|
@@ -0,0 +1,284 @@
|
|
|
+package com.owncloud.android.oc_framework.network;
|
|
|
+/* ownCloud Android client application
|
|
|
+ * Copyright (C) 2012-2013 ownCloud Inc.
|
|
|
+ *
|
|
|
+ * This program is free software: you can redistribute it and/or modify
|
|
|
+ * it under the terms of the GNU General Public License version 2,
|
|
|
+ * as published by the Free Software Foundation.
|
|
|
+ *
|
|
|
+ * This program is distributed in the hope that it will be useful,
|
|
|
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
+ * GNU General Public License for more details.
|
|
|
+ *
|
|
|
+ * You should have received a copy of the GNU General Public License
|
|
|
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
+ *
|
|
|
+ */
|
|
|
+
|
|
|
+
|
|
|
+import java.io.File;
|
|
|
+import java.io.FileInputStream;
|
|
|
+import java.io.FileOutputStream;
|
|
|
+import java.io.IOException;
|
|
|
+import java.io.InputStream;
|
|
|
+import java.security.GeneralSecurityException;
|
|
|
+import java.security.KeyStore;
|
|
|
+import java.security.KeyStoreException;
|
|
|
+import java.security.NoSuchAlgorithmException;
|
|
|
+import java.security.cert.Certificate;
|
|
|
+import java.security.cert.CertificateException;
|
|
|
+
|
|
|
+import javax.net.ssl.SSLContext;
|
|
|
+import javax.net.ssl.TrustManager;
|
|
|
+
|
|
|
+import org.apache.commons.httpclient.MultiThreadedHttpConnectionManager;
|
|
|
+import org.apache.commons.httpclient.protocol.Protocol;
|
|
|
+import org.apache.http.conn.ssl.BrowserCompatHostnameVerifier;
|
|
|
+import org.apache.http.conn.ssl.X509HostnameVerifier;
|
|
|
+
|
|
|
+import com.owncloud.android.oc_framework.MainApp;
|
|
|
+import com.owncloud.android.oc_framework.authentication.AccountAuthenticatorConstants;
|
|
|
+import com.owncloud.android.oc_framework.authentication.AccountUtils;
|
|
|
+import com.owncloud.android.oc_framework.authentication.AccountUtils.AccountNotFoundException;
|
|
|
+import com.owncloud.android.oc_framework.network.webdav.WebdavClient;
|
|
|
+
|
|
|
+import android.accounts.Account;
|
|
|
+import android.accounts.AccountManager;
|
|
|
+import android.accounts.AccountManagerFuture;
|
|
|
+import android.accounts.AuthenticatorException;
|
|
|
+import android.accounts.OperationCanceledException;
|
|
|
+import android.app.Activity;
|
|
|
+import android.content.Context;
|
|
|
+import android.net.Uri;
|
|
|
+import android.os.Bundle;
|
|
|
+import android.util.Log;
|
|
|
+
|
|
|
+public class OwnCloudClientUtils {
|
|
|
+
|
|
|
+ final private static String TAG = OwnCloudClientUtils.class.getSimpleName();
|
|
|
+
|
|
|
+ /** Default timeout for waiting data from the server */
|
|
|
+ public static final int DEFAULT_DATA_TIMEOUT = 60000;
|
|
|
+
|
|
|
+ /** Default timeout for establishing a connection */
|
|
|
+ public static final int DEFAULT_CONNECTION_TIMEOUT = 60000;
|
|
|
+
|
|
|
+ /** Connection manager for all the WebdavClients */
|
|
|
+ private static MultiThreadedHttpConnectionManager mConnManager = null;
|
|
|
+
|
|
|
+ private static Protocol mDefaultHttpsProtocol = null;
|
|
|
+
|
|
|
+ private static AdvancedSslSocketFactory mAdvancedSslSocketFactory = null;
|
|
|
+
|
|
|
+ private static X509HostnameVerifier mHostnameVerifier = null;
|
|
|
+
|
|
|
+
|
|
|
+ /**
|
|
|
+ * Creates a WebdavClient setup for an ownCloud account
|
|
|
+ *
|
|
|
+ * Do not call this method from the main thread.
|
|
|
+ *
|
|
|
+ * @param account The ownCloud account
|
|
|
+ * @param appContext Android application context
|
|
|
+ * @return A WebdavClient object ready to be used
|
|
|
+ * @throws AuthenticatorException If the authenticator failed to get the authorization token for the account.
