mirror of
https://github.com/oxen-io/session-android.git
synced 2025-10-23 18:49:37 +00:00
Add support for dependency injection, and accompanying tests.
This commit is contained in:
@@ -9,8 +9,8 @@ import org.thoughtcrime.securesms.crypto.MasterSecret;
|
||||
import org.thoughtcrime.securesms.database.DatabaseFactory;
|
||||
import org.thoughtcrime.securesms.database.EncryptingPartDatabase;
|
||||
import org.thoughtcrime.securesms.database.PartDatabase;
|
||||
import org.thoughtcrime.securesms.dependencies.InjectableType;
|
||||
import org.thoughtcrime.securesms.jobs.requirements.MasterSecretRequirement;
|
||||
import org.thoughtcrime.securesms.push.TextSecureCommunicationFactory;
|
||||
import org.thoughtcrime.securesms.util.Util;
|
||||
import org.whispersystems.jobqueue.JobParameters;
|
||||
import org.whispersystems.jobqueue.requirements.NetworkRequirement;
|
||||
@@ -26,13 +26,17 @@ import java.io.IOException;
|
||||
import java.io.InputStream;
|
||||
import java.util.List;
|
||||
|
||||
import javax.inject.Inject;
|
||||
|
||||
import ws.com.google.android.mms.MmsException;
|
||||
import ws.com.google.android.mms.pdu.PduPart;
|
||||
|
||||
public class AttachmentDownloadJob extends MasterSecretJob {
|
||||
public class AttachmentDownloadJob extends MasterSecretJob implements InjectableType {
|
||||
|
||||
private static final String TAG = AttachmentDownloadJob.class.getSimpleName();
|
||||
|
||||
@Inject transient TextSecureMessageReceiver messageReceiver;
|
||||
|
||||
private final long messageId;
|
||||
|
||||
public AttachmentDownloadJob(Context context, long messageId) {
|
||||
@@ -49,9 +53,8 @@ public class AttachmentDownloadJob extends MasterSecretJob {
|
||||
public void onAdded() {}
|
||||
|
||||
@Override
|
||||
public void onRun() throws RequirementNotMetException, IOException {
|
||||
MasterSecret masterSecret = getMasterSecret();
|
||||
PartDatabase database = DatabaseFactory.getEncryptingPartDatabase(context, masterSecret);
|
||||
public void onRun(MasterSecret masterSecret) throws IOException {
|
||||
PartDatabase database = DatabaseFactory.getEncryptingPartDatabase(context, masterSecret);
|
||||
|
||||
Log.w(TAG, "Downloading push parts for: " + messageId);
|
||||
|
||||
@@ -65,23 +68,17 @@ public class AttachmentDownloadJob extends MasterSecretJob {
|
||||
|
||||
@Override
|
||||
public void onCanceled() {
|
||||
try {
|
||||
MasterSecret masterSecret = getMasterSecret();
|
||||
PartDatabase database = DatabaseFactory.getEncryptingPartDatabase(context, masterSecret);
|
||||
List<Pair<Long, PduPart>> parts = database.getParts(messageId, false);
|
||||
PartDatabase database = DatabaseFactory.getPartDatabase(context);
|
||||
List<Pair<Long, PduPart>> parts = database.getParts(messageId, false);
|
||||
|
||||
for (Pair<Long, PduPart> partPair : parts) {
|
||||
markFailed(masterSecret, messageId, partPair.second, partPair.first);
|
||||
}
|
||||
} catch (RequirementNotMetException e) {
|
||||
Log.w(TAG, e);
|
||||
for (Pair<Long, PduPart> partPair : parts) {
|
||||
markFailed(messageId, partPair.second, partPair.first);
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetry(Throwable throwable) {
|
||||
if (throwable instanceof PushNetworkException) return true;
|
||||
if (throwable instanceof RequirementNotMetException) return true;
|
||||
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||
if (throwable instanceof PushNetworkException) return true;
|
||||
|
||||
return false;
|
||||
}
|
||||
@@ -89,7 +86,6 @@ public class AttachmentDownloadJob extends MasterSecretJob {
|
||||
private void retrievePart(MasterSecret masterSecret, PduPart part, long messageId, long partId)
|
||||
throws IOException
|
||||
{
|
||||
TextSecureMessageReceiver receiver = TextSecureCommunicationFactory.createReceiver(context, masterSecret);
|
||||
EncryptingPartDatabase database = DatabaseFactory.getEncryptingPartDatabase(context, masterSecret);
|
||||
File attachmentFile = null;
|
||||
|
||||
@@ -97,12 +93,12 @@ public class AttachmentDownloadJob extends MasterSecretJob {
|
||||
attachmentFile = createTempFile();
|
||||
|
||||
TextSecureAttachmentPointer pointer = createAttachmentPointer(masterSecret, part);
|
||||
InputStream attachment = receiver.retrieveAttachment(pointer, attachmentFile);
|
||||
InputStream attachment = messageReceiver.retrieveAttachment(pointer, attachmentFile);
|
||||
|
||||
database.updateDownloadedPart(messageId, partId, part, attachment);
|
||||
} catch (InvalidPartException | NonSuccessfulResponseCodeException | InvalidMessageException | MmsException e) {
|
||||
Log.w(TAG, e);
|
||||
markFailed(masterSecret, messageId, part, partId);
|
||||
markFailed(messageId, part, partId);
|
||||
} finally {
|
