerVersion}",
+ design : "com.google.android.material:material:${androidSupportDesignVersion}",
+ dropbox : "com.dropbox.core:dropbox-core-sdk:${dropboxVersion}",
+ espresso : "androidx.test.espresso:espresso-core:${espressoVersion}",
+ googleApiClientAndroid: "com.google.api-client:google-api-client-android:${googleClientVersion}",
+ googleApiServicesDrive: "com.google.apis:google-api-services-drive:${googleApiServicesVersion}",
+ googlePlayServicesAuth: "com.google.android.gms:play-services-auth:${googlePlayServicesVersion}",
+ greenDao : "org.greenrobot:greendao:${greenDaoVersion}",
+ gson : "com.google.code.gson:gson:${gsonVersion}",
+ hamcrest : "org.hamcrest:hamcrest-all:${hamcrestVersion}",
+ javaxAnnotation : "javax.annotation:jsr250-api:${javaxAnnotationVersion}",
+ junit : "org.junit.jupiter:junit-jupiter:${jUnitVersion}",
+ junitApi : "org.junit.jupiter:junit-jupiter-api:${jUnitVersion}",
+ junitEngine : "org.junit.jupiter:junit-jupiter-engine:${jUnitVersion}",
+ junitParams : "org.junit.jupiter:junit-jupiter-params:${jUnitVersion}",
+ junit4 : "org.junit.jupiter:junit-jupiter:${jUnit4Version}",
+ junit4Engine : "org.junit.vintage:junit-vintage-engine:${jUnitVersion}",
+ msgraph : "com.microsoft.graph:microsoft-graph:${msgraphVersion}",
+ msaAuth : "com.microsoft.graph:msa-auth-for-android-adapter:${msaAuthVersion}",
+ mockito : "org.mockito:mockito-core:${mockitoVersion}",
+ mockitoInline : "org.mockito:mockito-inline:${mockitoInlineVersion}",
+ multidex : "androidx.multidex:multidex:${multidexVersion}",
+ okHttp : "com.squareup.okhttp3:okhttp:${okHttpVersion}",
+ okHttpDigest : "com.burgstaller:okhttp-digest:${okHttpDigestVersion}",
+ recyclerViewFastScroll: "com.simplecityapps:recyclerview-fastscroll:${recyclerViewFastScrollVersion}",
+ rxJava : "io.reactivex.rxjava2:rxjava:${rxJavaVersion}",
+ rxAndroid : "io.reactivex.rxjava2:rxandroid:${rxAndroidVersion}",
+ rxBinding : "com.jakewharton.rxbinding2:rxbinding:${rxBindingVersion}",
+ testingSupportLib : "com.android.support.test:testing-support-lib:${testingSupportLibVersion}",
+ timber : "com.jakewharton.timber:timber:${timberVersion}",
+ velocity : "org.apache.velocity:velocity:${velocityVersion}",
+ runner : "androidx.test:runner:${runnerVersion}",
+ rules : "androidx.test:rules:${rulesVersion}",
+ contribution : "androidx.test.espresso:espresso-contrib:${contributionVersion}",
+ uiAutomator : "androidx.test.uiautomator:uiautomator:${uiautomatorVersion}",
+ zxcvbn : "com.nulab-inc:zxcvbn:${zxcvbnVersion}",
+ scaleImageView : "com.davemorrissey.labs:subsampling-scale-image-view:${scaleImageViewVersion}",
+ lruFileCache : "com.tomclaw.cache:cache:${lruFileCacheVersion}",
+ jsonWebTokenApi : "io.jsonwebtoken:jjwt-api:${jsonWebTokenApiVersion}",
+ jsonWebTokenImpl : "io.jsonwebtoken:jjwt-impl:${jsonWebTokenApiVersion}",
+ jsonWebTokenJson : "io.jsonwebtoken:jjwt-orgjson:${jsonWebTokenApiVersion}"
+ ]
+
+}
diff --git a/data/.gitignore b/data/.gitignore
new file mode 100755
index 00000000..796b96d1
--- /dev/null
+++ b/data/.gitignore
@@ -0,0 +1 @@
+/build
diff --git a/data/build.gradle b/data/build.gradle
new file mode 100644
index 00000000..3608ab82
--- /dev/null
+++ b/data/build.gradle
@@ -0,0 +1,122 @@
+apply plugin: 'org.greenrobot.greendao'
+apply plugin: 'com.android.library'
+apply plugin: 'kotlin-android'
+apply plugin: 'de.mannodermaus.android-junit5'
+
+android {
+ defaultPublishConfig "debug"
+
+ def globalConfiguration = rootProject.extensions.getByName("ext")
+
+ compileSdkVersion globalConfiguration["androidCompileSdkVersion"]
+ buildToolsVersion globalConfiguration["androidBuildToolsVersion"]
+
+ defaultConfig {
+ minSdkVersion globalConfiguration["androidMinSdkVersion"]
+ targetSdkVersion globalConfiguration["androidTargetSdkVersion"]
+
+ buildConfigField 'int', 'VERSION_CODE', "${globalConfiguration["androidVersionCode"]}"
+ buildConfigField "String", "VERSION_NAME", "\"${globalConfiguration["androidVersionName"]}\""
+ buildConfigField "String", "ONEDRIVE_API_KEY", "\"" + getApiKey('ONEDRIVE_API_KEY') + "\""
+ }
+
+ compileOptions {
+ sourceCompatibility JavaVersion.VERSION_1_8
+ targetCompatibility JavaVersion.VERSION_1_8
+ }
+
+ lintOptions {
+ quiet true
+ abortOnError false
+ ignoreWarnings true
+ }
+
+ flavorDimensions "version"
+
+ productFlavors {
+ playstore {
+ dimension "version"
+ }
+
+ license {
+ dimension "version"
+ }
+ }
+}
+
+greendao {
+ schemaVersion 3
+}
+
+configurations.all {
+ // Check for updates every build (use for cryptolib snapshot)
+ //resolutionStrategy.cacheChangingModulesFor 0, 'seconds'
+}
+
+dependencies {
+ def dependencies = rootProject.ext.dependencies
+
+ implementation project(':domain')
+ implementation project(':util')
+ implementation project(':msa-auth-for-android')
+
+ // cryptomator
+ implementation dependencies.cryptolib
+
+ // greendao
+ api dependencies.greenDao
+ // dagger
+ annotationProcessor dependencies.daggerCompiler
+ implementation dependencies.dagger
+ // cloud
+ implementation dependencies.dropbox
+ implementation dependencies.googlePlayServicesAuth
+ implementation(dependencies.googleApiServicesDrive) {
+ exclude module: 'guava-jdk5'
+ exclude module: 'httpclient'
+ }
+ implementation(dependencies.googleApiClientAndroid) {
+ exclude module: 'guava-jdk5'
+ exclude module: 'httpclient'
+ }
+ implementation dependencies.msgraph
+
+ // rest
+ implementation dependencies.rxJava
+ implementation dependencies.rxAndroid
+ implementation dependencies.okHttp
+ implementation dependencies.okHttpDigest
+ implementation dependencies.androidAnnotations
+ compileOnly dependencies.javaxAnnotation
+ implementation dependencies.gson
+
+ implementation dependencies.commonsCodec
+
+ implementation dependencies.documentFile
+
+ implementation dependencies.lruFileCache
+
+ implementation "org.jetbrains.kotlin:kotlin-stdlib-jdk8:$kotlin_version"
+
+ // test
+ testImplementation dependencies.junit
+ testImplementation dependencies.junitApi
+ testRuntimeOnly dependencies.junitEngine
+ testImplementation dependencies.junitParams
+
+ testImplementation dependencies.junit4
+ testRuntimeOnly dependencies.junit4Engine
+
+ testImplementation dependencies.mockito
+ testImplementation dependencies.hamcrest
+}
+
+configurations {
+ all*.exclude group: 'com.google.android', module: 'android'
+}
+
+static def getApiKey(key) {
+ Properties props = new Properties()
+ props.load(new FileInputStream(new File('secrets.properties')))
+ return props[key]
+}
diff --git a/data/src/main/AndroidManifest.xml b/data/src/main/AndroidManifest.xml
new file mode 100644
index 00000000..406049e3
--- /dev/null
+++ b/data/src/main/AndroidManifest.xml
@@ -0,0 +1,8 @@
+
+
+
+
+
+
+
diff --git a/data/src/main/java/org/cryptomator/data/cloud/CloudContentRepositoryFactories.java b/data/src/main/java/org/cryptomator/data/cloud/CloudContentRepositoryFactories.java
new file mode 100644
index 00000000..955822ab
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/CloudContentRepositoryFactories.java
@@ -0,0 +1,45 @@
+package org.cryptomator.data.cloud;
+
+import org.cryptomator.data.cloud.crypto.CryptoCloudContentRepositoryFactory;
+import org.cryptomator.data.cloud.dropbox.DropboxCloudContentRepositoryFactory;
+import org.cryptomator.data.cloud.googledrive.GoogleDriveCloudContentRepositoryFactory;
+import org.cryptomator.data.cloud.local.LocalStorageContentRepositoryFactory;
+import org.cryptomator.data.cloud.onedrive.OnedriveCloudContentRepositoryFactory;
+import org.cryptomator.data.cloud.webdav.WebDavCloudContentRepositoryFactory;
+import org.cryptomator.data.repository.CloudContentRepositoryFactory;
+import org.jetbrains.annotations.NotNull;
+
+import java.util.Iterator;
+
+import javax.inject.Inject;
+import javax.inject.Singleton;
+
+import static java.util.Arrays.asList;
+
+@Singleton
+public class CloudContentRepositoryFactories implements Iterable {
+
+ private final Iterable factories;
+
+ @Inject
+ public CloudContentRepositoryFactories(DropboxCloudContentRepositoryFactory dropboxFactory, //
+ GoogleDriveCloudContentRepositoryFactory googleDriveFactory, //
+ OnedriveCloudContentRepositoryFactory oneDriveFactory, //
+ CryptoCloudContentRepositoryFactory cryptoFactory, //
+ LocalStorageContentRepositoryFactory localStorageFactory, //
+ WebDavCloudContentRepositoryFactory webDavFactory) {
+
+ factories = asList(dropboxFactory, //
+ googleDriveFactory, //
+ oneDriveFactory, //
+ cryptoFactory, //
+ localStorageFactory, //
+ webDavFactory);
+ }
+
+ @NotNull
+ @Override
+ public Iterator iterator() {
+ return factories.iterator();
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/InterceptingCloudContentRepository.java b/data/src/main/java/org/cryptomator/data/cloud/InterceptingCloudContentRepository.java
new file mode 100644
index 00000000..6fc502d7
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/InterceptingCloudContentRepository.java
@@ -0,0 +1,224 @@
+package org.cryptomator.data.cloud;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudFile;
+import org.cryptomator.domain.CloudFolder;
+import org.cryptomator.domain.CloudNode;
+import org.cryptomator.domain.exception.BackendException;
+import org.cryptomator.domain.repository.CloudContentRepository;
+import org.cryptomator.domain.usecases.ProgressAware;
+import org.cryptomator.domain.usecases.cloud.DataSource;
+import org.cryptomator.domain.usecases.cloud.DownloadState;
+import org.cryptomator.domain.usecases.cloud.UploadState;
+import org.cryptomator.util.Optional;
+
+import java.io.File;
+import java.io.OutputStream;
+import java.util.List;
+
+public abstract class InterceptingCloudContentRepository
+ implements CloudContentRepository {
+
+ private final CloudContentRepository delegate;
+
+ protected InterceptingCloudContentRepository(CloudContentRepository delegate) {
+ this.delegate = delegate;
+ }
+
+ protected abstract void throwWrappedIfRequired(Exception e) throws BackendException;
+
+ @Override
+ public DirType root(CloudType cloud) throws BackendException {
+ try {
+ return delegate.root(cloud);
+ } catch (BackendException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ } catch (RuntimeException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ }
+ }
+
+ @Override
+ public DirType resolve(CloudType cloud, String path) throws BackendException {
+ try {
+ return delegate.resolve(cloud, path);
+ } catch (BackendException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ } catch (RuntimeException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ }
+ }
+
+ @Override
+ public FileType file(DirType parent, String name) throws BackendException {
+ try {
+ return delegate.file(parent, name);
+ } catch (BackendException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ } catch (RuntimeException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ }
+ }
+
+ @Override
+ public FileType file(DirType parent, String name, Optional size) throws BackendException {
+ try {
+ return delegate.file(parent, name, size);
+ } catch (BackendException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ } catch (RuntimeException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ }
+ }
+
+ @Override
+ public DirType folder(DirType parent, String name) throws BackendException {
+ try {
+ return delegate.folder(parent, name);
+ } catch (BackendException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ } catch (RuntimeException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ }
+ }
+
+ @Override
+ public boolean exists(NodeType node) throws BackendException {
+ try {
+ return delegate.exists(node);
+ } catch (BackendException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ } catch (RuntimeException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ }
+ }
+
+ @Override
+ public List extends CloudNode> list(DirType folder) throws BackendException {
+ try {
+ return delegate.list(folder);
+ } catch (BackendException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ } catch (RuntimeException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ }
+ }
+
+ @Override
+ public DirType create(DirType folder) throws BackendException {
+ try {
+ return delegate.create(folder);
+ } catch (BackendException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ } catch (RuntimeException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ }
+ }
+
+ @Override
+ public DirType move(DirType source, DirType target) throws BackendException {
+ try {
+ return delegate.move(source, target);
+ } catch (BackendException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ } catch (RuntimeException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ }
+ }
+
+ @Override
+ public FileType move(FileType source, FileType target) throws BackendException {
+ try {
+ return delegate.move(source, target);
+ } catch (BackendException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ } catch (RuntimeException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ }
+ }
+
+ @Override
+ public FileType write(FileType file, DataSource data, ProgressAware progressAware, boolean replace, long size) throws BackendException {
+ try {
+ return delegate.write(file, data, progressAware, replace, size);
+ } catch (BackendException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ } catch (RuntimeException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ }
+ }
+
+ @Override
+ public void read(FileType file, Optional encryptedTmpFile, OutputStream data, ProgressAware progressAware) throws BackendException {
+ try {
+ delegate.read(file, encryptedTmpFile, data, progressAware);
+ } catch (BackendException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ } catch (RuntimeException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ }
+ }
+
+ @Override
+ public void delete(NodeType node) throws BackendException {
+ try {
+ delegate.delete(node);
+ } catch (BackendException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ } catch (RuntimeException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ }
+ }
+
+ @Override
+ public String checkAuthenticationAndRetrieveCurrentAccount(CloudType cloud) throws BackendException {
+ try {
+ return delegate.checkAuthenticationAndRetrieveCurrentAccount(cloud);
+ } catch (BackendException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ } catch (RuntimeException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ }
+ }
+
+ @Override
+ public void logout(CloudType cloud) throws BackendException {
+ try {
+ delegate.logout(cloud);
+ } catch (BackendException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ } catch (RuntimeException e) {
+ throwWrappedIfRequired(e);
+ throw e;
+ }
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/BackupFileIdSuffixGenerator.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/BackupFileIdSuffixGenerator.java
new file mode 100644
index 00000000..7a5017c9
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/BackupFileIdSuffixGenerator.java
@@ -0,0 +1,28 @@
+package org.cryptomator.data.cloud.crypto;
+
+import com.google.common.io.BaseEncoding;
+
+import java.security.MessageDigest;
+import java.security.NoSuchAlgorithmException;
+
+/**
+ * Utility class for generating a suffix for the backup file to make it unique to its original master key file.
+ */
+class BackupFileIdSuffixGenerator {
+
+ /**
+ * Computes the SHA-256 digest of the given byte array and returns a file suffix containing the first 4 bytes in hex string format.
+ *
+ * @param fileBytes the input byte for which the digest is computed
+ * @return "." + first 4 bytes of SHA-256 digest in hex string format
+ */
+ static String generate(byte[] fileBytes) {
+ try {
+ MessageDigest md = MessageDigest.getInstance("SHA-256");
+ byte[] digest = md.digest(fileBytes);
+ return "." + BaseEncoding.base16().encode(digest, 0, 4);
+ } catch (NoSuchAlgorithmException e) {
+ throw new IllegalStateException("Every Java Platform must support the Message Digest algorithm SHA-256", e);
+ }
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoCloud.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoCloud.java
new file mode 100644
index 00000000..102b6265
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoCloud.java
@@ -0,0 +1,71 @@
+package org.cryptomator.data.cloud.crypto;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudType;
+import org.cryptomator.domain.Vault;
+
+public class CryptoCloud implements Cloud {
+
+ private final Vault vault;
+
+ CryptoCloud(Vault vault) {
+ this.vault = vault;
+ }
+
+ @Override
+ public Long id() {
+ return null;
+ }
+
+ @Override
+ public CloudType type() {
+ return CloudType.CRYPTO;
+ }
+
+ @Override
+ public boolean configurationMatches(Cloud cloud) {
+ return cloud instanceof CryptoCloud && configurationMatches((CryptoCloud) cloud);
+ }
+
+ private boolean configurationMatches(CryptoCloud cloud) {
+ return vault.equals(cloud.vault);
+ }
+
+ @Override
+ public boolean predefined() {
+ return false;
+ }
+
+ @Override
+ public boolean persistent() {
+ return false;
+ }
+
+ @Override
+ public boolean requiresNetwork() {
+ return false;
+ }
+
+ public Vault getVault() {
+ return vault;
+ }
+
+ @Override
+ public boolean equals(Object obj) {
+ if (obj == null || getClass() != obj.getClass())
+ return false;
+ if (obj == this)
+ return true;
+ return internalEquals((CryptoCloud) obj);
+ }
+
+ @Override
+ public int hashCode() {
+ return vault.hashCode();
+ }
+
+ private boolean internalEquals(CryptoCloud obj) {
+ return vault != null && vault.equals(obj.vault);
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoCloudContentRepository.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoCloudContentRepository.java
new file mode 100644
index 00000000..597a80b8
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoCloudContentRepository.java
@@ -0,0 +1,135 @@
+package org.cryptomator.data.cloud.crypto;
+
+import static java.lang.String.format;
+
+import java.io.File;
+import java.io.OutputStream;
+import java.util.List;
+
+import org.cryptomator.cryptolib.api.Cryptor;
+import org.cryptomator.domain.CloudFolder;
+import org.cryptomator.domain.exception.BackendException;
+import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
+import org.cryptomator.domain.exception.FatalBackendException;
+import org.cryptomator.domain.repository.CloudContentRepository;
+import org.cryptomator.domain.usecases.ProgressAware;
+import org.cryptomator.domain.usecases.cloud.DataSource;
+import org.cryptomator.domain.usecases.cloud.DownloadState;
+import org.cryptomator.domain.usecases.cloud.UploadState;
+import org.cryptomator.util.Optional;
+import org.cryptomator.util.Supplier;
+
+import android.content.Context;
+
+class CryptoCloudContentRepository implements CloudContentRepository {
+
+ private final CryptoImplDecorator cryptoImpl;
+
+ CryptoCloudContentRepository(Context context, CloudContentRepository cloudContentRepository, CryptoCloud cloud, Supplier cryptor) {
+ CloudFolder vaultLocation;
+ try {
+ vaultLocation = cloudContentRepository.resolve(cloud.getVault().getCloud(), cloud.getVault().getPath());
+ } catch (BackendException e) {
+ throw new FatalBackendException(e);
+ }
+
+ switch (cloud.getVault().getVersion()) {
+ case 7:
+ this.cryptoImpl = new CryptoImplVaultFormat7(context, cryptor, cloudContentRepository, vaultLocation, new DirIdCacheFormat7());
+ break;
+ case 6:
+ case 5:
+ this.cryptoImpl = new CryptoImplVaultFormatPre7(context, cryptor, cloudContentRepository, vaultLocation, new DirIdCacheFormatPre7());
+ break;
+ default:
+ throw new IllegalStateException(format("No CryptoImpl for vault version %d.", cloud.getVault().getVersion()));
+ }
+ }
+
+ @Override
+ public synchronized CryptoFolder root(CryptoCloud cloud) throws BackendException {
+ return cryptoImpl.root(cloud);
+ }
+
+ @Override
+ public CryptoFolder resolve(CryptoCloud cloud, String path) throws BackendException {
+ return cryptoImpl.resolve(cloud, path);
+ }
+
+ @Override
+ public CryptoFile file(CryptoFolder parent, String name) throws BackendException {
+ return cryptoImpl.file(parent, name);
+ }
+
+ @Override
+ public CryptoFile file(CryptoFolder parent, String name, Optional size) throws BackendException {
+ return cryptoImpl.file(parent, name, size);
+ }
+
+ @Override
+ public CryptoFolder folder(CryptoFolder parent, String name) throws BackendException {
+ return cryptoImpl.folder(parent, name);
+ }
+
+ @Override
+ public boolean exists(CryptoNode node) throws BackendException {
+ return cryptoImpl.exists(node);
+ }
+
+ @Override
+ public List list(CryptoFolder folder) throws BackendException {
+ return cryptoImpl.list(folder);
+ }
+
+ @Override
+ public CryptoFolder create(CryptoFolder folder) throws BackendException {
+ try {
+ return cryptoImpl.create(folder);
+ } catch (CloudNodeAlreadyExistsException e) {
+ throw new CloudNodeAlreadyExistsException(folder.getName());
+ }
+ }
+
+ @Override
+ public CryptoFolder move(CryptoFolder source, CryptoFolder target) throws BackendException {
+ try {
+ return cryptoImpl.move(source, target);
+ } catch (CloudNodeAlreadyExistsException e) {
+ throw new CloudNodeAlreadyExistsException(target.getName());
+ }
+ }
+
+ @Override
+ public CryptoFile move(CryptoFile source, CryptoFile target) throws BackendException {
+ try {
+ return cryptoImpl.move(source, target);
+ } catch (CloudNodeAlreadyExistsException e) {
+ throw new CloudNodeAlreadyExistsException(target.getName());
+ }
+ }
+
+ @Override
+ public CryptoFile write(CryptoFile file, DataSource data, ProgressAware progressAware, boolean replace, long length) throws BackendException {
+ return cryptoImpl.write(file, data, progressAware, replace, length);
+ }
+
+ @Override
+ public void read(CryptoFile file, Optional tmpEncryptedFile, OutputStream data, ProgressAware progressAware) throws BackendException {
+ cryptoImpl.read(file, data, progressAware);
+ }
+
+ @Override
+ public void delete(CryptoNode node) throws BackendException {
+ cryptoImpl.delete(node);
+ }
+
+ @Override
+ public String checkAuthenticationAndRetrieveCurrentAccount(CryptoCloud cloud) throws BackendException {
+ return cryptoImpl.currentAccount(cloud);
+ }
+
+ @Override
+ public void logout(CryptoCloud cloud) throws BackendException {
+ // empty
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoCloudContentRepositoryFactory.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoCloudContentRepositoryFactory.java
new file mode 100644
index 00000000..a4f29c31
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoCloudContentRepositoryFactory.java
@@ -0,0 +1,80 @@
+package org.cryptomator.data.cloud.crypto;
+
+import android.content.Context;
+
+import org.cryptomator.cryptolib.api.Cryptor;
+import org.cryptomator.data.repository.CloudContentRepositoryFactory;
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.Vault;
+import org.cryptomator.domain.exception.MissingCryptorException;
+import org.cryptomator.domain.repository.CloudContentRepository;
+import org.cryptomator.util.Optional;
+
+import javax.inject.Inject;
+import javax.inject.Singleton;
+
+import dagger.Lazy;
+
+import static java.lang.String.format;
+import static org.cryptomator.domain.CloudType.CRYPTO;
+
+@Singleton
+public class CryptoCloudContentRepositoryFactory implements CloudContentRepositoryFactory {
+
+ private final Lazy cloudContentRepository;
+ private final Cryptors cryptors;
+ private final Context context;
+
+ @Inject
+ public CryptoCloudContentRepositoryFactory(Lazy cloudContentRepository, Cryptors cryptors, Context context) {
+ this.cloudContentRepository = cloudContentRepository;
+ this.cryptors = cryptors;
+ this.context = context;
+ }
+
+ @Override
+ public boolean supports(Cloud cloud) {
+ return cloud.type() == CRYPTO;
+ }
+
+ @Override
+ public CloudContentRepository cloudContentRepositoryFor(Cloud cloud) {
+ CryptoCloud cryptoCloud = (CryptoCloud) cloud;
+ Vault vault = cryptoCloud.getVault();
+ return new CryptoCloudContentRepository(context, cloudContentRepository.get(), cryptoCloud, cryptors.get(vault));
+ }
+
+ public void deregisterCryptor(Vault vault) {
+ deregisterCryptor(vault, true);
+ }
+
+ public void deregisterCryptor(Vault vault, boolean assertPresent) {
+ Optional cryptor = cryptors.remove(vault);
+ if (cryptor.isAbsent()) {
+ if (assertPresent) {
+ throw new IllegalStateException(format("No cryptor registered for vault %s", vault));
+ }
+ } else {
+ cryptor.get().destroy();
+ }
+ }
+
+ public boolean cryptorIsRegisteredFor(Vault vault) {
+ try {
+ assertCryptorRegisteredFor(vault);
+ return true;
+ } catch (MissingCryptorException e) {
+ return false;
+ }
+ }
+
+ public void assertCryptorRegisteredFor(Vault vault) throws MissingCryptorException {
+ cryptors.get(vault).get();
+ }
+
+ void registerCryptor(Vault vault, Cryptor cryptor) {
+ if (!cryptors.putIfAbsent(vault, cryptor)) {
+ throw new IllegalStateException(format("Cryptor already registered for vault %s", vault));
+ }
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoCloudFactory.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoCloudFactory.java
new file mode 100644
index 00000000..9f211a49
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoCloudFactory.java
@@ -0,0 +1,216 @@
+package org.cryptomator.data.cloud.crypto;
+
+import static android.R.attr.version;
+import static java.text.Normalizer.normalize;
+import static org.cryptomator.data.cloud.crypto.CryptoConstants.DATA_DIR_NAME;
+import static org.cryptomator.data.cloud.crypto.CryptoConstants.MASTERKEY_BACKUP_FILE_EXT;
+import static org.cryptomator.data.cloud.crypto.CryptoConstants.MASTERKEY_FILE_NAME;
+import static org.cryptomator.data.cloud.crypto.CryptoConstants.MAX_VAULT_VERSION;
+import static org.cryptomator.data.cloud.crypto.CryptoConstants.MIN_VAULT_VERSION;
+import static org.cryptomator.data.cloud.crypto.CryptoConstants.ROOT_DIR_ID;
+import static org.cryptomator.data.cloud.crypto.CryptoConstants.VERSION_WITH_NORMALIZED_PASSWORDS;
+import static org.cryptomator.domain.Vault.aCopyOf;
+import static org.cryptomator.domain.usecases.ProgressAware.NO_OP_PROGRESS_AWARE;
+
+import java.io.ByteArrayOutputStream;
+import java.text.Normalizer;
+
+import javax.inject.Inject;
+import javax.inject.Singleton;
+
+import org.cryptomator.cryptolib.Cryptors;
+import org.cryptomator.cryptolib.api.Cryptor;
+import org.cryptomator.cryptolib.api.CryptorProvider;
+import org.cryptomator.cryptolib.api.InvalidPassphraseException;
+import org.cryptomator.cryptolib.api.KeyFile;
+import org.cryptomator.cryptolib.api.UnsupportedVaultFormatException;
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudFile;
+import org.cryptomator.domain.CloudFolder;
+import org.cryptomator.domain.Vault;
+import org.cryptomator.domain.exception.BackendException;
+import org.cryptomator.domain.repository.CloudContentRepository;
+import org.cryptomator.domain.usecases.cloud.ByteArrayDataSource;
+import org.cryptomator.domain.usecases.vault.UnlockToken;
+import org.cryptomator.util.Optional;
+
+@Singleton
+public class CryptoCloudFactory {
+
+ private final CryptorProvider cryptorProvider;
+ private final CloudContentRepository cloudContentRepository;
+ private final CryptoCloudContentRepositoryFactory cryptoCloudContentRepositoryFactory;
+
+ @Inject
+ public CryptoCloudFactory( //
+ CloudContentRepository cloudContentRepository, //
+ CryptoCloudContentRepositoryFactory cryptoCloudContentRepositoryFactory, //
+ CryptorProvider cryptorProvider) {
+ this.cryptorProvider = cryptorProvider;
+ this.cloudContentRepository = cloudContentRepository;
+ this.cryptoCloudContentRepositoryFactory = cryptoCloudContentRepositoryFactory;
+ }
+
+ public void create(CloudFolder location, CharSequence password) throws BackendException {
+ Cryptor cryptor = cryptorProvider.createNew();
+ try {
+ KeyFile keyFile = cryptor.writeKeysToMasterkeyFile(normalizePassword(password, version), MAX_VAULT_VERSION);
+ writeKeyFile(location, keyFile);
+ createRootFolder(location, cryptor);
+ } finally {
+ cryptor.destroy();
+ }
+ }
+
+ private void createRootFolder(CloudFolder location, Cryptor cryptor) throws BackendException {
+ CloudFolder dFolder = cloudContentRepository.folder(location, DATA_DIR_NAME);
+ dFolder = cloudContentRepository.create(dFolder);
+ String rootDirHash = cryptor.fileNameCryptor().hashDirectoryId(ROOT_DIR_ID);
+ CloudFolder lvl1Folder = cloudContentRepository.folder(dFolder, rootDirHash.substring(0, 2));
+ lvl1Folder = cloudContentRepository.create(lvl1Folder);
+ CloudFolder lvl2Folder = cloudContentRepository.folder(lvl1Folder, rootDirHash.substring(2));
+ cloudContentRepository.create(lvl2Folder);
+ }
+
+ public Cloud decryptedViewOf(Vault vault) throws BackendException {
+ return new CryptoCloud(aCopyOf(vault).build());
+ }
+
+ public Vault unlock(Vault vault, CharSequence password) throws BackendException {
+ return unlock(createUnlockToken(vault), password);
+ }
+
+ public Vault unlock(UnlockToken token, CharSequence password) throws BackendException {
+ UnlockTokenImpl impl = (UnlockTokenImpl) token;
+ Cryptor cryptor = cryptorFor(impl.getKeyFile(), password);
+ cryptoCloudContentRepositoryFactory.registerCryptor(impl.getVault(), cryptor);
+
+ return aCopyOf(token.getVault()) //
+ .withVersion(impl.getKeyFile().getVersion()) //
+ .build();
+ }
+
+ public UnlockTokenImpl createUnlockToken(Vault vault) throws BackendException {
+ CloudFolder vaultLocation = cloudContentRepository.resolve(vault.getCloud(), vault.getPath());
+ return createUnlockToken(vault, vaultLocation);
+ }
+
+ private UnlockTokenImpl createUnlockToken(Vault vault, CloudFolder location) throws BackendException {
+ byte[] keyFileData = readKeyFileData(location);
+ UnlockTokenImpl unlockToken = new UnlockTokenImpl(vault, keyFileData);
+ assertVaultVersionIsSupported(unlockToken.getKeyFile().getVersion());
+ return unlockToken;
+ }
+
+ private Cryptor cryptorFor(KeyFile keyFile, CharSequence password) {
+ return cryptorProvider.createFromKeyFile(keyFile, normalizePassword(password, keyFile.getVersion()), keyFile.getVersion());
+ }
+
+ private CloudFolder vaultLocation(Vault vault) throws BackendException {
+ return cloudContentRepository.resolve(vault.getCloud(), vault.getPath());
+ }
+
+ public boolean isVaultPasswordValid(Vault vault, CharSequence password) throws BackendException {
+ try {
+ // create a cryptor, which checks the password, then destroy it immediately
+ cryptorFor(createUnlockToken(vault).getKeyFile(), password).destroy();
+ return true;
+ } catch (InvalidPassphraseException e) {
+ return false;
+ }
+ }
+
+ public void lock(Vault vault) {
+ cryptoCloudContentRepositoryFactory.deregisterCryptor(vault);
+ }
+
+ private void assertVaultVersionIsSupported(int version) {
+ if (version < MIN_VAULT_VERSION) {
+ throw new UnsupportedVaultFormatException(version, MIN_VAULT_VERSION);
+ } else if (version > MAX_VAULT_VERSION) {
+ throw new UnsupportedVaultFormatException(version, MAX_VAULT_VERSION);
+ }
+ }
+
+ private void writeKeyFile(CloudFolder location, KeyFile keyFile) throws BackendException {
+ byte[] data = keyFile.serialize();
+ cloudContentRepository.write(masterkeyFile(location), ByteArrayDataSource.from(data), NO_OP_PROGRESS_AWARE, false, data.length);
+ }
+
+ private byte[] readKeyFileData(CloudFolder location) throws BackendException {
+ ByteArrayOutputStream data = new ByteArrayOutputStream();
+ cloudContentRepository.read(masterkeyFile(location), Optional.empty(), data, NO_OP_PROGRESS_AWARE);
+ return data.toByteArray();
+ }
+
+ private CloudFile masterkeyFile(CloudFolder location) throws BackendException {
