WebViewLoginController.java 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359
  1. /*
  2. *
  3. * Nextcloud Talk application
  4. *
  5. * @author Mario Danic
  6. * Copyright (C) 2017 Mario Danic (mario@lovelyhq.com)
  7. *
  8. * This program is free software: you can redistribute it and/or modify
  9. * it under the terms of the GNU General Public License as published by
  10. * the Free Software Foundation, either version 3 of the License, or
  11. * at your option) any later version.
  12. *
  13. * This program is distributed in the hope that it will be useful,
  14. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. * GNU General Public License for more details.
  17. *
  18. * You should have received a copy of the GNU General Public License
  19. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  20. */
  21. package com.nextcloud.talk.controllers;
  22. import android.content.pm.ActivityInfo;
  23. import android.net.http.SslCertificate;
  24. import android.net.http.SslError;
  25. import android.os.Bundle;
  26. import android.security.KeyChain;
  27. import android.security.KeyChainException;
  28. import android.support.annotation.NonNull;
  29. import android.text.TextUtils;
  30. import android.util.Log;
  31. import android.view.LayoutInflater;
  32. import android.view.View;
  33. import android.view.ViewGroup;
  34. import android.webkit.ClientCertRequest;
  35. import android.webkit.CookieSyncManager;
  36. import android.webkit.SslErrorHandler;
  37. import android.webkit.WebSettings;
  38. import android.webkit.WebView;
  39. import android.webkit.WebViewClient;
  40. import android.widget.ProgressBar;
  41. import com.bluelinelabs.conductor.RouterTransaction;
  42. import com.bluelinelabs.conductor.changehandler.HorizontalChangeHandler;
  43. import com.nextcloud.talk.R;
  44. import com.nextcloud.talk.api.helpers.api.ApiHelper;
  45. import com.nextcloud.talk.application.NextcloudTalkApplication;
  46. import com.nextcloud.talk.controllers.base.BaseController;
  47. import com.nextcloud.talk.events.CertificateEvent;
  48. import com.nextcloud.talk.models.LoginData;
  49. import com.nextcloud.talk.persistence.entities.UserEntity;
  50. import com.nextcloud.talk.utils.ErrorMessageHolder;
  51. import com.nextcloud.talk.utils.bundle.BundleBuilder;
  52. import com.nextcloud.talk.utils.bundle.BundleKeys;
  53. import com.nextcloud.talk.utils.database.user.UserUtils;
  54. import com.nextcloud.talk.utils.ssl.MagicTrustManager;
  55. import org.greenrobot.eventbus.EventBus;
  56. import java.lang.reflect.Field;
  57. import java.net.MalformedURLException;
  58. import java.net.URL;
  59. import java.net.URLDecoder;
  60. import java.security.PrivateKey;
  61. import java.security.cert.CertificateException;
  62. import java.security.cert.X509Certificate;
  63. import java.util.HashMap;
  64. import java.util.Map;
  65. import javax.inject.Inject;
  66. import autodagger.AutoInjector;
  67. import butterknife.BindView;
  68. import io.reactivex.disposables.Disposable;
  69. import io.requery.Persistable;
  70. import io.requery.reactivex.ReactiveEntityStore;
  71. @AutoInjector(NextcloudTalkApplication.class)
  72. public class WebViewLoginController extends BaseController {
  73. public static final String TAG = "WebViewLoginController";
  74. private final String PROTOCOL_SUFFIX = "://";
  75. private final String LOGIN_URL_DATA_KEY_VALUE_SEPARATOR = ":";
  76. @Inject
  77. UserUtils userUtils;
  78. @Inject
  79. ReactiveEntityStore<Persistable> dataStore;
  80. @Inject
  81. MagicTrustManager magicTrustManager;
  82. @Inject
  83. EventBus eventBus;
  84. @Inject
  85. java.net.CookieManager cookieManager;
  86. @BindView(R.id.webview)
  87. WebView webView;
  88. @BindView(R.id.progress_bar)
  89. ProgressBar progressBar;
  90. private String assembledPrefix;
  91. private Disposable userQueryDisposable;
  92. private String baseUrl;
  93. private boolean isPasswordUpdate;
  94. public WebViewLoginController(String baseUrl, boolean isPasswordUpdate) {
  95. this.baseUrl = baseUrl;
  96. this.isPasswordUpdate = isPasswordUpdate;
  97. }
  98. public WebViewLoginController(Bundle args) {
  99. super(args);
  100. }
  101. @Override
  102. protected View inflateView(@NonNull LayoutInflater inflater, @NonNull ViewGroup container) {