||||
if (attachmentFile != null)
|
||||
attachmentFile.delete();
|
||||
@@ -140,9 +136,9 @@ public class AttachmentDownloadJob extends MasterSecretJob {
|
||||
}
|
||||
}
|
||||
|
||||
private void markFailed(MasterSecret masterSecret, long messageId, PduPart part, long partId) {
|
||||
private void markFailed(long messageId, PduPart part, long partId) {
|
||||
try {
|
||||
EncryptingPartDatabase database = DatabaseFactory.getEncryptingPartDatabase(context, masterSecret);
|
||||
PartDatabase database = DatabaseFactory.getPartDatabase(context);
|
||||
database.updateFailedDownloadedPart(messageId, partId, part);
|
||||
} catch (MmsException e) {
|
||||
Log.w(TAG, e);
|
||||
|
@@ -5,6 +5,7 @@ import android.graphics.Bitmap;
|
||||
import android.util.Log;
|
||||
|
||||
import org.thoughtcrime.securesms.Release;
|
||||
import org.thoughtcrime.securesms.crypto.MasterSecret;
|
||||
import org.thoughtcrime.securesms.database.DatabaseFactory;
|
||||
import org.thoughtcrime.securesms.database.GroupDatabase;
|
||||
import org.thoughtcrime.securesms.jobs.requirements.MasterSecretRequirement;
|
||||
@@ -47,7 +48,7 @@ public class AvatarDownloadJob extends MasterSecretJob {
|
||||
public void onAdded() {}
|
||||
|
||||
@Override
|
||||
public void onRun() throws IOException {
|
||||
public void onRun(MasterSecret masterSecret) throws IOException {
|
||||
GroupDatabase database = DatabaseFactory.getGroupDatabase(context);
|
||||
GroupDatabase.GroupRecord record = database.getGroup(groupId);
|
||||
File attachment = null;
|
||||
@@ -90,7 +91,7 @@ public class AvatarDownloadJob extends MasterSecretJob {
|
||||
public void onCanceled() {}
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetry(Throwable throwable) {
|
||||
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||
if (throwable instanceof IOException) return true;
|
||||
return false;
|
||||
}
|
||||
|
@@ -4,10 +4,8 @@ import android.content.Context;
|
||||
import android.util.Log;
|
||||
|
||||
import org.thoughtcrime.securesms.crypto.MasterSecret;
|
||||
import org.thoughtcrime.securesms.crypto.storage.TextSecureAxolotlStore;
|
||||
import org.thoughtcrime.securesms.dependencies.InjectableType;
|
||||
import org.thoughtcrime.securesms.jobs.requirements.MasterSecretRequirement;
|
||||
import org.thoughtcrime.securesms.push.TextSecureCommunicationFactory;
|
||||
import org.thoughtcrime.securesms.util.VisibleForTesting;
|
||||
import org.whispersystems.jobqueue.JobParameters;
|
||||
import org.whispersystems.libaxolotl.InvalidKeyIdException;
|
||||
import org.whispersystems.libaxolotl.state.SignedPreKeyRecord;
|
||||
@@ -20,17 +18,23 @@ import org.whispersystems.textsecure.push.exceptions.PushNetworkException;
|
||||
import java.io.IOException;
|
||||
import java.util.Collections;
|
||||
import java.util.Comparator;
|
||||
import java.util.Iterator;
|
||||
import java.util.LinkedList;
|
||||
import java.util.List;
|
||||
import java.util.concurrent.TimeUnit;
|
||||
|
||||
public class CleanPreKeysJob extends MasterSecretJob {
|
||||
import javax.inject.Inject;
|
||||
|
||||
import static org.thoughtcrime.securesms.dependencies.AxolotlStorageModule.SignedPreKeyStoreFactory;
|
||||
|
||||
public class CleanPreKeysJob extends MasterSecretJob implements InjectableType {
|
||||
|
||||
private static final String TAG = CleanPreKeysJob.class.getSimpleName();
|
||||
|
||||
private static final int ARCHIVE_AGE_DAYS = 15;
|
||||
|
||||
@Inject transient TextSecureAccountManager accountManager;
|
||||
@Inject transient SignedPreKeyStoreFactory signedPreKeyStoreFactory;
|
||||
|
||||
public CleanPreKeysJob(Context context) {
|
||||
super(context, JobParameters.newBuilder()
|
||||
.withGroupId(CleanPreKeysJob.class.getSimpleName())
|
||||
@@ -45,40 +49,33 @@ public class CleanPreKeysJob extends MasterSecretJob {
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onRun() throws RequirementNotMetException, IOException {
|
||||
public void onRun(MasterSecret masterSecret) throws IOException {
|
||||
try {
|
||||
MasterSecret masterSecret = getMasterSecret();
|
||||
SignedPreKeyStore signedPreKeyStore = createSignedPreKeyStore(context, masterSecret);
|
||||
TextSecureAccountManager accountManager = createAccountManager(context);
|
||||
|
||||
SignedPreKeyStore signedPreKeyStore = signedPreKeyStoreFactory.create(masterSecret);
|
||||
SignedPreKeyEntity currentSignedPreKey = accountManager.getSignedPreKey();
|
||||
|
||||
if (currentSignedPreKey == null) return;
|
||||
|
||||
SignedPreKeyRecord currentRecord = signedPreKeyStore.loadSignedPreKey(currentSignedPreKey.getKeyId());
|
||||
List<SignedPreKeyRecord> allRecords = signedPreKeyStore.loadSignedPreKeys();
|
||||