+ return cloudContentRepository.file(location, MASTERKEY_FILE_NAME);
+ }
+
+ private CloudFile masterkeyBackupFile(CloudFolder location, byte[] data) throws BackendException {
+ String fileName = MASTERKEY_FILE_NAME + BackupFileIdSuffixGenerator.generate(data) + MASTERKEY_BACKUP_FILE_EXT;
+ return cloudContentRepository.file(location, fileName);
+ }
+
+ public void changePassword(Vault vault, String oldPassword, String newPassword) throws BackendException {
+ CloudFolder vaultLocation = vaultLocation(vault);
+ ByteArrayOutputStream dataOutputStream = new ByteArrayOutputStream();
+ cloudContentRepository.read(masterkeyFile(vaultLocation), Optional.empty(), dataOutputStream, NO_OP_PROGRESS_AWARE);
+
+ byte[] data = dataOutputStream.toByteArray();
+ int vaultVersion = KeyFile.parse(data).getVersion();
+
+ createBackupMasterKeyFile(data, vaultLocation);
+ createNewMasterKeyFile(data, vaultVersion, oldPassword, newPassword, vaultLocation);
+ }
+
+ private static class UnlockTokenImpl implements UnlockToken {
+
+ private final Vault vault;
+ private final byte[] keyFileData;
+
+ private UnlockTokenImpl(Vault vault, byte[] keyFileData) {
+ this.vault = vault;
+ this.keyFileData = keyFileData;
+ }
+
+ @Override
+ public Vault getVault() {
+ return vault;
+ }
+
+ public KeyFile getKeyFile() {
+ return KeyFile.parse(keyFileData);
+ }
+ }
+
+ private void createBackupMasterKeyFile(byte[] data, CloudFolder vaultLocation) throws BackendException {
+ cloudContentRepository.write( //
+ masterkeyBackupFile(vaultLocation, data), //
+ ByteArrayDataSource.from(data), //
+ NO_OP_PROGRESS_AWARE, //
+ true, //
+ data.length);
+ }
+
+ private void createNewMasterKeyFile(byte[] data, int vaultVersion, String oldPassword, String newPassword, CloudFolder vaultLocation) throws BackendException {
+ byte[] newMasterKeyFile = Cryptors.changePassphrase(cryptorProvider, //
+ data, //
+ normalizePassword(oldPassword, vaultVersion), //
+ normalizePassword(newPassword, vaultVersion));
+ cloudContentRepository.write(masterkeyFile(vaultLocation), //
+ ByteArrayDataSource.from(newMasterKeyFile), //
+ NO_OP_PROGRESS_AWARE, //
+ true, //
+ newMasterKeyFile.length);
+ }
+
+ private CharSequence normalizePassword(CharSequence password, int vaultVersion) {
+ if (vaultVersion >= VERSION_WITH_NORMALIZED_PASSWORDS) {
+ return normalize(password, Normalizer.Form.NFC);
+ } else {
+ return password;
+ }
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoConstants.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoConstants.java
new file mode 100644
index 00000000..45bfabed
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoConstants.java
@@ -0,0 +1,14 @@
+package org.cryptomator.data.cloud.crypto;
+
+class CryptoConstants {
+
+ static final String ROOT_DIR_ID = "";
+ static final String DATA_DIR_NAME = "d";
+ static final String MASTERKEY_FILE_NAME = "masterkey.cryptomator";
+ static final String MASTERKEY_BACKUP_FILE_EXT = ".bkup";
+
+ static final int MAX_VAULT_VERSION = 7;
+ static final int VERSION_WITH_NORMALIZED_PASSWORDS = 6;
+ static final int MIN_VAULT_VERSION = 5;
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoFile.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoFile.java
new file mode 100644
index 00000000..d280b687
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoFile.java
@@ -0,0 +1,80 @@
+package org.cryptomator.data.cloud.crypto;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudFile;
+import org.cryptomator.util.Optional;
+
+import java.util.Date;
+
+class CryptoFile implements CloudFile, CryptoNode {
+
+ private final String name;
+ private final String path;
+ private final Optional size;
+ private final CloudFile cloudFile;
+ private final CryptoFolder parent;
+
+ public CryptoFile(CryptoFolder parent, String name, String path, Optional size, CloudFile cloudFile) {
+ this.parent = parent;
+ this.name = name;
+ this.path = path;
+ this.size = size;
+ this.cloudFile = cloudFile;
+ }
+
+ @Override
+ public Cloud getCloud() {
+ return parent.getCloud();
+ }
+
+ @Override
+ public String getName() {
+ return name;
+ }
+
+ @Override
+ public String getPath() {
+ return path;
+ }
+
+ @Override
+ public CryptoFolder getParent() {
+ return parent;
+ }
+
+ @Override
+ public Optional getSize() {
+ return size;
+ }
+
+ @Override
+ public Optional getModified() {
+ return cloudFile.getModified();
+ }
+
+ /**
+ * @return The actual file in the underlying, i.e. decorated, CloudContentRepository
+ */
+ CloudFile getCloudFile() {
+ return cloudFile;
+ }
+
+ @Override
+ public boolean equals(Object obj) {
+ if (obj == null || getClass() != obj.getClass())
+ return false;
+ if (obj == this)
+ return true;
+ return internalEquals((CryptoFile) obj);
+ }
+
+ private boolean internalEquals(CryptoFile obj) {
+ return path != null && path.equals(obj.path);
+ }
+
+ @Override
+ public int hashCode() {
+ return path == null ? 0 : path.hashCode();
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoFolder.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoFolder.java
new file mode 100644
index 00000000..9cdb6858
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoFolder.java
@@ -0,0 +1,70 @@
+package org.cryptomator.data.cloud.crypto;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudFile;
+import org.cryptomator.domain.CloudFolder;
+
+class CryptoFolder implements CloudFolder, CryptoNode {
+
+ private final String name;
+ private final String path;
+ private final CryptoFolder parent;
+ private final CloudFile dirFile;
+
+ CryptoFolder(CryptoFolder parent, String name, String path, CloudFile dirFile) {
+ this.parent = parent;
+ this.name = name;
+ this.path = path;
+ this.dirFile = dirFile;
+ }
+
+ @Override
+ public Cloud getCloud() {
+ return parent.getCloud();
+ }
+
+ @Override
+ public String getName() {
+ return name;
+ }
+
+ @Override
+ public String getPath() {
+ return path;
+ }
+
+ @Override
+ public CryptoFolder getParent() {
+ return parent;
+ }
+
+ /**
+ * @return the file containing the directory id, in the underlying, i.e. decorated, CloudContentRepository
+ */
+ CloudFile getDirFile() {
+ return dirFile;
+ }
+
+ @Override
+ public boolean equals(Object obj) {
+ if (obj == null || getClass() != obj.getClass())
+ return false;
+ if (obj == this)
+ return true;
+ return internalEquals((CryptoFolder) obj);
+ }
+
+ private boolean internalEquals(CryptoFolder obj) {
+ return path != null && path.equals(obj.path);
+ }
+
+ @Override
+ public int hashCode() {
+ return path == null ? 0 : path.hashCode();
+ }
+
+ @Override
+ public CryptoFolder withCloud(Cloud cloud) {
+ return new CryptoFolder(parent.withCloud(cloud), name, path, dirFile);
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoImplDecorator.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoImplDecorator.java
new file mode 100644
index 00000000..def3a346
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoImplDecorator.java
@@ -0,0 +1,424 @@
+package org.cryptomator.data.cloud.crypto;
+
+import android.content.Context;
+
+import org.cryptomator.cryptolib.Cryptors;
+import org.cryptomator.cryptolib.DecryptingReadableByteChannel;
+import org.cryptomator.cryptolib.EncryptingWritableByteChannel;
+import org.cryptomator.cryptolib.api.Cryptor;
+import org.cryptomator.data.cloud.crypto.DirIdCache.DirIdInfo;
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudFile;
+import org.cryptomator.domain.CloudFolder;
+import org.cryptomator.domain.CloudNode;
+import org.cryptomator.domain.exception.BackendException;
+import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
+import org.cryptomator.domain.exception.EmptyDirFileException;
+import org.cryptomator.domain.exception.FatalBackendException;
+import org.cryptomator.domain.exception.NoDirFileException;
+import org.cryptomator.domain.repository.CloudContentRepository;
+import org.cryptomator.domain.usecases.DownloadFileReplacingProgressAware;
+import org.cryptomator.domain.usecases.ProgressAware;
+import org.cryptomator.domain.usecases.UploadFileReplacingProgressAware;
+import org.cryptomator.domain.usecases.cloud.DataSource;
+import org.cryptomator.domain.usecases.cloud.DownloadState;
+import org.cryptomator.domain.usecases.cloud.FileBasedDataSource;
+import org.cryptomator.domain.usecases.cloud.Progress;
+import org.cryptomator.domain.usecases.cloud.UploadState;
+import org.cryptomator.util.Optional;
+import org.cryptomator.util.Supplier;
+
+import java.io.ByteArrayOutputStream;
+import java.io.File;
+import java.io.FileInputStream;
+import java.io.FileOutputStream;
+import java.io.IOException;
+import java.io.InputStream;
+import java.io.OutputStream;
+import java.nio.ByteBuffer;
+import java.nio.channels.Channels;
+import java.nio.channels.ReadableByteChannel;
+import java.nio.channels.WritableByteChannel;
+import java.util.Collections;
+import java.util.LinkedList;
+import java.util.List;
+import java.util.Queue;
+import java.util.UUID;
+
+import static org.cryptomator.data.cloud.crypto.CryptoConstants.DATA_DIR_NAME;
+import static org.cryptomator.domain.usecases.ProgressAware.NO_OP_PROGRESS_AWARE;
+import static org.cryptomator.domain.usecases.cloud.Progress.progress;
+
+abstract class CryptoImplDecorator {
+
+ final CloudContentRepository cloudContentRepository;
+ final Context context;
+ final DirIdCache dirIdCache;
+
+ private final Supplier cryptor;
+ private final CloudFolder storageLocation;
+
+ private RootCryptoFolder root;
+
+ CryptoImplDecorator(Context context, Supplier cryptor, CloudContentRepository cloudContentRepository, CloudFolder storageLocation, DirIdCache dirIdCache) {
+ this.context = context;
+ this.cryptor = cryptor;
+ this.cloudContentRepository = cloudContentRepository;
+ this.storageLocation = storageLocation;
+ this.dirIdCache = dirIdCache;
+ }
+
+ abstract CryptoFolder folder(CryptoFolder cryptoParent, String cleartextName) throws BackendException;
+
+ abstract String decryptName(String dirId, String encryptedName);
+
+ abstract String encryptName(CryptoFolder cryptoParent, String name) throws BackendException;
+
+ abstract Optional extractEncryptedName(String ciphertextName);
+
+ abstract List list(CryptoFolder cryptoFolder) throws BackendException;
+
+ abstract String encryptFolderName(CryptoFolder cryptoFolder, String name) throws BackendException;
+
+ abstract CryptoSymlink symlink(CryptoFolder cryptoParent, String cleartextName, String target) throws BackendException;
+
+ abstract CryptoFolder create(CryptoFolder folder) throws BackendException;
+
+ abstract CryptoFolder move(CryptoFolder source, CryptoFolder target) throws BackendException;
+
+ abstract CryptoFile move(CryptoFile source, CryptoFile target) throws BackendException;
+
+ abstract void delete(CloudNode node) throws BackendException;
+
+ abstract CryptoFile write(CryptoFile cryptoFile, DataSource data, ProgressAware progressAware, boolean replace, long length) throws BackendException;
+
+ abstract String loadDirId(CryptoFolder folder) throws BackendException, EmptyDirFileException;
+
+ abstract DirIdInfo createDirIdInfo(CryptoFolder folder) throws BackendException;
+
+ private String dirHash(String directoryId) {
+ return cryptor().fileNameCryptor().hashDirectoryId(directoryId);
+ }
+
+ private CloudFolder dataFolder() throws BackendException {
+ return cloudContentRepository.folder(storageLocation, DATA_DIR_NAME);
+ }
+
+ String path(CloudFolder base, String name) {
+ return base.getPath() + "/" + name;
+ }
+
+ File getInternalCache() {
+ return context.getCacheDir();
+ }
+
+ List deepCollectSubfolders(CryptoFolder source) throws BackendException {
+ Queue queue = new LinkedList<>();
+ queue.add(source);
+
+ List result = new LinkedList<>();
+ while (!queue.isEmpty()) {
+ CryptoFolder folder = queue.remove();
+ List subfolders = shallowCollectSubfolders(folder);
+ queue.addAll(subfolders);
+ result.addAll(subfolders);
+ }
+
+ Collections.reverse(result);
+
+ return result;
+ }
+
+ private List shallowCollectSubfolders(CryptoFolder source) throws BackendException {
+ List result = new LinkedList<>();
+
+ try {
+ List list = list(source);
+ for (CloudNode node : list) {
+ if (node instanceof CryptoFolder) {
+ result.add((CryptoFolder) node);
+ }
+ }
+ } catch (NoDirFileException e) {
+ // Ignoring because nothing can be done if the dir-file doesn't exists in the cloud
+ }
+
+ return result;
+ }
+
+ public RootCryptoFolder root(CryptoCloud cryptoCloud) throws BackendException {
+ if (root == null) {
+ root = new RootCryptoFolder(cryptoCloud);
+ }
+ return root;
+ }
+
+ public CryptoFolder resolve(CryptoCloud cloud, String path) throws BackendException {
+ if (path.startsWith("/")) {
+ path = path.substring(1);
+ }
+ String[] names = path.split("/");
+ CryptoFolder folder = root(cloud);
+ for (String name : names) {
+ folder = folder(folder, name);
+ }
+ return folder;
+ }
+
+ public CryptoFile file(CryptoFolder cryptoParent, String cleartextName) throws BackendException {
+ return file(cryptoParent, cleartextName, Optional.empty());
+ }
+
+ public CryptoFile file(CryptoFolder cryptoParent, String cleartextName, Optional cleartextSize) throws BackendException {
+ String ciphertextName = encryptFileName(cryptoParent, cleartextName);
+ return file(cryptoParent, cleartextName, ciphertextName, cleartextSize);
+ }
+
+ private CryptoFile file(CryptoFolder cryptoParent, String cleartextName, String ciphertextName, Optional cleartextSize) throws BackendException {
+ Optional ciphertextSize;
+ if (cleartextSize.isPresent()) {
+ ciphertextSize = Optional.of(Cryptors.ciphertextSize(cleartextSize.get(), cryptor()) + cryptor().fileHeaderCryptor().headerSize());
+ } else {
+ ciphertextSize = Optional.empty();
+ }
+ CloudFile cloudFile = cloudContentRepository.file(dirIdInfo(cryptoParent).getCloudFolder(), ciphertextName, ciphertextSize);
+ return file(cryptoParent, cleartextName, cloudFile, cleartextSize);
+ }
+
+ CryptoFile file(CryptoFile cryptoFile, CloudFile cloudFile, Optional cleartextSize) throws BackendException {
+ return file(cryptoFile.getParent(), cryptoFile.getName(), cloudFile, cleartextSize);
+ }
+
+ CryptoFile file(CryptoFolder cryptoParent, String cleartextName, CloudFile cloudFile, Optional cleartextSize) throws BackendException {
+ return new CryptoFile(cryptoParent, cleartextName, path(cryptoParent, cleartextName), cleartextSize, cloudFile);
+ }
+
+ private String encryptFileName(CryptoFolder cryptoParent, String name) throws BackendException {
+ return encryptName(cryptoParent, name);
+ }
+
+ CryptoFolder folder(CryptoFolder cryptoParent, String cleartextName, CloudFile dirFile) throws BackendException {
+ return new CryptoFolder(cryptoParent, cleartextName, path(cryptoParent, cleartextName), dirFile);
+ }
+
+ CryptoFolder folder(CryptoFolder cryptoFolder, CloudFile dirFile) throws BackendException {
+ return new CryptoFolder(cryptoFolder.getParent(), cryptoFolder.getName(), cryptoFolder.getPath(), dirFile);
+ }
+
+ boolean exists(CloudNode node) throws BackendException {
+ if (node instanceof CryptoFolder) {
+ return exists((CryptoFolder) node);
+ } else if (node instanceof CryptoFile) {
+ return exists((CryptoFile) node);
+ } else if (node instanceof CryptoSymlink) {
+ return exists((CryptoSymlink) node);
+ } else {
+ throw new IllegalArgumentException("Unexpected CloudNode type: " + node.getClass());
+ }
+ }
+
+ private boolean exists(CryptoFolder folder) throws BackendException {
+ return cloudContentRepository.exists(folder.getDirFile()) && cloudContentRepository.exists(dirIdInfo(folder).getCloudFolder());
+ }
+
+ private boolean exists(CryptoFile file) throws BackendException {
+ return cloudContentRepository.exists(file.getCloudFile());
+ }
+
+ private boolean exists(CryptoSymlink symlink) throws BackendException {
+ return cloudContentRepository.exists(symlink.getCloudFile());
+ }
+
+ void assertCryptoFolderAlreadyExists(CryptoFolder cryptoFolder) throws BackendException {
+ if (cloudContentRepository.exists(cryptoFolder.getDirFile()) //
+ || cloudContentRepository.exists(file(cryptoFolder.getParent(), cryptoFolder.getName()))) {
+ throw new CloudNodeAlreadyExistsException(cryptoFolder.getName());
+ }
+ }
+
+ void assertCryptoFileAlreadyExists(CryptoFile cryptoFile) throws BackendException {
+ if (cloudContentRepository.exists(cryptoFile.getCloudFile()) //
+ || cloudContentRepository.exists(folder(cryptoFile.getParent(), cryptoFile.getName()).getDirFile())) {
+ throw new CloudNodeAlreadyExistsException("CloudNode already exists and replace is false");
+ }
+ }
+
+ private CryptoFile writeFromTmpFile(DataSource originalDataSource, final CryptoFile cryptoFile, File encryptedFile, final ProgressAware progressAware, boolean replace)
+ throws BackendException, IOException {
+ CryptoFile targetFile = targetFile(cryptoFile, replace);
+ return file(targetFile, //
+ cloudContentRepository.write( //
+ targetFile.getCloudFile(), //
+ originalDataSource.decorate(FileBasedDataSource.from(encryptedFile)), //
+ new UploadFileReplacingProgressAware(cryptoFile, progressAware), //
+ replace, //
+ encryptedFile.length()), //
+ cryptoFile.getSize());
+ }
+
+ private CryptoFile targetFile(CryptoFile cryptoFile, boolean replace) throws BackendException {
+ if (replace || !cloudContentRepository.exists(cryptoFile)) {
+ return cryptoFile;
+ }
+ return firstNonExistingAutoRenamedFile(cryptoFile);
+ }
+
+ private CryptoFile firstNonExistingAutoRenamedFile(CryptoFile original) throws BackendException {
+ String name = original.getName();
+ String nameWithoutExtension = nameWithoutExtension(name);
+ String extension = extension(name);
+ int counter = 1;
+ CryptoFile result;
+ do {
+ String newFileName = nameWithoutExtension + " (" + counter + ")" + extension;
+ result = file(original.getParent(), newFileName, original.getSize());
+ counter++;
+ } while (cloudContentRepository.exists(result));
+ return result;
+ }
+
+ String nameWithoutExtension(String name) {
+ int lastDot = name.lastIndexOf(".");
+ if (lastDot == -1) {
+ return name;
+ }
+ return name.substring(0, lastDot);
+ }
+
+ String extension(String name) {
+ int lastDot = name.lastIndexOf(".");
+ if (lastDot == -1) {
+ return "";
+ }
+ return name.substring(lastDot + 1);
+ }
+
+ public void read(CryptoFile cryptoFile, OutputStream data, ProgressAware progressAware) throws BackendException {
+ CloudFile ciphertextFile = cryptoFile.getCloudFile();
+ try {
+ File encryptedTmpFile = readToTmpFile(cryptoFile, ciphertextFile, progressAware);
+ progressAware.onProgress(Progress.started(DownloadState.decryption(cryptoFile)));
+ try (ReadableByteChannel readableByteChannel = Channels.newChannel(new FileInputStream(encryptedTmpFile));
+ ReadableByteChannel decryptingReadableByteChannel = new DecryptingReadableByteChannel(readableByteChannel, cryptor(), true)) {
+ ByteBuffer buff = ByteBuffer.allocate(cryptor().fileContentCryptor().ciphertextChunkSize());
+ long cleartextSize = cryptoFile.getSize().orElse(Long.MAX_VALUE);
+ long decrypted = 0;
+ int read;
+ while ((read = decryptingReadableByteChannel.read(buff)) > 0) {
+ buff.flip();
+ data.write(buff.array(), 0, buff.remaining());
+ decrypted += read;
+ progressAware.onProgress(progress(DownloadState.decryption(cryptoFile)).between(0).and(cleartextSize).withValue(decrypted));
+ }
+ } finally {
+ encryptedTmpFile.delete();
+ progressAware.onProgress(Progress.completed(DownloadState.decryption(cryptoFile)));
+ }
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ private File readToTmpFile(CryptoFile cryptoFile, CloudFile file, ProgressAware progressAware) throws BackendException, IOException {
+ File encryptedTmpFile = File.createTempFile(UUID.randomUUID().toString(), ".crypto", getInternalCache());
+ try (OutputStream encryptedData = new FileOutputStream(encryptedTmpFile)) {
+ cloudContentRepository.read(file, Optional.of(encryptedTmpFile), encryptedData, new DownloadFileReplacingProgressAware(cryptoFile, progressAware));
+ return encryptedTmpFile;
+ }
+ }
+
+ public String currentAccount(Cloud cloud) throws BackendException {
+ return cloudContentRepository.checkAuthenticationAndRetrieveCurrentAccount(cloud);
+ }
+
+ DirIdInfo dirIdInfo(CryptoFolder folder) throws BackendException {
+ DirIdInfo dirIdInfo = dirIdCache.get(folder);
+ if (dirIdInfo == null) {
+ return createDirIdInfo(folder);
+ }
+ return dirIdInfo;
+ }
+
+ DirIdInfo createDirIdInfoFor(String dirId) throws BackendException {
+ String dirHash = dirHash(dirId);
+ CloudFolder lvl2Dir = lvl2Dir(dirHash);
+ return new DirIdInfo(dirId, lvl2Dir);
+ }
+
+ byte[] loadContentsOfDirFile(CryptoFolder folder) throws BackendException, EmptyDirFileException {
+ try (ByteArrayOutputStream out = new ByteArrayOutputStream()) {
+ cloudContentRepository.read(folder.getDirFile(), Optional.empty(), out, NO_OP_PROGRESS_AWARE);
+ if (dirfileIsEmpty(out)) {
+ throw new EmptyDirFileException(folder.getName(), folder.getDirFile().getPath());
+ }
+ return out.toByteArray();
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ String newDirId() {
+ return UUID.randomUUID().toString();
+ }
+
+ boolean dirfileIsEmpty(ByteArrayOutputStream out) {
+ return out.size() == 0;
+ }
+
+ private CloudFolder lvl2Dir(String dirHash) throws BackendException {
+ return cloudContentRepository.folder(lvl1Dir(dirHash), dirHash.substring(2));
+ }
+
+ private CloudFolder lvl1Dir(String dirHash) throws BackendException {
+ return cloudContentRepository.folder(dataFolder(), dirHash.substring(0, 2));
+ }
+
+ Cryptor cryptor() {
+ return cryptor.get();
+ }
+
+ CloudFolder storageLocation() {
+ return storageLocation;
+ }
+
+ void addFolderToCache(CryptoFolder result, DirIdCache.DirIdInfo dirInfo) {
+ dirIdCache.put(result, dirInfo);
+ }
+
+ void evictFromCache(CryptoFolder cryptoFolder) {
+ dirIdCache.evict(cryptoFolder);
+ }
+
+ CryptoFile writeShortNameFile(CryptoFile cryptoFile, DataSource data, ProgressAware progressAware, boolean replace, long length) throws BackendException {
+ if (!replace) {
+ assertCryptoFileAlreadyExists(cryptoFile);
+ }
+ try (InputStream stream = data.open(context)) {
+ File encryptedTmpFile = File.createTempFile(UUID.randomUUID().toString(), ".crypto", getInternalCache());
+ try (WritableByteChannel writableByteChannel = Channels.newChannel(new FileOutputStream(encryptedTmpFile));
+ WritableByteChannel encryptingWritableByteChannel = new EncryptingWritableByteChannel(writableByteChannel, cryptor())) {
+ progressAware.onProgress(Progress.started(UploadState.encryption(cryptoFile)));
+ ByteBuffer buff = ByteBuffer.allocate(cryptor().fileContentCryptor().cleartextChunkSize());
+ long ciphertextSize = Cryptors.ciphertextSize(cryptoFile.getSize().get(), cryptor()) + cryptor().fileHeaderCryptor().headerSize();
+ int read;
+ long encrypted = 0;
+ while ((read = stream.read(buff.array())) > 0) {
+ buff.limit(read);
+ int written = encryptingWritableByteChannel.write(buff);
+ buff.flip();
+ encrypted += written;
+ progressAware.onProgress(progress(UploadState.encryption(cryptoFile)).between(0).and(ciphertextSize).withValue(encrypted));
+ }
+ encryptingWritableByteChannel.close();
+ progressAware.onProgress(Progress.completed(UploadState.encryption(cryptoFile)));
+ return writeFromTmpFile(data, cryptoFile, encryptedTmpFile, progressAware, replace);
+ } catch (Throwable e) {
+ throw e;
+ } finally {
+ encryptedTmpFile.delete();
+ }
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoImplVaultFormat7.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoImplVaultFormat7.java
new file mode 100644
index 00000000..7bd37584
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoImplVaultFormat7.java
@@ -0,0 +1,546 @@
+package org.cryptomator.data.cloud.crypto;
+
+import android.content.Context;
+
+import com.google.common.io.BaseEncoding;
+
+import org.cryptomator.cryptolib.Cryptors;
+import org.cryptomator.cryptolib.EncryptingWritableByteChannel;
+import org.cryptomator.cryptolib.api.AuthenticationFailedException;
+import org.cryptomator.cryptolib.api.Cryptor;
+import org.cryptomator.cryptolib.common.MessageDigestSupplier;
+import org.cryptomator.domain.CloudFile;
+import org.cryptomator.domain.CloudFolder;
+import org.cryptomator.domain.CloudNode;
+import org.cryptomator.domain.exception.BackendException;
+import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
+import org.cryptomator.domain.exception.EmptyDirFileException;
+import org.cryptomator.domain.exception.FatalBackendException;
+import org.cryptomator.domain.exception.NoDirFileException;
+import org.cryptomator.domain.exception.NoSuchCloudFileException;
+import org.cryptomator.domain.exception.SymLinkException;
+import org.cryptomator.domain.repository.CloudContentRepository;
+import org.cryptomator.domain.usecases.ProgressAware;
+import org.cryptomator.domain.usecases.UploadFileReplacingProgressAware;
+import org.cryptomator.domain.usecases.cloud.ByteArrayDataSource;
+import org.cryptomator.domain.usecases.cloud.DataSource;
+import org.cryptomator.domain.usecases.cloud.FileBasedDataSource;
+import org.cryptomator.domain.usecases.cloud.Progress;
+import org.cryptomator.domain.usecases.cloud.UploadState;
+import org.cryptomator.util.Optional;
+import org.cryptomator.util.Supplier;
+
+import java.io.ByteArrayOutputStream;
+import java.io.File;
+import java.io.FileOutputStream;
+import java.io.IOException;
+import java.io.InputStream;
+import java.nio.ByteBuffer;
+import java.nio.channels.Channels;
+import java.nio.channels.WritableByteChannel;
+import java.util.ArrayList;
+import java.util.Collections;
+import java.util.List;
+import java.util.UUID;
+import java.util.regex.Matcher;
+import java.util.regex.Pattern;
+
+import timber.log.Timber;
+
+import static org.cryptomator.domain.usecases.ProgressAware.NO_OP_PROGRESS_AWARE;
+import static org.cryptomator.domain.usecases.cloud.Progress.progress;
+import static org.cryptomator.util.Encodings.UTF_8;
+
+final class CryptoImplVaultFormat7 extends CryptoImplDecorator {
+
+ private static final int SHORT_NAMES_MAX_LENGTH = 220;
+ private static final String CLOUD_NODE_EXT = ".c9r";
+ private static final String LONG_NODE_FILE_EXT = ".c9s";
+ private static final String CLOUD_FOLDER_DIR_FILE_PRE = "dir";
+ private static final String LONG_NODE_FILE_CONTENT_CONTENTS = "contents";
+ private static final String LONG_NODE_FILE_CONTENT_NAME = "name";
+ private static final String CLOUD_NODE_SYMLINK_PRE = "symlink";
+ private static final Pattern BASE64_ENCRYPTED_NAME_PATTERN = Pattern.compile("^([A-Za-z0-9+/\\-_]{4})*([A-Za-z0-9+/\\-]{4}|[A-Za-z0-9+/\\-_]{3}=|[A-Za-z0-9+/\\-_]{2}==)?$");
+
+ private static final BaseEncoding BASE64 = BaseEncoding.base64Url();
+
+ CryptoImplVaultFormat7(Context context, Supplier cryptor, CloudContentRepository cloudContentRepository, CloudFolder storageLocation, DirIdCache dirIdCache) {
+ super(context, cryptor, cloudContentRepository, storageLocation, dirIdCache);
+ }
+
+ @Override
+ CryptoFolder folder(CryptoFolder cryptoParent, String cleartextName) throws BackendException {
+ String dirFileName = encryptFolderName(cryptoParent, cleartextName);
+ CloudFolder dirFolder = cloudContentRepository.folder(dirIdInfo(cryptoParent).getCloudFolder(), dirFileName);
+ CloudFile dirFile = cloudContentRepository.file(dirFolder, CLOUD_FOLDER_DIR_FILE_PRE + CLOUD_NODE_EXT);
+ return folder(cryptoParent, cleartextName, dirFile);
+ }
+
+ @Override
+ String encryptName(CryptoFolder cryptoFolder, String name) throws BackendException {
+ String ciphertextName = cryptor() //
+ .fileNameCryptor() //
+ .encryptFilename(BASE64, name, dirIdInfo(cryptoFolder).getId().getBytes(UTF_8)) + CLOUD_NODE_EXT;
+
+ if (ciphertextName.length() > SHORT_NAMES_MAX_LENGTH) {
+ ciphertextName = deflate(cryptoFolder, ciphertextName);
+ }
+ return ciphertextName;
+ }
+
+ private String deflate(CryptoFolder cryptoParent, String longFileName) throws BackendException {
+ byte[] longFilenameBytes = longFileName.getBytes(UTF_8);
+ byte[] hash = MessageDigestSupplier.SHA1.get().digest(longFilenameBytes);
+ String shortFileName = BASE64.encode(hash) + LONG_NODE_FILE_EXT;
+
+ CloudFolder dirFolder = cloudContentRepository.folder(dirIdInfo(cryptoParent).getCloudFolder(), shortFileName);
+
+ // if folder already exists in case of renaming
+ if (!cloudContentRepository.exists(dirFolder)) {
+ dirFolder = cloudContentRepository.create(dirFolder);
+ }
+
+ byte[] data = longFileName.getBytes(UTF_8);
+ CloudFile cloudFile = cloudContentRepository.file(dirFolder, LONG_NODE_FILE_CONTENT_NAME + LONG_NODE_FILE_EXT, Optional.of((long) data.length));
+ cloudContentRepository.write(cloudFile, ByteArrayDataSource.from(data), NO_OP_PROGRESS_AWARE, true, data.length);
+ return shortFileName;
+ }
+
+ private CloudFile metadataFile(CloudNode cloudNode) throws BackendException {
+ CloudFolder cloudFolder;
+
+ if (cloudNode instanceof CloudFile) {
+ cloudFolder = cloudNode.getParent();
+ } else if (cloudNode instanceof CloudFolder) {
+ cloudFolder = (CloudFolder) cloudNode;
+ } else {
+ throw new IllegalStateException("Should be file or folder");
+ }
+
+ return cloudContentRepository.file(cloudFolder, LONG_NODE_FILE_CONTENT_NAME + LONG_NODE_FILE_EXT);
+ }
+
+ private String inflate(CloudNode cloudNode) throws BackendException {
+ CloudFile metadataFile = metadataFile(cloudNode);
+ ByteArrayOutputStream out = new ByteArrayOutputStream();
+ cloudContentRepository.read(metadataFile, Optional.empty(), out, NO_OP_PROGRESS_AWARE);
+ return new String(out.toByteArray(), UTF_8);
+ }
+
+ @Override
+ String decryptName(String dirId, String encryptedName) {
+ Optional ciphertextName = extractEncryptedName(encryptedName);
+ if (ciphertextName.isPresent()) {
+ return cryptor().fileNameCryptor().decryptFilename(BASE64, ciphertextName.get(), dirId.getBytes(UTF_8));
+ } else {
+ return null;
+ }
+ }
+
+ @Override
+ List list(CryptoFolder cryptoFolder) throws BackendException {
+ dirIdCache.evictSubFoldersOf(cryptoFolder);
+
+ DirIdCache.DirIdInfo dirIdInfo = dirIdInfo(cryptoFolder);
+ String dirId = dirIdInfo(cryptoFolder).getId();
+ CloudFolder lvl2Dir = dirIdInfo.getCloudFolder();
+
+ List ciphertextNodes;
+
+ try {
+ ciphertextNodes = cloudContentRepository.list(lvl2Dir);
+ } catch (NoSuchCloudFileException e) {
+ if (cryptoFolder instanceof RootCryptoFolder) {
+ Timber.tag("CryptoFs").e("No lvl2Dir exists for root folder in %s", lvl2Dir.getPath());
+ throw new FatalBackendException(String.format("No lvl2Dir exists for root folder in %s", lvl2Dir.getPath()), e);
+ } else if (cloudContentRepository.exists(cloudContentRepository.file(cryptoFolder.getDirFile().getParent(), CLOUD_NODE_SYMLINK_PRE + CLOUD_NODE_EXT))) {
+ throw new SymLinkException();
+ } else if (!cloudContentRepository.exists(cryptoFolder.getDirFile())) {
+ Timber.tag("CryptoFs").e("No dir file exists in %s", cryptoFolder.getDirFile().getPath());
+ throw new NoDirFileException(cryptoFolder.getName(), cryptoFolder.getDirFile().getPath());
+ }
+ return Collections.emptyList();
+ }
+
+ List result = new ArrayList<>();
+ for (CloudNode node : ciphertextNodes) {
+ ciphertextToCleartextNode(cryptoFolder, dirId, node).ifPresent(result::add);
+ }
+
+ return result;
+ }
+
+ private Optional ciphertextToCleartextNode(CryptoFolder cryptoFolder, String dirId, CloudNode cloudNode) throws BackendException {
+ String ciphertextName = cloudNode.getName();
+ Optional longNameFolderDirFile = Optional.empty();
+ Optional longNameFile = Optional.empty();
+
+ if (ciphertextName.endsWith(CLOUD_NODE_EXT)) {
+ ciphertextName = nameWithoutExtension(ciphertextName);
+ } else if (ciphertextName.endsWith(LONG_NODE_FILE_EXT)) {