  103. return inflater.inflate(R.layout.controller_web_view_login, container, false);
  104. }
  105. @Override
  106. protected void onViewBound(@NonNull View view) {
  107. super.onViewBound(view);
  108. NextcloudTalkApplication.getSharedApplication().getComponentApplication().inject(this);
  109. if (getActivity() != null) {
  110. getActivity().setRequestedOrientation(ActivityInfo.SCREEN_ORIENTATION_PORTRAIT);
  111. }
  112. if (getActionBar() != null) {
  113. getActionBar().hide();
  114. }
  115. assembledPrefix = getResources().getString(R.string.nc_talk_login_scheme) + PROTOCOL_SUFFIX + "login/";
  116. webView.getSettings().setAllowFileAccess(false);
  117. webView.getSettings().setAllowFileAccessFromFileURLs(false);
  118. webView.getSettings().setJavaScriptEnabled(true);
  119. webView.getSettings().setJavaScriptCanOpenWindowsAutomatically(false);
  120. webView.getSettings().setDomStorageEnabled(true);
  121. webView.getSettings().setUserAgentString(ApiHelper.getUserAgent());
  122. webView.getSettings().setSaveFormData(false);
  123. webView.getSettings().setSavePassword(false);
  124. webView.getSettings().setRenderPriority(WebSettings.RenderPriority.HIGH);
  125. webView.clearCache(true);
  126. webView.clearFormData();
  127. webView.clearHistory();
  128. CookieSyncManager.createInstance(getActivity());
  129. android.webkit.CookieManager.getInstance().removeAllCookies(null);
  130. Map<String, String> headers = new HashMap<>();
  131. headers.put("OCS-APIRequest", "true");
  132. webView.setWebViewClient(new WebViewClient() {
  133. private boolean basePageLoaded;
  134. @Override
  135. public boolean shouldOverrideUrlLoading(WebView view, String url) {
  136. if (url.startsWith(assembledPrefix)) {
  137. parseAndLoginFromWebView(url);
  138. return true;
  139. }
  140. return false;
  141. }
  142. @Override
  143. public void onPageFinished(WebView view, String url) {
  144. if (!basePageLoaded) {
  145. if (progressBar != null) {
  146. progressBar.setVisibility(View.GONE);
  147. }
  148. if (webView != null) {
  149. webView.setVisibility(View.VISIBLE);
  150. }
  151. basePageLoaded = true;
  152. }
  153. super.onPageFinished(view, url);
  154. }
  155. @Override
  156. public void onReceivedClientCertRequest(WebView view, ClientCertRequest request) {
  157. String host = null;
  158. try {
  159. URL url = new URL(webView.getUrl());
  160. host = url.getHost();
  161. } catch (MalformedURLException e) {
  162. Log.d(TAG, "Failed to create url");
  163. }
  164. KeyChain.choosePrivateKeyAlias(getActivity(), alias -> {
  165. try {
  166. PrivateKey changPrivateKey = KeyChain.getPrivateKey(getActivity(), alias);
  167. X509Certificate[] certificates = KeyChain.getCertificateChain(getActivity(), alias);
  168. request.proceed(changPrivateKey, certificates);
  169. } catch (KeyChainException e) {
  170. Log.e(TAG, "Failed to get keys via keychain exception");
  171. request.cancel();
  172. } catch (InterruptedException e) {
  173. Log.e(TAG, "Failed to get keys due to interruption");
  174. request.cancel();
  175. }
  176. }, new String[]{"RSA"}, null, host, -1, null);
  177. }
  178. @Override
  179. public void onReceivedSslError(WebView view, SslErrorHandler handler, SslError error) {
  180. try {
  181. SslCertificate sslCertificate = error.getCertificate();
  182. Field f = sslCertificate.getClass().getDeclaredField("mX509Certificate");
  183. f.setAccessible(true);
  184. X509Certificate cert = (X509Certificate) f.get(sslCertificate);
  185. if (cert == null) {
  186. handler.cancel();
  187. } else {
  188. try {
  189. magicTrustManager.checkServerTrusted(new X509Certificate[]{cert}, "generic");
  190. handler.proceed();
  191. } catch (CertificateException exception) {
  192. eventBus.post(new CertificateEvent(cert, magicTrustManager, handler));
  193. }
  194. }
  195. } catch (Exception exception) {
  196. handler.cancel();
  197. }
  198. }
  199. @Override
  200. public void onReceivedError(WebView view, int errorCode, String description, String failingUrl) {
  201. super.onReceivedError(view, errorCode, description, failingUrl);
  202. }
  203. });
  204. webView.loadUrl(baseUrl + "/index.php/login/flow", headers);
  205. }
  206. private void dispose() {