List<SignedPreKeyRecord> oldRecords = removeRecordFrom(currentRecord, allRecords);
|
||||
SignedPreKeyRecord currentRecord = signedPreKeyStore.loadSignedPreKey(currentSignedPreKey.getKeyId());
|
||||
List<SignedPreKeyRecord> allRecords = signedPreKeyStore.loadSignedPreKeys();
|
||||
LinkedList<SignedPreKeyRecord> oldRecords = removeRecordFrom(currentRecord, allRecords);
|
||||
|
||||
Collections.sort(oldRecords, new SignedPreKeySorter());
|
||||
|
||||
Log.w(TAG, "Old signed prekey record count: " + oldRecords.size());
|
||||
|
||||
if (oldRecords.size() < 2) {
|
||||
return;
|
||||
}
|
||||
boolean foundAgedRecord = false;
|
||||
|
||||
SignedPreKeyRecord latestRecord = oldRecords.get(0);
|
||||
long latestRecordArchiveDuration = System.currentTimeMillis() - latestRecord.getTimestamp();
|
||||
for (SignedPreKeyRecord oldRecord : oldRecords) {
|
||||
long archiveDuration = System.currentTimeMillis() - oldRecord.getTimestamp();
|
||||
|
||||
if (latestRecordArchiveDuration >= TimeUnit.DAYS.toMillis(ARCHIVE_AGE_DAYS)) {
|
||||
Iterator<SignedPreKeyRecord> iterator = oldRecords.iterator();
|
||||
iterator.next();
|
||||
|
||||
while (iterator.hasNext()) {
|
||||
SignedPreKeyRecord expiredRecord = iterator.next();
|
||||
Log.w(TAG, "Removing signed prekey record: " + expiredRecord.getId() + " with timestamp: " + expiredRecord.getTimestamp());
|
||||
|
||||
signedPreKeyStore.removeSignedPreKey(expiredRecord.getId());
|
||||
if (archiveDuration >= TimeUnit.DAYS.toMillis(ARCHIVE_AGE_DAYS)) {
|
||||
if (!foundAgedRecord) {
|
||||
foundAgedRecord = true;
|
||||
} else {
|
||||
Log.w(TAG, "Removing signed prekey record: " + oldRecord.getId() + " with timestamp: " + oldRecord.getTimestamp());
|
||||
signedPreKeyStore.removeSignedPreKey(oldRecord.getId());
|
||||
}
|
||||
}
|
||||
}
|
||||
} catch (InvalidKeyIdException e) {
|
||||
@@ -87,8 +84,7 @@ public class CleanPreKeysJob extends MasterSecretJob {
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetry(Throwable throwable) {
|
||||
if (throwable instanceof RequirementNotMetException) return true;
|
||||
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||
if (throwable instanceof NonSuccessfulResponseCodeException) return false;
|
||||
if (throwable instanceof PushNetworkException) return true;
|
||||
return false;
|
||||
@@ -99,11 +95,11 @@ public class CleanPreKeysJob extends MasterSecretJob {
|
||||
Log.w(TAG, "Failed to execute clean signed prekeys task.");
|
||||
}
|
||||
|
||||
private List<SignedPreKeyRecord> removeRecordFrom(SignedPreKeyRecord currentRecord,
|
||||
List<SignedPreKeyRecord> records)
|
||||
private LinkedList<SignedPreKeyRecord> removeRecordFrom(SignedPreKeyRecord currentRecord,
|
||||
List<SignedPreKeyRecord> records)
|
||||
|
||||
{
|
||||
List<SignedPreKeyRecord> others = new LinkedList<>();
|
||||
LinkedList<SignedPreKeyRecord> others = new LinkedList<>();
|
||||
|
||||
for (SignedPreKeyRecord record : records) {
|
||||
if (record.getId() != currentRecord.getId()) {
|
||||
@@ -114,20 +110,11 @@ public class CleanPreKeysJob extends MasterSecretJob {
|
||||
return others;
|
||||
}
|
||||
|
||||
@VisibleForTesting
|
||||
protected TextSecureAccountManager createAccountManager(Context context) {
|
||||
return TextSecureCommunicationFactory.createManager(context);
|
||||
}
|
||||
|
||||
protected SignedPreKeyStore createSignedPreKeyStore(Context context, MasterSecret masterSecret) {
|
||||
return new TextSecureAxolotlStore(context, masterSecret);
|
||||
}
|
||||
|
||||
private static class SignedPreKeySorter implements Comparator<SignedPreKeyRecord> {
|
||||
@Override
|
||||
public int compare(SignedPreKeyRecord lhs, SignedPreKeyRecord rhs) {
|
||||
if (lhs.getTimestamp() < rhs.getTimestamp()) return -1;
|
||||
else if (lhs.getTimestamp() > rhs.getTimestamp()) return 1;
|
||||
if (lhs.getTimestamp() > rhs.getTimestamp()) return -1;
|
||||
else if (lhs.getTimestamp() < rhs.getTimestamp()) return 1;
|
||||
else return 0;
|
||||
}
|
||||
}
|
||||
|
@@ -6,6 +6,7 @@ import android.util.Log;
|
||||
import org.thoughtcrime.securesms.crypto.IdentityKeyUtil;
|
||||
import org.thoughtcrime.securesms.crypto.MasterSecret;
|
||||
import org.thoughtcrime.securesms.crypto.PreKeyUtil;
|
||||
import org.thoughtcrime.securesms.dependencies.InjectableType;
|
||||
import org.thoughtcrime.securesms.push.TextSecureCommunicationFactory;
|
||||
import org.thoughtcrime.securesms.util.ParcelUtil;
|
||||
import org.thoughtcrime.securesms.util.TextSecurePreferences;
|
||||
@@ -15,13 +16,18 @@ import org.whispersystems.jobqueue.requirements.NetworkRequirement;
|
||||
import org.whispersystems.libaxolotl.IdentityKeyPair;
|
||||
import org.whispersystems.libaxolotl.state.SignedPreKeyRecord;
|
||||