+ Optional ciphertextNameOption = longNodeCiphertextName(cloudNode);
+ if (ciphertextNameOption.isPresent()) {
+ ciphertextName = ciphertextNameOption.get();
+ } else {
+ return Optional.empty();
+ }
+
+ List subfiles = cloudContentRepository.list((CloudFolder) cloudNode);
+
+ for (CloudNode cloudNode1 : subfiles) {
+ switch (cloudNode1.getName()) {
+ case LONG_NODE_FILE_CONTENT_CONTENTS + CLOUD_NODE_EXT:
+ longNameFile = Optional.of((CloudFile) cloudNode1);
+ break;
+ case CLOUD_FOLDER_DIR_FILE_PRE + CLOUD_NODE_EXT:
+ longNameFolderDirFile = Optional.of((CloudFile) cloudNode1);
+ break;
+ case CLOUD_NODE_SYMLINK_PRE + CLOUD_NODE_EXT:
+ return Optional.empty();
+ }
+ }
+ }
+
+ try {
+ String cleartextName = decryptName(dirId, ciphertextName);
+
+ if (cleartextName == null) {
+ Timber.tag("CryptoFs").w("Failed to parse cipher text name of: %s", cloudNode.getPath());
+ return Optional.empty();
+ }
+
+ return cloudNodeFromName(cloudNode, cryptoFolder, cleartextName, longNameFile, longNameFolderDirFile);
+ } catch (AuthenticationFailedException e) {
+ Timber.tag("CryptoFs").w(e, "File/Folder name authentication failed: %s", cloudNode.getPath());
+ return Optional.empty();
+ } catch (IllegalArgumentException e) {
+ Timber.tag("CryptoFs").w(e, "Illegal ciphertext filename/folder: %s", cloudNode.getPath());
+ return Optional.empty();
+ }
+ }
+
+ private Optional cloudNodeFromName(CloudNode cloudNode, CryptoFolder cryptoFolder, String cleartextName, Optional longNameFile, Optional dirFile) throws BackendException {
+ if (cloudNode instanceof CloudFile) {
+ CloudFile cloudFile = (CloudFile) cloudNode;
+ Optional cleartextSize = Optional.empty();
+ if (cloudFile.getSize().isPresent()) {
+ long ciphertextSizeWithoutHeader = cloudFile.getSize().get() - cryptor().fileHeaderCryptor().headerSize();
+ if (ciphertextSizeWithoutHeader >= 0) {
+ cleartextSize = Optional.of(Cryptors.cleartextSize(ciphertextSizeWithoutHeader, cryptor()));
+ }
+ }
+ return Optional.of(file(cryptoFolder, cleartextName, cloudFile, cleartextSize));
+ } else if (cloudNode instanceof CloudFolder) {
+ if (longNameFile.isPresent()) {
+ // long file
+ Optional cleartextSize = Optional.empty();
+ if (longNameFile.get().getSize().isPresent()) {
+ long ciphertextSizeWithoutHeader = longNameFile.get().getSize().get() - cryptor().fileHeaderCryptor().headerSize();
+ if (ciphertextSizeWithoutHeader >= 0) {
+ cleartextSize = Optional.of(Cryptors.cleartextSize(ciphertextSizeWithoutHeader, cryptor()));
+ }
+ }
+
+ return Optional.of(file(cryptoFolder, cleartextName, longNameFile.get(), cleartextSize));
+ } else {
+ // folder
+ if (dirFile.isPresent()) {
+ return Optional.of(folder(cryptoFolder, cleartextName, dirFile.get()));
+ } else {
+ CloudFile constructedDirFile = cloudContentRepository.file((CloudFolder) cloudNode, "dir" + CLOUD_NODE_EXT);
+ return Optional.of(folder(cryptoFolder, cleartextName, constructedDirFile));
+ }
+ }
+ }
+
+ return Optional.empty();
+ }
+
+ private Optional longNodeCiphertextName(CloudNode cloudNode) {
+ try {
+ String ciphertextName = inflate(cloudNode);
+ ciphertextName = nameWithoutExtension(ciphertextName);
+ return Optional.of(ciphertextName);
+ } catch (NoSuchCloudFileException e) {
+ Timber.tag("CryptoFs").e("Missing %s%s for cloud node: %s", LONG_NODE_FILE_CONTENT_NAME, LONG_NODE_FILE_EXT, cloudNode.getPath());
+ return Optional.empty();
+ } catch (BackendException e) {
+ Timber.tag("CryptoFs").e(e, "Failed to read %s%s for cloud node: %s", LONG_NODE_FILE_CONTENT_NAME, LONG_NODE_FILE_EXT, cloudNode.getPath());
+ return Optional.empty();
+ }
+ }
+
+ @Override
+ DirIdCache.DirIdInfo createDirIdInfo(CryptoFolder folder) throws BackendException {
+ String dirId = loadDirId(folder);
+ return dirIdCache.put(folder, createDirIdInfoFor(dirId));
+ }
+
+ @Override
+ String encryptFolderName(CryptoFolder cryptoFolder, String name) throws BackendException {
+ return encryptName(cryptoFolder, name);
+ }
+
+ @Override
+ CryptoSymlink symlink(CryptoFolder cryptoParent, String cleartextName, String target) throws BackendException {
+ return null;
+ }
+
+ @Override
+ String loadDirId(CryptoFolder folder) throws BackendException, EmptyDirFileException {
+ CloudFile dirFile = null;
+
+ if (folder.getDirFile() != null) {
+ dirFile = folder.getDirFile();
+ }
+
+ if (RootCryptoFolder.isRoot(folder)) {
+ return CryptoConstants.ROOT_DIR_ID;
+ } else if (dirFile != null && cloudContentRepository.exists(dirFile)) {
+ return new String(loadContentsOfDirFile(dirFile), UTF_8);
+ } else {
+ return newDirId();
+ }
+ }
+
+ private byte[] loadContentsOfDirFile(CloudFile file) throws BackendException, EmptyDirFileException {
+ try (ByteArrayOutputStream out = new ByteArrayOutputStream()) {
+ cloudContentRepository.read(file, Optional.empty(), out, NO_OP_PROGRESS_AWARE);
+ if (dirfileIsEmpty(out)) {
+ throw new EmptyDirFileException(file.getName(), file.getPath());
+ }
+ return out.toByteArray();
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ CryptoFolder create(CryptoFolder folder) throws BackendException {
+ boolean shortName = false;
+ if (folder.getDirFile().getParent().getName().endsWith(LONG_NODE_FILE_EXT)) {
+ assertCryptoLongDirFileAlreadyExists(folder);
+ } else {
+ assertCryptoFolderAlreadyExists(folder);
+ shortName = true;
+ }
+
+ DirIdCache.DirIdInfo dirIdInfo = dirIdInfo(folder);
+ CloudFolder createdCloudFolder = cloudContentRepository.create(dirIdInfo.getCloudFolder());
+
+ CloudFolder dirFolder = folder.getDirFile().getParent();
+ CloudFile dirFile = folder.getDirFile();
+ if (shortName) {
+ dirFolder = cloudContentRepository.create(dirFolder);
+ dirFile = cloudContentRepository.file(dirFolder, folder.getDirFile().getName());
+ }
+
+ byte[] dirId = dirIdInfo.getId().getBytes(UTF_8);
+ CloudFile createdDirFile = cloudContentRepository.write(dirFile, ByteArrayDataSource.from(dirId), NO_OP_PROGRESS_AWARE, false, dirId.length);
+ CryptoFolder result = folder(folder, createdDirFile);
+ addFolderToCache(result, dirIdInfo.withCloudFolder(createdCloudFolder));
+ return result;
+ }
+
+ @Override
+ Optional extractEncryptedName(String ciphertextName) {
+ final Matcher matcher = BASE64_ENCRYPTED_NAME_PATTERN.matcher(ciphertextName);
+ if (matcher.find(0)) {
+ return Optional.of(matcher.group());
+ } else {
+ return Optional.empty();
+ }
+ }
+
+ @Override
+ CryptoFolder move(CryptoFolder source, CryptoFolder target) throws BackendException {
+ boolean shortName = false;
+ if (target.getDirFile().getParent().getName().endsWith(LONG_NODE_FILE_EXT)) {
+ assertCryptoLongDirFileAlreadyExists(target);
+ } else {
+ assertCryptoFolderAlreadyExists(target);
+ shortName = true;
+ }
+
+ CloudFile targetDirFile = target.getDirFile();
+ if (shortName) {
+ CloudFolder targetDirFolder = cloudContentRepository.create(target.getDirFile().getParent());
+ targetDirFile = cloudContentRepository.file(targetDirFolder, target.getDirFile().getName());
+ }
+
+ CryptoFolder result = folder(target.getParent(), target.getName(), cloudContentRepository.move(source.getDirFile(), targetDirFile));
+
+ cloudContentRepository.delete(source.getDirFile().getParent());
+
+ evictFromCache(source);
+ evictFromCache(target);
+
+ return result;
+ }
+
+ @Override
+ CryptoFile move(CryptoFile source, CryptoFile target) throws BackendException {
+ if (source.getCloudFile().getParent().getName().endsWith(LONG_NODE_FILE_EXT)) {
+ CloudFolder targetDirFolder = cloudContentRepository.folder(target.getCloudFile().getParent(), target.getCloudFile().getName());
+ CryptoFile cryptoFile;
+ if (target.getCloudFile().getName().endsWith(LONG_NODE_FILE_EXT)) {
+ assertCryptoLongDirFileAlreadyExists(targetDirFolder);
+ cryptoFile = moveLongFileToLongFile(source, target, targetDirFolder);
+ } else {
+ assertCryptoFileAlreadyExists(target);
+ cryptoFile = moveLongFileToShortFile(source, target);
+ }
+ CloudFolder sourceDirFolder = cloudContentRepository.folder(source.getCloudFile().getParent().getParent(), source.getCloudFile().getParent().getName());
+ cloudContentRepository.delete(sourceDirFolder);
+ return cryptoFile;
+ } else {
+ CloudFolder targetDirFolder = cloudContentRepository.folder(target.getCloudFile().getParent(), target.getCloudFile().getName());
+ if (target.getCloudFile().getName().endsWith(LONG_NODE_FILE_EXT)) {
+ assertCryptoLongDirFileAlreadyExists(targetDirFolder);
+ return moveShortFileToLongFile(source, target, targetDirFolder);
+ } else {
+ assertCryptoFileAlreadyExists(target);
+ return file(target, cloudContentRepository.move(source.getCloudFile(), target.getCloudFile()), source.getSize());
+ }
+ }
+ }
+
+ private CryptoFile moveLongFileToLongFile(CryptoFile source, CryptoFile target, CloudFolder targetDirFolder) throws BackendException {
+ CloudFile sourceFile = cloudContentRepository.file(source.getCloudFile().getParent(), LONG_NODE_FILE_CONTENT_CONTENTS + CLOUD_NODE_EXT);
+ CloudFile movedFile = cloudContentRepository.move(sourceFile, cloudContentRepository.file(targetDirFolder, LONG_NODE_FILE_CONTENT_CONTENTS + CLOUD_NODE_EXT));
+ return file(target, movedFile, movedFile.getSize());
+ }
+
+ private CryptoFile moveLongFileToShortFile(CryptoFile source, CryptoFile target) throws BackendException {
+ CloudFile sourceFile = cloudContentRepository.file(source.getCloudFile().getParent(), LONG_NODE_FILE_CONTENT_CONTENTS + CLOUD_NODE_EXT);
+ CloudFile movedFile = cloudContentRepository.move(sourceFile, target.getCloudFile());
+ return file(target, movedFile, movedFile.getSize());
+ }
+
+ private CryptoFile moveShortFileToLongFile(CryptoFile source, CryptoFile target, CloudFolder targetDirFolder) throws BackendException {
+ CloudFile movedFile = cloudContentRepository.move(source.getCloudFile(), cloudContentRepository.file(targetDirFolder, LONG_NODE_FILE_CONTENT_CONTENTS + CLOUD_NODE_EXT));
+ return file(target, movedFile, movedFile.getSize());
+ }
+
+ @Override
+ void delete(CloudNode node) throws BackendException {
+ if (node instanceof CryptoFolder) {
+ CryptoFolder cryptoFolder = (CryptoFolder) node;
+ List cryptoSubfolders = deepCollectSubfolders(cryptoFolder);
+ for (CryptoFolder cryptoSubfolder : cryptoSubfolders) {
+ try {
+ cloudContentRepository.delete(dirIdInfo(cryptoSubfolder).getCloudFolder());
+ } catch (NoSuchCloudFileException e) {
+ // Ignoring because nothing can be done if the dir-file doesn't exists in the cloud
+ }
+ }
+
+ try {
+ cloudContentRepository.delete(dirIdInfo(cryptoFolder).getCloudFolder());
+ } catch (NoSuchCloudFileException e) {
+ // Ignoring because nothing can be done if the dir-file doesn't exists in the cloud
+ }
+
+ cloudContentRepository.delete(cryptoFolder.getDirFile().getParent());
+
+ evictFromCache(cryptoFolder);
+ } else if (node instanceof CryptoFile) {
+ CryptoFile cryptoFile = (CryptoFile) node;
+ if (cryptoFile.getCloudFile().getParent().getName().endsWith(LONG_NODE_FILE_EXT)) {
+ cloudContentRepository.delete(cryptoFile.getCloudFile().getParent());
+ } else {
+ cloudContentRepository.delete(cryptoFile.getCloudFile());
+ }
+ }
+ }
+
+ @Override
+ public CryptoFile write(CryptoFile cryptoFile, DataSource data, ProgressAware progressAware, boolean replace, long length) throws BackendException {
+ if (cryptoFile.getCloudFile().getName().endsWith(LONG_NODE_FILE_EXT)) {
+ return writeLongFile(cryptoFile, data, progressAware, replace, length);
+ } else {
+ return writeShortNameFile(cryptoFile, data, progressAware, replace, length);
+ }
+ }
+
+ private CryptoFile writeLongFile(CryptoFile cryptoFile, DataSource data, ProgressAware progressAware, boolean replace, long length) throws BackendException {
+ CloudFolder dirFolder = cloudContentRepository.folder(cryptoFile.getCloudFile().getParent(), cryptoFile.getCloudFile().getName());
+ CloudFile cloudFile = cloudContentRepository.file(dirFolder, LONG_NODE_FILE_CONTENT_CONTENTS + CLOUD_NODE_EXT, data.size(context));
+
+ assertCryptoLongDirFileAlreadyExists(dirFolder);
+
+ try (InputStream stream = data.open(context)) {
+ File encryptedTmpFile = File.createTempFile(UUID.randomUUID().toString(), ".crypto", getInternalCache());
+ try (WritableByteChannel writableByteChannel = Channels.newChannel(new FileOutputStream(encryptedTmpFile)); //
+ WritableByteChannel encryptingWritableByteChannel = new EncryptingWritableByteChannel(writableByteChannel, cryptor())) {
+ progressAware.onProgress(Progress.started(UploadState.encryption(cloudFile)));
+ ByteBuffer buff = ByteBuffer.allocate(cryptor().fileContentCryptor().cleartextChunkSize());
+ long ciphertextSize = Cryptors.ciphertextSize(cloudFile.getSize().get(), cryptor()) + cryptor().fileHeaderCryptor().headerSize();
+ int read;
+ long encrypted = 0;
+ while ((read = stream.read(buff.array())) > 0) {
+ buff.limit(read);
+ int written = encryptingWritableByteChannel.write(buff);
+ buff.flip();
+ encrypted += written;
+ progressAware.onProgress(progress(UploadState.encryption(cloudFile)).between(0).and(ciphertextSize).withValue(encrypted));
+ }
+ encryptingWritableByteChannel.close();
+ progressAware.onProgress(Progress.completed(UploadState.encryption(cloudFile)));
+
+ CloudFile targetFile = targetFile(cryptoFile, cloudFile, replace);
+
+ return file(cryptoFile, //
+ cloudContentRepository.write( //
+ targetFile, //
+ data.decorate(FileBasedDataSource.from(encryptedTmpFile)), //
+ new UploadFileReplacingProgressAware(cryptoFile, progressAware), //
+ replace, //
+ encryptedTmpFile.length()), //
+ cryptoFile.getSize());
+ } catch (Throwable e) {
+ throw e;
+ } finally {
+ encryptedTmpFile.delete();
+ }
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ private CloudFile targetFile(CryptoFile cryptoFile, CloudFile cloudFile, boolean replace) throws BackendException {
+ if (replace || !cloudContentRepository.exists(cloudFile)) {
+ return cloudFile;
+ }
+ return firstNonExistingAutoRenamedFile(cryptoFile);
+ }
+
+ private CloudFile firstNonExistingAutoRenamedFile(CryptoFile original) throws BackendException {
+ String name = original.getName();
+ String nameWithoutExtension = nameWithoutExtension(name);
+ String extension = extension(name);
+
+ if (!extension.isEmpty()) {
+ extension = "." + extension;
+ }
+
+ int counter = 1;
+ CryptoFile result;
+ CloudFile cloudFile;
+ do {
+ String newFileName = nameWithoutExtension + " (" + counter + ")" + extension;
+ result = file(original.getParent(), newFileName, original.getSize());
+ counter++;
+
+ CloudFolder dirFolder = cloudContentRepository.folder(result.getCloudFile().getParent(), result.getCloudFile().getName());
+ cloudFile = cloudContentRepository.file(dirFolder, LONG_NODE_FILE_CONTENT_CONTENTS + CLOUD_NODE_EXT, result.getSize());
+ } while (cloudContentRepository.exists(cloudFile));
+ return cloudFile;
+ }
+
+ private void assertCryptoLongDirFileAlreadyExists(CloudFolder cryptoFolder) throws BackendException {
+ if (cloudContentRepository.exists(cloudContentRepository.file(cryptoFolder, CLOUD_FOLDER_DIR_FILE_PRE + CLOUD_NODE_EXT))) {
+ throw new CloudNodeAlreadyExistsException("CloudNode already exists and replace is false");
+ }
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoImplVaultFormatPre7.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoImplVaultFormatPre7.java
new file mode 100644
index 00000000..4a635c3b
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoImplVaultFormatPre7.java
@@ -0,0 +1,270 @@
+package org.cryptomator.data.cloud.crypto;
+
+import android.content.Context;
+
+import org.apache.commons.codec.binary.Base32;
+import org.apache.commons.codec.binary.BaseNCodec;
+import org.cryptomator.cryptolib.Cryptors;
+import org.cryptomator.cryptolib.api.AuthenticationFailedException;
+import org.cryptomator.cryptolib.api.Cryptor;
+import org.cryptomator.cryptolib.common.MessageDigestSupplier;
+import org.cryptomator.domain.CloudFile;
+import org.cryptomator.domain.CloudFolder;
+import org.cryptomator.domain.CloudNode;
+import org.cryptomator.domain.exception.AlreadyExistException;
+import org.cryptomator.domain.exception.BackendException;
+import org.cryptomator.domain.exception.EmptyDirFileException;
+import org.cryptomator.domain.exception.NoSuchCloudFileException;
+import org.cryptomator.domain.repository.CloudContentRepository;
+import org.cryptomator.domain.usecases.ProgressAware;
+import org.cryptomator.domain.usecases.cloud.ByteArrayDataSource;
+import org.cryptomator.domain.usecases.cloud.DataSource;
+import org.cryptomator.domain.usecases.cloud.UploadState;
+import org.cryptomator.util.Optional;
+import org.cryptomator.util.Supplier;
+
+import java.io.ByteArrayOutputStream;
+import java.util.ArrayList;
+import java.util.List;
+import java.util.regex.Matcher;
+import java.util.regex.Pattern;
+
+import timber.log.Timber;
+
+import static org.cryptomator.domain.usecases.ProgressAware.NO_OP_PROGRESS_AWARE;
+import static org.cryptomator.util.Encodings.UTF_8;
+
+final class CryptoImplVaultFormatPre7 extends CryptoImplDecorator {
+
+ private static final int SHORT_NAMES_MAX_LENGTH = 129;
+ private static final String DIR_PREFIX = "0";
+ private static final String SYMLINK_PREFIX = "1S";
+ private static final String LONG_NAME_FILE_EXT = ".lng";
+ private static final String METADATA_DIR_NAME = "m";
+
+ private static final BaseNCodec BASE32 = new Base32();
+ private static final Pattern BASE32_ENCRYPTED_NAME_PATTERN = Pattern.compile("^(0|1S)?(([A-Z2-7]{8})*[A-Z2-7=]{8})$");
+
+ CryptoImplVaultFormatPre7(Context context, Supplier cryptor, CloudContentRepository cloudContentRepository, CloudFolder storageLocation, DirIdCache dirIdCache) {
+ super(context, cryptor, cloudContentRepository, storageLocation, dirIdCache);
+ }
+
+ @Override
+ CryptoFolder folder(CryptoFolder cryptoParent, String cleartextName) throws BackendException {
+ String dirFileName = encryptFolderName(cryptoParent, cleartextName);
+ CloudFile dirFile = cloudContentRepository.file(dirIdInfo(cryptoParent).getCloudFolder(), dirFileName);
+ return folder(cryptoParent, cleartextName, dirFile);
+ }
+
+ @Override
+ CryptoFolder create(CryptoFolder folder) throws BackendException {
+ assertCryptoFolderAlreadyExists(folder);
+ DirIdCache.DirIdInfo dirIdInfo = dirIdInfo(folder);
+ CloudFolder createdCloudFolder = cloudContentRepository.create(dirIdInfo.getCloudFolder());
+ byte[] dirId = dirIdInfo.getId().getBytes(UTF_8);
+ CloudFile createdDirFile = cloudContentRepository.write(folder.getDirFile(), ByteArrayDataSource.from(dirId), NO_OP_PROGRESS_AWARE, false, dirId.length);
+ CryptoFolder result = folder(folder, createdDirFile);
+ addFolderToCache(result, dirIdInfo.withCloudFolder(createdCloudFolder));
+ return result;
+ }
+
+ @Override
+ String encryptName(CryptoFolder cryptoParent, String name) throws BackendException {
+ return encryptName(cryptoParent, name, "");
+ }
+
+ private String encryptName(CryptoFolder cryptoParent, String name, String prefix) throws BackendException {
+ String ciphertextName = prefix + cryptor().fileNameCryptor().encryptFilename(name, dirIdInfo(cryptoParent).getId().getBytes(UTF_8));
+ if (ciphertextName.length() > SHORT_NAMES_MAX_LENGTH) {
+ ciphertextName = deflate(ciphertextName);
+ }
+ return ciphertextName;
+ }
+
+ private String deflate(String longFileName) throws BackendException {
+ byte[] longFilenameBytes = longFileName.getBytes(UTF_8);
+ byte[] hash = MessageDigestSupplier.SHA1.get().digest(longFilenameBytes);
+ String shortFileName = BASE32.encodeAsString(hash) + LONG_NAME_FILE_EXT;
+ CloudFile metadataFile = metadataFile(shortFileName);
+ byte[] data = longFileName.getBytes(UTF_8);
+ try {
+ cloudContentRepository.create(metadataFile.getParent());
+ } catch (AlreadyExistException e) {
+ }
+ cloudContentRepository.write(metadataFile, ByteArrayDataSource.from(data), NO_OP_PROGRESS_AWARE, true, data.length);
+ return shortFileName;
+ }
+
+ private String inflate(String shortFileName) throws BackendException {
+ CloudFile metadataFile = metadataFile(shortFileName);
+ ByteArrayOutputStream out = new ByteArrayOutputStream();
+ cloudContentRepository.read(metadataFile, Optional.empty(), out, NO_OP_PROGRESS_AWARE);
+ return new String(out.toByteArray(), UTF_8);
+ }
+
+ private CloudFile inflatePermanently(CloudFile cloudFile, String longFileName) throws BackendException {
+ Timber.tag("CryptoFs").i("inflatePermanently: %s -> %s", cloudFile.getName(), longFileName);
+ CloudFile newCiphertextFile = cloudContentRepository.file(cloudFile.getParent(), longFileName);
+ cloudContentRepository.move(cloudFile, newCiphertextFile);
+ return newCiphertextFile;
+ }
+
+ private CloudFile metadataFile(String shortFilename) throws BackendException {
+ CloudFolder firstLevelFolder = cloudContentRepository.folder(metadataFolder(), shortFilename.substring(0, 2));
+ CloudFolder secondLevelFolder = cloudContentRepository.folder(firstLevelFolder, shortFilename.substring(2, 4));
+ return cloudContentRepository.file(secondLevelFolder, shortFilename);
+ }
+
+ private CloudFolder metadataFolder() throws BackendException {
+ return cloudContentRepository.folder(storageLocation(), METADATA_DIR_NAME);
+ }
+
+ @Override
+ List list(CryptoFolder cryptoFolder) throws BackendException {
+ DirIdCache.DirIdInfo dirIdInfo = dirIdInfo(cryptoFolder);
+ String dirId = dirIdInfo(cryptoFolder).getId();
+ CloudFolder lvl2Dir = dirIdInfo.getCloudFolder();
+ List ciphertextNodes = cloudContentRepository.list(lvl2Dir);
+ List result = new ArrayList<>();
+ for (CloudNode node : ciphertextNodes) {
+ if (node instanceof CloudFile) {
+ ciphertextToCleartextNode(cryptoFolder, dirId, node).ifPresent(result::add);
+ }
+ }
+ return result;
+ }
+
+ private Optional ciphertextToCleartextNode(CryptoFolder cryptoFolder, String dirId, CloudNode cloudNode) throws BackendException {
+ CloudFile cloudFile = (CloudFile) cloudNode;
+ String ciphertextName = cloudFile.getName();
+ if (ciphertextName.endsWith(LONG_NAME_FILE_EXT)) {
+ try {
+ ciphertextName = inflate(ciphertextName);
+ if (ciphertextName.length() <= SHORT_NAMES_MAX_LENGTH) {
+ cloudFile = inflatePermanently(cloudFile, ciphertextName);
+ }
+ } catch (NoSuchCloudFileException e) {
+ Timber.tag("CryptoFs").e("Missing mFile: %s", ciphertextName);
+ return Optional.empty();
+ } catch (BackendException e) {
+ Timber.tag("CryptoFs").e(e, "Failed to read mFile: %s", ciphertextName);
+ return Optional.empty();
+ }
+ }
+ String cleartextName;
+ try {
+ cleartextName = decryptName(dirId, ciphertextName.toUpperCase());
+ } catch (AuthenticationFailedException e) {
+ Timber.tag("CryptoFs").w("File name authentication failed: %s", cloudFile.getPath());
+ return Optional.empty();
+ } catch (IllegalArgumentException e) {
+ Timber.tag("CryptoFs").d("Illegal ciphertext filename: %s", cloudFile.getPath());
+ return Optional.empty();
+ }
+ if (cleartextName == null || ciphertextName.startsWith(SYMLINK_PREFIX)) {
+ return Optional.empty();
+ } else if (ciphertextName.startsWith(DIR_PREFIX)) {
+ return Optional.of(folder(cryptoFolder, cleartextName, cloudFile));
+ } else {
+ Optional cleartextSize = Optional.empty();
+ if (cloudFile.getSize().isPresent()) {
+ long ciphertextSizeWithoutHeader = cloudFile.getSize().get() - cryptor().fileHeaderCryptor().headerSize();
+ if (ciphertextSizeWithoutHeader >= 0) {
+ cleartextSize = Optional.of(Cryptors.cleartextSize(ciphertextSizeWithoutHeader, cryptor()));
+ }
+ }
+ return Optional.of(file(cryptoFolder, cleartextName, cloudFile, cleartextSize));
+ }
+ }
+
+ @Override
+ String decryptName(String dirId, String encryptedName) {
+ Optional ciphertextName = extractEncryptedName(encryptedName);
+ if (ciphertextName.isPresent()) {
+ return cryptor().fileNameCryptor().decryptFilename(ciphertextName.get(), dirId.getBytes(UTF_8));
+ } else {
+ return null;
+ }
+ }
+
+ @Override
+ Optional extractEncryptedName(String ciphertextName) {
+ Matcher matcher = BASE32_ENCRYPTED_NAME_PATTERN.matcher(ciphertextName);
+ if (matcher.find(0)) {
+ return Optional.of(matcher.group(2));
+ } else {
+ return Optional.empty();
+ }
+ }
+
+ @Override
+ CryptoSymlink symlink(CryptoFolder cryptoParent, String cleartextName, String target) throws BackendException {
+ String ciphertextName = encryptSymlinkName(cryptoParent, cleartextName);
+ CloudFile cloudFile = cloudContentRepository.file(dirIdInfo(cryptoParent).getCloudFolder(), ciphertextName);
+ return new CryptoSymlink(cryptoParent, cleartextName, path(cryptoParent, cleartextName), target, cloudFile);
+ }
+
+ private String encryptSymlinkName(CryptoFolder cryptoFolder, String name) throws BackendException {
+ return encryptName(cryptoFolder, name, SYMLINK_PREFIX);
+ }
+
+ @Override
+ String encryptFolderName(CryptoFolder cryptoFolder, String name) throws BackendException {
+ return encryptName(cryptoFolder, name, DIR_PREFIX);
+ }
+
+ @Override
+ CryptoFolder move(CryptoFolder source, CryptoFolder target) throws BackendException {
+ assertCryptoFolderAlreadyExists(target);
+ CryptoFolder result = folder(target.getParent(), target.getName(), cloudContentRepository.move(source.getDirFile(), target.getDirFile()));
+
+ evictFromCache(source);
+ evictFromCache(target);
+ return result;
+ }
+
+ @Override
+ CryptoFile move(CryptoFile source, CryptoFile target) throws BackendException {
+ assertCryptoFileAlreadyExists(target);
+ return file(target, cloudContentRepository.move(source.getCloudFile(), target.getCloudFile()), source.getSize());
+ }
+
+ @Override
+ void delete(CloudNode node) throws BackendException {
+ if (node instanceof CryptoFolder) {
+ CryptoFolder cryptoFolder = (CryptoFolder) node;
+ List cryptoSubfolders = deepCollectSubfolders(cryptoFolder);
+ for (CryptoFolder cryptoSubfolder : cryptoSubfolders) {
+ cloudContentRepository.delete(dirIdInfo(cryptoSubfolder).getCloudFolder());
+ }
+ cloudContentRepository.delete(dirIdInfo(cryptoFolder).getCloudFolder());
+ cloudContentRepository.delete(cryptoFolder.getDirFile());
+ evictFromCache(cryptoFolder);
+ } else if (node instanceof CryptoFile) {
+ CryptoFile cryptoFile = (CryptoFile) node;
+ cloudContentRepository.delete(cryptoFile.getCloudFile());
+ }
+ }
+
+ @Override
+ String loadDirId(CryptoFolder folder) throws BackendException, EmptyDirFileException {
+ if (RootCryptoFolder.isRoot(folder)) {
+ return CryptoConstants.ROOT_DIR_ID;
+ } else if (cloudContentRepository.exists(folder.getDirFile())) {
+ return new String(loadContentsOfDirFile(folder), UTF_8);
+ } else {
+ return newDirId();
+ }
+ }
+
+ @Override
+ DirIdCache.DirIdInfo createDirIdInfo(CryptoFolder folder) throws BackendException {
+ String dirId = loadDirId(folder);
+ return dirIdCache.put(folder, createDirIdInfoFor(dirId));
+ }
+
+ @Override
+ public CryptoFile write(CryptoFile cryptoFile, DataSource data, ProgressAware progressAware, boolean replace, long length) throws BackendException {
+ return writeShortNameFile(cryptoFile, data, progressAware, replace, length);
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoNode.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoNode.java
new file mode 100644
index 00000000..bd22fca3
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoNode.java
@@ -0,0 +1,6 @@
+package org.cryptomator.data.cloud.crypto;
+
+import org.cryptomator.domain.CloudNode;
+
+interface CryptoNode extends CloudNode {
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoSymlink.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoSymlink.java
new file mode 100644
index 00000000..4c9d6e77
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptoSymlink.java
@@ -0,0 +1,80 @@
+package org.cryptomator.data.cloud.crypto;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudFile;
+import org.cryptomator.util.Optional;
+
+import java.util.Date;
+
+class CryptoSymlink implements CloudFile, CryptoNode {
+
+ private final String name;
+ private final String path;
+ private final String target;
+ private final CloudFile cloudFile;
+ private final CryptoFolder parent;
+
+ public CryptoSymlink(CryptoFolder parent, String name, String path, String target, CloudFile cloudFile) {
+ this.parent = parent;
+ this.name = name;
+ this.path = path;
+ this.target = target;
+ this.cloudFile = cloudFile;
+ }
+
+ @Override
+ public Cloud getCloud() {
+ return parent.getCloud();
+ }
+
+ @Override
+ public String getName() {
+ return name;
+ }
+
+ @Override
+ public String getPath() {
+ return path;
+ }
+
+ @Override
+ public CryptoFolder getParent() {
+ return parent;
+ }
+
+ @Override
+ public Optional getSize() {
+ return Optional.of((long) target.length());
+ }
+
+ @Override
+ public Optional getModified() {
+ return cloudFile.getModified();
+ }
+
+ /**
+ * @return The actual file in the underlying, i.e. decorated, CloudContentRepository
+ */
+ CloudFile getCloudFile() {
+ return cloudFile;
+ }
+
+ @Override
+ public boolean equals(Object obj) {
+ if (obj == null || getClass() != obj.getClass())
+ return false;
+ if (obj == this)
+ return true;
+ return internalEquals((CryptoSymlink) obj);
+ }
+
+ private boolean internalEquals(CryptoSymlink obj) {
+ return path != null && path.equals(obj.path);
+ }
+
+ @Override
+ public int hashCode() {
+ return path == null ? 0 : path.hashCode();
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/Cryptors.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/Cryptors.java
new file mode 100644
index 00000000..6ac46823
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/Cryptors.java
@@ -0,0 +1,144 @@
+package org.cryptomator.data.cloud.crypto;
+
+import java.util.Iterator;
+import java.util.Map;
+import java.util.concurrent.ConcurrentHashMap;
+import java.util.concurrent.ConcurrentMap;
+
+import org.cryptomator.cryptolib.api.Cryptor;
+import org.cryptomator.domain.Vault;
+import org.cryptomator.domain.exception.MissingCryptorException;
+import org.cryptomator.util.Optional;
+import org.cryptomator.util.Supplier;
+
+public abstract class Cryptors {
+
+ Cryptors() {
+ }
+
+ public abstract boolean isEmpty();
+
+ public abstract int size();
+
+ public abstract Supplier get(Vault vault);
+
+ public abstract Optional remove(Vault vault);
+
+ public abstract boolean putIfAbsent(Vault vault, Cryptor cryptor);
+
+ public static class Delegating extends Cryptors {
+
+ private final Cryptors.Default fallback = new Cryptors.Default();
+
+ private volatile Cryptors.Default delegate;
+
+ public synchronized void setDelegate(Cryptors.Default delegate) {
+ delegate.putAll(fallback.cryptors);
+ this.delegate = delegate;
+ }
+
+ public synchronized void removeDelegate() {
+ fallback.putAll(delegate.cryptors);
+ this.delegate = null;
+ }
+
+ @Override
+ public synchronized boolean isEmpty() {
+ return delegate().isEmpty();
+ }
+
+ @Override
+ public synchronized int size() {
+ return delegate().size();
+ }
+
+ @Override
+ public synchronized Supplier get(Vault vault) {
+ return delegate().get(vault);
+ }
+
+ @Override
+ public synchronized Optional remove(Vault vault) {
+ return delegate().remove(vault);
+ }
+
+ @Override
+ public synchronized boolean putIfAbsent(Vault vault, Cryptor cryptor) {
+ return delegate().putIfAbsent(vault, cryptor);
+ }
+
+ private synchronized Cryptors delegate() {
+ if (delegate == null) {
+ return fallback;
+ } else {
+ return delegate;
+ }
+ }
+
+ }
+
+ public static class Default extends Cryptors {
+
+ private final ConcurrentMap cryptors = new ConcurrentHashMap<>();
+
+ private Runnable onChangeListener = () -> {
+ };
+
+ public boolean isEmpty() {
+ return cryptors.isEmpty();
+ }
+
+ public int size() {
+ return cryptors.size();
+ }
+
+ public Supplier get(final Vault vault) {
+ return () -> {
+ Cryptor cryptor = cryptors.get(vault);
+ if (cryptor == null) {
+ throw new MissingCryptorException();