  207. if (userQueryDisposable != null && !userQueryDisposable.isDisposed()) {
  208. userQueryDisposable.dispose();
  209. }
  210. userQueryDisposable = null;
  211. }
  212. private void parseAndLoginFromWebView(String dataString) {
  213. LoginData loginData = parseLoginData(assembledPrefix, dataString);
  214. if (loginData != null) {
  215. dispose();
  216. UserEntity currentUser = userUtils.getCurrentUser();
  217. ErrorMessageHolder.ErrorMessageType errorMessageType = null;
  218. if (currentUser != null && isPasswordUpdate &&
  219. !currentUser.getUsername().equals(loginData.getUsername())) {
  220. ErrorMessageHolder.getInstance().setMessageType(
  221. ErrorMessageHolder.ErrorMessageType.WRONG_ACCOUNT);
  222. getRouter().popToRoot();
  223. } else {
  224. if (!isPasswordUpdate && userUtils.getIfUserWithUsernameAndServer(loginData.getUsername(), baseUrl)) {
  225. errorMessageType = ErrorMessageHolder.ErrorMessageType.ACCOUNT_UPDATED_NOT_ADDED;
  226. }
  227. if (userUtils.checkIfUserIsScheduledForDeletion(loginData.getUsername(), baseUrl)) {
  228. ErrorMessageHolder.getInstance().setMessageType(
  229. ErrorMessageHolder.ErrorMessageType.ACCOUNT_SCHEDULED_FOR_DELETION);
  230. getRouter().popToRoot();
  231. }
  232. // We use the URL user entered because one provided by the server is NOT reliable
  233. ErrorMessageHolder.ErrorMessageType finalErrorMessageType = errorMessageType;
  234. userQueryDisposable = userUtils.createOrUpdateUser(loginData.getUsername(), loginData.getToken(),
  235. loginData.getServerUrl(), null, null, true,
  236. null).
  237. subscribe(userEntity -> {
  238. cookieManager.getCookieStore().removeAll();
  239. if (!isPasswordUpdate && finalErrorMessageType == null) {
  240. BundleBuilder bundleBuilder = new BundleBuilder(new Bundle());
  241. bundleBuilder.putString(BundleKeys.KEY_USERNAME, userEntity.getUsername());
  242. bundleBuilder.putString(BundleKeys.KEY_TOKEN, userEntity.getToken());
  243. bundleBuilder.putString(BundleKeys.KEY_BASE_URL, userEntity.getBaseUrl());
  244. getRouter().pushController(RouterTransaction.with(new AccountVerificationController
  245. (bundleBuilder.build())).pushChangeHandler(new HorizontalChangeHandler())
  246. .popChangeHandler(new HorizontalChangeHandler()));
  247. } else {
  248. if (finalErrorMessageType != null) {
  249. ErrorMessageHolder.getInstance().setMessageType(finalErrorMessageType);
  250. }
  251. getRouter().popToRoot();
  252. }
  253. }, throwable -> dispose(),
  254. this::dispose);
  255. }
  256. }
  257. }
  258. private LoginData parseLoginData(String prefix, String dataString) {
  259. if (dataString.length() < prefix.length()) {
  260. return null;
  261. }
  262. LoginData loginData = new LoginData();
  263. // format is xxx://login/server1:xxx&user:xxx&password:xxx
  264. String data = dataString.substring(prefix.length());
  265. String[] values = data.split("&");
  266. if (values.length != 3) {
  267. return null;
  268. }
  269. for (String value : values) {
  270. if (value.startsWith("user" + LOGIN_URL_DATA_KEY_VALUE_SEPARATOR)) {
  271. loginData.setUsername(URLDecoder.decode(
  272. value.substring(("user" + LOGIN_URL_DATA_KEY_VALUE_SEPARATOR).length())));
  273. } else if (value.startsWith("password" + LOGIN_URL_DATA_KEY_VALUE_SEPARATOR)) {
  274. loginData.setToken(URLDecoder.decode(
  275. value.substring(("password" + LOGIN_URL_DATA_KEY_VALUE_SEPARATOR).length())));
  276. } else if (value.startsWith("server" + LOGIN_URL_DATA_KEY_VALUE_SEPARATOR)) {
  277. loginData.setServerUrl(URLDecoder.decode(
  278. value.substring(("server" + LOGIN_URL_DATA_KEY_VALUE_SEPARATOR).length())));
  279. } else {
  280. return null;
  281. }
  282. }
  283. if (!TextUtils.isEmpty(loginData.getServerUrl()) && !TextUtils.isEmpty(loginData.getUsername()) &&
  284. !TextUtils.isEmpty(loginData.getToken())) {
  285. return loginData;
  286. } else {
  287. return null;
  288. }
  289. }
  290. @Override
  291. public void onDestroy() {
  292. super.onDestroy();
  293. dispose();
  294. }
  295. @Override
  296. protected void onDestroyView(@NonNull View view) {
  297. super.onDestroyView(view);
  298. if (getActivity() != null) {
  299. getActivity().setRequestedOrientation(ActivityInfo.SCREEN_ORIENTATION_FULL_SENSOR);
  300. }
  301. }
  302. }