import org.whispersystems.textsecure.api.TextSecureAccountManager;
|
||||
import org.whispersystems.textsecure.push.exceptions.PushNetworkException;
|
||||
|
||||
import java.io.IOException;
|
||||
|
||||
public class CreateSignedPreKeyJob extends ContextJob {
|
||||
import javax.inject.Inject;
|
||||
|
||||
public class CreateSignedPreKeyJob extends ContextJob implements InjectableType {
|
||||
|
||||
private static final String TAG = CreateSignedPreKeyJob.class.getSimpleName();
|
||||
|
||||
@Inject transient TextSecureAccountManager accountManager;
|
||||
|
||||
public CreateSignedPreKeyJob(Context context, MasterSecret masterSecret) {
|
||||
super(context, JobParameters.newBuilder()
|
||||
.withPersistence()
|
||||
@@ -35,7 +41,7 @@ public class CreateSignedPreKeyJob extends ContextJob {
|
||||
public void onAdded() {}
|
||||
|
||||
@Override
|
||||
public void onRun() throws Throwable {
|
||||
public void onRun() throws IOException {
|
||||
MasterSecret masterSecret = ParcelUtil.deserialize(getEncryptionKeys().getEncoded(), MasterSecret.CREATOR);
|
||||
|
||||
if (TextSecurePreferences.isSignedPreKeyRegistered(context)) {
|
||||
@@ -43,9 +49,8 @@ public class CreateSignedPreKeyJob extends ContextJob {
|
||||
return;
|
||||
}
|
||||
|
||||
IdentityKeyPair identityKeyPair = IdentityKeyUtil.getIdentityKeyPair(context, masterSecret);
|
||||
SignedPreKeyRecord signedPreKeyRecord = PreKeyUtil.generateSignedPreKey(context, masterSecret, identityKeyPair);
|
||||
TextSecureAccountManager accountManager = TextSecureCommunicationFactory.createManager(context);
|
||||
IdentityKeyPair identityKeyPair = IdentityKeyUtil.getIdentityKeyPair(context, masterSecret);
|
||||
SignedPreKeyRecord signedPreKeyRecord = PreKeyUtil.generateSignedPreKey(context, masterSecret, identityKeyPair);
|
||||
|
||||
accountManager.setSignedPreKey(signedPreKeyRecord);
|
||||
TextSecurePreferences.setSignedPreKeyRegistered(context, true);
|
||||
@@ -56,11 +61,7 @@ public class CreateSignedPreKeyJob extends ContextJob {
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetry(Throwable throwable) {
|
||||
if (throwable instanceof IOException) {
|
||||
return true;
|
||||
}
|
||||
|
||||
Log.w(TAG, throwable);
|
||||
if (throwable instanceof PushNetworkException) return true;
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
@@ -4,6 +4,8 @@ import android.content.Context;
|
||||
import android.util.Log;
|
||||
|
||||
import org.thoughtcrime.securesms.Release;
|
||||
import org.thoughtcrime.securesms.dependencies.InjectableType;
|
||||
import org.thoughtcrime.securesms.dependencies.TextSecureCommunicationModule;
|
||||
import org.thoughtcrime.securesms.push.TextSecurePushTrustStore;
|
||||
import org.thoughtcrime.securesms.util.TextSecurePreferences;
|
||||
import org.whispersystems.jobqueue.JobParameters;
|
||||
@@ -16,10 +18,16 @@ import org.whispersystems.textsecure.push.exceptions.PushNetworkException;
|
||||
|
||||
import java.io.IOException;
|
||||
|
||||
public class DeliveryReceiptJob extends ContextJob {
|
||||
import javax.inject.Inject;
|
||||
|
||||
import static org.thoughtcrime.securesms.dependencies.TextSecureCommunicationModule.TextSecureMessageSenderFactory;
|
||||
|
||||
public class DeliveryReceiptJob extends ContextJob implements InjectableType {
|
||||
|
||||
private static final String TAG = DeliveryReceiptJob.class.getSimpleName();
|
||||
|
||||
@Inject transient TextSecureMessageSenderFactory messageSenderFactory;
|
||||
|
||||
private final String destination;
|
||||
private final long timestamp;
|
||||
private final String relay;
|
||||
@@ -42,14 +50,9 @@ public class DeliveryReceiptJob extends ContextJob {
|
||||
@Override
|
||||
public void onRun() throws IOException {
|
||||
Log.w("DeliveryReceiptJob", "Sending delivery receipt...");
|
||||
TextSecureMessageSender messageSender =
|
||||
new TextSecureMessageSender(Release.PUSH_URL,
|
||||
new TextSecurePushTrustStore(context),
|
||||
TextSecurePreferences.getLocalNumber(context),
|
||||
TextSecurePreferences.getPushServerPassword(context),
|
||||
null, Optional.<TextSecureMessageSender.EventListener>absent());
|
||||
TextSecureMessageSender messageSender = messageSenderFactory.create(null);
|
||||
PushAddress pushAddress = new PushAddress(-1, destination, 1, relay);
|
||||
|
||||
PushAddress pushAddress = new PushAddress(-1, destination, 1, relay);
|
||||
messageSender.sendDeliveryReceipt(pushAddress, timestamp);
|
||||
}
|
||||
|
||||
|
@@ -12,7 +12,22 @@ public abstract class MasterSecretJob extends ContextJob {
|
||||
super(context, parameters);
|
||||
}
|
||||
|
||||
protected MasterSecret getMasterSecret() throws RequirementNotMetException {
|
||||
@Override
|
||||
public void onRun() throws Throwable {