+ } else {
+ return cryptor;
+ }
+ };
+ }
+
+ public Optional remove(Vault vault) {
+ Optional result = Optional.ofNullable(cryptors.remove(vault));
+ if (result.isPresent()) {
+ onChangeListener.run();
+ }
+ return result;
+ }
+
+ public boolean putIfAbsent(Vault vault, Cryptor cryptor) {
+ if (cryptors.putIfAbsent(vault, cryptor) == null) {
+ onChangeListener.run();
+ return true;
+ } else {
+ return false;
+ }
+ }
+
+ public void setOnChangeListener(Runnable onChangeListener) {
+ this.onChangeListener = onChangeListener;
+ }
+
+ public void putAll(Map cryptors) {
+ this.cryptors.putAll(cryptors);
+ onChangeListener.run();
+ }
+
+ public void destroyAll() {
+ while (!isEmpty()) {
+ Iterator cryptorIterator = cryptors.values().iterator();
+ while (cryptorIterator.hasNext()) {
+ cryptorIterator.next().destroy();
+ cryptorIterator.remove();
+ }
+ }
+ onChangeListener.run();
+ }
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptorsModule.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptorsModule.java
new file mode 100644
index 00000000..0463e7e8
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/CryptorsModule.java
@@ -0,0 +1,23 @@
+package org.cryptomator.data.cloud.crypto;
+
+import javax.inject.Singleton;
+
+import dagger.Module;
+import dagger.Provides;
+
+@Module
+public class CryptorsModule {
+
+ private final Cryptors cryptors;
+
+ public CryptorsModule(Cryptors cryptors) {
+ this.cryptors = cryptors;
+ }
+
+ @Singleton
+ @Provides
+ public Cryptors provideCryptors() {
+ return cryptors;
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/DirIdCache.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/DirIdCache.java
new file mode 100644
index 00000000..289d2d84
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/DirIdCache.java
@@ -0,0 +1,38 @@
+package org.cryptomator.data.cloud.crypto;
+
+import org.cryptomator.domain.CloudFolder;
+
+interface DirIdCache {
+
+ DirIdInfo get(CryptoFolder folder);
+
+ DirIdInfo put(CryptoFolder folder, DirIdInfo dirIdInfo);
+
+ void evict(CryptoFolder folder);
+
+ void evictSubFoldersOf(CryptoFolder cryptoFolder);
+
+ class DirIdInfo {
+
+ private final String id;
+ private final CloudFolder cloudFolder;
+
+ DirIdInfo(String id, CloudFolder cloudFolder) {
+ this.id = id;
+ this.cloudFolder = cloudFolder;
+ }
+
+ public String getId() {
+ return id;
+ }
+
+ public CloudFolder getCloudFolder() {
+ return cloudFolder;
+ }
+
+ DirIdInfo withCloudFolder(CloudFolder cloudFolder) {
+ return new DirIdInfo(id, cloudFolder);
+ }
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/DirIdCacheFormat7.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/DirIdCacheFormat7.java
new file mode 100644
index 00000000..853366aa
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/DirIdCacheFormat7.java
@@ -0,0 +1,78 @@
+package org.cryptomator.data.cloud.crypto;
+
+import java.util.Map;
+
+import android.util.LruCache;
+
+class DirIdCacheFormat7 implements DirIdCache {
+
+ private static final int MAX_SIZE = 1024;
+
+ private final LruCache cache = new LruCache<>(MAX_SIZE);
+
+ DirIdCacheFormat7() {
+ }
+
+ @Override
+ public DirIdInfo get(CryptoFolder folder) {
+ return cache.get(DirIdCacheKey.toKey(folder));
+ }
+
+ @Override
+ public DirIdInfo put(CryptoFolder folder, DirIdInfo dirIdInfo) {
+ DirIdCacheKey key = DirIdCacheKey.toKey(folder);
+ cache.put(key, dirIdInfo);
+ return dirIdInfo;
+ }
+
+ @Override
+ public void evict(CryptoFolder folder) {
+ DirIdCacheKey key = DirIdCacheKey.toKey(folder);
+ cache.remove(key);
+ }
+
+ @Override
+ public void evictSubFoldersOf(CryptoFolder folder) {
+ Map cacheSnapshot = cache.snapshot();
+ for (Map.Entry cacheEntry : cacheSnapshot.entrySet()) {
+ if (cacheEntry.getKey().path.startsWith(folder.getPath() + "/")) {
+ cache.remove(cacheEntry.getKey());
+ }
+ }
+ }
+
+ private static class DirIdCacheKey {
+
+ static DirIdCacheKey toKey(CryptoFolder folder) {
+ return new DirIdCacheKey(folder.getPath());
+ }
+
+ private final String path;
+
+ private DirIdCacheKey(String path) {
+ this.path = path;
+ }
+
+ @Override
+ public boolean equals(Object obj) {
+ if (obj == this)
+ return true;
+ if (obj == null || getClass() != obj.getClass())
+ return false;
+ return internalEquals((DirIdCacheKey) obj);
+ }
+
+ private boolean internalEquals(DirIdCacheKey o) {
+ return (path == null ? o.path == null : path.equals(o.path));
+ }
+
+ @Override
+ public int hashCode() {
+ final int prime = 31;
+ int hash = 1940604225;
+ hash = hash * prime + (path == null ? 0 : path.hashCode());
+ return hash;
+ }
+
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/DirIdCacheFormatPre7.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/DirIdCacheFormatPre7.java
new file mode 100644
index 00000000..2235420e
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/DirIdCacheFormatPre7.java
@@ -0,0 +1,86 @@
+package org.cryptomator.data.cloud.crypto;
+
+import android.util.LruCache;
+
+import org.cryptomator.domain.CloudFile;
+
+import java.util.Date;
+
+class DirIdCacheFormatPre7 implements DirIdCache {
+
+ private static final int MAX_SIZE = 1024;
+
+ private final LruCache cache = new LruCache<>(MAX_SIZE);
+
+ DirIdCacheFormatPre7() {
+ }
+
+ public DirIdInfo get(CryptoFolder folder) {
+ return cache.get(DirIdCacheKey.toKey(folder));
+ }
+
+ public DirIdInfo put(CryptoFolder folder, DirIdInfo dirIdInfo) {
+ DirIdCacheKey key = DirIdCacheKey.toKey(folder);
+ cache.put(key, dirIdInfo);
+ cache.remove(key.withoutModified());
+ return dirIdInfo;
+ }
+
+ public void evict(CryptoFolder folder) {
+ DirIdCacheKey key = DirIdCacheKey.toKey(folder);
+ cache.remove(key);
+ cache.remove(key.withoutModified());
+ }
+
+ @Override
+ public void evictSubFoldersOf(CryptoFolder cryptoFolder) {
+ // no implementation needed
+ }
+
+ private static class DirIdCacheKey {
+
+ static DirIdCacheKey toKey(CryptoFolder folder) {
+ return new DirIdCacheKey(folder.getDirFile());
+ }
+
+ private final String path;
+ private final Date modified;
+
+ private DirIdCacheKey(CloudFile dirFile) {
+ this.path = dirFile == null ? null : dirFile.getPath();
+ this.modified = dirFile == null ? null : dirFile.getModified().orElse(null);
+ }
+
+ private DirIdCacheKey(String path) {
+ this.path = path;
+ this.modified = null;
+ }
+
+ DirIdCacheKey withoutModified() {
+ return new DirIdCacheKey(path);
+ }
+
+ @Override
+ public boolean equals(Object obj) {
+ if (obj == this)
+ return true;
+ if (obj == null || getClass() != obj.getClass())
+ return false;
+ return internalEquals((DirIdCacheKey) obj);
+ }
+
+ private boolean internalEquals(DirIdCacheKey o) {
+ return (path == null ? o.path == null : path.equals(o.path)) //
+ && (modified == null ? o.modified == null : modified.equals(o.modified));
+ }
+
+ @Override
+ public int hashCode() {
+ final int prime = 31;
+ int hash = 1940604225;
+ hash = hash * prime + (path == null ? 0 : path.hashCode());
+ hash = hash * prime + (modified == null ? 0 : modified.hashCode());
+ return hash;
+ }
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/crypto/RootCryptoFolder.java b/data/src/main/java/org/cryptomator/data/cloud/crypto/RootCryptoFolder.java
new file mode 100644
index 00000000..80594edc
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/crypto/RootCryptoFolder.java
@@ -0,0 +1,27 @@
+package org.cryptomator.data.cloud.crypto;
+
+import org.cryptomator.domain.Cloud;
+
+class RootCryptoFolder extends CryptoFolder {
+
+ public static boolean isRoot(CryptoFolder folder) {
+ return folder instanceof RootCryptoFolder;
+ }
+
+ private final CryptoCloud cloud;
+
+ public RootCryptoFolder(CryptoCloud cloud) {
+ super(null, "", "", null);
+ this.cloud = cloud;
+ }
+
+ @Override
+ public Cloud getCloud() {
+ return cloud;
+ }
+
+ @Override
+ public CryptoFolder withCloud(Cloud cloud) {
+ return new RootCryptoFolder((CryptoCloud) cloud);
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxClientFactory.java b/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxClientFactory.java
new file mode 100644
index 00000000..efddfdf0
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxClientFactory.java
@@ -0,0 +1,56 @@
+package org.cryptomator.data.cloud.dropbox;
+
+import android.content.Context;
+
+import com.dropbox.core.DbxRequestConfig;
+import com.dropbox.core.http.OkHttp3Requestor;
+import com.dropbox.core.v2.DbxClientV2;
+
+import org.cryptomator.data.BuildConfig;
+import org.cryptomator.data.cloud.okhttplogging.HttpLoggingInterceptor;
+
+import java.util.Locale;
+
+import okhttp3.Interceptor;
+import okhttp3.OkHttpClient;
+import timber.log.Timber;
+
+import static org.cryptomator.data.util.NetworkTimeout.CONNECTION;
+import static org.cryptomator.data.util.NetworkTimeout.READ;
+import static org.cryptomator.data.util.NetworkTimeout.WRITE;
+
+class DropboxClientFactory {
+
+ private DbxClientV2 sDbxClient;
+
+ public DbxClientV2 getClient(String accessToken, Context context) {
+ if (sDbxClient == null) {
+ sDbxClient = createDropboxClient(accessToken, context);
+ }
+ return sDbxClient;
+ }
+
+ private DbxClientV2 createDropboxClient(String accessToken, Context context) {
+ String userLocale = Locale.getDefault().toString();
+
+ OkHttpClient okHttpClient = new OkHttpClient() //
+ .newBuilder() //
+ .connectTimeout(CONNECTION.getTimeout(), CONNECTION.getUnit()) //
+ .readTimeout(READ.getTimeout(), READ.getUnit()) //
+ .writeTimeout(WRITE.getTimeout(), WRITE.getUnit()) //
+ .addInterceptor(httpLoggingInterceptor(context)) //
+ .build();
+
+ DbxRequestConfig requestConfig = DbxRequestConfig //
+ .newBuilder("Cryptomator-Android/" + BuildConfig.VERSION_NAME) //
+ .withUserLocale(userLocale) //
+ .withHttpRequestor(new OkHttp3Requestor(okHttpClient)) //
+ .build();
+
+ return new DbxClientV2(requestConfig, accessToken);
+ }
+
+ private static Interceptor httpLoggingInterceptor(Context context) {
+ return new HttpLoggingInterceptor(message -> Timber.tag("OkHttp").d(message), context);
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxCloudContentRepository.java b/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxCloudContentRepository.java
new file mode 100644
index 00000000..8bae83e9
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxCloudContentRepository.java
@@ -0,0 +1,213 @@
+package org.cryptomator.data.cloud.dropbox;
+
+import android.content.Context;
+
+import com.dropbox.core.DbxException;
+import com.dropbox.core.InvalidAccessTokenException;
+import com.dropbox.core.NetworkIOException;
+import com.dropbox.core.v2.files.CreateFolderErrorException;
+import com.dropbox.core.v2.files.DeleteErrorException;
+import com.dropbox.core.v2.files.DownloadErrorException;
+import com.dropbox.core.v2.files.ListFolderErrorException;
+import com.dropbox.core.v2.files.RelocationErrorException;
+
+import org.cryptomator.data.cloud.InterceptingCloudContentRepository;
+import org.cryptomator.domain.DropboxCloud;
+import org.cryptomator.domain.exception.BackendException;
+import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
+import org.cryptomator.domain.exception.FatalBackendException;
+import org.cryptomator.domain.exception.NetworkConnectionException;
+import org.cryptomator.domain.exception.NoSuchCloudFileException;
+import org.cryptomator.domain.exception.authentication.WrongCredentialsException;
+import org.cryptomator.domain.repository.CloudContentRepository;
+import org.cryptomator.domain.usecases.ProgressAware;
+import org.cryptomator.domain.usecases.cloud.DataSource;
+import org.cryptomator.domain.usecases.cloud.DownloadState;
+import org.cryptomator.domain.usecases.cloud.UploadState;
+import org.cryptomator.util.Optional;
+
+import java.io.File;
+import java.io.IOException;
+import java.io.OutputStream;
+import java.util.List;
+
+import static org.cryptomator.util.ExceptionUtil.contains;
+import static org.cryptomator.util.ExceptionUtil.extract;
+
+class DropboxCloudContentRepository extends InterceptingCloudContentRepository {
+
+ private final DropboxCloud cloud;
+
+ public DropboxCloudContentRepository(DropboxCloud cloud, Context context) {
+ super(new Intercepted(cloud, context));
+ this.cloud = cloud;
+ }
+
+ @Override
+ protected void throwWrappedIfRequired(Exception e) throws BackendException {
+ throwConnectionErrorIfRequired(e);
+ throwWrongCredentialsExceptionIfRequired(e);
+ }
+
+ private void throwConnectionErrorIfRequired(Exception e) throws NetworkConnectionException {
+ if (contains(e, NetworkIOException.class)) {
+ throw new NetworkConnectionException(e);
+ }
+ }
+
+ private void throwWrongCredentialsExceptionIfRequired(Exception e) {
+ if (contains(e, InvalidAccessTokenException.class)) {
+ throw new WrongCredentialsException(cloud);
+ }
+ }
+
+ private static class Intercepted implements CloudContentRepository {
+
+ private final DropboxImpl cloud;
+
+ public Intercepted(DropboxCloud cloud, Context context) {
+ this.cloud = new DropboxImpl(cloud, context);
+ }
+
+ public DropboxFolder root(DropboxCloud cloud) {
+ return this.cloud.root();
+ }
+
+ @Override
+ public DropboxFolder resolve(DropboxCloud cloud, String path) {
+ return this.cloud.resolve(path);
+ }
+
+ @Override
+ public DropboxFile file(DropboxFolder parent, String name) {
+ return cloud.file(parent, name);
+ }
+
+ @Override
+ public DropboxFile file(DropboxFolder parent, String name, Optional size) throws BackendException {
+ return cloud.file(parent, name, size);
+ }
+
+ @Override
+ public DropboxFolder folder(DropboxFolder parent, String name) {
+ return cloud.folder(parent, name);
+ }
+
+ @Override
+ public boolean exists(DropboxNode node) throws BackendException {
+ try {
+ return cloud.exists(node);
+ } catch (DbxException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public List list(DropboxFolder folder) throws BackendException {
+ try {
+ return cloud.list(folder);
+ } catch (DbxException e) {
+ if (e instanceof ListFolderErrorException) {
+ if (((ListFolderErrorException) e).errorValue.getPathValue().isNotFound()) {
+ throw new NoSuchCloudFileException();
+ }
+ }
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public DropboxFolder create(DropboxFolder folder) throws BackendException {
+ try {
+ return cloud.create(folder);
+ } catch (DbxException e) {
+ if (e instanceof CreateFolderErrorException) {
+ throw new CloudNodeAlreadyExistsException(folder.getName());
+ }
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public DropboxFolder move(DropboxFolder source, DropboxFolder target) throws BackendException {
+ try {
+ return (DropboxFolder) cloud.move(source, target);
+ } catch (DbxException e) {
+ if (e instanceof RelocationErrorException) {
+ if (extract(e, RelocationErrorException.class).get().errorValue.isFromLookup()) {
+ throw new NoSuchCloudFileException(source.getName());
+ }
+ throw new CloudNodeAlreadyExistsException(target.getName());
+ }
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public DropboxFile move(DropboxFile source, DropboxFile target) throws BackendException {
+ try {
+ return (DropboxFile) cloud.move(source, target);
+ } catch (DbxException e) {
+ if (e instanceof RelocationErrorException) {
+ throw new CloudNodeAlreadyExistsException(target.getName());
+ }
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public DropboxFile write(DropboxFile uploadFile, DataSource data, ProgressAware progressAware, boolean replace, long size) throws BackendException {
+ try {
+ return cloud.write(uploadFile, data, progressAware, replace, size);
+ } catch (IOException | DbxException e) {
+ if (contains(e, NoSuchCloudFileException.class)) {
+ throw new NoSuchCloudFileException(uploadFile.getName());
+ }
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public void read(DropboxFile file, Optional encryptedTmpFile, OutputStream data, ProgressAware progressAware) throws BackendException {
+ try {
+ cloud.read(file, encryptedTmpFile, data, progressAware);
+ } catch (IOException | DbxException e) {
+ if (contains(e, DownloadErrorException.class)) {
+ if (extract(e, DownloadErrorException.class).get().errorValue.getPathValue().isNotFound()) {
+ throw new NoSuchCloudFileException(file.getName());
+ }
+ }
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public void delete(DropboxNode node) throws BackendException {
+ try {
+ cloud.delete(node);
+ } catch (DbxException e) {
+ if (contains(e, DeleteErrorException.class)) {
+ if (extract(e, DeleteErrorException.class).get().errorValue.getPathLookupValue().isNotFound()) {
+ throw new NoSuchCloudFileException(node.getName());
+ }
+ }
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public String checkAuthenticationAndRetrieveCurrentAccount(DropboxCloud cloud) throws BackendException {
+ try {
+ return this.cloud.currentAccount();
+ } catch (DbxException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public void logout(DropboxCloud cloud) throws BackendException {
+ // empty
+ }
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxCloudContentRepositoryFactory.java b/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxCloudContentRepositoryFactory.java
new file mode 100644
index 00000000..bba187e9
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxCloudContentRepositoryFactory.java
@@ -0,0 +1,35 @@
+package org.cryptomator.data.cloud.dropbox;
+
+import android.content.Context;
+
+import org.cryptomator.data.repository.CloudContentRepositoryFactory;
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.DropboxCloud;
+import org.cryptomator.domain.repository.CloudContentRepository;
+
+import javax.inject.Inject;
+import javax.inject.Singleton;
+
+import static org.cryptomator.domain.CloudType.DROPBOX;
+
+@Singleton
+public class DropboxCloudContentRepositoryFactory implements CloudContentRepositoryFactory {
+
+ private final Context context;
+
+ @Inject
+ public DropboxCloudContentRepositoryFactory(Context context) {
+ this.context = context;
+ }
+
+ @Override
+ public boolean supports(Cloud cloud) {
+ return cloud.type() == DROPBOX;
+ }
+
+ @Override
+ public CloudContentRepository cloudContentRepositoryFor(Cloud cloud) {
+ return new DropboxCloudContentRepository((DropboxCloud) cloud, context);
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxCloudNodeFactory.java b/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxCloudNodeFactory.java
new file mode 100644
index 00000000..d5f5439e
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxCloudNodeFactory.java
@@ -0,0 +1,39 @@
+package org.cryptomator.data.cloud.dropbox;
+
+import org.cryptomator.util.Optional;
+
+import com.dropbox.core.v2.files.FileMetadata;
+import com.dropbox.core.v2.files.FolderMetadata;
+import com.dropbox.core.v2.files.Metadata;
+
+class DropboxCloudNodeFactory {
+
+ public static DropboxFile from(DropboxFolder parent, FileMetadata metadata) {
+ return new DropboxFile(parent, metadata.getName(), metadata.getPathDisplay(), Optional.ofNullable(metadata.getSize()), Optional.ofNullable(metadata.getServerModified()));
+ }
+
+ public static DropboxFile file(DropboxFolder parent, String name, Optional size, String path) {
+ return new DropboxFile(parent, name, path, size, Optional.empty());
+ }
+
+ public static DropboxFolder from(DropboxFolder parent, FolderMetadata metadata) {
+ return new DropboxFolder(parent, metadata.getName(), getNodePath(parent, metadata.getName()));
+ }
+
+ private static String getNodePath(DropboxFolder parent, String name) {
+ return parent.getPath() + "/" + name;
+ }
+
+ public static DropboxFolder folder(DropboxFolder parent, String name, String path) {
+ return new DropboxFolder(parent, name, path);
+ }
+
+ public static DropboxNode from(DropboxFolder parent, Metadata metadata) {
+ if (metadata instanceof FileMetadata) {
+ return from(parent, (FileMetadata) metadata);
+ } else {
+ return from(parent, (FolderMetadata) metadata);
+ }
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxFile.java b/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxFile.java
new file mode 100644
index 00000000..b1fa31b2
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxFile.java
@@ -0,0 +1,55 @@
+package org.cryptomator.data.cloud.dropbox;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudFile;
+import org.cryptomator.util.Optional;
+
+import java.util.Date;
+
+class DropboxFile implements CloudFile, DropboxNode {
+
+ private final DropboxFolder parent;
+ private final String name;
+ private final String path;
+ private final Optional size;
+ private final Optional modified;
+
+ public DropboxFile(DropboxFolder parent, String name, String path, Optional size, Optional modified) {
+ this.parent = parent;
+ this.name = name;
+ this.path = path;
+ this.size = size;
+ this.modified = modified;
+ }
+
+ @Override
+ public Cloud getCloud() {
+ return parent.getCloud();
+ }
+
+ @Override
+ public String getName() {
+ return name;
+ }
+
+ @Override
+ public String getPath() {
+ return path;
+ }
+
+ @Override
+ public DropboxFolder getParent() {
+ return parent;
+ }
+
+ @Override
+ public Optional getSize() {
+ return size;
+ }
+
+ @Override
+ public Optional getModified() {
+ return modified;
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxFolder.java b/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxFolder.java
new file mode 100644
index 00000000..c762ff92
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxFolder.java
@@ -0,0 +1,42 @@
+package org.cryptomator.data.cloud.dropbox;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudFolder;
+
+class DropboxFolder implements CloudFolder, DropboxNode {
+
+ private final DropboxFolder parent;
+ private final String name;
+ private final String path;
+
+ public DropboxFolder(DropboxFolder parent, String name, String path) {
+ this.parent = parent;
+ this.name = name;
+ this.path = path;
+ }
+
+ @Override
+ public Cloud getCloud() {
+ return parent.getCloud();
+ }
+
+ @Override
+ public String getName() {
+ return name;
+ }
+
+ @Override
+ public String getPath() {
+ return path;
+ }
+
+ @Override
+ public DropboxFolder getParent() {
+ return parent;
+ }
+
+ @Override
+ public DropboxFolder withCloud(Cloud cloud) {
+ return new DropboxFolder(parent.withCloud(cloud), name, path);
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxImpl.java b/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxImpl.java
new file mode 100644
index 00000000..19fa607b
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxImpl.java
@@ -0,0 +1,468 @@
+package org.cryptomator.data.cloud.dropbox;
+
+import android.content.Context;
+
+import com.dropbox.core.DbxException;
+import com.dropbox.core.NetworkIOException;
+import com.dropbox.core.RetryException;
+import com.dropbox.core.v2.DbxClientV2;
+import com.dropbox.core.v2.files.CommitInfo;
+import com.dropbox.core.v2.files.CreateFolderResult;
+import com.dropbox.core.v2.files.FileMetadata;
+import com.dropbox.core.v2.files.FolderMetadata;
+import com.dropbox.core.v2.files.GetMetadataErrorException;
+import com.dropbox.core.v2.files.ListFolderResult;
+import com.dropbox.core.v2.files.Metadata;
+import com.dropbox.core.v2.files.RelocationResult;
+import com.dropbox.core.v2.files.UploadSessionCursor;
+import com.dropbox.core.v2.files.UploadSessionFinishErrorException;
+import com.dropbox.core.v2.files.UploadSessionLookupErrorException;
+import com.dropbox.core.v2.files.WriteMode;
+import com.dropbox.core.v2.users.FullAccount;
+import com.tomclaw.cache.DiskLruCache;
+
+import org.cryptomator.data.util.TransferredBytesAwareInputStream;
+import org.cryptomator.data.util.TransferredBytesAwareOutputStream;
+import org.cryptomator.domain.CloudFile;
+import org.cryptomator.domain.CloudFolder;
+import org.cryptomator.domain.CloudNode;
+import org.cryptomator.domain.DropboxCloud;
+import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
+import org.cryptomator.domain.exception.FatalBackendException;
+import org.cryptomator.domain.exception.authentication.AuthenticationException;
+import org.cryptomator.domain.exception.authentication.NoAuthenticationProvidedException;
+import org.cryptomator.domain.usecases.ProgressAware;
+import org.cryptomator.domain.usecases.cloud.DataSource;
+import org.cryptomator.domain.usecases.cloud.DownloadState;
+import org.cryptomator.domain.usecases.cloud.Progress;
+import org.cryptomator.domain.usecases.cloud.UploadState;
+import org.cryptomator.util.Optional;
+import org.cryptomator.util.SharedPreferencesHandler;
+import org.cryptomator.util.crypto.CredentialCryptor;
+import org.cryptomator.util.file.LruFileCacheUtil;
+
+import java.io.File;
+import java.io.IOException;
+import java.io.InputStream;
+import java.io.OutputStream;
+import java.util.ArrayList;
+import java.util.List;
+
+import timber.log.Timber;
+
+import static org.cryptomator.domain.usecases.cloud.Progress.progress;
+import static org.cryptomator.util.file.LruFileCacheUtil.Cache.DROPBOX;
+import static org.cryptomator.util.file.LruFileCacheUtil.retrieveFromLruCache;
+import static org.cryptomator.util.file.LruFileCacheUtil.storeToLruCache;
+
+class DropboxImpl {
+
+ private static final long CHUNKED_UPLOAD_CHUNK_SIZE = 8L << 20;
+ private static final int CHUNKED_UPLOAD_MAX_ATTEMPTS = 5;
+
+ private final DropboxClientFactory clientFactory = new DropboxClientFactory();
+ private final DropboxCloud cloud;
+ private final RootDropboxFolder root;
+ private final Context context;
+ private final SharedPreferencesHandler sharedPreferencesHandler;
+
+ private DiskLruCache diskLruCache;
+
+ DropboxImpl(DropboxCloud cloud, Context context) {
+ if (cloud.accessToken() == null) {
+ throw new NoAuthenticationProvidedException(cloud);
+ }
+ this.cloud = cloud;
+ this.root = new RootDropboxFolder(cloud);
+ this.context = context;
+
+ sharedPreferencesHandler = new SharedPreferencesHandler(context);
+ }
+
+ private DbxClientV2 client() throws AuthenticationException {
+ return clientFactory.getClient(decrypt(cloud.accessToken()), context);
+ }
+
+ private String decrypt(String password) {
+ return CredentialCryptor //
+ .getInstance(context) //
+ .decrypt(password);
+ }
+
+ public DropboxFolder root() {
+ return root;
+ }
+
+ public DropboxFolder resolve(String path) {
+ if (path.startsWith("/")) {
+ path = path.substring(1);
+ }
+ String[] names = path.split("/");
+ DropboxFolder folder = root;
+ for (String name : names) {
+ folder = folder(folder, name);
+ }
+ return folder;
+ }
+
+ public DropboxFile file(CloudFolder folder, String name) {
+ return file(folder, name, Optional.empty());
+ }
+
+ public DropboxFile file(CloudFolder folder, String name, Optional size) {
+ return DropboxCloudNodeFactory.file( //
+ (DropboxFolder) folder, //
+ name, //
+ size, //
+ folder.getPath() + '/' + name);
+ }
+
+ public DropboxFolder folder(CloudFolder folder, String name) {
+ return DropboxCloudNodeFactory.folder( //
+ (DropboxFolder) folder, //
+ name, //
+ folder.getPath() + '/' + name);
+ }
+
+ public boolean exists(CloudNode node) throws AuthenticationException, DbxException {
+ try {
+ Metadata metadata = client() //
+ .files() //
+ .getMetadata(node.getPath());
+ if (node instanceof CloudFolder) {
+ return metadata instanceof FolderMetadata;
+ } else {
+ return metadata instanceof FileMetadata;
+ }
+ } catch (GetMetadataErrorException e) {
+ if (e.errorValue.isPath()) {
+ return false;
+ }
+ throw e;
+ }
+ }
+
+ public List list(CloudFolder folder) throws AuthenticationException, DbxException {
+ List result = new ArrayList<>();
+ ListFolderResult listFolderResult = null;
+ do {
+ if (listFolderResult == null) {
+ listFolderResult = client() //
+ .files() //
+ .listFolder(folder.getPath());
+ } else {
+ String cursor = listFolderResult.getCursor();
+ listFolderResult = client() //
+ .files() //
+ .listFolderContinue(cursor);
+ }
+ List entryMetadata = listFolderResult.getEntries();
+ for (Metadata metadata : entryMetadata) {
+ result.add(DropboxCloudNodeFactory.from( //
+ (DropboxFolder) folder, //
+ metadata));
+ }
+ } while (listFolderResult.getHasMore());
+ return result;
+ }
+
+ public DropboxFolder create(CloudFolder folder) throws AuthenticationException, DbxException {
+ CreateFolderResult createFolderResult = client() //
+ .files() //
+ .createFolderV2(folder.getPath());
+
+ return DropboxCloudNodeFactory.from( //
+ (DropboxFolder) folder.getParent(), //
+ createFolderResult.getMetadata());
+ }
+
+ public CloudNode move(CloudNode source, CloudNode target) throws AuthenticationException, DbxException {
+ RelocationResult relocationResult = client() //
+ .files() //
+ .moveV2(source.getPath(), target.getPath());
+
+ return DropboxCloudNodeFactory.from( //
+ (DropboxFolder) target.getParent(), //
+ relocationResult.getMetadata());
+ }
+
+ public DropboxFile write(DropboxFile file, DataSource data, final ProgressAware progressAware, boolean replace, long size)
+ throws AuthenticationException, DbxException, IOException, CloudNodeAlreadyExistsException {
+ if (exists(file) && !replace) {
+ throw new CloudNodeAlreadyExistsException("CloudNode already exists and replace is false");
+ }
+
+ progressAware.onProgress(Progress.started(UploadState.upload(file)));
+ WriteMode writeMode = WriteMode.ADD;
+ if (replace) {
+ writeMode = WriteMode.OVERWRITE;
+ }
+ // "Upload the file with simple upload API if it is small enough, otherwise use chunked
+ // upload API for better performance. Arbitrarily chose 2 times our chunk size as the
+ // deciding factor. This should really depend on your network."
+ // Source: https://github.com/dropbox/dropbox-sdk-java/blob/master/examples/upload-file/src/main/java/com/dropbox/core/examples/upload_file/Main.java
+ if (size <= (2 * CHUNKED_UPLOAD_CHUNK_SIZE)) {
+ uploadFile(file, data, progressAware, writeMode, size);
+ } else {
+ chunkedUploadFile(file, data, progressAware, writeMode, size);
+ }
+ FileMetadata metadata = (FileMetadata) client() //
+ .files() //
+ .getMetadata(file.getPath());
+
+ progressAware.onProgress(Progress.completed(UploadState.upload(file)));
+
+ return DropboxCloudNodeFactory.from( //
+ file.getParent(), //
+ metadata);
+ }
+
+ private void uploadFile(final DropboxFile file, DataSource data, final ProgressAware progressAware, WriteMode writeMode, final long size) //
+ throws AuthenticationException, DbxException, IOException {
+ try (TransferredBytesAwareInputStream in = new TransferredBytesAwareInputStream(data.open(context)) {
+ @Override
+ public void bytesTransferred(long transferred) {
+ progressAware.onProgress( //
+ progress(UploadState.upload(file)) //
+ .between(0) //
+ .and(size) //
+ .withValue(transferred));
+ }
+ }) {
+ client() //
+ .files() //
+ .uploadBuilder(file.getPath()) //
+ .withMode(writeMode) //
+ .uploadAndFinish(in);
+ }
+ }
+
+ private void chunkedUploadFile(final DropboxFile file, DataSource data, final ProgressAware progressAware, WriteMode writeMode, final long size)
+ throws AuthenticationException, DbxException, IOException {
+ // Assert our file is at least the chunk upload size. We make this assumption in the code
+ // below to simplify the logic.
+ if (size < CHUNKED_UPLOAD_CHUNK_SIZE) {
+ throw new FatalBackendException("File too small, use uploadFile() instead.");
+ }
+
+ long uploaded = 0L;
+ DbxException thrown = null;
+
+ try (InputStream stream = data.open(context)) {
+
+ // Chunked uploads have 3 phases, each of which can accept uploaded bytes:
+ //
+ // (1) Start: initiate the upload and get an upload session ID
+ // (2) Append: upload chunks of the file to append to our session
+ // (3) Finish: commit the upload and close the session
+ //
+ // We track how many bytes we uploaded to determine which phase we should be in.