|
|
|
+ * @throws OperationCanceledException If the authenticator operation was cancelled while getting the authorization token for the account.
|
|
|
+ * @throws IOException If there was some I/O error while getting the authorization token for the account.
|
|
|
+ * @throws AccountNotFoundException If 'account' is unknown for the AccountManager
|
|
|
+ */
|
|
|
+ public static WebdavClient createOwnCloudClient (Account account, Context appContext) throws OperationCanceledException, AuthenticatorException, IOException, AccountNotFoundException {
|
|
|
+ //Log_OC.d(TAG, "Creating WebdavClient associated to " + account.name);
|
|
|
+
|
|
|
+ Uri uri = Uri.parse(AccountUtils.constructFullURLForAccount(appContext, account));
|
|
|
+ AccountManager am = AccountManager.get(appContext);
|
|
|
+ boolean isOauth2 = am.getUserData(account, AccountAuthenticatorConstants.KEY_SUPPORTS_OAUTH2) != null; // TODO avoid calling to getUserData here
|
|
|
+ boolean isSamlSso = am.getUserData(account, AccountAuthenticatorConstants.KEY_SUPPORTS_SAML_WEB_SSO) != null;
|
|
|
+ WebdavClient client = createOwnCloudClient(uri, appContext, !isSamlSso);
|
|
|
+ if (isOauth2) {
|
|
|
+ String accessToken = am.blockingGetAuthToken(account, MainApp.getAuthTokenTypeAccessToken(), false);
|
|
|
+ client.setBearerCredentials(accessToken); // TODO not assume that the access token is a bearer token
|
|
|
+
|
|
|
+ } else if (isSamlSso) { // TODO avoid a call to getUserData here
|
|
|
+ String accessToken = am.blockingGetAuthToken(account, MainApp.getAuthTokenTypeSamlSessionCookie(), false);
|
|
|
+ client.setSsoSessionCookie(accessToken);
|
|
|
+
|
|
|
+ } else {
|
|
|
+ String username = account.name.substring(0, account.name.lastIndexOf('@'));
|
|
|
+ //String password = am.getPassword(account);
|
|
|
+ String password = am.blockingGetAuthToken(account, MainApp.getAuthTokenTypePass(), false);
|
|
|
+ client.setBasicCredentials(username, password);
|
|
|
+ }
|
|
|
+
|
|
|
+ return client;
|
|
|
+ }
|
|
|
+
|
|
|
+
|
|
|
+ public static WebdavClient createOwnCloudClient (Account account, Context appContext, Activity currentActivity) throws OperationCanceledException, AuthenticatorException, IOException, AccountNotFoundException {
|
|
|
+ Uri uri = Uri.parse(AccountUtils.constructFullURLForAccount(appContext, account));
|
|
|
+ AccountManager am = AccountManager.get(appContext);
|
|
|
+ boolean isOauth2 = am.getUserData(account, AccountAuthenticatorConstants.KEY_SUPPORTS_OAUTH2) != null; // TODO avoid calling to getUserData here
|
|
|
+ boolean isSamlSso = am.getUserData(account, AccountAuthenticatorConstants.KEY_SUPPORTS_SAML_WEB_SSO) != null;
|
|
|
+ WebdavClient client = createOwnCloudClient(uri, appContext, !isSamlSso);
|
|
|
+
|
|
|
+ if (isOauth2) { // TODO avoid a call to getUserData here
|
|
|
+ AccountManagerFuture<Bundle> future = am.getAuthToken(account, MainApp.getAuthTokenTypeAccessToken(), null, currentActivity, null, null);
|
|
|
+ Bundle result = future.getResult();
|
|
|
+ String accessToken = result.getString(AccountManager.KEY_AUTHTOKEN);
|
|
|
+ if (accessToken == null) throw new AuthenticatorException("WTF!");
|
|
|
+ client.setBearerCredentials(accessToken); // TODO not assume that the access token is a bearer token
|
|
|
+
|
|
|
+ } else if (isSamlSso) { // TODO avoid a call to getUserData here
|
|
|
+ AccountManagerFuture<Bundle> future = am.getAuthToken(account, MainApp.getAuthTokenTypeSamlSessionCookie(), null, currentActivity, null, null);
|
|
|
+ Bundle result = future.getResult();
|
|
|
+ String accessToken = result.getString(AccountManager.KEY_AUTHTOKEN);
|
|
|
+ if (accessToken == null) throw new AuthenticatorException("WTF!");
|
|
|
+ client.setSsoSessionCookie(accessToken);
|
|
|
+
|
|
|
+ } else {
|
|
|
+ String username = account.name.substring(0, account.name.lastIndexOf('@'));
|
|
|
+ //String password = am.getPassword(account);
|
|
|
+ //String password = am.blockingGetAuthToken(account, MainApp.getAuthTokenTypePass(), false);
|
|
|
+ AccountManagerFuture<Bundle> future = am.getAuthToken(account, MainApp.getAuthTokenTypePass(), null, currentActivity, null, null);
|
|
|
+ Bundle result = future.getResult();
|
|
|
+ String password = result.getString(AccountManager.KEY_AUTHTOKEN);
|
|
|
+ client.setBasicCredentials(username, password);
|
|
|
+ }
|
|
|
+
|
|
|
+ return client;
|
|
|
+ }
|
|
|
+
|
|
|
+ /**
|
|
|
+ * Creates a WebdavClient to access a URL and sets the desired parameters for ownCloud client connections.