|
||||
MasterSecret masterSecret = getMasterSecret();
|
||||
onRun(masterSecret);
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetry(Throwable throwable) {
|
||||
if (throwable instanceof RequirementNotMetException) return true;
|
||||
return onShouldRetryThrowable(throwable);
|
||||
}
|
||||
|
||||
public abstract void onRun(MasterSecret masterSecret) throws Throwable;
|
||||
public abstract boolean onShouldRetryThrowable(Throwable throwable);
|
||||
|
||||
private MasterSecret getMasterSecret() throws RequirementNotMetException {
|
||||
MasterSecret masterSecret = KeyCachingService.getMasterSecret(context);
|
||||
|
||||
if (masterSecret == null) throw new RequirementNotMetException();
|
||||
|
@@ -74,10 +74,9 @@ public class MmsDownloadJob extends MasterSecretJob {
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onRun() throws RequirementNotMetException {
|
||||
public void onRun(MasterSecret masterSecret) {
|
||||
Log.w(TAG, "MmsDownloadJob:onRun()");
|
||||
|
||||
MasterSecret masterSecret = getMasterSecret();
|
||||
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
||||
Optional<NotificationInd> notification = database.getNotification(messageId);
|
||||
|
||||
@@ -180,7 +179,7 @@ public class MmsDownloadJob extends MasterSecretJob {
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetry(Throwable throwable) {
|
||||
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||
return false;
|
||||
}
|
||||
|
||||
|
@@ -60,10 +60,9 @@ public class MmsSendJob extends MasterSecretJob {
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onRun() throws RequirementNotMetException, MmsException, NoSuchMessageException {
|
||||
MasterSecret masterSecret = getMasterSecret();
|
||||
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
||||
SendReq message = database.getOutgoingMessage(masterSecret, messageId);
|
||||
public void onRun(MasterSecret masterSecret) throws MmsException, NoSuchMessageException {
|
||||
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
||||
SendReq message = database.getOutgoingMessage(masterSecret, messageId);
|
||||
|
||||
try {
|
||||
MmsSendResult result = deliver(masterSecret, message);
|
||||
@@ -85,8 +84,7 @@ public class MmsSendJob extends MasterSecretJob {
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetry(Throwable throwable) {
|
||||
if (throwable instanceof RequirementNotMetException) return true;
|
||||
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||
return false;
|
||||
}
|
||||
|
||||
|
@@ -69,24 +69,22 @@ public class PushDecryptJob extends MasterSecretJob {
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onRun() throws RequirementNotMetException, NoSuchMessageException {
|
||||
MasterSecret masterSecret = getMasterSecret();
|
||||
PushDatabase database = DatabaseFactory.getPushDatabase(context);
|
||||
TextSecureEnvelope envelope = database.get(messageId);
|
||||
public void onRun(MasterSecret masterSecret) throws NoSuchMessageException {
|
||||
PushDatabase database = DatabaseFactory.getPushDatabase(context);
|
||||
TextSecureEnvelope envelope = database.get(messageId);
|
||||
|
||||
handleMessage(masterSecret, envelope);
|
||||
database.delete(messageId);
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onCanceled() {
|
||||
|
||||
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetry(Throwable throwable) {
|
||||
if (throwable instanceof RequirementNotMetException) return true;
|
||||
return false;
|
||||
public void onCanceled() {
|
||||
|
||||
}
|
||||
|
||||
private void handleMessage(MasterSecret masterSecret, TextSecureEnvelope envelope) {
|
||||
|
@@ -8,9 +8,9 @@ import org.thoughtcrime.securesms.database.DatabaseFactory;
|
||||
import org.thoughtcrime.securesms.database.MmsDatabase;
|
||||
import org.thoughtcrime.securesms.database.MmsSmsColumns;
|
||||
import org.thoughtcrime.securesms.database.NoSuchMessageException;
|
||||
import org.thoughtcrime.securesms.dependencies.InjectableType;
|
||||
import org.thoughtcrime.securesms.jobs.requirements.MasterSecretRequirement;
|
||||
import org.thoughtcrime.securesms.mms.PartParser;
|
||||
import org.thoughtcrime.securesms.push.TextSecureCommunicationFactory;
|
||||
import org.thoughtcrime.securesms.recipients.Recipient;
|
||||
import org.thoughtcrime.securesms.recipients.RecipientFormattingException;
|
||||
import org.thoughtcrime.securesms.recipients.Recipients;
|
||||
@@ -19,10 +19,10 @@ import org.thoughtcrime.securesms.util.GroupUtil;
|
||||
import org.whispersystems.jobqueue.JobParameters;
|
||||
import org.whispersystems.jobqueue.requirements.NetworkRequirement;
|
||||
import org.whispersystems.textsecure.api.TextSecureMessageSender;
|
||||