+ String sessionId = null;
+ for (int i = 0; i < CHUNKED_UPLOAD_MAX_ATTEMPTS; i++) {
+ if (i > 0) {
+ Timber.v("Retrying chunked upload (" + (i + 1) + " / " + CHUNKED_UPLOAD_MAX_ATTEMPTS + " attempts)");
+ }
+
+ try {
+ // if this is a retry, make sure seek to the correct offset
+ stream.skip(uploaded);
+
+ // (1) Start
+ if (sessionId == null) {
+ sessionId = client() //
+ .files() //
+ .uploadSessionStart() //
+ .uploadAndFinish(new TransferredBytesAwareInputStream(stream) {
+ @Override
+ public void bytesTransferred(long transferred) {
+ progressAware.onProgress( //
+ progress(UploadState.upload(file)) //
+ .between(0) //
+ .and(size) //
+ .withValue(transferred));
+ }
+ }, CHUNKED_UPLOAD_CHUNK_SIZE).getSessionId();
+ uploaded += CHUNKED_UPLOAD_CHUNK_SIZE;
+
+ progressAware.onProgress( //
+ progress(UploadState.upload(file)) //
+ .between(0) //
+ .and(size) //
+ .withValue(uploaded));
+ }
+
+ UploadSessionCursor cursor = new UploadSessionCursor(sessionId, uploaded);
+
+ // (2) Append
+ while ((size - uploaded) > CHUNKED_UPLOAD_CHUNK_SIZE) {
+ final long fullyUploaded = uploaded;
+ client() //
+ .files() //
+ .uploadSessionAppendV2(cursor) //
+ .uploadAndFinish(new TransferredBytesAwareInputStream(stream) {
+ @Override
+ public void bytesTransferred(long transferred) {
+ progressAware.onProgress( //
+ progress(UploadState.upload(file)) //
+ .between(0) //
+ .and(size) //
+ .withValue(fullyUploaded + transferred));
+ }
+ }, CHUNKED_UPLOAD_CHUNK_SIZE);
+ uploaded += CHUNKED_UPLOAD_CHUNK_SIZE;
+
+ progressAware.onProgress( //
+ progress(UploadState.upload(file)) //
+ .between(0) //
+ .and(size) //
+ .withValue(uploaded));
+
+ cursor = new UploadSessionCursor(sessionId, uploaded);
+ }
+
+ // (3) Finish
+ long remaining = size - uploaded;
+ CommitInfo commitInfo = CommitInfo //
+ .newBuilder(file.getPath()) //
+ .withMode(writeMode) //
+ .build();
+
+ client() //
+ .files() //
+ .uploadSessionFinish(cursor, commitInfo) //
+ .uploadAndFinish(stream, remaining);
+
+ return;
+ } catch (RetryException ex) {
+ thrown = ex;
+ // RetryExceptions are never automatically retried by the client for uploads. Must
+ // catch this exception even if DbxRequestConfig.getMaxRetries() > 0.
+ sleepQuietly(ex.getBackoffMillis());
+ } catch (NetworkIOException ex) {
+ thrown = ex;
+ // Network issue with Dropbox (maybe a timeout?), try again.
+ } catch (UploadSessionLookupErrorException ex) {
+ if (ex.errorValue.isIncorrectOffset()) {
+ thrown = ex;
+ // Server offset into the stream doesn't match our offset (uploaded). Seek to
+ // the expected offset according to the server and try again.
+ uploaded = ex. //
+ errorValue. //
+ getIncorrectOffsetValue(). //
+ getCorrectOffset();
+ } else {
+ throw new FatalBackendException(ex);
+ }
+ } catch (UploadSessionFinishErrorException ex) {
+ if (ex.errorValue.isLookupFailed() && ex.errorValue.getLookupFailedValue().isIncorrectOffset()) {
+ thrown = ex;
+ // Server offset into the stream doesn't match our offset (uploaded). Seek to
+ // the expected offset according to the server and try again.
+ uploaded = ex. //
+ errorValue. //
+ getLookupFailedValue(). //
+ getIncorrectOffsetValue(). //
+ getCorrectOffset();
+ } else {
+ throw new FatalBackendException(ex);
+ }
+ }
+ }
+ }
+
+ throw new FatalBackendException("Maxed out upload attempts to Dropbox.", thrown);
+ }
+
+ public void read(CloudFile file, Optional encryptedTmpFile, OutputStream data, final ProgressAware progressAware) throws DbxException, IOException {
+ progressAware.onProgress(Progress.started(DownloadState.download(file)));
+
+ Optional cacheKey = Optional.empty();
+ Optional cacheFile = Optional.empty();
+
+ if (sharedPreferencesHandler.useLruCache() && createLruCache(sharedPreferencesHandler.lruCacheSize())) {
+ final FileMetadata fileMetadata = (FileMetadata) client() //
+ .files() //
+ .getMetadata(file.getPath());
+ cacheKey = Optional.of(fileMetadata.getId() + fileMetadata.getRev());
+ java.io.File cachedFile = diskLruCache.get(cacheKey.get());
+ cacheFile = cachedFile != null ? Optional.of(cachedFile) : Optional.empty();
+ }
+
+ if (sharedPreferencesHandler.useLruCache() && cacheFile.isPresent()) {
+ try {
+ retrieveFromLruCache(cacheFile.get(), data);
+ } catch (IOException e) {
+ Timber.tag("DropboxImpl").w(e, "Error while retrieving content from Cache, get from web request");
+ writeToData(file, data, encryptedTmpFile, cacheKey, progressAware);
+ }
+ } else {
+ writeToData(file, data, encryptedTmpFile, cacheKey, progressAware);
+ }
+
+ progressAware.onProgress(Progress.completed(DownloadState.download(file)));
+ }
+
+ private void writeToData(final CloudFile file, //
+ final OutputStream data, //
+ final Optional encryptedTmpFile, //
+ final Optional cacheKey, //
+ final ProgressAware progressAware) throws DbxException, IOException {
+ try (TransferredBytesAwareOutputStream out = new TransferredBytesAwareOutputStream(data) {
+ @Override
+ public void bytesTransferred(long transferred) {
+ progressAware.onProgress( //
+ progress(DownloadState.download(file)) //
+ .between(0) //
+ .and(file.getSize().orElse(Long.MAX_VALUE)) //
+ .withValue(transferred));
+ }
+ }) {
+ client() //
+ .files() //
+ .download(file.getPath()) //
+ .download(out);
+ }
+
+ if (sharedPreferencesHandler.useLruCache() && encryptedTmpFile.isPresent() && cacheKey.isPresent()) {
+ try {
+ storeToLruCache(diskLruCache, cacheKey.get(), encryptedTmpFile.get());
+ } catch (IOException e) {
+ Timber.tag("DropboxImpl").e(e, "Failed to write downloaded file in LRU cache");
+ }
+ }
+ }
+
+ private boolean createLruCache(int cacheSize) {
+ if (diskLruCache == null) {
+ try {
+ diskLruCache = DiskLruCache.create(new LruFileCacheUtil(context).resolve(DROPBOX), cacheSize);
+ } catch (IOException e) {
+ Timber.tag("DropboxImpl").e(e, "Failed to setup LRU cache");
+ return false;
+ }
+ }
+
+ return true;
+ }
+
+ public void delete(CloudNode node) throws AuthenticationException, DbxException {
+ client() //
+ .files() //
+ .deleteV2(node.getPath());
+ }
+
+ public String currentAccount() throws AuthenticationException, DbxException {
+ FullAccount currentAccount = client() //
+ .users() //
+ .getCurrentAccount();
+ return currentAccount.getName().getDisplayName();
+ }
+
+ private static void sleepQuietly(long millis) {
+ try {
+ Thread.sleep(millis);
+ } catch (InterruptedException ex) {
+ throw new FatalBackendException("Error uploading to Dropbox: interrupted during backoff.");
+ }
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxNode.java b/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxNode.java
new file mode 100644
index 00000000..665e7d0a
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/dropbox/DropboxNode.java
@@ -0,0 +1,6 @@
+package org.cryptomator.data.cloud.dropbox;
+
+import org.cryptomator.domain.CloudNode;
+
+interface DropboxNode extends CloudNode {
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/dropbox/RootDropboxFolder.java b/data/src/main/java/org/cryptomator/data/cloud/dropbox/RootDropboxFolder.java
new file mode 100644
index 00000000..e0be4aa0
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/dropbox/RootDropboxFolder.java
@@ -0,0 +1,24 @@
+package org.cryptomator.data.cloud.dropbox;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.DropboxCloud;
+
+class RootDropboxFolder extends DropboxFolder {
+
+ private final DropboxCloud cloud;
+
+ public RootDropboxFolder(DropboxCloud cloud) {
+ super(null, "", "");
+ this.cloud = cloud;
+ }
+
+ @Override
+ public DropboxCloud getCloud() {
+ return cloud;
+ }
+
+ @Override
+ public DropboxFolder withCloud(Cloud cloud) {
+ return new RootDropboxFolder((DropboxCloud) cloud);
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/googledrive/FixedGoogleAccountCredential.java b/data/src/main/java/org/cryptomator/data/cloud/googledrive/FixedGoogleAccountCredential.java
new file mode 100644
index 00000000..d0525a4e
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/googledrive/FixedGoogleAccountCredential.java
@@ -0,0 +1,116 @@
+package org.cryptomator.data.cloud.googledrive;
+
+import android.accounts.Account;
+import android.content.Context;
+
+import com.google.android.gms.auth.GoogleAuthException;
+import com.google.android.gms.auth.GoogleAuthUtil;
+import com.google.android.gms.auth.GooglePlayServicesAvailabilityException;
+import com.google.android.gms.auth.UserRecoverableAuthException;
+import com.google.api.client.googleapis.extensions.android.gms.auth.GoogleAccountCredential;
+import com.google.api.client.googleapis.extensions.android.gms.auth.GoogleAuthIOException;
+import com.google.api.client.googleapis.extensions.android.gms.auth.GooglePlayServicesAvailabilityIOException;
+import com.google.api.client.googleapis.extensions.android.gms.auth.UserRecoverableAuthIOException;
+import com.google.api.client.http.HttpExecuteInterceptor;
+import com.google.api.client.http.HttpRequest;
+import com.google.api.client.http.HttpResponse;
+import com.google.api.client.http.HttpUnsuccessfulResponseHandler;
+import com.google.api.client.util.BackOffUtils;
+import com.google.api.client.util.Beta;
+import com.google.api.client.util.Joiner;
+import com.google.api.client.util.Preconditions;
+import com.google.api.client.util.Sleeper;
+
+import org.cryptomator.data.util.NetworkTimeout;
+
+import java.io.IOException;
+import java.util.Collection;
+
+import static com.google.android.gms.auth.GoogleAuthUtil.GOOGLE_ACCOUNT_TYPE;
+
+class FixedGoogleAccountCredential extends GoogleAccountCredential {
+
+ private String accountName;
+
+ public static FixedGoogleAccountCredential usingOAuth2(Context context, Collection scopes) {
+ Preconditions.checkArgument(scopes != null && scopes.iterator().hasNext());
+ String scopesStr = "oauth2:" + Joiner.on(' ').join(scopes);
+ return new FixedGoogleAccountCredential(context, scopesStr);
+ }
+
+ private FixedGoogleAccountCredential(Context context, String scopesStr) {
+ super(context, scopesStr);
+ }
+
+ @Override
+ public void initialize(HttpRequest request) {
+ FixedRequestHandler handler = new FixedRequestHandler();
+ request.setInterceptor(handler);
+ request.setUnsuccessfulResponseHandler(handler);
+ request.setConnectTimeout((int) NetworkTimeout.CONNECTION.asMilliseconds());
+ request.setReadTimeout((int) NetworkTimeout.READ.asMilliseconds());
+ }
+
+ void setAccountName(String accountName) {
+ this.accountName = accountName;
+ }
+
+ @Override
+ public String getToken() throws IOException, GoogleAuthException {
+ if (getBackOff() != null) {
+ getBackOff().reset();
+ }
+
+ while (true) {
+ try {
+ Account accountDetails = new Account(accountName, GOOGLE_ACCOUNT_TYPE);
+ return GoogleAuthUtil.getToken(getContext(), accountDetails, getScope());
+ } catch (IOException e) {
+ // network or server error, so retry using back-off policy
+ try {
+ if (getBackOff() == null || !BackOffUtils.next(Sleeper.DEFAULT, getBackOff())) {
+ throw e;
+ }
+ } catch (InterruptedException e2) {
+ // ignore
+ }
+ }
+ }
+ }
+
+ @Beta
+ class FixedRequestHandler implements HttpExecuteInterceptor, HttpUnsuccessfulResponseHandler {
+
+ /** Whether we've received a 401 error code indicating the token is invalid. */
+ boolean received401;
+ String token;
+
+ @Override
+ public void intercept(HttpRequest request) throws IOException {
+ try {
+ token = getToken();
+ request.getHeaders().setAuthorization("Bearer " + token);
+ } catch (GooglePlayServicesAvailabilityException e) {
+ throw new GooglePlayServicesAvailabilityIOException(e);
+ } catch (UserRecoverableAuthException e) {
+ throw new UserRecoverableAuthIOException(e);
+ } catch (GoogleAuthException e) {
+ throw new GoogleAuthIOException(e);
+ }
+ }
+
+ @Override
+ public boolean handleResponse(HttpRequest request, HttpResponse response, boolean supportsRetry) throws IOException {
+ if (response.getStatusCode() == 401 && !received401) {
+ received401 = true;
+ try {
+ GoogleAuthUtil.clearToken(getContext(), token);
+ } catch (GoogleAuthException e) {
+ throw new IOException(e);
+ }
+ return true;
+ }
+ return false;
+ }
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveClientFactory.java b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveClientFactory.java
new file mode 100644
index 00000000..6775d7e8
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveClientFactory.java
@@ -0,0 +1,34 @@
+package org.cryptomator.data.cloud.googledrive;
+
+import android.content.Context;
+
+import com.google.api.client.extensions.android.http.AndroidHttp;
+import com.google.api.client.json.jackson2.JacksonFactory;
+import com.google.api.services.drive.Drive;
+import com.google.api.services.drive.DriveScopes;
+
+import org.cryptomator.data.BuildConfig;
+import org.cryptomator.domain.exception.FatalBackendException;
+
+import java.util.Collections;
+
+class GoogleDriveClientFactory {
+
+ private final Context context;
+
+ GoogleDriveClientFactory(Context context) {
+ this.context = context;
+ }
+
+ Drive getClient(String accountName) throws FatalBackendException {
+ try {
+ FixedGoogleAccountCredential credential = FixedGoogleAccountCredential.usingOAuth2(context, Collections.singleton(DriveScopes.DRIVE));
+ credential.setAccountName(accountName);
+ return new Drive.Builder(AndroidHttp.newCompatibleTransport(), JacksonFactory.getDefaultInstance(), credential) //
+ .setApplicationName("Cryptomator-Android/" + BuildConfig.VERSION_NAME) //
+ .build();
+ } catch (Exception e) {
+ throw new FatalBackendException(e);
+ }
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveCloudContentRepository.java b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveCloudContentRepository.java
new file mode 100644
index 00000000..a7e4b86c
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveCloudContentRepository.java
@@ -0,0 +1,213 @@
+package org.cryptomator.data.cloud.googledrive;
+
+import android.content.Context;
+
+import com.google.api.client.googleapis.extensions.android.gms.auth.UserRecoverableAuthIOException;
+import com.google.api.client.googleapis.json.GoogleJsonResponseException;
+import com.google.api.client.http.HttpStatusCodes;
+
+import org.cryptomator.data.cloud.InterceptingCloudContentRepository;
+import org.cryptomator.domain.CloudNode;
+import org.cryptomator.domain.GoogleDriveCloud;
+import org.cryptomator.domain.exception.BackendException;
+import org.cryptomator.domain.exception.FatalBackendException;
+import org.cryptomator.domain.exception.NetworkConnectionException;
+import org.cryptomator.domain.exception.NoSuchCloudFileException;
+import org.cryptomator.domain.exception.authentication.UserRecoverableAuthenticationException;
+import org.cryptomator.domain.repository.CloudContentRepository;
+import org.cryptomator.domain.usecases.ProgressAware;
+import org.cryptomator.domain.usecases.cloud.DataSource;
+import org.cryptomator.domain.usecases.cloud.DownloadState;
+import org.cryptomator.domain.usecases.cloud.UploadState;
+import org.cryptomator.util.ExceptionUtil;
+import org.cryptomator.util.Optional;
+
+import java.io.File;
+import java.io.IOException;
+import java.io.OutputStream;
+import java.net.SocketTimeoutException;
+import java.util.List;
+
+import static org.cryptomator.util.ExceptionUtil.contains;
+import static org.cryptomator.util.ExceptionUtil.extract;
+
+class GoogleDriveCloudContentRepository extends InterceptingCloudContentRepository {
+
+ private final GoogleDriveCloud cloud;
+
+ GoogleDriveCloudContentRepository(Context context, GoogleDriveCloud cloud, GoogleDriveIdCache idCache) {
+ super(new Intercepted(context, cloud, idCache));
+ this.cloud = cloud;
+ }
+
+ @Override
+ protected void throwWrappedIfRequired(Exception e) throws BackendException {
+ throwConnectionErrorIfRequired(e);
+ throwUserRecoverableAuthenticationExceptionIfRequired(e);
+ throwNoSuchCloudFileExceptionIfRequired(e);
+ }
+
+ private void throwUserRecoverableAuthenticationExceptionIfRequired(Exception e) {
+ Optional userRecoverableAuthIOException = extract(e, UserRecoverableAuthIOException.class);
+ if (userRecoverableAuthIOException.isPresent()) {
+ throw new UserRecoverableAuthenticationException(cloud, userRecoverableAuthIOException.get().getIntent());
+ }
+ }
+
+ private void throwConnectionErrorIfRequired(Exception e) throws NetworkConnectionException {
+ if (contains(e, SocketTimeoutException.class) || contains(e, IOException.class, ExceptionUtil.thatHasMessage("NetworkError"))) {
+ throw new NetworkConnectionException(e);
+ }
+ }
+
+ private void throwNoSuchCloudFileExceptionIfRequired(Exception e) throws NoSuchCloudFileException {
+ if (contains(e, GoogleJsonResponseException.class)) {
+ if (extract(e, GoogleJsonResponseException.class).get().getStatusCode() == HttpStatusCodes.STATUS_CODE_NOT_FOUND) {
+ throw new NoSuchCloudFileException();
+ }
+ }
+ }
+
+ private static class Intercepted implements CloudContentRepository {
+
+ private final GoogleDriveImpl impl;
+
+ public Intercepted(Context context, GoogleDriveCloud cloud, GoogleDriveIdCache idCache) {
+ this.impl = new GoogleDriveImpl(context, cloud, idCache);
+ }
+
+ @Override
+ public GoogleDriveFolder root(GoogleDriveCloud cloud) throws BackendException {
+ return impl.root();
+ }
+
+ @Override
+ public GoogleDriveFolder resolve(GoogleDriveCloud cloud, String path) throws BackendException {
+ try {
+ return impl.resolve(path);
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public GoogleDriveFile file(GoogleDriveFolder parent, String name) throws BackendException {
+ try {
+ return impl.file(parent, name);
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public GoogleDriveFile file(GoogleDriveFolder parent, String name, Optional size) throws BackendException {
+ try {
+ return impl.file(parent, name, size);
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public GoogleDriveFolder folder(GoogleDriveFolder parent, String name) throws BackendException {
+ try {
+ return impl.folder(parent, name);
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public boolean exists(GoogleDriveNode node) throws BackendException {
+ try {
+ return impl.exists(node);
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public List list(GoogleDriveFolder folder) throws BackendException {
+ try {
+ return impl.list(folder);
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public GoogleDriveFolder create(GoogleDriveFolder folder) throws BackendException {
+ try {
+ return impl.create(folder);
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public GoogleDriveFolder move(GoogleDriveFolder source, GoogleDriveFolder target) throws BackendException {
+ try {
+ if (source.getDriveId() == null) {
+ throw new NoSuchCloudFileException(source.getName());
+ }
+ return (GoogleDriveFolder) impl.move(source, target);
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public GoogleDriveFile move(GoogleDriveFile source, GoogleDriveFile target) throws BackendException {
+ try {
+ return (GoogleDriveFile) impl.move(source, target);
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public GoogleDriveFile write(GoogleDriveFile file, DataSource data, ProgressAware progressAware, boolean replace, long size) throws BackendException {
+ try {
+ return impl.write(file, data, progressAware, replace, size);
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public void read(GoogleDriveFile file, Optional encryptedTmpFile, OutputStream data, ProgressAware progressAware) throws BackendException {
+ try {
+ if (file.getDriveId() == null) {
+ throw new NoSuchCloudFileException(file.getName());
+ }
+ impl.read(file, encryptedTmpFile, data, progressAware);
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public void delete(GoogleDriveNode node) throws BackendException {
+ try {
+ impl.delete(node);
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public String checkAuthenticationAndRetrieveCurrentAccount(GoogleDriveCloud cloud) throws BackendException {
+ try {
+ return impl.currentAccount();
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public void logout(GoogleDriveCloud cloud) throws BackendException {
+ // empty
+ }
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveCloudContentRepositoryFactory.java b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveCloudContentRepositoryFactory.java
new file mode 100644
index 00000000..b48527e7
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveCloudContentRepositoryFactory.java
@@ -0,0 +1,35 @@
+package org.cryptomator.data.cloud.googledrive;
+
+import android.content.Context;
+
+import org.cryptomator.data.repository.CloudContentRepositoryFactory;
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudType;
+import org.cryptomator.domain.GoogleDriveCloud;
+import org.cryptomator.domain.repository.CloudContentRepository;
+
+import javax.inject.Inject;
+import javax.inject.Singleton;
+
+@Singleton
+public class GoogleDriveCloudContentRepositoryFactory implements CloudContentRepositoryFactory {
+
+ private final Context context;
+ private final GoogleDriveIdCache idCache;
+
+ @Inject
+ public GoogleDriveCloudContentRepositoryFactory(Context context, GoogleDriveIdCache idCache) {
+ this.context = context;
+ this.idCache = idCache;
+ }
+
+ @Override
+ public boolean supports(Cloud cloud) {
+ return cloud.type() == CloudType.GOOGLE_DRIVE;
+ }
+
+ @Override
+ public CloudContentRepository cloudContentRepositoryFor(Cloud cloud) {
+ return new GoogleDriveCloudContentRepository(context, (GoogleDriveCloud) cloud, idCache);
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveCloudNodeFactory.java b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveCloudNodeFactory.java
new file mode 100644
index 00000000..a3f35e33
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveCloudNodeFactory.java
@@ -0,0 +1,59 @@
+package org.cryptomator.data.cloud.googledrive;
+
+import com.google.api.services.drive.model.File;
+
+import org.cryptomator.util.Optional;
+
+import java.util.Date;
+
+class GoogleDriveCloudNodeFactory {
+
+ public static GoogleDriveFile file(GoogleDriveFolder parent, File file) {
+ return new GoogleDriveFile(parent, file.getName(), getNodePath(parent, file.getName()), file.getId(), getFileSize(file), getModified(file));
+ }
+
+ public static GoogleDriveFile file(GoogleDriveFolder parent, String name, Optional size) {
+ return new GoogleDriveFile(parent, name, getNodePath(parent, name), null, size, Optional.empty());
+ }
+
+ private static Optional getModified(File file) {
+ return file.getModifiedTime() != null ? Optional.of(new Date(file.getModifiedTime().getValue())) : Optional.empty();
+ }
+
+ private static Optional getFileSize(File file) {
+ return file.getSize() != null ? Optional.of(file.getSize()) : Optional.empty();
+ }
+
+ public static GoogleDriveFile file(GoogleDriveFolder parent, String name, Optional size, String path, String driveId) {
+ return new GoogleDriveFile(parent, name, path, driveId, size, Optional.empty());
+ }
+
+ public static GoogleDriveFolder folder(GoogleDriveFolder parent, File file) {
+ return new GoogleDriveFolder(parent, file.getName(), getNodePath(parent, file.getName()), file.getId());
+ }
+
+ public static GoogleDriveFolder folder(GoogleDriveFolder parent, String name) {
+ return new GoogleDriveFolder(parent, name, getNodePath(parent, name), null);
+ }
+
+ public static GoogleDriveFolder folder(GoogleDriveFolder parent, String name, String path, String driveId) {
+ return new GoogleDriveFolder(parent, name, path, driveId);
+ }
+
+ public static GoogleDriveNode from(GoogleDriveFolder parent, File file) {
+ if (isFolder(file)) {
+ return folder(parent, file);
+ } else {
+ return file(parent, file);
+ }
+ }
+
+ public static boolean isFolder(File file) {
+ return file.getMimeType().equals("application/vnd.google-apps.folder");
+ }
+
+ public static String getNodePath(GoogleDriveFolder parent, String name) {
+ return parent.getPath() + "/" + name;
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveFile.java b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveFile.java
new file mode 100644
index 00000000..b0716a8a
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveFile.java
@@ -0,0 +1,61 @@
+package org.cryptomator.data.cloud.googledrive;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudFile;
+import org.cryptomator.util.Optional;
+
+import java.util.Date;
+
+class GoogleDriveFile implements CloudFile, GoogleDriveNode {
+
+ private final GoogleDriveFolder parent;
+ private final String name;
+ private final String path;
+ private final String driveId;
+ private final Optional size;
+ private final Optional modified;
+
+ public GoogleDriveFile(GoogleDriveFolder parent, String name, String path, String driveId, Optional size, Optional modified) {
+ this.parent = parent;
+ this.name = name;
+ this.path = path;
+ this.driveId = driveId;
+ this.size = size;
+ this.modified = modified;
+ }
+
+ @Override
+ public Cloud getCloud() {
+ return parent.getCloud();
+ }
+
+ @Override
+ public String getName() {
+ return name;
+ }
+
+ @Override
+ public String getPath() {
+ return path;
+ }
+
+ @Override
+ public String getDriveId() {
+ return driveId;
+ }
+
+ @Override
+ public GoogleDriveFolder getParent() {
+ return parent;
+ }
+
+ @Override
+ public Optional getSize() {
+ return size;
+ }
+
+ @Override
+ public Optional getModified() {
+ return modified;
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveFolder.java b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveFolder.java
new file mode 100644
index 00000000..60d2bf93
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveFolder.java
@@ -0,0 +1,49 @@
+package org.cryptomator.data.cloud.googledrive;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudFolder;
+
+class GoogleDriveFolder implements CloudFolder, GoogleDriveNode {
+
+ private final GoogleDriveFolder parent;
+ private final String name;
+ private final String path;
+ private final String driveId;
+
+ public GoogleDriveFolder(GoogleDriveFolder parent, String name, String path, String driveId) {
+ this.parent = parent;
+ this.name = name;
+ this.path = path;
+ this.driveId = driveId;
+ }
+
+ @Override
+ public Cloud getCloud() {
+ return parent.getCloud();
+ }
+
+ @Override
+ public String getName() {
+ return name;
+ }
+
+ @Override
+ public String getPath() {
+ return path;
+ }
+
+ @Override
+ public String getDriveId() {
+ return driveId;
+ }
+
+ @Override
+ public GoogleDriveFolder getParent() {
+ return parent;
+ }
+
+ @Override
+ public GoogleDriveFolder withCloud(Cloud cloud) {
+ return new GoogleDriveFolder(parent.withCloud(cloud), name, path, driveId);
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveIdCache.java b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveIdCache.java
new file mode 100644
index 00000000..b75ce333
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveIdCache.java
@@ -0,0 +1,77 @@
+package org.cryptomator.data.cloud.googledrive;
+
+import android.util.LruCache;
+
+import org.cryptomator.domain.CloudFolder;
+
+import javax.inject.Inject;
+
+class GoogleDriveIdCache {
+
+ private final LruCache cache;
+
+ @Inject
+ GoogleDriveIdCache() {
+ cache = new LruCache<>(1000);
+ }
+
+ public NodeInfo get(String path) {
+ return cache.get(path);
+ }
+
+ T cache(T value) {
+ add(value);
+ return value;
+ }
+
+ public void add(GoogleDriveIdCloudNode node) {
+ add(node.getPath(), new NodeInfo(node));
+ }
+
+ private void add(String path, NodeInfo info) {
+ cache.put(path, info);
+ }
+
+ public void remove(GoogleDriveIdCloudNode node) {
+ remove(node.getPath());
+ }
+
+ private void remove(String path) {
+ removeChildren(path);
+ cache.remove(path);
+ }
+
+ private void removeChildren(String path) {
+ String prefix = path + '/';
+ for (String key : cache.snapshot().keySet()) {
+ if (key.startsWith(prefix)) {
+ cache.remove(key);
+ }
+ }
+ }
+
+ static class NodeInfo {
+
+ private final String id;
+ private final boolean isFolder;
+
+ private NodeInfo(GoogleDriveIdCloudNode node) {
+ this(node.getDriveId(), node instanceof CloudFolder);
+ }
+
+ NodeInfo(String id, boolean isFolder) {
+ this.id = id;
+ this.isFolder = isFolder;
+ }
+
+ public String getId() {
+ return id;
+ }
+
+ public boolean isFolder() {
+ return isFolder;
+ }
+
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveIdCloudNode.java b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveIdCloudNode.java
new file mode 100644
index 00000000..83f70c74
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveIdCloudNode.java
@@ -0,0 +1,9 @@
+package org.cryptomator.data.cloud.googledrive;
+
+import org.cryptomator.domain.CloudNode;
+
+interface GoogleDriveIdCloudNode extends CloudNode {
+
+ String getDriveId();
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveImpl.java b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveImpl.java
new file mode 100644
index 00000000..48df9744
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveImpl.java
@@ -0,0 +1,448 @@
+package org.cryptomator.data.cloud.googledrive;
+
+import static org.cryptomator.data.cloud.googledrive.GoogleDriveCloudNodeFactory.from;
+import static org.cryptomator.data.cloud.googledrive.GoogleDriveCloudNodeFactory.isFolder;
+import static org.cryptomator.domain.usecases.cloud.Progress.progress;
+import static org.cryptomator.util.file.LruFileCacheUtil.retrieveFromLruCache;
+import static org.cryptomator.util.file.LruFileCacheUtil.storeToLruCache;
+import static org.cryptomator.util.file.LruFileCacheUtil.Cache.GOOGLE_DRIVE;
+
+import java.io.IOException;
+import java.io.OutputStream;
+import java.util.ArrayList;
+import java.util.Collections;
+import java.util.List;
+
+import org.cryptomator.data.util.TransferredBytesAwareGoogleContentInputStream;
+import org.cryptomator.data.util.TransferredBytesAwareOutputStream;
+import org.cryptomator.domain.CloudNode;
+import org.cryptomator.domain.GoogleDriveCloud;
+import org.cryptomator.domain.exception.BackendException;
+import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
+import org.cryptomator.domain.exception.NoSuchCloudFileException;
+import org.cryptomator.domain.exception.authentication.NoAuthenticationProvidedException;
+import org.cryptomator.domain.usecases.ProgressAware;
+import org.cryptomator.domain.usecases.cloud.DataSource;
+import org.cryptomator.domain.usecases.cloud.DownloadState;
+import org.cryptomator.domain.usecases.cloud.Progress;
+import org.cryptomator.domain.usecases.cloud.UploadState;
+import org.cryptomator.util.Optional;
+import org.cryptomator.util.SharedPreferencesHandler;
+import org.cryptomator.util.file.LruFileCacheUtil;
+
+import com.google.api.client.googleapis.json.GoogleJsonResponseException;
+import com.google.api.client.http.HttpResponseException;
+import com.google.api.services.drive.Drive;
+import com.google.api.services.drive.model.About;
+import com.google.api.services.drive.model.File;
+import com.google.api.services.drive.model.FileList;
+import com.google.api.services.drive.model.Revision;
+import com.google.api.services.drive.model.RevisionList;
+import com.tomclaw.cache.DiskLruCache;
+
+import android.content.Context;
+
+import timber.log.Timber;
+
+class GoogleDriveImpl {
+
+ private static final int STATUS_REQUEST_RANGE_NOT_SATISFIABLE = 416;
+
+ private final GoogleDriveIdCache idCache;
+
+ private final Context context;
+ private final GoogleDriveCloud googleDriveCloud;
+ private final SharedPreferencesHandler sharedPreferencesHandler;
+ private final RootGoogleDriveFolder root;
+
+ private DiskLruCache diskLruCache;
+
+ GoogleDriveImpl(Context context, GoogleDriveCloud googleDriveCloud, GoogleDriveIdCache idCache) {
+ if (googleDriveCloud.accessToken() == null) {
+ throw new NoAuthenticationProvidedException(googleDriveCloud);
+ }
+ this.context = context;
+ this.googleDriveCloud = googleDriveCloud;
+ this.idCache = idCache;
+ this.root = new RootGoogleDriveFolder(googleDriveCloud);
+
+ sharedPreferencesHandler = new SharedPreferencesHandler(context);
+ }
+
+ private Drive client() {
+ return new GoogleDriveClientFactory(context) //
+ .getClient(googleDriveCloud.accessToken());
+ }
+
+ public GoogleDriveFolder root() {
+ return root;
+ }
+
+ public GoogleDriveFolder resolve(String path) throws IOException {
+ if (path.startsWith("/")) {
+ path = path.substring(1);
+ }
+ String[] names = path.split("/");
+ GoogleDriveFolder folder = root;
+ for (String name : names) {
+ folder = folder(folder, name);
+ }
+ return folder;
+ }
+
+ private Optional findFile(String parentDriveId, String name) throws IOException {
+ Drive.Files.List fileListQuery = client().files().list() //
+ .setFields("files(id,mimeType,name,size)") //
+ .setSupportsAllDrives(true);
+
+ if (parentDriveId != null && parentDriveId.equals("root")) {
+ fileListQuery.setQ("name contains '" + name + "' and '" + parentDriveId + "' in parents and trashed = false or sharedWithMe");
+ } else {
+ fileListQuery.setQ("name contains '" + name + "' and '" + parentDriveId + "' in parents and trashed = false");
+ }
+
+ FileList files = fileListQuery.execute();
+
+ for (File file : files.getFiles()) {
+ if (name.equals(file.getName())) {
+ return Optional.of(file);
+ }
+ }
+ return Optional.empty();
+ }
+
+ public GoogleDriveFile file(GoogleDriveFolder parent, String name) throws IOException {
+ return file(parent, name, Optional.empty());
+ }
+
+ public GoogleDriveFile file(GoogleDriveFolder parent, String name, Optional size) throws IOException {
+ if (parent.getDriveId() == null) {
+ return GoogleDriveCloudNodeFactory.file(parent, name, size);
+ }
+ String path = GoogleDriveCloudNodeFactory.getNodePath(parent, name);
+ GoogleDriveIdCache.NodeInfo nodeInfo = idCache.get(path);
+ if (nodeInfo != null && !nodeInfo.isFolder()) {
+ return GoogleDriveCloudNodeFactory.file( //
+ parent, //
+ name, //
+ size, //
+ path, //
+ nodeInfo.getId());
+ }
+
+ Optional file = findFile(parent.getDriveId(), name);
+ if (file.isPresent()) {
+ if (!isFolder(file.get())) {
+ return idCache.cache(GoogleDriveCloudNodeFactory.file(parent, file.get()));
+ }
+ }
+
+ return GoogleDriveCloudNodeFactory.file(parent, name, size);
+ }
+
+ public GoogleDriveFolder folder(GoogleDriveFolder parent, String name) throws IOException {