|
|
|
+ *
|
|
|
+ * @param uri URL to the ownCloud server
|
|
|
+ * @param context Android context where the WebdavClient is being created.
|
|
|
+ * @return A WebdavClient object ready to be used
|
|
|
+ */
|
|
|
+ public static WebdavClient createOwnCloudClient(Uri uri, Context context, boolean followRedirects) {
|
|
|
+ try {
|
|
|
+ registerAdvancedSslContext(true, context);
|
|
|
+ } catch (GeneralSecurityException e) {
|
|
|
+ Log.e(TAG, "Advanced SSL Context could not be loaded. Default SSL management in the system will be used for HTTPS connections", e);
|
|
|
+
|
|
|
+ } catch (IOException e) {
|
|
|
+ Log.e(TAG, "The local server truststore could not be read. Default SSL management in the system will be used for HTTPS connections", e);
|
|
|
+ }
|
|
|
+
|
|
|
+ WebdavClient client = new WebdavClient(getMultiThreadedConnManager());
|
|
|
+
|
|
|
+ client.setDefaultTimeouts(DEFAULT_DATA_TIMEOUT, DEFAULT_CONNECTION_TIMEOUT);
|
|
|
+ client.setBaseUri(uri);
|
|
|
+ client.setFollowRedirects(followRedirects);
|
|
|
+
|
|
|
+ return client;
|
|
|
+ }
|
|
|
+
|
|
|
+
|
|
|
+ /**
|
|
|
+ * Registers or unregisters the proper components for advanced SSL handling.
|
|
|
+ * @throws IOException
|
|
|
+ */
|
|
|
+ private static void registerAdvancedSslContext(boolean register, Context context) throws GeneralSecurityException, IOException {
|
|
|
+ Protocol pr = null;
|
|
|
+ try {
|
|
|
+ pr = Protocol.getProtocol("https");
|
|
|
+ if (pr != null && mDefaultHttpsProtocol == null) {
|
|
|
+ mDefaultHttpsProtocol = pr;
|
|
|
+ }
|
|
|
+ } catch (IllegalStateException e) {
|
|
|
+ // nothing to do here; really
|
|
|
+ }
|
|
|
+ boolean isRegistered = (pr != null && pr.getSocketFactory() instanceof AdvancedSslSocketFactory);
|
|
|
+ if (register && !isRegistered) {
|
|
|
+ Protocol.registerProtocol("https", new Protocol("https", getAdvancedSslSocketFactory(context), 443));
|
|
|
+
|
|
|
+ } else if (!register && isRegistered) {
|
|
|
+ if (mDefaultHttpsProtocol != null) {
|
|
|
+ Protocol.registerProtocol("https", mDefaultHttpsProtocol);
|
|
|
+ }
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ public static AdvancedSslSocketFactory getAdvancedSslSocketFactory(Context context) throws GeneralSecurityException, IOException {
|
|
|
+ if (mAdvancedSslSocketFactory == null) {
|
|
|
+ KeyStore trustStore = getKnownServersStore(context);
|
|
|
+ AdvancedX509TrustManager trustMgr = new AdvancedX509TrustManager(trustStore);
|
|
|
+ TrustManager[] tms = new TrustManager[] { trustMgr };
|
|
|
+
|
|
|
+ SSLContext sslContext = SSLContext.getInstance("TLS");
|
|
|
+ sslContext.init(null, tms, null);
|
|
|
+
|
|
|
+ mHostnameVerifier = new BrowserCompatHostnameVerifier();
|
|
|
+ mAdvancedSslSocketFactory = new AdvancedSslSocketFactory(sslContext, trustMgr, mHostnameVerifier);
|
|
|
+ }
|
|
|
+ return mAdvancedSslSocketFactory;
|
|
|
+ }
|
|
|
+
|
|
|
+
|
|
|
+ private static String LOCAL_TRUSTSTORE_FILENAME = "knownServers.bks";
|
|
|
+
|
|
|
+ private static String LOCAL_TRUSTSTORE_PASSWORD = "password";
|
|
|
+
|
|
|
+ private static KeyStore mKnownServersStore = null;
|
|
|
+
|
|
|
+ /**
|
|
|
+ * Returns the local store of reliable server certificates, explicitly accepted by the user.