import org.whispersystems.textsecure.api.crypto.UntrustedIdentityException;
|
||||
import org.whispersystems.textsecure.api.messages.TextSecureAttachment;
|
||||
import org.whispersystems.textsecure.api.messages.TextSecureGroup;
|
||||
import org.whispersystems.textsecure.api.messages.TextSecureMessage;
|
||||
import org.whispersystems.textsecure.api.crypto.UntrustedIdentityException;
|
||||
import org.whispersystems.textsecure.push.PushAddress;
|
||||
import org.whispersystems.textsecure.push.PushMessageProtos;
|
||||
import org.whispersystems.textsecure.push.exceptions.EncapsulatedExceptions;
|
||||
@@ -33,13 +33,19 @@ import java.io.IOException;
|
||||
import java.util.LinkedList;
|
||||
import java.util.List;
|
||||
|
||||
import javax.inject.Inject;
|
||||
|
||||
import ws.com.google.android.mms.MmsException;
|
||||
import ws.com.google.android.mms.pdu.SendReq;
|
||||
|
||||
public class PushGroupSendJob extends PushSendJob {
|
||||
import static org.thoughtcrime.securesms.dependencies.TextSecureCommunicationModule.TextSecureMessageSenderFactory;
|
||||
|
||||
public class PushGroupSendJob extends PushSendJob implements InjectableType {
|
||||
|
||||
private static final String TAG = PushGroupSendJob.class.getSimpleName();
|
||||
|
||||
@Inject transient TextSecureMessageSenderFactory messageSenderFactory;
|
||||
|
||||
private final long messageId;
|
||||
|
||||
public PushGroupSendJob(Context context, long messageId, String destination) {
|
||||
@@ -60,10 +66,9 @@ public class PushGroupSendJob extends PushSendJob {
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onRun() throws RequirementNotMetException, MmsException, IOException, NoSuchMessageException {
|
||||
MasterSecret masterSecret = getMasterSecret();
|
||||
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
||||
SendReq message = database.getOutgoingMessage(masterSecret, messageId);
|
||||
public void onRun(MasterSecret masterSecret) throws MmsException, IOException, NoSuchMessageException {
|
||||
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
||||
SendReq message = database.getOutgoingMessage(masterSecret, messageId);
|
||||
|
||||
try {
|
||||
deliver(masterSecret, message);
|
||||
@@ -92,21 +97,20 @@ public class PushGroupSendJob extends PushSendJob {
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onCanceled() {
|
||||
DatabaseFactory.getMmsDatabase(context).markAsSentFailed(messageId);
|
||||
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||
if (throwable instanceof IOException) return true;
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetry(Throwable throwable) {
|
||||
if (throwable instanceof RequirementNotMetException) return true;
|
||||
if (throwable instanceof IOException) return true;
|
||||
return false;
|
||||
public void onCanceled() {
|
||||
DatabaseFactory.getMmsDatabase(context).markAsSentFailed(messageId);
|
||||
}
|
||||
|
||||
private void deliver(MasterSecret masterSecret, SendReq message)
|
||||
throws IOException, RecipientFormattingException, InvalidNumberException, EncapsulatedExceptions
|
||||
{
|
||||
TextSecureMessageSender messageSender = TextSecureCommunicationFactory.createSender(context, masterSecret);
|
||||
TextSecureMessageSender messageSender = messageSenderFactory.create(masterSecret);
|
||||
byte[] groupId = GroupUtil.getDecodedId(message.getTo()[0].getString());
|
||||
Recipients recipients = DatabaseFactory.getGroupDatabase(context).getGroupMembers(groupId, false);
|
||||
List<PushAddress> addresses = getPushAddresses(recipients);
|
||||
|
@@ -9,8 +9,8 @@ import org.thoughtcrime.securesms.crypto.storage.TextSecureAxolotlStore;
|
||||
import org.thoughtcrime.securesms.database.DatabaseFactory;
|
||||
import org.thoughtcrime.securesms.database.MmsDatabase;
|
||||
import org.thoughtcrime.securesms.database.NoSuchMessageException;
|
||||
import org.thoughtcrime.securesms.dependencies.InjectableType;
|
||||
import org.thoughtcrime.securesms.mms.PartParser;
|
||||
import org.thoughtcrime.securesms.push.TextSecureCommunicationFactory;
|
||||
import org.thoughtcrime.securesms.recipients.Recipient;
|
||||
import org.thoughtcrime.securesms.recipients.RecipientFactory;
|
||||
import org.thoughtcrime.securesms.recipients.RecipientFormattingException;
|
||||
@@ -21,9 +21,9 @@ import org.thoughtcrime.securesms.transport.RetryLaterException;
|
||||
import org.thoughtcrime.securesms.transport.SecureFallbackApprovalException;
|
||||
import org.whispersystems.libaxolotl.state.AxolotlStore;
|
||||
import org.whispersystems.textsecure.api.TextSecureMessageSender;
|
||||
import org.whispersystems.textsecure.api.crypto.UntrustedIdentityException;
|
||||
import org.whispersystems.textsecure.api.messages.TextSecureAttachment;
|
||||