+ if (parent.getDriveId() == null) {
+ return GoogleDriveCloudNodeFactory.folder(parent, name);
+ }
+ String path = GoogleDriveCloudNodeFactory.getNodePath(parent, name);
+ GoogleDriveIdCache.NodeInfo nodeInfo = idCache.get(path);
+ if (nodeInfo != null && nodeInfo.isFolder()) {
+ return GoogleDriveCloudNodeFactory.folder( //
+ parent, //
+ name, //
+ path, //
+ nodeInfo.getId());
+ }
+ Optional folder = findFile(parent.getDriveId(), name);
+ if (folder.isPresent()) {
+ if (isFolder(folder.get())) {
+ return idCache.cache( //
+ GoogleDriveCloudNodeFactory.folder(parent, folder.get()));
+ }
+ }
+
+ return GoogleDriveCloudNodeFactory.folder(parent, name);
+ }
+
+ public boolean exists(GoogleDriveNode node) throws IOException {
+ try {
+ Optional file = findFile( //
+ node.getParent().getDriveId(), //
+ node.getName());
+ boolean fileExists = file.isPresent();
+ if (fileExists) {
+ idCache.add(from( //
+ node.getParent(), //
+ file.get()));
+ }
+ return fileExists;
+ } catch (GoogleJsonResponseException e) {
+ return false;
+ }
+ }
+
+ public List list(GoogleDriveFolder folder) throws IOException {
+ List result = new ArrayList<>();
+ String pageToken = null;
+ do {
+ Drive.Files.List fileListQuery = client() //
+ .files() //
+ .list() //
+ .setFields("nextPageToken,files(id,mimeType,modifiedTime,name,size)") //
+ .setPageSize(1000) //
+ .setSupportsAllDrives(true).setIncludeItemsFromAllDrives(true).setPageToken(pageToken);
+
+ if (folder.getDriveId().equals("root")) {
+ fileListQuery.setQ("'" + folder.getDriveId() + "' in parents and trashed = false or sharedWithMe");
+ } else {
+ fileListQuery.setQ("'" + folder.getDriveId() + "' in parents and trashed = false");
+ }
+
+ FileList fileList = fileListQuery.execute();
+
+ for (File file : fileList.getFiles()) {
+ result.add(idCache.cache(from(folder, file)));
+ }
+ pageToken = fileList.getNextPageToken();
+ } while (pageToken != null);
+ return result;
+ }
+
+ public GoogleDriveFolder create(GoogleDriveFolder folder) throws IOException {
+ if (folder.getParent().getDriveId() == null) {
+ folder = new GoogleDriveFolder( //
+ create(folder.getParent()), //
+ folder.getName(), //
+ folder.getPath(), //
+ folder.getDriveId());
+ }
+ File metadata = new File();
+ metadata.setName(folder.getName());
+ metadata.setMimeType("application/vnd.google-apps.folder");
+ metadata.setParents( //
+ Collections.singletonList(folder.getParent().getDriveId()));
+
+ File createdFolder = client() //
+ .files() //
+ .create(metadata) //
+ .setFields("id,name") //
+ .setSupportsAllDrives(true).execute();
+
+ return idCache.cache( //
+ GoogleDriveCloudNodeFactory.folder( //
+ folder.getParent(), //
+ createdFolder));
+ }
+
+ public GoogleDriveNode move(GoogleDriveNode source, GoogleDriveNode target) throws IOException, CloudNodeAlreadyExistsException {
+ if (exists(target)) {
+ throw new CloudNodeAlreadyExistsException(target.getName());
+ }
+
+ File metadata = new File();
+ metadata.setName(target.getName());
+
+ File movedFile = client() //
+ .files() //
+ .update(source.getDriveId(), metadata) //
+ .setFields("id,mimeType,modifiedTime,name,size") //
+ .setAddParents(target.getParent().getDriveId()) //
+ .setRemoveParents(source.getParent().getDriveId()) //
+ .setSupportsAllDrives(true).execute();
+
+ idCache.remove(source);
+ return idCache.cache(from(target.getParent(), movedFile));
+ }
+
+ public GoogleDriveFile write(final GoogleDriveFile file, DataSource data, final ProgressAware progressAware, boolean replace, final long size) //
+ throws IOException, BackendException {
+ if (exists(file) && !replace) {
+ throw new CloudNodeAlreadyExistsException("CloudNode already exists and replace is false");
+ }
+
+ if (file.getParent().getDriveId() == null) {
+ throw new NoSuchCloudFileException(String.format("The parent folder of %s doesn't have a driveId. The file would remain in root folder", file.getPath()));
+ }
+
+ File metadata = new File();
+ metadata.setName(file.getName());
+
+ progressAware.onProgress(Progress.started(UploadState.upload(file)));
+ File uploadedFile;
+ if (file.getDriveId() != null && replace) {
+ try (TransferredBytesAwareGoogleContentInputStream in = new TransferredBytesAwareGoogleContentInputStream(null, data.open(context), size) {
+ @Override
+ public void bytesTransferred(long transferred) {
+ progressAware.onProgress( //
+ progress(UploadState.upload(file)) //
+ .between(0) //
+ .and(size) //
+ .withValue(transferred));
+ }
+ }) {
+ uploadedFile = client() //
+ .files() //
+ .update( //
+ file.getDriveId(), //
+ metadata, //
+ in)
+ .setFields("id,modifiedTime,name,size") //
+ .setSupportsAllDrives(true) //
+ .execute();
+ }
+ } else {
+ metadata.setParents( //
+ Collections.singletonList(file.getParent().getDriveId()));
+
+ try (TransferredBytesAwareGoogleContentInputStream in = new TransferredBytesAwareGoogleContentInputStream(null, data.open(context), size) {
+ @Override
+ public void bytesTransferred(long transferred) {
+ progressAware.onProgress( //
+ progress(UploadState.upload(file)) //
+ .between(0) //
+ .and(size) //
+ .withValue(transferred));
+ }
+ }) {
+ uploadedFile = client() //
+ .files() //
+ .create(metadata, in).setFields("id,modifiedTime,name,size") //
+ .setSupportsAllDrives(true) //
+ .execute();
+ }
+ }
+ progressAware.onProgress(Progress.completed(UploadState.upload(file)));
+ return idCache.cache( //
+ GoogleDriveCloudNodeFactory.file(file.getParent(), uploadedFile));
+ }
+
+ public void read(final GoogleDriveFile file, Optional encryptedTmpFile, OutputStream data, final ProgressAware progressAware) throws IOException {
+ progressAware.onProgress(Progress.started(DownloadState.download(file)));
+
+ Optional cacheKey = Optional.empty();
+ Optional cacheFile = Optional.empty();
+
+ if (sharedPreferencesHandler.useLruCache() && createLruCache(sharedPreferencesHandler.lruCacheSize())) {
+ List revisions = new ArrayList<>();
+ String pageToken = null;
+ do {
+ final RevisionList revisionList = client() //
+ .revisions() //
+ .list(file.getDriveId()) //
+ .setPageToken(pageToken).execute(); //
+
+ revisions.addAll(revisionList.getRevisions());
+
+ pageToken = revisionList.getNextPageToken();
+ } while (pageToken != null);
+
+ Collections.sort(revisions, (revision1, revision2) -> {
+ Long modified1 = revision1.getModifiedTime().getValue();
+ Long modified2 = revision2.getModifiedTime().getValue();
+ return Integer.compare(modified1.compareTo(modified2), 0);
+ });
+
+ int revisionIndex = revisions.size() > 0 ? revisions.size() - 1 : 0;
+ cacheKey = Optional.of(file.getDriveId() + revisions.get(revisionIndex).getId());
+ java.io.File cachedFile = diskLruCache.get(cacheKey.get());
+ cacheFile = cachedFile != null ? Optional.of(cachedFile) : Optional.empty();
+ }
+
+ if (sharedPreferencesHandler.useLruCache() && cacheFile.isPresent()) {
+ try {
+ retrieveFromLruCache(cacheFile.get(), data);
+ } catch (IOException e) {
+ Timber.tag("GoogleDriveImpl").w(e, "Error while retrieving content from Cache, get from web request");
+ writeToDate(file, data, encryptedTmpFile, cacheKey, progressAware);
+ }
+ } else {
+ writeToDate(file, data, encryptedTmpFile, cacheKey, progressAware);
+ }
+
+ progressAware.onProgress(Progress.completed(DownloadState.download(file)));
+ }
+
+ private void writeToDate(final GoogleDriveFile file, //
+ final OutputStream data, //
+ final Optional encryptedTmpFile, //
+ final Optional cacheKey, //
+ final ProgressAware progressAware) throws IOException {
+ try (TransferredBytesAwareOutputStream out = new TransferredBytesAwareOutputStream(data) {
+ @Override
+ public void bytesTransferred(long transferred) {
+ progressAware.onProgress( //
+ progress(DownloadState.download(file)) //
+ .between(0) //
+ .and(file.getSize().orElse(Long.MAX_VALUE)) //
+ .withValue(transferred));
+ }
+ }) {
+ client() //
+ .files() //
+ .get(file.getDriveId()) //
+ .setAlt("media") //
+ .setSupportsAllDrives(true) //
+ .executeMediaAndDownloadTo(out);
+ } catch (HttpResponseException e) {
+ ignoreEmptyFileErrorAndRethrowOthers(e, file);
+ }
+
+ if (sharedPreferencesHandler.useLruCache() && encryptedTmpFile.isPresent() && cacheKey.isPresent()) {
+ try {
+ storeToLruCache(diskLruCache, cacheKey.get(), encryptedTmpFile.get());
+ } catch (IOException e) {
+ Timber.tag("GoogleDriveImpl").e(e, "Failed to write downloaded file in LRU cache");
+ }
+ }
+ }
+
+ private boolean createLruCache(int cacheSize) {
+ if (diskLruCache == null) {
+ try {
+ diskLruCache = DiskLruCache.create(new LruFileCacheUtil(context).resolve(GOOGLE_DRIVE), cacheSize);
+ } catch (IOException e) {
+ Timber.tag("GoogleDriveImpl").e(e, "Failed to setup LRU cache");
+ return false;
+ }
+ }
+
+ return true;
+ }
+
+ /*
+ * Workaround a bug in gdrive which does not allow to download empty files.
+ *
+ * In this case an HttpResponseException with status code 416 is thrown. The filesize is checked.
+ * If zero, the exception is ignored - nothing has been read, so the OutputStream is in the correct
+ * state.
+ */
+ private void ignoreEmptyFileErrorAndRethrowOthers(HttpResponseException e, GoogleDriveFile file) throws IOException {
+ if (e.getStatusCode() == STATUS_REQUEST_RANGE_NOT_SATISFIABLE) {
+ Optional foundFile = findFile( //
+ file.getParent().getDriveId(), //
+ file.getName());
+ if (sizeOfFile(foundFile) == 0) {
+ return;
+ }
+ }
+ throw e;
+ }
+
+ private long sizeOfFile(Optional foundFile) {
+ if (foundFile.isAbsent() || isFolder(foundFile.get())) {
+ return -1;
+ }
+ return foundFile.get().getSize();
+ }
+
+ public void delete(GoogleDriveNode node) throws IOException {
+ client().files().delete(node.getDriveId()).setSupportsAllDrives(true).execute();
+ idCache.remove(node);
+ }
+
+ public String currentAccount() throws IOException {
+ About about = client().about().get().execute();
+ return about.getUser().getDisplayName();
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveNode.java b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveNode.java
new file mode 100644
index 00000000..478a32af
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/googledrive/GoogleDriveNode.java
@@ -0,0 +1,10 @@
+package org.cryptomator.data.cloud.googledrive;
+
+interface GoogleDriveNode extends GoogleDriveIdCloudNode {
+
+ @Override
+ String getDriveId();
+
+ @Override
+ GoogleDriveFolder getParent();
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/googledrive/RootGoogleDriveFolder.java b/data/src/main/java/org/cryptomator/data/cloud/googledrive/RootGoogleDriveFolder.java
new file mode 100644
index 00000000..474fc530
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/googledrive/RootGoogleDriveFolder.java
@@ -0,0 +1,24 @@
+package org.cryptomator.data.cloud.googledrive;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.GoogleDriveCloud;
+
+public class RootGoogleDriveFolder extends GoogleDriveFolder {
+
+ private final GoogleDriveCloud cloud;
+
+ public RootGoogleDriveFolder(GoogleDriveCloud cloud) {
+ super(null, "", "", "root");
+ this.cloud = cloud;
+ }
+
+ @Override
+ public GoogleDriveCloud getCloud() {
+ return cloud;
+ }
+
+ @Override
+ public GoogleDriveFolder withCloud(Cloud cloud) {
+ return new RootGoogleDriveFolder((GoogleDriveCloud) cloud);
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/local/LocalStorageContentRepositoryFactory.java b/data/src/main/java/org/cryptomator/data/cloud/local/LocalStorageContentRepositoryFactory.java
new file mode 100644
index 00000000..1a7427a6
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/local/LocalStorageContentRepositoryFactory.java
@@ -0,0 +1,62 @@
+package org.cryptomator.data.cloud.local;
+
+import android.content.Context;
+import android.os.Build;
+
+import org.cryptomator.data.cloud.local.file.LocalStorageContentRepository;
+import org.cryptomator.data.cloud.local.storageaccessframework.LocalStorageAccessFrameworkContentRepository;
+import org.cryptomator.data.repository.CloudContentRepositoryFactory;
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.LocalStorageCloud;
+import org.cryptomator.domain.exception.authentication.NoAuthenticationProvidedException;
+import org.cryptomator.domain.repository.CloudContentRepository;
+import org.cryptomator.util.file.MimeTypes;
+
+import javax.inject.Inject;
+import javax.inject.Singleton;
+
+import static android.Manifest.permission.READ_EXTERNAL_STORAGE;
+import static android.Manifest.permission.WRITE_EXTERNAL_STORAGE;
+import static android.content.pm.PackageManager.PERMISSION_GRANTED;
+import static androidx.core.content.ContextCompat.checkSelfPermission;
+import static org.cryptomator.domain.CloudType.LOCAL;
+
+@Singleton
+public class LocalStorageContentRepositoryFactory implements CloudContentRepositoryFactory {
+
+ private final Context context;
+ private final MimeTypes mimeTypes;
+
+ @Inject
+ public LocalStorageContentRepositoryFactory(Context context, MimeTypes mimeTypes) {
+ this.context = context;
+ this.mimeTypes = mimeTypes;
+ }
+
+ @Override
+ public boolean supports(Cloud cloud) {
+ return cloud.type() == LOCAL;
+ }
+
+ @Override
+ public CloudContentRepository cloudContentRepositoryFor(Cloud cloud) {
+ if (!hasPermissions(WRITE_EXTERNAL_STORAGE, READ_EXTERNAL_STORAGE)) {
+ throw new NoAuthenticationProvidedException(cloud);
+ }
+ if (((LocalStorageCloud) cloud).rootUri() != null && Build.VERSION.SDK_INT >= Build.VERSION_CODES.LOLLIPOP) {
+ return new LocalStorageAccessFrameworkContentRepository(context, mimeTypes, (LocalStorageCloud) cloud);
+ } else {
+ return new LocalStorageContentRepository(context, (LocalStorageCloud) cloud);
+ }
+ }
+
+ private boolean hasPermissions(String... permissions) {
+ for (String permission : permissions) {
+ if (checkSelfPermission(context, permission) != PERMISSION_GRANTED) {
+ return false;
+ }
+ }
+ return true;
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalFile.java b/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalFile.java
new file mode 100644
index 00000000..9e9c17a4
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalFile.java
@@ -0,0 +1,54 @@
+package org.cryptomator.data.cloud.local.file;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudFile;
+import org.cryptomator.util.Optional;
+
+import java.util.Date;
+
+class LocalFile implements CloudFile, LocalNode {
+
+ private final LocalFolder parent;
+ private final String name;
+ private final String path;
+ private final Optional size;
+ private final Optional modified;
+
+ LocalFile(LocalFolder parent, String name, String path, Optional size, Optional modified) {
+ this.parent = parent;
+ this.name = name;
+ this.path = path;
+ this.size = size;
+ this.modified = modified;
+ }
+
+ @Override
+ public Cloud getCloud() {
+ return parent.getCloud();
+ }
+
+ @Override
+ public String getName() {
+ return name;
+ }
+
+ @Override
+ public String getPath() {
+ return path;
+ }
+
+ @Override
+ public LocalFolder getParent() {
+ return parent;
+ }
+
+ @Override
+ public Optional getSize() {
+ return size;
+ }
+
+ @Override
+ public Optional getModified() {
+ return modified;
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalFolder.java b/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalFolder.java
new file mode 100644
index 00000000..490441dd
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalFolder.java
@@ -0,0 +1,42 @@
+package org.cryptomator.data.cloud.local.file;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudFolder;
+
+class LocalFolder implements CloudFolder, LocalNode {
+
+ private final LocalFolder parent;
+ private final String name;
+ private final String path;
+
+ LocalFolder(LocalFolder parent, String name, String path) {
+ this.parent = parent;
+ this.name = name;
+ this.path = path;
+ }
+
+ @Override
+ public Cloud getCloud() {
+ return parent.getCloud();
+ }
+
+ @Override
+ public String getName() {
+ return name;
+ }
+
+ @Override
+ public String getPath() {
+ return path;
+ }
+
+ @Override
+ public LocalFolder getParent() {
+ return parent;
+ }
+
+ @Override
+ public LocalFolder withCloud(Cloud cloud) {
+ return new LocalFolder(parent.withCloud(cloud), name, path);
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalNode.java b/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalNode.java
new file mode 100644
index 00000000..aa3ee16e
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalNode.java
@@ -0,0 +1,6 @@
+package org.cryptomator.data.cloud.local.file;
+
+import org.cryptomator.domain.CloudNode;
+
+interface LocalNode extends CloudNode {
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalStorageContentRepository.java b/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalStorageContentRepository.java
new file mode 100644
index 00000000..38ad0722
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalStorageContentRepository.java
@@ -0,0 +1,121 @@
+package org.cryptomator.data.cloud.local.file;
+
+import android.content.Context;
+
+import org.cryptomator.domain.CloudNode;
+import org.cryptomator.domain.LocalStorageCloud;
+import org.cryptomator.domain.exception.BackendException;
+import org.cryptomator.domain.exception.FatalBackendException;
+import org.cryptomator.domain.exception.NoSuchCloudFileException;
+import org.cryptomator.domain.repository.CloudContentRepository;
+import org.cryptomator.domain.usecases.ProgressAware;
+import org.cryptomator.domain.usecases.cloud.DataSource;
+import org.cryptomator.domain.usecases.cloud.DownloadState;
+import org.cryptomator.domain.usecases.cloud.UploadState;
+import org.cryptomator.util.Optional;
+
+import java.io.File;
+import java.io.FileNotFoundException;
+import java.io.IOException;
+import java.io.OutputStream;
+import java.util.List;
+
+import static org.cryptomator.util.ExceptionUtil.contains;
+
+public class LocalStorageContentRepository implements CloudContentRepository {
+
+ private final LocalStorageImpl localStorageImpl;
+
+ public LocalStorageContentRepository(Context context, LocalStorageCloud localStorageCloud) {
+ this.localStorageImpl = new LocalStorageImpl(context, localStorageCloud);
+ }
+
+ @Override
+ public LocalFolder root(LocalStorageCloud cloud) throws BackendException {
+ return localStorageImpl.root();
+ }
+
+ @Override
+ public LocalFolder resolve(LocalStorageCloud cloud, String path) throws BackendException {
+ return localStorageImpl.resolve(path);
+ }
+
+ @Override
+ public LocalFile file(LocalFolder parent, String name) throws BackendException {
+ return localStorageImpl.file(parent, name);
+ }
+
+ @Override
+ public LocalFile file(LocalFolder parent, String name, Optional size) throws BackendException {
+ return localStorageImpl.file(parent, name, size);
+ }
+
+ @Override
+ public LocalFolder folder(LocalFolder parent, String name) throws BackendException {
+ return localStorageImpl.folder(parent, name);
+ }
+
+ @Override
+ public boolean exists(LocalNode node) throws BackendException {
+ return localStorageImpl.exists(node);
+ }
+
+ @Override
+ public List list(LocalFolder folder) throws BackendException {
+ return localStorageImpl.list(folder);
+ }
+
+ @Override
+ public LocalFolder create(LocalFolder folder) throws BackendException {
+ return localStorageImpl.create(folder);
+ }
+
+ @Override
+ public LocalFolder move(LocalFolder source, LocalFolder target) throws BackendException {
+ return (LocalFolder) localStorageImpl.move(source, target);
+ }
+
+ @Override
+ public LocalFile move(LocalFile source, LocalFile target) throws BackendException {
+ return (LocalFile) localStorageImpl.move(source, target);
+ }
+
+ @Override
+ public LocalFile write(LocalFile file, DataSource data, ProgressAware progressAware, boolean replace, long size) throws BackendException {
+ try {
+ return localStorageImpl.write(file, data, progressAware, replace, size);
+ } catch (IOException e) {
+ if (contains(e, FileNotFoundException.class)) {
+ throw new NoSuchCloudFileException(file.getName());
+ }
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public void read(LocalFile file, Optional tmpEncryptedFile, OutputStream data, ProgressAware progressAware) throws BackendException {
+ try {
+ localStorageImpl.read(file, data, progressAware);
+ } catch (IOException e) {
+ if (contains(e, FileNotFoundException.class)) {
+ throw new NoSuchCloudFileException(file.getName());
+ }
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public void delete(LocalNode node) throws BackendException {
+ localStorageImpl.delete(node);
+ }
+
+ @Override
+ public String checkAuthenticationAndRetrieveCurrentAccount(LocalStorageCloud cloud) throws BackendException {
+ return null;
+ }
+
+ @Override
+ public void logout(LocalStorageCloud cloud) throws BackendException {
+ // empty
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalStorageImpl.java b/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalStorageImpl.java
new file mode 100644
index 00000000..b893e5cd
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalStorageImpl.java
@@ -0,0 +1,193 @@
+package org.cryptomator.data.cloud.local.file;
+
+import android.content.Context;
+
+import org.cryptomator.data.util.TransferredBytesAwareInputStream;
+import org.cryptomator.data.util.TransferredBytesAwareOutputStream;
+import org.cryptomator.domain.CloudFile;
+import org.cryptomator.domain.CloudFolder;
+import org.cryptomator.domain.CloudNode;
+import org.cryptomator.domain.LocalStorageCloud;
+import org.cryptomator.domain.exception.BackendException;
+import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
+import org.cryptomator.domain.exception.FatalBackendException;
+import org.cryptomator.domain.exception.NoSuchCloudFileException;
+import org.cryptomator.domain.usecases.ProgressAware;
+import org.cryptomator.domain.usecases.cloud.DataSource;
+import org.cryptomator.domain.usecases.cloud.DownloadState;
+import org.cryptomator.domain.usecases.cloud.Progress;
+import org.cryptomator.domain.usecases.cloud.UploadState;
+import org.cryptomator.util.Optional;
+
+import java.io.File;
+import java.io.FileInputStream;
+import java.io.FileOutputStream;
+import java.io.IOException;
+import java.io.InputStream;
+import java.io.OutputStream;
+import java.util.ArrayList;
+import java.util.Date;
+import java.util.List;
+
+import static org.cryptomator.data.util.CopyStream.copyStreamToStream;
+import static org.cryptomator.domain.usecases.cloud.Progress.progress;
+
+class LocalStorageImpl {
+
+ private final Context context;
+ private final RootLocalFolder root;
+
+ LocalStorageImpl(Context context, LocalStorageCloud localStorageCloud) {
+ this.context = context;
+ this.root = new RootLocalFolder(localStorageCloud);
+ }
+
+ public LocalFolder root() {
+ return root;
+ }
+
+ public LocalFolder resolve(String path) {
+ if (path.startsWith(root.getPath())) {
+ path = path.substring(root.getPath().length() + 1);
+ }
+ String[] names = path.split("/");
+ LocalFolder folder = root;
+ for (String name : names) {
+ folder = folder(folder, name);
+ }
+ return folder;
+ }
+
+ public LocalFile file(CloudFolder folder, String name) {
+ return file(folder, name, Optional.empty());
+ }
+
+ public LocalFile file(CloudFolder folder, String name, Optional size) {
+ return LocalStorageNodeFactory.file( //
+ (LocalFolder) folder, //
+ name, //
+ folder.getPath() + '/' + name, //
+ size, //
+ Optional.empty());
+ }
+
+ public LocalFolder folder(CloudFolder folder, String name) {
+ return LocalStorageNodeFactory.folder( //
+ (LocalFolder) folder, //
+ name, //
+ folder.getPath() + '/' + name);
+ }
+
+ public boolean exists(CloudNode node) {
+ return new File(node.getPath()).exists();
+ }
+
+ public List list(LocalFolder folder) throws BackendException {
+ List result = new ArrayList<>();
+ File localDirectory = new File(folder.getPath());
+ if (!exists(folder)) {
+ throw new NoSuchCloudFileException();
+ }
+ for (File file : localDirectory.listFiles()) {
+ result.add(LocalStorageNodeFactory.from(folder, file));
+ }
+ return result;
+ }
+
+ public LocalFolder create(LocalFolder folder) throws BackendException {
+ File createFolder = new File(folder.getPath());
+ if (createFolder.exists()) {
+ throw new CloudNodeAlreadyExistsException(folder.getName());
+ }
+ if (!createFolder.mkdirs()) {
+ throw new FatalBackendException("Couldn't create a local folder at " + folder.getPath());
+ }
+
+ return LocalStorageNodeFactory.folder( //
+ folder.getParent(), //
+ createFolder);
+ }
+
+ public LocalNode move(CloudNode source, CloudNode target) throws BackendException {
+ File sourceFile = new File(source.getPath());
+ File targetFile = new File(target.getPath());
+ if (targetFile.exists()) {
+ throw new CloudNodeAlreadyExistsException(target.getName());
+ }
+ if (!sourceFile.exists()) {
+ throw new NoSuchCloudFileException(source.getName());
+ }
+ if (!sourceFile.renameTo(targetFile)) {
+ throw new FatalBackendException("Couldn't move " + source.getPath() + " to " + target.getPath());
+ }
+ return LocalStorageNodeFactory.from((LocalFolder) target.getParent(), targetFile);
+ }
+
+ public void delete(CloudNode node) {
+ File fileOrDirectory = new File(node.getPath());
+ if (!deleteRecursive(fileOrDirectory)) {
+ throw new FatalBackendException("Couldn't delete local CloudNode " + fileOrDirectory);
+ }
+ }
+
+ private boolean deleteRecursive(File fileOrDirectory) {
+ if (fileOrDirectory.isDirectory()) {
+ for (File child : fileOrDirectory.listFiles()) {
+ deleteRecursive(child);
+ }
+ }
+ return fileOrDirectory.delete();
+ }
+
+ public LocalFile write(final CloudFile file, DataSource data, final ProgressAware progressAware, boolean replace, final long size) throws IOException, BackendException {
+ if (exists(file) && !replace) {
+ throw new CloudNodeAlreadyExistsException("CloudNode already exists and replace is false");
+ }
+
+ progressAware.onProgress(Progress.started(UploadState.upload(file)));
+ File localFile = new File(file.getPath());
+
+ try (OutputStream out = new FileOutputStream(localFile); TransferredBytesAwareInputStream in = new TransferredBytesAwareInputStream(data.open(context)) {
+ @Override
+ public void bytesTransferred(long transferred) {
+ progressAware.onProgress( //
+ progress(UploadState.upload(file)) //
+ .between(0) //
+ .and(size) //
+ .withValue(transferred));
+ }
+ }) {
+ copyStreamToStream(in, out);
+ }
+
+ progressAware.onProgress(Progress.completed(UploadState.upload(file)));
+
+ return LocalStorageNodeFactory.file( //
+ (LocalFolder) file.getParent(), //
+ file.getName(), //
+ localFile.getPath(), //
+ Optional.of(localFile.length()), //
+ Optional.of(new Date(localFile.lastModified())));
+ }
+
+ public void read(final LocalFile file, OutputStream data, final ProgressAware progressAware) throws IOException {
+ progressAware.onProgress(Progress.started(DownloadState.download(file)));
+ File localFile = new File(file.getPath());
+
+ try (InputStream in = new FileInputStream(localFile); TransferredBytesAwareOutputStream out = new TransferredBytesAwareOutputStream(data) {
+ @Override
+ public void bytesTransferred(long transferred) {
+ progressAware //
+ .onProgress(progress(DownloadState.download(file)) //
+ .between(0) //
+ .and(localFile.length()) //
+ .withValue(transferred));
+ }
+ }) {
+ copyStreamToStream(in, out);
+ }
+
+ progressAware.onProgress(Progress.completed(DownloadState.download(file)));
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalStorageNodeFactory.java b/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalStorageNodeFactory.java
new file mode 100644
index 00000000..30cc58eb
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/local/file/LocalStorageNodeFactory.java
@@ -0,0 +1,34 @@
+package org.cryptomator.data.cloud.local.file;
+
+import org.cryptomator.util.Optional;
+
+import java.io.File;
+import java.util.Date;
+
+class LocalStorageNodeFactory {
+
+ public static LocalNode from(LocalFolder parent, File file) {
+ if (file.isDirectory()) {
+ return folder(parent, file);
+ } else {
+ return file( //
+ parent, //
+ file.getName(), //
+ file.getPath(), //
+ Optional.of(file.length()), //
+ Optional.of(new Date(file.lastModified())));
+ }
+ }
+
+ public static LocalFolder folder(LocalFolder parent, File file) {
+ return folder(parent, file.getName(), file.getPath());
+ }
+
+ public static LocalFolder folder(LocalFolder parent, String name, String path) {
+ return new LocalFolder(parent, name, path);
+ }
+
+ public static LocalFile file(LocalFolder folder, String name, String path, Optional size, Optional modified) {
+ return new LocalFile(folder, name, path, size, modified);
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/local/file/RootLocalFolder.java b/data/src/main/java/org/cryptomator/data/cloud/local/file/RootLocalFolder.java
new file mode 100644
index 00000000..19e71595
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/local/file/RootLocalFolder.java
@@ -0,0 +1,26 @@
+package org.cryptomator.data.cloud.local.file;
+
+import android.os.Environment;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.LocalStorageCloud;
+
+public class RootLocalFolder extends LocalFolder {
+
+ private final LocalStorageCloud localStorageCloud;
+
+ public RootLocalFolder(LocalStorageCloud localStorageCloud) {
+ super(null, "", Environment.getExternalStorageDirectory().getPath());
+ this.localStorageCloud = localStorageCloud;
+ }
+
+ @Override
+ public Cloud getCloud() {
+ return localStorageCloud;
+ }
+
+ @Override
+ public RootLocalFolder withCloud(Cloud cloud) {
+ return new RootLocalFolder((LocalStorageCloud) cloud);
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/DocumentIdCache.java b/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/DocumentIdCache.java
new file mode 100644
index 00000000..aefe70d9
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/DocumentIdCache.java
@@ -0,0 +1,74 @@
+package org.cryptomator.data.cloud.local.storageaccessframework;
+
+import android.util.LruCache;
+
+import org.cryptomator.domain.CloudFolder;
+
+class DocumentIdCache {
+
+ private final LruCache cache;
+
+ DocumentIdCache() {
+ cache = new LruCache<>(1000);
+ }
+
+ public NodeInfo get(String path) {
+ return cache.get(path);
+ }
+
+ T cache(T value) {
+ add(value);
+ return value;
+ }
+
+ public void add(LocalStorageAccessNode node) {
+ add(node.getPath(), new NodeInfo(node));
+ }
+
+ private void add(String path, NodeInfo info) {
+ cache.put(path, info);
+ }
+
+ public void remove(LocalStorageAccessNode node) {
+ remove(node.getPath());
+ }
+
+ private void remove(String path) {
+ removeChildren(path);
+ cache.remove(path);
+ }
+
+ private void removeChildren(String path) {
+ String prefix = path + '/';
+ for (String key : cache.snapshot().keySet()) {
+ if (key.startsWith(prefix)) {
+ cache.remove(key);
+ }
+ }
+ }
+
+ static class NodeInfo {
+
+ private final String id;
+ private final boolean isFolder;
+
+ private NodeInfo(LocalStorageAccessNode node) {
+ this(node.getDocumentId(), node instanceof CloudFolder);
+ }
+
+ NodeInfo(String id, boolean isFolder) {
+ this.id = id;
+ this.isFolder = isFolder;
+ }
+
+ public String getId() {
+ return id;
+ }
+
+ public boolean isFolder() {
+ return isFolder;
+ }
+
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessFile.java b/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessFile.java
new file mode 100644
index 00000000..33a73aa6
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessFile.java
@@ -0,0 +1,94 @@
+package org.cryptomator.data.cloud.local.storageaccessframework;
+
+import android.net.Uri;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudFile;
+import org.cryptomator.util.Optional;
+
+import java.util.Date;
+
+import static android.net.Uri.parse;
+
+class LocalStorageAccessFile implements CloudFile, LocalStorageAccessNode {
+
+ private final LocalStorageAccessFolder parent;
+ private final String name;
+ private final String path;
+ private final Optional size;
+ private final Optional modified;
+ private final String documentId;
+ private final String documentUri;
+
+ LocalStorageAccessFile(LocalStorageAccessFolder parent, String name, String path, Optional size, Optional modified, String documentId, String documentUri) {
+ this.parent = parent;
+ this.name = name;
+ this.path = path;
+ this.size = size;
+ this.modified = modified;
+ this.documentId = documentId;
+ this.documentUri = documentUri;
+ }
+
+ @Override
+ public Cloud getCloud() {
+ return parent.getCloud();
+ }
+
+ @Override
+ public String getName() {
+ return name;
+ }
+
+ @Override
+ public String getPath() {
+ return path;
+ }
+
+ @Override
+ public Uri getUri() {
+ return parse(documentUri);
+ }
+
+ @Override
+ public LocalStorageAccessFolder getParent() {
+ return parent;
+ }
+
+ @Override
+ public String getDocumentId() {
+ return documentId;
+ }
+
+ @Override
+ public Optional getSize() {
+ return size;
+ }
+
+ @Override
+ public Optional getModified() {
+ return modified;
+ }
+
+ @Override
+ public boolean equals(Object obj) {
+ if (obj == this)
+ return true;
+ if (obj == null || getClass() != obj.getClass())
+ return false;
+ return internalEquals((LocalStorageAccessFile) obj);
+ }
+
+ private boolean internalEquals(LocalStorageAccessFile o) {
+ return path.equals(o.path);
+ }
+
+ @Override
+ public int hashCode() {
+ final int prime = 31;
+ int hash = 56127034;
+ hash = hash * prime + path.hashCode();
+ return hash;
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessFolder.java b/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessFolder.java
new file mode 100644
index 00000000..cf6e9071
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessFolder.java
@@ -0,0 +1,85 @@
+package org.cryptomator.data.cloud.local.storageaccessframework;
+
+import android.net.Uri;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudFolder;
+
+import static android.net.Uri.parse;
+
+class LocalStorageAccessFolder implements CloudFolder, LocalStorageAccessNode {
+
+ private final LocalStorageAccessFolder parent;
+ private final String name;
+ private final String path;
+ private final String documentId;
+ private final String documentUri;
+
+ LocalStorageAccessFolder(LocalStorageAccessFolder parent, String name, String path, String documentId, String documentUri) {