|
|
|
+ *
|
|
|
+ * Returns a KeyStore instance with empty content if the local store was never created.
|
|
|
+ *
|
|
|
+ * Loads the store from the storage environment if needed.
|
|
|
+ *
|
|
|
+ * @param context Android context where the operation is being performed.
|
|
|
+ * @return KeyStore instance with explicitly-accepted server certificates.
|
|
|
+ * @throws KeyStoreException When the KeyStore instance could not be created.
|
|
|
+ * @throws IOException When an existing local trust store could not be loaded.
|
|
|
+ * @throws NoSuchAlgorithmException When the existing local trust store was saved with an unsupported algorithm.
|
|
|
+ * @throws CertificateException When an exception occurred while loading the certificates from the local trust store.
|
|
|
+ */
|
|
|
+ private static KeyStore getKnownServersStore(Context context) throws KeyStoreException, IOException, NoSuchAlgorithmException, CertificateException {
|
|
|
+ if (mKnownServersStore == null) {
|
|
|
+ //mKnownServersStore = KeyStore.getInstance("BKS");
|
|
|
+ mKnownServersStore = KeyStore.getInstance(KeyStore.getDefaultType());
|
|
|
+ File localTrustStoreFile = new File(context.getFilesDir(), LOCAL_TRUSTSTORE_FILENAME);
|
|
|
+ Log.d(TAG, "Searching known-servers store at " + localTrustStoreFile.getAbsolutePath());
|
|
|
+ if (localTrustStoreFile.exists()) {
|
|
|
+ InputStream in = new FileInputStream(localTrustStoreFile);
|
|
|
+ try {
|
|
|
+ mKnownServersStore.load(in, LOCAL_TRUSTSTORE_PASSWORD.toCharArray());
|
|
|
+ } finally {
|
|
|
+ in.close();
|
|
|
+ }
|
|
|
+ } else {
|
|
|
+ mKnownServersStore.load(null, LOCAL_TRUSTSTORE_PASSWORD.toCharArray()); // necessary to initialize an empty KeyStore instance
|
|
|
+ }
|
|
|
+ }
|
|
|
+ return mKnownServersStore;
|
|
|
+ }
|
|
|
+
|
|
|
+
|
|
|
+ public static void addCertToKnownServersStore(Certificate cert, Context context) throws KeyStoreException, NoSuchAlgorithmException,
|
|
|
+ CertificateException, IOException {
|
|
|
+ KeyStore knownServers = getKnownServersStore(context);
|
|
|
+ knownServers.setCertificateEntry(Integer.toString(cert.hashCode()), cert);
|
|
|
+ FileOutputStream fos = null;
|
|
|
+ try {
|
|
|
+ fos = context.openFileOutput(LOCAL_TRUSTSTORE_FILENAME, Context.MODE_PRIVATE);
|
|
|
+ knownServers.store(fos, LOCAL_TRUSTSTORE_PASSWORD.toCharArray());
|
|
|
+ } finally {
|
|
|
+ fos.close();
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+
|
|
|
+ static private MultiThreadedHttpConnectionManager getMultiThreadedConnManager() {
|
|
|
+ if (mConnManager == null) {
|
|
|
+ mConnManager = new MultiThreadedHttpConnectionManager();
|
|
|
+ mConnManager.getParams().setDefaultMaxConnectionsPerHost(5);
|
|
|
+ mConnManager.getParams().setMaxTotalConnections(5);
|
|
|
+ }
|
|
|
+ return mConnManager;
|
|
|
+ }
|
|
|
+
|
|
|
+
|
|
|
+}
|