import org.whispersystems.textsecure.api.messages.TextSecureMessage;
|
||||
import org.whispersystems.textsecure.api.crypto.UntrustedIdentityException;
|
||||
import org.whispersystems.textsecure.push.PushAddress;
|
||||
import org.whispersystems.textsecure.push.UnregisteredUserException;
|
||||
import org.whispersystems.textsecure.storage.RecipientDevice;
|
||||
@@ -32,13 +32,19 @@ import org.whispersystems.textsecure.util.InvalidNumberException;
|
||||
import java.io.IOException;
|
||||
import java.util.List;
|
||||
|
||||
import javax.inject.Inject;
|
||||
|
||||
import ws.com.google.android.mms.MmsException;
|
||||
import ws.com.google.android.mms.pdu.SendReq;
|
||||
|
||||
public class PushMediaSendJob extends PushSendJob {
|
||||
import static org.thoughtcrime.securesms.dependencies.TextSecureCommunicationModule.TextSecureMessageSenderFactory;
|
||||
|
||||
public class PushMediaSendJob extends PushSendJob implements InjectableType {
|
||||
|
||||
private static final String TAG = PushMediaSendJob.class.getSimpleName();
|
||||
|
||||
@Inject transient TextSecureMessageSenderFactory messageSenderFactory;
|
||||
|
||||
private final long messageId;
|
||||
|
||||
public PushMediaSendJob(Context context, long messageId, String destination) {
|
||||
@@ -52,12 +58,11 @@ public class PushMediaSendJob extends PushSendJob {
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onRun()
|
||||
throws RequirementNotMetException, RetryLaterException, MmsException, NoSuchMessageException
|
||||
public void onRun(MasterSecret masterSecret)
|
||||
throws RetryLaterException, MmsException, NoSuchMessageException
|
||||
{
|
||||
MasterSecret masterSecret = getMasterSecret();
|
||||
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
||||
SendReq message = database.getOutgoingMessage(masterSecret, messageId);
|
||||
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
||||
SendReq message = database.getOutgoingMessage(masterSecret, messageId);
|
||||
|
||||
try {
|
||||
deliver(masterSecret, message);
|
||||
@@ -80,25 +85,25 @@ public class PushMediaSendJob extends PushSendJob {
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||
if (throwable instanceof RequirementNotMetException) return true;
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onCanceled() {
|
||||
DatabaseFactory.getMmsDatabase(context).markAsSentFailed(messageId);
|
||||
notifyMediaMessageDeliveryFailed(context, messageId);
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetry(Throwable throwable) {
|
||||
if (throwable instanceof RetryLaterException) return true;
|
||||
if (throwable instanceof RequirementNotMetException) return true;
|
||||
return false;
|
||||
}
|
||||
|
||||
private void deliver(MasterSecret masterSecret, SendReq message)
|
||||
throws RetryLaterException, SecureFallbackApprovalException,
|
||||
InsecureFallbackApprovalException, UntrustedIdentityException
|
||||
{
|
||||
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
||||
TextSecureMessageSender messageSender = TextSecureCommunicationFactory.createSender(context, masterSecret);
|
||||
TextSecureMessageSender messageSender = messageSenderFactory.create(masterSecret);
|
||||
String destination = message.getTo()[0].getString();
|
||||
boolean isSmsFallbackSupported = isSmsFallbackSupported(context, destination);
|
||||
|
||||
|
@@ -10,8 +10,8 @@ import org.thoughtcrime.securesms.database.DatabaseFactory;
|
||||
import org.thoughtcrime.securesms.database.EncryptingSmsDatabase;
|
||||
import org.thoughtcrime.securesms.database.NoSuchMessageException;
|
||||
import org.thoughtcrime.securesms.database.model.SmsMessageRecord;
|
||||
import org.thoughtcrime.securesms.dependencies.InjectableType;
|
||||
import org.thoughtcrime.securesms.notifications.MessageNotifier;
|
||||
import org.thoughtcrime.securesms.push.TextSecureCommunicationFactory;
|
||||
import org.thoughtcrime.securesms.recipients.Recipient;
|
||||
import org.thoughtcrime.securesms.recipients.Recipients;
|
||||
import org.thoughtcrime.securesms.sms.IncomingIdentityUpdateMessage;
|
||||
@@ -20,8 +20,8 @@ import org.thoughtcrime.securesms.transport.RetryLaterException;
|
||||
import org.thoughtcrime.securesms.transport.SecureFallbackApprovalException;
|
||||
import org.whispersystems.libaxolotl.state.AxolotlStore;
|
||||
import org.whispersystems.textsecure.api.TextSecureMessageSender;
|
||||
import org.whispersystems.textsecure.api.messages.TextSecureMessage;
|
||||
import org.whispersystems.textsecure.api.crypto.UntrustedIdentityException;
|
||||
import org.whispersystems.textsecure.api.messages.TextSecureMessage;
|
||||
import org.whispersystems.textsecure.push.PushAddress;
|
||||
import org.whispersystems.textsecure.push.UnregisteredUserException;