+ this.parent = parent;
+ this.name = name;
+ this.path = path;
+ this.documentId = documentId;
+ this.documentUri = documentUri;
+ }
+
+ @Override
+ public Cloud getCloud() {
+ return parent.getCloud();
+ }
+
+ @Override
+ public String getName() {
+ return name;
+ }
+
+ @Override
+ public String getPath() {
+ return path;
+ }
+
+ @Override
+ public Uri getUri() {
+ if (documentUri == null) {
+ return null;
+ }
+
+ return parse(documentUri);
+ }
+
+ @Override
+ public LocalStorageAccessFolder getParent() {
+ return parent;
+ }
+
+ @Override
+ public String getDocumentId() {
+ return documentId;
+ }
+
+ @Override
+ public boolean equals(Object obj) {
+ if (obj == this)
+ return true;
+ if (obj == null || getClass() != obj.getClass())
+ return false;
+ return internalEquals((LocalStorageAccessFolder) obj);
+ }
+
+ private boolean internalEquals(LocalStorageAccessFolder o) {
+ return path.equals(o.path);
+ }
+
+ @Override
+ public int hashCode() {
+ final int prime = 31;
+ int hash = 341797327;
+ hash = hash * prime + path.hashCode();
+ return hash;
+ }
+
+ @Override
+ public LocalStorageAccessFolder withCloud(Cloud cloud) {
+ return new LocalStorageAccessFolder(parent.withCloud(cloud), name, path, documentId, documentUri);
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessFrameworkContentRepository.java b/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessFrameworkContentRepository.java
new file mode 100644
index 00000000..809ea2cc
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessFrameworkContentRepository.java
@@ -0,0 +1,123 @@
+package org.cryptomator.data.cloud.local.storageaccessframework;
+
+import android.content.Context;
+import android.os.Build;
+
+import org.cryptomator.domain.CloudNode;
+import org.cryptomator.domain.LocalStorageCloud;
+import org.cryptomator.domain.exception.BackendException;
+import org.cryptomator.domain.exception.FatalBackendException;
+import org.cryptomator.domain.exception.NoSuchCloudFileException;
+import org.cryptomator.domain.repository.CloudContentRepository;
+import org.cryptomator.domain.usecases.ProgressAware;
+import org.cryptomator.domain.usecases.cloud.DataSource;
+import org.cryptomator.domain.usecases.cloud.DownloadState;
+import org.cryptomator.domain.usecases.cloud.UploadState;
+import org.cryptomator.util.Optional;
+import org.cryptomator.util.file.MimeTypes;
+
+import java.io.File;
+import java.io.IOException;
+import java.io.OutputStream;
+import java.util.List;
+
+import androidx.annotation.RequiresApi;
+
+@RequiresApi(Build.VERSION_CODES.LOLLIPOP)
+public class LocalStorageAccessFrameworkContentRepository implements CloudContentRepository {
+
+ private final LocalStorageAccessFrameworkImpl localStorageAccessFramework;
+
+ public LocalStorageAccessFrameworkContentRepository(Context context, MimeTypes mimeTypes, LocalStorageCloud localStorageCloud) {
+ this.localStorageAccessFramework = new LocalStorageAccessFrameworkImpl(context, mimeTypes, localStorageCloud, new DocumentIdCache());
+ }
+
+ @Override
+ public LocalStorageAccessFolder root(LocalStorageCloud cloud) throws BackendException {
+ return localStorageAccessFramework.root();
+ }
+
+ @Override
+ public LocalStorageAccessFolder resolve(LocalStorageCloud cloud, String path) throws BackendException {
+ return localStorageAccessFramework.resolve(path);
+ }
+
+ @Override
+ public LocalStorageAccessFile file(LocalStorageAccessFolder parent, String name) throws BackendException {
+ return localStorageAccessFramework.file(parent, name);
+ }
+
+ @Override
+ public LocalStorageAccessFile file(LocalStorageAccessFolder parent, String name, Optional size) throws BackendException {
+ return localStorageAccessFramework.file(parent, name, size);
+ }
+
+ @Override
+ public LocalStorageAccessFolder folder(LocalStorageAccessFolder parent, String name) throws BackendException {
+ return localStorageAccessFramework.folder(parent, name);
+ }
+
+ @Override
+ public boolean exists(LocalStorageAccessNode node) throws BackendException {
+ return localStorageAccessFramework.exists(node);
+ }
+
+ @Override
+ public List list(LocalStorageAccessFolder folder) throws BackendException {
+ return localStorageAccessFramework.list(folder);
+ }
+
+ @Override
+ public LocalStorageAccessFolder create(LocalStorageAccessFolder folder) throws BackendException {
+ return localStorageAccessFramework.create(folder);
+ }
+
+ @Override
+ public LocalStorageAccessFolder move(LocalStorageAccessFolder source, LocalStorageAccessFolder target) throws BackendException {
+ if (source.getDocumentId() == null) {
+ throw new NoSuchCloudFileException(source.getName());
+ }
+ return (LocalStorageAccessFolder) localStorageAccessFramework.move(source, target);
+ }
+
+ @Override
+ public LocalStorageAccessFile move(LocalStorageAccessFile source, LocalStorageAccessFile target) throws BackendException {
+ return (LocalStorageAccessFile) localStorageAccessFramework.move(source, target);
+ }
+
+ @Override
+ public LocalStorageAccessFile write(LocalStorageAccessFile file, DataSource data, ProgressAware progressAware, boolean replace, long size) throws BackendException {
+ try {
+ return localStorageAccessFramework.write(file, data, progressAware, replace, size);
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public void read(LocalStorageAccessFile file, Optional tmpEnctypted, OutputStream data, ProgressAware progressAware) throws BackendException {
+ try {
+ if (file.getDocumentId() == null) {
+ throw new NoSuchCloudFileException(file.getName());
+ }
+ localStorageAccessFramework.read(file, data, progressAware);
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ @Override
+ public void delete(LocalStorageAccessNode node) throws BackendException {
+ localStorageAccessFramework.delete(node);
+ }
+
+ @Override
+ public String checkAuthenticationAndRetrieveCurrentAccount(LocalStorageCloud cloud) throws BackendException {
+ return null;
+ }
+
+ @Override
+ public void logout(LocalStorageCloud cloud) throws BackendException {
+ // empty
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessFrameworkImpl.java b/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessFrameworkImpl.java
new file mode 100644
index 00000000..9e58eefa
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessFrameworkImpl.java
@@ -0,0 +1,536 @@
+package org.cryptomator.data.cloud.local.storageaccessframework;
+
+import static org.cryptomator.data.cloud.local.storageaccessframework.LocalStorageAccessFrameworkNodeFactory.from;
+import static org.cryptomator.data.util.CopyStream.closeQuietly;
+import static org.cryptomator.data.util.CopyStream.copyStreamToStream;
+import static org.cryptomator.domain.usecases.ProgressAware.NO_OP_PROGRESS_AWARE;
+import static org.cryptomator.domain.usecases.cloud.Progress.progress;
+
+import java.io.FileNotFoundException;
+import java.io.FileOutputStream;
+import java.io.IOException;
+import java.io.InputStream;
+import java.io.OutputStream;
+import java.util.ArrayList;
+import java.util.List;
+
+import org.cryptomator.data.util.TransferredBytesAwareInputStream;
+import org.cryptomator.data.util.TransferredBytesAwareOutputStream;
+import org.cryptomator.domain.CloudFolder;
+import org.cryptomator.domain.CloudNode;
+import org.cryptomator.domain.LocalStorageCloud;
+import org.cryptomator.domain.exception.BackendException;
+import org.cryptomator.domain.exception.CloudNodeAlreadyExistsException;
+import org.cryptomator.domain.exception.FatalBackendException;
+import org.cryptomator.domain.exception.NoSuchCloudFileException;
+import org.cryptomator.domain.exception.NotFoundException;
+import org.cryptomator.domain.exception.authentication.NoAuthenticationProvidedException;
+import org.cryptomator.domain.usecases.ProgressAware;
+import org.cryptomator.domain.usecases.cloud.DataSource;
+import org.cryptomator.domain.usecases.cloud.DownloadState;
+import org.cryptomator.domain.usecases.cloud.Progress;
+import org.cryptomator.domain.usecases.cloud.UploadState;
+import org.cryptomator.util.Optional;
+import org.cryptomator.util.Supplier;
+import org.cryptomator.util.file.MimeType;
+import org.cryptomator.util.file.MimeTypes;
+
+import android.content.ContentResolver;
+import android.content.Context;
+import android.content.UriPermission;
+import android.database.Cursor;
+import android.net.Uri;
+import android.os.Build;
+import android.provider.DocumentsContract;
+import android.provider.DocumentsContract.Document;
+
+import androidx.annotation.RequiresApi;
+import androidx.documentfile.provider.DocumentFile;
+
+import timber.log.Timber;
+
+@RequiresApi(Build.VERSION_CODES.LOLLIPOP)
+class LocalStorageAccessFrameworkImpl {
+
+ private final Context context;
+ private final RootLocalStorageAccessFolder root;
+ private final DocumentIdCache idCache;
+ private final MimeTypes mimeTypes;
+
+ LocalStorageAccessFrameworkImpl(Context context, MimeTypes mimeTypes, LocalStorageCloud cloud, DocumentIdCache documentIdCache) {
+ this.mimeTypes = mimeTypes;
+ if (!hasUriPermissions(context, cloud.rootUri())) {
+ throw new NoAuthenticationProvidedException(cloud);
+ }
+ this.context = context;
+ this.root = new RootLocalStorageAccessFolder(cloud);
+ this.idCache = documentIdCache;
+ }
+
+ private boolean hasUriPermissions(Context context, String uri) {
+ Optional uriPermission = uriPermissionFor(context, uri);
+ return uriPermission.isPresent() //
+ && uriPermission.get().isReadPermission() //
+ && uriPermission.get().isWritePermission();
+ }
+
+ private Optional uriPermissionFor(Context context, String uri) {
+ for (UriPermission uriPermission : context.getContentResolver().getPersistedUriPermissions()) {
+ if (uri.equals(uriPermission.getUri().toString())) {
+ return Optional.of(uriPermission);
+ }
+ }
+ return Optional.empty();
+ }
+
+ public LocalStorageAccessFolder root() {
+ return root;
+ }
+
+ public LocalStorageAccessFolder resolve(String path) throws BackendException {
+ if (path.startsWith("/")) {
+ path = path.substring(1);
+ }
+
+ String[] names = path.split("/");
+ LocalStorageAccessFolder folder = root;
+ for (String name : names) {
+ folder = folder(folder, name);
+ }
+ return folder;
+ }
+
+ public LocalStorageAccessFile file(LocalStorageAccessFolder parent, String name) throws BackendException {
+ return file( //
+ parent, //
+ name, //
+ Optional.empty());
+ }
+
+ public LocalStorageAccessFile file(LocalStorageAccessFolder parent, String name, Optional size) throws BackendException {
+ if (parent.getDocumentId() == null) {
+ return LocalStorageAccessFrameworkNodeFactory.file( //
+ parent, //
+ name, //
+ size);
+ }
+ String path = LocalStorageAccessFrameworkNodeFactory.getNodePath(parent, name);
+ DocumentIdCache.NodeInfo nodeInfo = idCache.get(path);
+ if (nodeInfo != null && !nodeInfo.isFolder()) {
+ return LocalStorageAccessFrameworkNodeFactory.file( //
+ parent, //
+ name, //
+ path, //
+ size, //
+ nodeInfo.getId());
+ }
+ List cloudNodes = listFilesWithNameFilter(parent, name);
+ if (cloudNodes.size() > 0) {
+ LocalStorageAccessNode cloudNode = cloudNodes.get(0);
+ if (cloudNode instanceof LocalStorageAccessFile) {
+ return idCache.cache((LocalStorageAccessFile) cloudNode);
+ }
+ }
+ return LocalStorageAccessFrameworkNodeFactory.file( //
+ parent, //
+ name, //
+ size);
+ }
+
+ public LocalStorageAccessFolder folder(LocalStorageAccessFolder parent, String name) throws BackendException {
+ if (parent.getDocumentId() == null) {
+ return LocalStorageAccessFrameworkNodeFactory.folder( //
+ parent, //
+ name);
+ }
+ String path = LocalStorageAccessFrameworkNodeFactory.getNodePath(parent, name);
+ DocumentIdCache.NodeInfo nodeInfo = idCache.get(path);
+ if (nodeInfo != null && nodeInfo.isFolder()) {
+ return LocalStorageAccessFrameworkNodeFactory.folder( //
+ parent, //
+ name, //
+ nodeInfo.getId());
+ }
+ List cloudNodes = listFilesWithNameFilter(parent, name);
+ if (cloudNodes.size() > 0) {
+ LocalStorageAccessNode cloudNode = cloudNodes.get(0);
+ if (cloudNode instanceof LocalStorageAccessFolder) {
+ return idCache.cache((LocalStorageAccessFolder) cloudNode);
+ }
+ }
+
+ return LocalStorageAccessFrameworkNodeFactory.folder( //
+ parent, //
+ name);
+ }
+
+ private List listFilesWithNameFilter(LocalStorageAccessFolder parent, String name) throws BackendException {
+ if (parent.getUri() == null) {
+ List parents = listFilesWithNameFilter(parent.getParent(), parent.getName());
+ if (parents.isEmpty() || !(parents.get(0) instanceof LocalStorageAccessFolder)) {
+ throw new NoSuchCloudFileException(name);
+ }
+ parent = (LocalStorageAccessFolder) parents.get(0);
+ }
+ Cursor childCursor = null;
+ try {
+ childCursor = contentResolver() //
+ .query( //
+ DocumentsContract.buildChildDocumentsUriUsingTree( //
+ parent.getUri(), //
+ parent.getDocumentId()),
+ new String[] {Document.COLUMN_DISPLAY_NAME, // cursor position 0
+ Document.COLUMN_MIME_TYPE, // cursor position 1
+ Document.COLUMN_SIZE, // cursor position 2
+ Document.COLUMN_LAST_MODIFIED, // cursor position 3
+ Document.COLUMN_DOCUMENT_ID // cursor position 4
+ }, //
+ null, //
+ null, //
+ null);
+
+ List result = new ArrayList<>();
+ while (childCursor != null && childCursor.moveToNext()) {
+ if (childCursor.getString(0).equals(name)) {
+ result.add(idCache.cache(from(parent, childCursor)));
+ }
+ }
+ return result;
+ } catch (IllegalArgumentException e) {
+ if (e.getMessage().contains(FileNotFoundException.class.getCanonicalName())) {
+ throw new NoSuchCloudFileException(name);
+ }
+ throw new FatalBackendException(e);
+ } finally {
+ closeQuietly(childCursor);
+ }
+ }
+
+ public boolean exists(LocalStorageAccessNode node) throws BackendException {
+ try {
+
+ List cloudNodes = listFilesWithNameFilter( //
+ node.getParent(), //
+ node.getName());
+
+ boolean documentExists = cloudNodes.size() > 0;
+
+ if (documentExists) {
+ idCache.add(cloudNodes.get(0));
+ }
+
+ return documentExists;
+ } catch (NoSuchCloudFileException e) {
+ return false;
+ }
+ }
+
+ public List list(LocalStorageAccessFolder folder) throws BackendException {
+ Cursor childCursor = contentResolver() //
+ .query( //
+ DocumentsContract.buildChildDocumentsUriUsingTree( //
+ folder.getUri(), //
+ folder.getDocumentId()),
+ new String[] { //
+ Document.COLUMN_DISPLAY_NAME, // cursor position 0
+ Document.COLUMN_MIME_TYPE, // cursor position 1
+ Document.COLUMN_SIZE, // cursor position 2
+ Document.COLUMN_LAST_MODIFIED, // cursor position 3
+ Document.COLUMN_DOCUMENT_ID // cursor position 4
+ }, null, null, null);
+
+ try {
+ List result = new ArrayList<>();
+ while (childCursor != null && childCursor.moveToNext()) {
+ result.add(idCache.cache(from(folder, childCursor)));
+ }
+ return result;
+ } finally {
+ closeQuietly(childCursor);
+ }
+ }
+
+ public LocalStorageAccessFolder create(LocalStorageAccessFolder folder) throws BackendException {
+ if (folder //
+ .getParent() //
+ .getDocumentId() == null) {
+ folder = new LocalStorageAccessFolder( //
+ create(folder.getParent()), //
+ folder.getName(), //
+ folder.getPath(), //
+ null, //
+ null);
+ }
+ Uri createdDocument;
+ try {
+ createdDocument = DocumentsContract.createDocument( //
+ contentResolver(), //
+ folder.getParent().getUri(), //
+ Document.MIME_TYPE_DIR, //
+ folder.getName());
+ } catch (FileNotFoundException e) {
+ throw new NoSuchCloudFileException(folder.getName());
+ }
+ return idCache.cache( //
+ LocalStorageAccessFrameworkNodeFactory.folder( //
+ folder.getParent(), //
+ buildDocumentFile(createdDocument)));
+ }
+
+ public LocalStorageAccessNode move(LocalStorageAccessNode source, LocalStorageAccessNode target) throws BackendException {
+ if (exists(target)) {
+ throw new CloudNodeAlreadyExistsException(target.getName());
+ }
+
+ idCache.remove(source);
+ idCache.remove(target);
+ boolean isRename = !source //
+ .getName() //
+ .equals(target.getName());
+ boolean isMove = !source //
+ .getParent() //
+ .equals(target.getParent());
+ LocalStorageAccessNode renamedSource = source;
+ if (isRename) {
+ renamedSource = rename(source, target.getName());
+ }
+ if (isMove) {
+ if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.N) {
+ return idCache.cache( //
+ moveForApiStartingFrom24(renamedSource, target));
+ } else {
+ return idCache.cache( //
+ moveForApiBelow24(renamedSource, target));
+ }
+ }
+ return renamedSource;
+ }
+
+ private LocalStorageAccessNode rename(LocalStorageAccessNode source, String name) throws NoSuchCloudFileException {
+ Uri newUri = null;
+ try {
+ newUri = DocumentsContract.renameDocument( //
+ contentResolver(), //
+ source.getUri(), //
+ name);
+ } catch (FileNotFoundException e) {
+ // Bug in Android 9 see #460
+ if (Build.VERSION.SDK_INT != Build.VERSION_CODES.P) {
+ throw new NoSuchCloudFileException(source.getName());
+ }
+ }
+
+ // Bug in Android 9 see #460
+ if (Build.VERSION.SDK_INT == Build.VERSION_CODES.P) {
+ try {
+ List cloudNodes = listFilesWithNameFilter( //
+ source.getParent(), //
+ name);
+
+ newUri = cloudNodes.get(0).getUri();
+ } catch (BackendException e) {
+ Timber.tag("LocalStgeAccessFrkImpl").e(e);
+ }
+ }
+
+ return LocalStorageAccessFrameworkNodeFactory.from( //
+ source.getParent(), //
+ buildDocumentFile(newUri));
+ }
+
+ @RequiresApi(api = Build.VERSION_CODES.N)
+ private LocalStorageAccessNode moveForApiStartingFrom24(LocalStorageAccessNode source, LocalStorageAccessNode target) throws NoSuchCloudFileException {
+ Uri movedTargetUri;
+ try {
+ movedTargetUri = DocumentsContract.moveDocument( //
+ contentResolver(), //
+ source.getUri(), //
+ source.getParent().getUri(), //
+ target.getParent().getUri());
+ } catch (FileNotFoundException e) {
+ throw new NoSuchCloudFileException(source.getName());
+ }
+ return from( //
+ target.getParent(), //
+ buildDocumentFile(movedTargetUri));
+ }
+
+ private LocalStorageAccessNode moveForApiBelow24(LocalStorageAccessNode source, LocalStorageAccessNode target) throws BackendException {
+ try {
+ LocalStorageAccessNode result;
+ if (source instanceof CloudFolder) {
+ result = moveForApiBelow24( //
+ (LocalStorageAccessFolder) source, //
+ (LocalStorageAccessFolder) target);
+ } else {
+ result = moveForApiBelow24( //
+ (LocalStorageAccessFile) source, //
+ (LocalStorageAccessFile) target);
+ }
+ delete(source);
+ return result;
+ } catch (IOException e) {
+ throw new FatalBackendException(e);
+ }
+ }
+
+ private LocalStorageAccessFolder moveForApiBelow24(LocalStorageAccessFolder source, LocalStorageAccessFolder target) throws IOException, BackendException {
+ if (!exists(target.getParent())) {
+ throw new NoSuchCloudFileException(target.getParent().getPath());
+ }
+ LocalStorageAccessFolder createdFolder = create(target);
+ for (CloudNode child : list(source)) {
+ if (child instanceof CloudFolder) {
+ moveForApiBelow24( //
+ (LocalStorageAccessFolder) child, //
+ folder(target, child.getName()));
+ } else {
+ moveForApiBelow24( //
+ (LocalStorageAccessFile) child, //
+ file(target, child.getName()));
+ }
+ }
+ return createdFolder;
+ }
+
+ private LocalStorageAccessFile moveForApiBelow24(final LocalStorageAccessFile source, LocalStorageAccessFile target) throws IOException, BackendException {
+ DataSource dataSource = new DataSource() {
+ @Override
+ public void close() throws IOException {
+ // do nothing
+ }
+
+ @Override
+ public Optional size(Context context) {
+ return source.getSize();
+ }
+
+ @Override
+ public InputStream open(Context context) throws IOException {
+ return contentResolver().openInputStream(source.getUri());
+ }
+
+ @Override
+ public DataSource decorate(DataSource delegate) {
+ return delegate;
+ }
+ };
+ return write(target, dataSource, NO_OP_PROGRESS_AWARE, true, source.getSize().get());
+ }
+
+ public LocalStorageAccessFile write( //
+ LocalStorageAccessFile file, //
+ final DataSource data, //
+ final ProgressAware progressAware, //
+ final boolean replace, //
+ final long size) throws IOException, BackendException {
+
+ progressAware.onProgress(Progress.started(UploadState.upload(file)));
+ Optional fileUri = existingFileUri(file);
+ if (fileUri.isPresent() && !replace) {
+ throw new CloudNodeAlreadyExistsException("CloudNode already exists and replace is false");
+ }
+
+ if (file.getParent().getUri() == null) {
+ LocalStorageAccessFolder parent = (LocalStorageAccessFolder) listFilesWithNameFilter(file.getParent().getParent(), file.getParent().getName()).get(0);
+ String tmpFileUri = fileUri.isPresent() ? fileUri.get().toString() : "";
+ file = new LocalStorageAccessFile(parent, file.getName(), file.getPath(), file.getSize(), file.getModified(), file.getDocumentId(), tmpFileUri);
+ }
+
+ final LocalStorageAccessFile tmpFile = file;
+
+ Uri uploadUri = fileUri.orElseGet(createNewDocumentSupplier(tmpFile));
+ if (uploadUri == null) {
+ throw new NotFoundException(tmpFile.getName());
+ }
+
+ try (OutputStream out = contentResolver().openOutputStream(uploadUri); //
+ TransferredBytesAwareInputStream in = new TransferredBytesAwareInputStream(data.open(context)) {
+ @Override
+ public void bytesTransferred(long transferred) {
+ progressAware //
+ .onProgress(progress(UploadState.upload(tmpFile)) //
+ .between(0) //
+ .and(size) //
+ .withValue(transferred));
+ }
+ }) {
+ if (out instanceof FileOutputStream) {
+ ((FileOutputStream) out).getChannel().truncate(0);
+ }
+
+ copyStreamToStream(in, out);
+ }
+
+ progressAware.onProgress(Progress.completed(UploadState.upload(file)));
+
+ return LocalStorageAccessFrameworkNodeFactory.file( //
+ file.getParent(), //
+ buildDocumentFile(uploadUri));
+ }
+
+ private Supplier createNewDocumentSupplier(final LocalStorageAccessFile file) {
+ return () -> {
+ MimeType mimeType = mimeTypes.fromFilename(file.getName()) //
+ .orElse(MimeType.APPLICATION_OCTET_STREAM);
+ try {
+ return DocumentsContract.createDocument( //
+ contentResolver(), //
+ file.getParent().getUri(), //
+ mimeType.toString(), //
+ file.getName());
+ } catch (FileNotFoundException e) {
+ return null;
+ }
+ };
+ }
+
+ private Optional existingFileUri(LocalStorageAccessFile file) throws BackendException {
+ List nodes = listFilesWithNameFilter( //
+ file.getParent(), //
+ file.getName());
+ if (nodes.size() > 0) {
+ return Optional.of(nodes.get(0).getUri());
+ } else {
+ return Optional.empty();
+ }
+ }
+
+ public void read(final LocalStorageAccessFile file, final OutputStream data, final ProgressAware progressAware) throws IOException {
+ progressAware.onProgress(Progress.started(DownloadState.download(file)));
+
+ try (InputStream in = contentResolver().openInputStream(file.getUri()); //
+ TransferredBytesAwareOutputStream out = new TransferredBytesAwareOutputStream(data) {
+ @Override
+ public void bytesTransferred(long transferred) {
+ progressAware.onProgress(progress(DownloadState.download(file)) //
+ .between(0) //
+ .and(file.getSize().orElse(Long.MAX_VALUE)) //
+ .withValue(transferred));
+ }
+ }) {
+ copyStreamToStream(in, out);
+ }
+
+ progressAware.onProgress(Progress.completed(DownloadState.download(file)));
+ }
+
+ public void delete(LocalStorageAccessNode node) throws NoSuchCloudFileException {
+ try {
+ DocumentsContract.deleteDocument( //
+ contentResolver(), //
+ node.getUri());
+ } catch (FileNotFoundException e) {
+ throw new NoSuchCloudFileException(node.getName());
+ }
+ idCache.remove(node);
+ }
+
+ private DocumentFile buildDocumentFile(Uri fileUri) {
+ return DocumentFile.fromSingleUri(context, fileUri);
+ }
+
+ private ContentResolver contentResolver() {
+ return context.getContentResolver();
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessFrameworkNodeFactory.java b/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessFrameworkNodeFactory.java
new file mode 100644
index 00000000..f2cf4df7
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessFrameworkNodeFactory.java
@@ -0,0 +1,124 @@
+package org.cryptomator.data.cloud.local.storageaccessframework;
+
+import android.database.Cursor;
+import android.os.Build;
+import android.provider.DocumentsContract;
+
+import org.cryptomator.util.Optional;
+
+import java.util.Date;
+
+import androidx.annotation.RequiresApi;
+import androidx.documentfile.provider.DocumentFile;
+
+@RequiresApi(Build.VERSION_CODES.LOLLIPOP)
+class LocalStorageAccessFrameworkNodeFactory {
+
+ public static LocalStorageAccessNode from(LocalStorageAccessFolder parent, Cursor cursor) {
+ if (isFolder(cursor)) {
+ return folder(parent, cursor);
+ } else {
+ return file(parent, cursor);
+ }
+ }
+
+ private static LocalStorageAccessFile file(LocalStorageAccessFolder parent, Cursor cursor) {
+ return new LocalStorageAccessFile( //
+ parent, //
+ cursor.getString(0), //
+ getNodePath(parent, cursor.getString(0)), //
+ Optional.of(cursor.getLong(2)), //
+ Optional.of(new Date(cursor.getLong(3))), //
+ cursor.getString(4), //
+ getDocumentUri(parent, cursor.getString(4)));
+ }
+
+ private static LocalStorageAccessFolder folder(LocalStorageAccessFolder parent, Cursor cursor) {
+ return new LocalStorageAccessFolder(parent, //
+ cursor.getString(0), //
+ getNodePath(parent, cursor.getString(0)), //
+ cursor.getString(4), //
+ getDocumentUri(parent, cursor.getString(4)));
+ }
+
+ public static LocalStorageAccessNode from(LocalStorageAccessFolder parent, DocumentFile documentFile) {
+ if (isFolder(documentFile)) {
+ return folder(parent, documentFile);
+ } else {
+ return file(parent, documentFile);
+ }
+ }
+
+ public static LocalStorageAccessFolder folder(LocalStorageAccessFolder parent, DocumentFile directory) {
+ return new LocalStorageAccessFolder(parent, //
+ directory.getName(), //
+ getNodePath(parent, directory.getName()), //
+ DocumentsContract.getDocumentId(directory.getUri()), //
+ directory.getUri().toString());
+ }
+
+ public static LocalStorageAccessFile file(LocalStorageAccessFolder parent, DocumentFile documentFile) {
+ return new LocalStorageAccessFile( //
+ parent, //
+ documentFile.getName(), //
+ getNodePath(parent, documentFile.getName()), //
+ Optional.of(documentFile.length()), //
+ Optional.of(new Date(documentFile.lastModified())), //
+ DocumentsContract.getTreeDocumentId(documentFile.getUri()), //
+ documentFile.getUri().toString());
+ }
+
+ public static LocalStorageAccessFile file(LocalStorageAccessFolder parent, String name, Optional size) {
+ return new LocalStorageAccessFile(//
+ parent, //
+ name, //
+ getNodePath(parent, name), //
+ size, //
+ Optional.empty(), //
+ null, //
+ null);
+ }
+
+ public static LocalStorageAccessFile file(LocalStorageAccessFolder parent, String name, String path, Optional size, String documentId) {
+ return new LocalStorageAccessFile(parent, //
+ name, //
+ path, //
+ size, //
+ Optional.empty(), //
+ documentId, //
+ getDocumentUri(parent, documentId));
+ }
+
+ public static LocalStorageAccessFolder folder(LocalStorageAccessFolder parent, String name) {
+ return new LocalStorageAccessFolder(parent, //
+ name, //
+ getNodePath(parent, name), //
+ null, //
+ null);
+ }
+
+ public static LocalStorageAccessFolder folder(LocalStorageAccessFolder parent, String name, String documentId) {
+ return new LocalStorageAccessFolder(parent, //
+ name, //
+ getNodePath(parent, name), //
+ documentId, //
+ getDocumentUri(parent, documentId));
+ }
+
+ private static String getDocumentUri(LocalStorageAccessFolder parent, String documentId) {
+ return DocumentsContract.buildDocumentUriUsingTree(parent.getUri(), documentId).toString();
+ }
+
+ private static boolean isFolder(DocumentFile file) {
+ return file.isDirectory();
+ }
+
+ private static boolean isFolder(Cursor cursor) {
+ return cursor.getString(1).equals(DocumentsContract.Document.MIME_TYPE_DIR);
+ }
+
+ public static String getNodePath(LocalStorageAccessFolder parent, String name) {
+ return parent.getPath() + "/" + name;
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessNode.java b/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessNode.java
new file mode 100644
index 00000000..d4254dc7
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/LocalStorageAccessNode.java
@@ -0,0 +1,15 @@
+package org.cryptomator.data.cloud.local.storageaccessframework;
+
+import android.net.Uri;
+
+import org.cryptomator.domain.CloudNode;
+
+public interface LocalStorageAccessNode extends CloudNode {
+
+ Uri getUri();
+
+ LocalStorageAccessFolder getParent();
+
+ String getDocumentId();
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/RootLocalStorageAccessFolder.java b/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/RootLocalStorageAccessFolder.java
new file mode 100644
index 00000000..a5736c89
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/local/storageaccessframework/RootLocalStorageAccessFolder.java
@@ -0,0 +1,41 @@
+package org.cryptomator.data.cloud.local.storageaccessframework;
+
+import android.os.Build;
+import android.provider.DocumentsContract;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.LocalStorageCloud;
+
+import androidx.annotation.RequiresApi;
+
+import static android.net.Uri.parse;
+
+@RequiresApi(api = Build.VERSION_CODES.LOLLIPOP)
+public class RootLocalStorageAccessFolder extends LocalStorageAccessFolder {
+
+ private final LocalStorageCloud localStorageCloud;
+
+ public RootLocalStorageAccessFolder(LocalStorageCloud localStorageCloud) {
+ super(null, //
+ "", //
+ "", //
+ DocumentsContract.getTreeDocumentId( //
+ parse(localStorageCloud.rootUri())), //
+ DocumentsContract.buildChildDocumentsUriUsingTree( //
+ parse(localStorageCloud.rootUri()), //
+ DocumentsContract.getTreeDocumentId( //
+ parse(localStorageCloud.rootUri())))
+ .toString());
+ this.localStorageCloud = localStorageCloud;
+ }
+
+ @Override
+ public Cloud getCloud() {
+ return localStorageCloud;
+ }
+
+ @Override
+ public LocalStorageAccessFolder withCloud(Cloud cloud) {
+ return new RootLocalStorageAccessFolder((LocalStorageCloud) cloud);
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/okhttplogging/HeaderNames.java b/data/src/main/java/org/cryptomator/data/cloud/okhttplogging/HeaderNames.java
new file mode 100644
index 00000000..58295d84
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/okhttplogging/HeaderNames.java
@@ -0,0 +1,20 @@
+package org.cryptomator.data.cloud.okhttplogging;
+
+import java.util.HashSet;
+import java.util.Set;
+
+class HeaderNames {
+
+ private final Set lowercaseNames = new HashSet<>();
+
+ public HeaderNames(String... headerNames) {
+ for (String headerName : headerNames) {
+ lowercaseNames.add(headerName.toLowerCase());
+ }
+ }
+
+ public boolean contains(String headerName) {
+ return lowercaseNames.contains(headerName.toLowerCase());
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/okhttplogging/HttpLoggingInterceptor.java b/data/src/main/java/org/cryptomator/data/cloud/okhttplogging/HttpLoggingInterceptor.java
new file mode 100644
index 00000000..a905d434
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/okhttplogging/HttpLoggingInterceptor.java
@@ -0,0 +1,147 @@
+package org.cryptomator.data.cloud.okhttplogging;
+
+import android.content.Context;
+
+import org.jetbrains.annotations.NotNull;
+
+import java.io.IOException;
+
+import okhttp3.Connection;
+import okhttp3.Headers;
+import okhttp3.Interceptor;
+import okhttp3.Protocol;
+import okhttp3.Request;
+import okhttp3.RequestBody;
+import okhttp3.Response;
+
+import static android.preference.PreferenceManager.getDefaultSharedPreferences;
+import static java.lang.String.format;
+import static java.util.concurrent.TimeUnit.NANOSECONDS;
+
+public final class HttpLoggingInterceptor implements Interceptor {
+
+ private static final HeaderNames EXCLUDED_HEADERS = new HeaderNames(//
+ // headers excluded because they are logged separately:
+ "Content-Type", "Content-Length",
+ // headers excluded because they contain sensitive information:
+ "Authorization", //
+ "WWW-Authenticate", //
+ "Cookie", //
+ "Set-Cookie" //
+ );
+
+ public interface Logger {
+ void log(String message);
+ }
+
+ public HttpLoggingInterceptor(Logger logger, Context context) {
+ this.logger = logger;
+ this.context = context;
+ }
+
+ private final Logger logger;
+ private final Context context;
+
+ @NotNull
+ @Override
+ public Response intercept(@NotNull Chain chain) throws IOException {
+ if (debugModeEnabled(context)) {
+ return proceedWithLogging(chain);
+ } else {
+ return chain.proceed(chain.request());
+ }
+ }
+
+ private Response proceedWithLogging(Chain chain) throws IOException {
+ Request request = chain.request();
+ logRequest(request, chain);
+ return getAndLogResponse(request, chain);
+ }
+
+ private void logRequest(Request request, Chain chain) throws IOException {
+ logRequestStart(request, chain);
+ logContentTypeAndLength(request);
+ logHeaders(request.headers());
+ logRequestEnd(request);
+ }
+
+ private Response getAndLogResponse(Request request, Chain chain) throws IOException {
+ long startOfRequestMs = System.nanoTime();
+ Response response = getResponseLoggingExceptions(request, chain);
+ long requestDurationMs = NANOSECONDS.toMillis(System.nanoTime() - startOfRequestMs);
+ logResponse(response, requestDurationMs);
+ return response;
+ }
+
+ private Response getResponseLoggingExceptions(Request request, Chain chain) throws IOException {
+ try {
+ return chain.proceed(request);
+ } catch (Exception e) {
+ logger.log("<-- HTTP FAILED: " + e);
+ throw e;
+ }
+ }
+
+ private void logResponse(Response response, long requestDurationMs) {
+ logResponseStart(response, requestDurationMs);
+ logHeaders(response.headers());
+ logger.log("<-- END HTTP");
+ }
+
+ private void logRequestStart(Request request, Chain chain) throws IOException {
+ Connection connection = chain.connection();
+ Protocol protocol = connection != null ? connection.protocol() : Protocol.HTTP_1_1;
+ String bodyLength = hasBody(request) ? request.body().contentLength() + "-byte body" : "unknown length";
+
+ logger.log(format("--> %s %s %s (%s)", //
+ request.method(), //
+ request.url(), //
+ protocol, //
+ bodyLength //
+ ));
+ }
+
+ private void logContentTypeAndLength(Request request) throws IOException {
+ // Request body headers are only present when installed as a network interceptor. Force
+ // them to be included (when available) so there values are known.
+ if (hasBody(request)) {
+ RequestBody body = request.body();
+ if (body.contentType() != null) {
+ logger.log("Content-Type: " + body.contentType());
+ }
+ if (body.contentLength() != -1) {
+ logger.log("Content-Length: " + body.contentLength());
+ }
+ }
+ }
+
+ private void logRequestEnd(Request request) {
+ logger.log("--> END " + request.method());
+ }
+
+ private void logResponseStart(Response response, long requestDurationMs) {
+ logger.log("<-- " + response.code() + ' ' + response.message() + ' ' + response.request().url() + " (" + requestDurationMs + "ms" + ')');
+ }
+
+ private boolean hasBody(Request request) {
+ return request.body() != null;
+ }
+
+ private void logHeaders(Headers headers) {
+ for (int i = 0, count = headers.size(); i < count; i++) {
+ String name = headers.name(i);
+ if (isExcludedHeader(name)) {
+ continue;
+ }
+ logger.log(name + ": " + headers.value(i));
+ }
+ }
+
+ private static boolean debugModeEnabled(Context context) {
+ return getDefaultSharedPreferences(context).getBoolean("debugMode", false);
+ }
+
+ private boolean isExcludedHeader(String name) {
+ return EXCLUDED_HEADERS.contains(name);
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/MSAAuthAndroidAdapterImpl.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/MSAAuthAndroidAdapterImpl.java
new file mode 100644
index 00000000..1cf2556c
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/MSAAuthAndroidAdapterImpl.java
@@ -0,0 +1,25 @@
+package org.cryptomator.data.cloud.onedrive;
+
+import android.content.Context;
+
+import org.cryptomator.data.BuildConfig;
+import org.cryptomator.data.cloud.onedrive.graph.MSAAuthAndroidAdapter;
+
+public class MSAAuthAndroidAdapterImpl extends MSAAuthAndroidAdapter {
+
+ private static final String[] SCOPES = new String[] {"https://graph.microsoft.com/Files.ReadWrite", "offline_access", "openid"};
+
+ public MSAAuthAndroidAdapterImpl(Context context, String refreshToken) {
+ super(context, refreshToken);
+ }
+
+ @Override
+ public String getClientId() {
+ return BuildConfig.ONEDRIVE_API_KEY;
+ }
+
+ @Override
+ public String[] getScopes() {
+ return SCOPES;
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveClientFactory.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveClientFactory.java
new file mode 100644
index 00000000..6130c9ac
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveClientFactory.java
@@ -0,0 +1,78 @@
+package org.cryptomator.data.cloud.onedrive;
+
+import android.content.Context;
+
+import com.microsoft.graph.authentication.IAuthenticationProvider;
+import com.microsoft.graph.core.DefaultClientConfig;
+import com.microsoft.graph.models.extensions.IGraphServiceClient;
+import com.microsoft.graph.requests.extensions.GraphServiceClient;
+
+import org.cryptomator.data.cloud.okhttplogging.HttpLoggingInterceptor;
+import org.cryptomator.data.cloud.onedrive.graph.IAuthenticationAdapter;
+
+import java.util.concurrent.atomic.AtomicReference;
+
+import okhttp3.Interceptor;
+import okhttp3.OkHttpClient;
+import timber.log.Timber;
+
+import static org.cryptomator.data.util.NetworkTimeout.CONNECTION;
+import static org.cryptomator.data.util.NetworkTimeout.READ;
+import static org.cryptomator.data.util.NetworkTimeout.WRITE;
+
+public class OnedriveClientFactory {
+
+ private final AtomicReference graphServiceClient = new AtomicReference<>();
+ private final IAuthenticationAdapter authenticationAdapter;
+
+ private static OnedriveClientFactory instance;
+
+ private final Context context;
+
+ private OnedriveClientFactory(Context context, String refreshToken) {
+ this.context = context;
+ this.authenticationAdapter = new MSAAuthAndroidAdapterImpl(context, refreshToken);
+ }
+
+ public static OnedriveClientFactory instance(Context context, String accessToken) {
+ if (instance == null) {
+ instance = new OnedriveClientFactory(context, accessToken);
+ }
+ return instance;
+ }
+
+ public IGraphServiceClient client() {
+ if (graphServiceClient.get() == null) {
+
+ OkHttpClient.Builder builder = new OkHttpClient() //
+ .newBuilder() //
+ .connectTimeout(CONNECTION.getTimeout(), CONNECTION.getUnit()) //
+ .readTimeout(READ.getTimeout(), READ.getUnit()) //
+ .writeTimeout(WRITE.getTimeout(), WRITE.getUnit()) //
+ .addInterceptor(httpLoggingInterceptor(context));
+
+ OnedriveHttpProvider onedriveHttpProvider = new OnedriveHttpProvider(new DefaultClientConfig() {
+ @Override
+ public IAuthenticationProvider getAuthenticationProvider() {
+ return getAuthenticationAdapter();
+ }
+ }, builder.build());
+
+ graphServiceClient.set(GraphServiceClient //
+ .builder() //
+ .authenticationProvider(getAuthenticationAdapter()) //
+ .httpProvider(onedriveHttpProvider) //
+ .buildClient());
+ }
+ return graphServiceClient.get();
+ }
+
+ private static Interceptor httpLoggingInterceptor(Context context) {
+ return new HttpLoggingInterceptor(message -> Timber.tag("OkHttp").d(message), context);
+ }
+
+ public synchronized IAuthenticationAdapter getAuthenticationAdapter() {
+ return authenticationAdapter;
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepository.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepository.java
new file mode 100644
index 00000000..56b46baf
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepository.java
@@ -0,0 +1,165 @@
+package org.cryptomator.data.cloud.onedrive;
+
+import android.content.Context;
+
+import com.microsoft.graph.core.GraphErrorCodes;
+
+import org.cryptomator.data.cloud.InterceptingCloudContentRepository;
+import org.cryptomator.data.cloud.onedrive.graph.ClientException;
+import org.cryptomator.domain.CloudNode;
+import org.cryptomator.domain.OnedriveCloud;
+import org.cryptomator.domain.exception.BackendException;
+import org.cryptomator.domain.exception.FatalBackendException;
+import org.cryptomator.domain.exception.NetworkConnectionException;
+import org.cryptomator.domain.exception.NoSuchCloudFileException;
+import org.cryptomator.domain.exception.authentication.WrongCredentialsException;
+import org.cryptomator.domain.repository.CloudContentRepository;
+import org.cryptomator.domain.usecases.ProgressAware;
+import org.cryptomator.domain.usecases.cloud.DataSource;
+import org.cryptomator.domain.usecases.cloud.DownloadState;
+import org.cryptomator.domain.usecases.cloud.UploadState;
+import org.cryptomator.util.Optional;
+
+import java.io.File;
+import java.io.IOException;
+import java.io.OutputStream;
+import java.net.SocketTimeoutException;
+import java.util.List;
+
+import static org.cryptomator.util.ExceptionUtil.contains;
+
+class OnedriveCloudContentRepository extends InterceptingCloudContentRepository {
+
+ private final OnedriveCloud cloud;
+
+ public OnedriveCloudContentRepository(OnedriveCloud cloud, Context context) {
+ super(new Intercepted(cloud, context));
+ this.cloud = cloud;
+ }
+
+ @Override
+ protected void throwWrappedIfRequired(Exception e) throws BackendException {
+ throwNetworkConnectionExceptionIfRequired(e);
+ throwWrongCredentialsExceptionIfRequired(e);
+ }
+
+ private void throwNetworkConnectionExceptionIfRequired(Exception e) throws NetworkConnectionException {
+ if (contains(e, SocketTimeoutException.class)) {
+ throw new NetworkConnectionException(e);
+ }
+ }
+
+ private void throwWrongCredentialsExceptionIfRequired(Exception e) {
+ if (isAuthenticationError(e)) {
+ throw new WrongCredentialsException(cloud);
+ }
+ }
+
+ private boolean isAuthenticationError(Throwable e) {
+ return e != null //
+ && ((e instanceof ClientException && ((ClientException) e).errorCode().equals(GraphErrorCodes.AUTHENTICATION_FAILURE)) //
+ || isAuthenticationError(e.getCause()));
+ }
+
+ private static class Intercepted implements CloudContentRepository {
+
+ private final OnedriveImpl oneDriveImpl;
+
+ public Intercepted(OnedriveCloud cloud, Context context) {
+ this.oneDriveImpl = new OnedriveImpl(cloud, context, new OnedriveIdCache());
+ }
+
+ @Override
+ public OnedriveFolder root(OnedriveCloud cloud) {
+ return oneDriveImpl.root();
+ }
+
+ @Override
+ public OnedriveFolder resolve(OnedriveCloud cloud, String path) {
+ return oneDriveImpl.resolve(path);
+ }
+
+ @Override
+ public OnedriveFile file(OnedriveFolder parent, String name) {
+ return oneDriveImpl.file(parent, name);
+ }
+
+ @Override
+ public OnedriveFile file(OnedriveFolder parent, String name, Optional size) {
+ return oneDriveImpl.file(parent, name, size);
+ }
+
+ @Override
+ public OnedriveFolder folder(OnedriveFolder parent, String name) {
+ return oneDriveImpl.folder(parent, name);
+ }
+
+ @Override
+ public boolean exists(OnedriveNode node) throws BackendException {
+ return oneDriveImpl.exists(node);
+ }
+
+ @Override
+ public List list(OnedriveFolder folder) throws BackendException {
+ return oneDriveImpl.list(folder);
+ }
+
+ @Override
+ public OnedriveFolder create(OnedriveFolder folder) throws BackendException {
+ return oneDriveImpl.create(folder);
+ }
+
+ @Override
+ public OnedriveFolder move(OnedriveFolder source, OnedriveFolder target) throws BackendException {
+ return (OnedriveFolder) oneDriveImpl.move(source, target);
+ }
+
+ @Override
+ public OnedriveFile move(OnedriveFile source, OnedriveFile target) throws BackendException {
+ return (OnedriveFile) oneDriveImpl.move(source, target);
+ }
+
+ @Override
+ public OnedriveFile write(OnedriveFile file, DataSource data, ProgressAware progressAware, boolean replace, long size) throws BackendException {
+ try {
+ return oneDriveImpl.write(file, data, progressAware, replace, size);
+ } catch (BackendException e) {
+ if (contains(e, NoSuchCloudFileException.class)) {
+ throw new NoSuchCloudFileException(file.getName());
+ }
+ throw e;
+ }
+ }
+
+ @Override
+ public void read(OnedriveFile file, Optional tmpEncryptedFile, OutputStream data, ProgressAware progressAware) throws BackendException {
+ try {
+ oneDriveImpl.read(file, tmpEncryptedFile, data, progressAware);
+ } catch (IOException | BackendException e) {
+ if (contains(e, NoSuchCloudFileException.class)) {
+ throw new NoSuchCloudFileException(file.getName());
+ } else if (e instanceof IOException) {
+ throw new FatalBackendException(e);
+ } else if (e instanceof BackendException) {
+ throw (BackendException) e;
+ }
+ }
+ }
+
+ @Override
+ public void delete(OnedriveNode node) throws BackendException {
+ oneDriveImpl.delete(node);
+ }
+
+ @Override
+ public String checkAuthenticationAndRetrieveCurrentAccount(OnedriveCloud cloud) throws BackendException {
+ return oneDriveImpl.currentAccount();
+ }
+
+ @Override
+ public void logout(OnedriveCloud cloud) {
+ oneDriveImpl.logout();
+ }
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepositoryFactory.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepositoryFactory.java
new file mode 100644
index 00000000..7dff2b35
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudContentRepositoryFactory.java
@@ -0,0 +1,34 @@
+package org.cryptomator.data.cloud.onedrive;
+
+import android.content.Context;
+
+import org.cryptomator.data.repository.CloudContentRepositoryFactory;
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.OnedriveCloud;
+import org.cryptomator.domain.repository.CloudContentRepository;
+
+import javax.inject.Inject;
+import javax.inject.Singleton;
+
+import static org.cryptomator.domain.CloudType.ONEDRIVE;
+
+@Singleton
+public class OnedriveCloudContentRepositoryFactory implements CloudContentRepositoryFactory {
+
+ private final Context context;
+
+ @Inject
+ public OnedriveCloudContentRepositoryFactory(Context context) {
+ this.context = context;
+ }
+
+ @Override
+ public boolean supports(Cloud cloud) {
+ return cloud.type() == ONEDRIVE;
+ }
+
+ @Override
+ public CloudContentRepository cloudContentRepositoryFor(Cloud cloud) {
+ return new OnedriveCloudContentRepository((OnedriveCloud) cloud, context);
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudNodeFactory.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudNodeFactory.java
new file mode 100644
index 00000000..b8ed36f4
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveCloudNodeFactory.java
@@ -0,0 +1,77 @@
+package org.cryptomator.data.cloud.onedrive;
+
+import com.microsoft.graph.models.extensions.DriveItem;
+
+import org.cryptomator.util.Optional;
+
+import java.util.Date;
+
+class OnedriveCloudNodeFactory {
+
+ public static OnedriveNode from(OnedriveFolder parent, DriveItem item) {
+ if (isFolder(item)) {
+ return folder(parent, item);
+ } else {
+ return file(parent, item);
+ }
+ }
+
+ private static OnedriveFile file(OnedriveFolder parent, DriveItem item) {
+ return new OnedriveFile(parent, item.name, getNodePath(parent, item.name), Optional.ofNullable(item.size), lastModified(item));
+ }
+
+ public static OnedriveFile file(OnedriveFolder parent, DriveItem item, Optional lastModified) {
+ return new OnedriveFile(parent, item.name, getNodePath(parent, item.name), Optional.ofNullable(item.size), lastModified);
+ }
+
+ public static OnedriveFile file(OnedriveFolder parent, String name, Optional size) {
+ return new OnedriveFile(parent, name, getNodePath(parent, name), size, Optional.empty());
+ }
+
+ public static OnedriveFile file(OnedriveFolder parent, String name, Optional size, String path) {
+ return new OnedriveFile(parent, name, path, size, Optional.empty());
+ }
+
+ public static OnedriveFolder folder(OnedriveFolder parent, DriveItem item) {
+ return new OnedriveFolder(parent, item.name, getNodePath(parent, item.name));
+ }
+
+ public static OnedriveFolder folder(OnedriveFolder parent, String name) {
+ return new OnedriveFolder(parent, name, getNodePath(parent, name));
+ }
+
+ public static OnedriveFolder folder(OnedriveFolder parent, String name, String path) {
+ return new OnedriveFolder(parent, name, path);
+ }
+
+ private static String getNodePath(OnedriveFolder parent, String name) {
+ return parent.getPath() + "/" + name;
+ }
+
+ public static String getId(DriveItem item) {
+ return item.remoteItem != null //
+ ? item.remoteItem.id //
+ : item.id;
+ }
+
+ public static String getDriveId(DriveItem item) {
+ return item.remoteItem != null //
+ ? item.remoteItem.parentReference.driveId //
+ : item.parentReference != null //
+ ? item.parentReference.driveId //
+ : null;
+ }
+
+ public static boolean isFolder(DriveItem item) {
+ return item.folder != null || (item.remoteItem != null && item.remoteItem.folder != null);
+ }
+
+ private static Optional lastModified(DriveItem item) {
+ if (item.lastModifiedDateTime == null) {
+ return Optional.empty();
+ } else {
+ return Optional.of(item.lastModifiedDateTime.getTime());
+ }
+ }
+
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveFile.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveFile.java
new file mode 100644
index 00000000..d1bd6cbc
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveFile.java
@@ -0,0 +1,59 @@
+package org.cryptomator.data.cloud.onedrive;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudFile;
+import org.cryptomator.util.Optional;
+
+import java.util.Date;
+
+class OnedriveFile implements CloudFile, OnedriveNode {
+
+ private final OnedriveFolder parent;
+ private final String name;
+ private final String path;
+ private final Optional size;
+ private final Optional modified;
+
+ public OnedriveFile(OnedriveFolder parent, String name, String path, Optional size, Optional modified) {
+ this.parent = parent;
+ this.name = name;
+ this.path = path;
+ this.size = size;
+ this.modified = modified;
+ }
+
+ @Override
+ public boolean isFolder() {
+ return false;
+ }
+
+ @Override
+ public Cloud getCloud() {
+ return parent.getCloud();
+ }
+
+ @Override
+ public String getName() {
+ return name;
+ }
+
+ @Override
+ public String getPath() {
+ return path;
+ }
+
+ @Override
+ public OnedriveFolder getParent() {
+ return parent;
+ }
+
+ @Override
+ public Optional getSize() {
+ return size;
+ }
+
+ @Override
+ public Optional getModified() {
+ return modified;
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveFolder.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveFolder.java
new file mode 100644
index 00000000..c51a22fa
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveFolder.java
@@ -0,0 +1,47 @@
+package org.cryptomator.data.cloud.onedrive;
+
+import org.cryptomator.domain.Cloud;
+import org.cryptomator.domain.CloudFolder;
+
+class OnedriveFolder implements CloudFolder, OnedriveNode {
+
+ private final OnedriveFolder parent;
+ private final String name;
+ private final String path;
+
+ public OnedriveFolder(OnedriveFolder parent, String name, String path) {
+ this.parent = parent;
+ this.name = name;
+ this.path = path;
+ }
+
+ @Override
+ public boolean isFolder() {
+ return true;
+ }
+
+ @Override
+ public Cloud getCloud() {
+ return parent.getCloud();
+ }
+
+ @Override
+ public String getName() {
+ return name;
+ }
+
+ @Override
+ public String getPath() {
+ return path;
+ }
+
+ @Override
+ public OnedriveFolder getParent() {
+ return parent;
+ }
+
+ @Override
+ public OnedriveFolder withCloud(Cloud cloud) {
+ return new OnedriveFolder(parent.withCloud(cloud), name, path);
+ }
+}
diff --git a/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveHttpProvider.java b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveHttpProvider.java
new file mode 100644
index 00000000..392e817f
--- /dev/null
+++ b/data/src/main/java/org/cryptomator/data/cloud/onedrive/OnedriveHttpProvider.java
@@ -0,0 +1,577 @@
+// ------------------------------------------------------------------------------
+// Copyright (c) 2015 Microsoft Corporation
+//
+// Permission is hereby granted, free of charge, to any person obtaining a copy
+// of this software and associated documentation files (the "Software"), to deal
+// in the Software without restriction, including without limitation the rights
+// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
+// copies of the Software, and to permit persons to whom the Software is
+// furnished to do so, subject to the following conditions:
+//
+// The above copyright notice and this permission notice shall be included in
+// all copies or substantial portions of the Software.
+//
+// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF WILDCARD_MIME_TYPE KIND, EXPRESS OR
+// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
+// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR WILDCARD_MIME_TYPE CLAIM, DAMAGES OR OTHER
+// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
+// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
+// THE SOFTWARE.
+// ------------------------------------------------------------------------------
+package org.cryptomator.data.cloud.onedrive;
+
+import java.io.BufferedInputStream;
+import java.io.BufferedOutputStream;
+import java.io.ByteArrayInputStream;
+import java.io.IOException;
+import java.io.InputStream;
+import java.io.OutputStream;
+import java.io.UnsupportedEncodingException;
+import java.net.URL;
+import java.util.Collections;
+import java.util.List;
+import java.util.Map;
+import java.util.Scanner;
+import java.util.concurrent.TimeUnit;
+
+import com.google.common.annotations.VisibleForTesting;
+import com.microsoft.graph.authentication.IAuthenticationProvider;
+import com.microsoft.graph.concurrency.ICallback;
+import com.microsoft.graph.concurrency.IExecutors;
+import com.microsoft.graph.concurrency.IProgressCallback;
+import com.microsoft.graph.core.ClientException;
+import com.microsoft.graph.core.Constants;
+import com.microsoft.graph.core.DefaultConnectionConfig;
+import com.microsoft.graph.core.IClientConfig;
+import com.microsoft.graph.core.IConnectionConfig;
+import com.microsoft.graph.http.GraphServiceException;
+import com.microsoft.graph.http.HttpMethod;
+import com.microsoft.graph.http.HttpResponseCode;
+import com.microsoft.graph.http.HttpResponseHeadersHelper;
+import com.microsoft.graph.http.IHttpProvider;
+import com.microsoft.graph.http.IHttpRequest;
+import com.microsoft.graph.http.IStatefulResponseHandler;
+import com.microsoft.graph.httpcore.HttpClients;
+import com.microsoft.graph.httpcore.ICoreAuthenticationProvider;
+import com.microsoft.graph.httpcore.middlewareoption.RedirectOptions;
+import com.microsoft.graph.httpcore.middlewareoption.RetryOptions;
+import com.microsoft.graph.logger.ILogger;
+import com.microsoft.graph.logger.LoggerLevel;
+import com.microsoft.graph.options.HeaderOption;
+import com.microsoft.graph.serializer.ISerializer;
+
+import org.jetbrains.annotations.NotNull;
+
+import okhttp3.MediaType;
+import okhttp3.OkHttpClient;
+import okhttp3.Protocol;
+import okhttp3.Request;
+import okhttp3.RequestBody;
+import okhttp3.Response;
+import okio.BufferedSink;
+
+/**
+ * Http provider based off of URLConnection.
+ */
+public class OnedriveHttpProvider implements IHttpProvider {
+
+ private final HttpResponseHeadersHelper responseHeadersHelper = new HttpResponseHeadersHelper();
+
+ /**
+ * The serializer
+ */
+ private final ISerializer serializer;
+
+ /**
+ * The authentication provider
+ */
+ private final IAuthenticationProvider authenticationProvider;
+
+ /**
+ * The executors
+ */
+ private final IExecutors executors;
+
+ /**
+ * The logger
+ */
+ private final ILogger logger;
+
+ /**
+ * The connection config
+ */
+ private IConnectionConfig connectionConfig;
+
+ /**
+ * The OkHttpClient that handles all requests
+ */
+ private OkHttpClient corehttpClient;
+
+ /**
+ * Creates the DefaultHttpProvider
+ *
+ * @param serializer the serializer
+ * @param authenticationProvider the authentication provider
+ * @param executors the executors
+ * @param logger the logger for diagnostic information
+ */
+ public OnedriveHttpProvider(final ISerializer serializer, final IAuthenticationProvider authenticationProvider, final IExecutors executors, final ILogger logger) {
+ this.serializer = serializer;
+ this.authenticationProvider = authenticationProvider;
+ this.executors = executors;
+ this.logger = logger;
+ }
+
+ /**
+ * Creates the DefaultHttpProvider
+ *
+ * @param clientConfig the client configuration to use for the provider
+ * @param httpClient the http client to execute the requests with
+ */
+ public OnedriveHttpProvider(final IClientConfig clientConfig, final OkHttpClient httpClient) {
+ this(clientConfig.getSerializer(), clientConfig.getAuthenticationProvider(), clientConfig.getExecutors(), clientConfig.getLogger());
+ this.corehttpClient = httpClient;
+ }
+
+ /**
+ * Gets the serializer for this HTTP provider
+ *
+ * @return the serializer for this provider
+ */
+ @Override
+ public ISerializer getSerializer() {
+ return serializer;
+ }
+
+ /**
+ * Sends the HTTP request asynchronously
+ *
+ * @param request the request description
+ * @param callback the callback to be called after success or failure
+ * @param resultClass the class of the response from the service
+ * @param serializable the object to send to the service in the body of the request
+ * @param the type of the response object
+ * @param the type of the object to send to the service in the body of the request
+ */
+ @Override
+ public void send(final IHttpRequest request, final ICallback super Result> callback, final Class resultClass, final Body serializable) {
+ final IProgressCallback super Result> progressCallback;
+ if (callback instanceof IProgressCallback) {
+ progressCallback = (IProgressCallback super Result>) callback;
+ } else {
+ progressCallback = null;
+ }
+
+ executors.performOnBackground(() -> {
+ try {
+ executors.performOnForeground(sendRequestInternal(request, resultClass, serializable, progressCallback, null), callback);
+ } catch (final ClientException e) {
+ executors.performOnForeground(e, callback);
+ }
+ });
+ }
+
+ /**
+ * Sends the HTTP request
+ *
+ * @param request the request description
+ * @param resultClass the class of the response from the service
+ * @param serializable the object to send to the service in the body of the request
+ * @param the type of the response object
+ * @param the type of the object to send to the service in the body of the request
+ * @return the result from the request
+ * @throws ClientException an exception occurs if the request was unable to complete for any reason
+ */
+ @Override
+ public Result send(final IHttpRequest request, final Class resultClass, final Body serializable) throws ClientException {
+ return send(request, resultClass, serializable, null);
+ }
+
+ /**
+ * Sends the HTTP request
+ *
+ * @param request the request description
+ * @param resultClass the class of the response from the service
+ * @param serializable the object to send to the service in the body of the request
+ * @param handler the handler for stateful response
+ * @param the type of the response object
+ * @param the type of the object to send to the service in the body of the request
+ * @param the response handler for stateful response
+ * @return the result from the request
+ * @throws ClientException this exception occurs if the request was unable to complete for any reason
+ */
+ public Result send(final IHttpRequest request, final Class resultClass, final Body serializable, final IStatefulResponseHandler handler)
+ throws ClientException {
+ return sendRequestInternal(request, resultClass, serializable, null, handler);
+ }
+
+ /**
+ * Sends the HTTP request
+ *
+ * @param request the request description
+ * @param resultClass the class of the response from the service
+ * @param serializable the object to send to the service in the body of the request
+ * @param progress the progress callback for the request
+ * @param the type of the response object
+ * @param the type of the object to send to the service in the body of the request
+ * @return the result from the request
+ * @throws ClientException an exception occurs if the request was unable to complete for any reason
+ */
+ public Request getHttpRequest(final IHttpRequest request, final Class resultClass, final Body serializable, final IProgressCallback super Result> progress) throws ClientException {
+ final int defaultBufferSize = 4096;
+
+ final URL requestUrl = request.getRequestUrl();
+ logger.logDebug("Starting to send request, URL " + requestUrl.toString());
+
+ if (this.connectionConfig == null) {
+ this.connectionConfig = new DefaultConnectionConfig();
+ }
+
+ // Request level middleware options
+ RedirectOptions redirectOptions = new RedirectOptions(request.getMaxRedirects() > 0 ? request.getMaxRedirects() : this.connectionConfig.getMaxRedirects(),
+ request.getShouldRedirect() != null ? request.getShouldRedirect() : this.connectionConfig.getShouldRedirect());
+ RetryOptions retryOptions = new RetryOptions(request.getShouldRetry() != null ? request.getShouldRetry() : this.connectionConfig.getShouldRetry(),
+ request.getMaxRetries() > 0 ? request.getMaxRetries() : this.connectionConfig.getMaxRetries(), request.getDelay() > 0 ? request.getDelay() : this.connectionConfig.getDelay());
+
+ Request coreHttpRequest = convertIHttpRequestToOkHttpRequest(request);
+ Request.Builder corehttpRequestBuilder = coreHttpRequest.newBuilder().tag(RedirectOptions.class, redirectOptions).tag(RetryOptions.class, retryOptions);
+
+ String contenttype = null;
+
+ logger.logDebug("Request Method " + request.getHttpMethod().toString());
+ List requestHeaders = request.getHeaders();
+
+ for (HeaderOption headerOption : requestHeaders) {
+ if (headerOption.getName().equalsIgnoreCase(Constants.CONTENT_TYPE_HEADER_NAME)) {
+ contenttype = headerOption.getValue().toString();
+ break;
+ }
+ }
+
+ final byte[] bytesToWrite;
+ corehttpRequestBuilder.addHeader("Accept", "*/*");
+ if (serializable == null) {
+ // Send an empty body through with a POST request
+ // This ensures that the Content-Length header is properly set
+ if (request.getHttpMethod() == HttpMethod.POST) {
+ bytesToWrite = new byte[0];
+ if (contenttype == null) {
+ contenttype = Constants.BINARY_CONTENT_TYPE;
+ }
+ } else {
+ bytesToWrite = null;
+ }
+ } else if (serializable instanceof byte[]) {
+ logger.logDebug("Sending byte[] as request body");
+ bytesToWrite = (byte[]) serializable;
+
+ // If the user hasn't specified a Content-Type for the request
+ if (!hasHeader(requestHeaders, Constants.CONTENT_TYPE_HEADER_NAME)) {
+ corehttpRequestBuilder.addHeader(Constants.CONTENT_TYPE_HEADER_NAME, Constants.BINARY_CONTENT_TYPE);
+ contenttype = Constants.BINARY_CONTENT_TYPE;
+ }
+ } else {
+ logger.logDebug("Sending " + serializable.getClass().getName() + " as request body");
+ final String serializeObject = serializer.serializeObject(serializable);
+ try {
+ bytesToWrite = serializeObject.getBytes(Constants.JSON_ENCODING);
+ } catch (final UnsupportedEncodingException ex) {
+ final ClientException clientException = new ClientException("Unsupported encoding problem: ", ex);
+ logger.logError("Unsupported encoding problem: " + ex.getMessage(), ex);
+ throw clientException;
+ }
+
+ // If the user hasn't specified a Content-Type for the request
+ if (!hasHeader(requestHeaders, Constants.CONTENT_TYPE_HEADER_NAME)) {
+ corehttpRequestBuilder.addHeader(Constants.CONTENT_TYPE_HEADER_NAME, Constants.JSON_CONTENT_TYPE);
+ contenttype = Constants.JSON_CONTENT_TYPE;
+ }
+ }
+
+ RequestBody requestBody = null;
+ // Handle cases where we've got a body to process.
+ if (bytesToWrite != null) {
+ final String mediaContentType = contenttype;
+ requestBody = new RequestBody() {
+ @Override
+ public long contentLength() {
+ return bytesToWrite.length;
+ }
+
+ @Override
+ public void writeTo(@NotNull BufferedSink sink) throws IOException {
+ OutputStream out = sink.outputStream();
+ int writtenSoFar = 0;
+ BufferedOutputStream bos = new BufferedOutputStream(out);
+ int toWrite;
+ do {
+ toWrite = Math.min(defaultBufferSize, bytesToWrite.length - writtenSoFar);
+ bos.write(bytesToWrite, writtenSoFar, toWrite);
+ writtenSoFar = writtenSoFar + toWrite;
+ if (progress != null) {
+ executors.performOnForeground(writtenSoFar, bytesToWrite.length, progress);
+ }
+ } while (toWrite > 0);
+ bos.close();
+ out.close();
+ }
+
+ @Override
+ public MediaType contentType() {
+ return MediaType.parse(mediaContentType);
+ }
+ };
+ }
+
+ corehttpRequestBuilder.method(request.getHttpMethod().toString(), requestBody);
+ return corehttpRequestBuilder.build();
+ }
+
+ /**
+ * Sends the HTTP request
+ *
+ * @param request the request description
+ * @param resultClass the class of the response from the service
+ * @param serializable the object to send to the service in the body of the request
+ * @param progress the progress callback for the request
+ * @param handler the handler for stateful response
+ * @param the type of the response object
+ * @param the type of the object to send to the service in the body of the request
+ * @param