|
||||
import org.whispersystems.textsecure.storage.RecipientDevice;
|
||||
@@ -29,10 +29,16 @@ import org.whispersystems.textsecure.util.InvalidNumberException;
|
||||
|
||||
import java.io.IOException;
|
||||
|
||||
public class PushTextSendJob extends PushSendJob {
|
||||
import javax.inject.Inject;
|
||||
|
||||
import static org.thoughtcrime.securesms.dependencies.TextSecureCommunicationModule.TextSecureMessageSenderFactory;
|
||||
|
||||
public class PushTextSendJob extends PushSendJob implements InjectableType {
|
||||
|
||||
private static final String TAG = PushTextSendJob.class.getSimpleName();
|
||||
|
||||
@Inject transient TextSecureMessageSenderFactory messageSenderFactory;
|
||||
|
||||
private final long messageId;
|
||||
|
||||
public PushTextSendJob(Context context, long messageId, String destination) {
|
||||
@@ -46,9 +52,7 @@ public class PushTextSendJob extends PushSendJob {
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onRun() throws RequirementNotMetException, NoSuchMessageException, RetryLaterException
|
||||
{
|
||||
MasterSecret masterSecret = getMasterSecret();
|
||||
public void onRun(MasterSecret masterSecret) throws NoSuchMessageException, RetryLaterException {
|
||||
EncryptingSmsDatabase database = DatabaseFactory.getEncryptingSmsDatabase(context);
|
||||
SmsMessageRecord record = database.getMessage(masterSecret, messageId);
|
||||
String destination = record.getIndividualRecipient().getNumber();
|
||||
@@ -77,7 +81,24 @@ public class PushTextSendJob extends PushSendJob {
|
||||
}
|
||||
}
|
||||
|
||||
public void deliver(MasterSecret masterSecret, SmsMessageRecord message, String destination)
|
||||
@Override
|
||||
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||
if (throwable instanceof RetryLaterException) return true;
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onCanceled() {
|
||||
DatabaseFactory.getSmsDatabase(context).markAsSentFailed(messageId);
|
||||
|
||||
long threadId = DatabaseFactory.getSmsDatabase(context).getThreadIdForMessage(messageId);
|
||||
Recipients recipients = DatabaseFactory.getThreadDatabase(context).getRecipientsForThreadId(threadId);
|
||||
|
||||
MessageNotifier.notifyMessageDeliveryFailed(context, recipients, threadId);
|
||||
}
|
||||
|
||||
private void deliver(MasterSecret masterSecret, SmsMessageRecord message, String destination)
|
||||
throws UntrustedIdentityException, SecureFallbackApprovalException,
|
||||
InsecureFallbackApprovalException, RetryLaterException
|
||||
{
|
||||
@@ -85,7 +106,7 @@ public class PushTextSendJob extends PushSendJob {
|
||||
|
||||
try {
|
||||
PushAddress address = getPushAddress(message.getIndividualRecipient());
|
||||
TextSecureMessageSender messageSender = TextSecureCommunicationFactory.createSender(context, masterSecret);
|
||||
TextSecureMessageSender messageSender = messageSenderFactory.create(masterSecret);
|
||||
|
||||
if (message.isEndSession()) {
|
||||
messageSender.sendMessage(address, new TextSecureMessage(message.getDateSent(), null,
|
||||
@@ -105,24 +126,6 @@ public class PushTextSendJob extends PushSendJob {
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetry(Throwable throwable) {
|
||||
if (throwable instanceof RequirementNotMetException) return true;
|
||||
if (throwable instanceof RetryLaterException) return true;
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onCanceled() {
|
||||
DatabaseFactory.getSmsDatabase(context).markAsSentFailed(messageId);
|
||||
|
||||
long threadId = DatabaseFactory.getSmsDatabase(context).getThreadIdForMessage(messageId);
|
||||
Recipients recipients = DatabaseFactory.getThreadDatabase(context).getRecipientsForThreadId(threadId);
|
||||
|
||||
MessageNotifier.notifyMessageDeliveryFailed(context, recipients, threadId);
|
||||
}
|
||||
|
||||
private void fallbackOrAskApproval(MasterSecret masterSecret, SmsMessageRecord smsMessage, String destination)
|
||||
throws SecureFallbackApprovalException, InsecureFallbackApprovalException
|
||||
{
|
||||
|
@@ -3,9 +3,11 @@ package org.thoughtcrime.securesms.jobs;
|
||||
import android.content.Context;
|
||||
import android.util.Log;
|
||||
|
||||
import org.thoughtcrime.securesms.ApplicationContext;
|
||||
import org.thoughtcrime.securesms.crypto.IdentityKeyUtil;
|
||||
import org.thoughtcrime.securesms.crypto.MasterSecret;
|
||||
import org.thoughtcrime.securesms.crypto.PreKeyUtil;
|
||||
import org.thoughtcrime.securesms.dependencies.InjectableType;
|
||||
import org.thoughtcrime.securesms.jobs.requirements.MasterSecretRequirement;
|
||||
import org.thoughtcrime.securesms.push.TextSecureCommunicationFactory;
|
||||
import org.thoughtcrime.securesms.util.TextSecurePreferences;
|
||||
@@ -22,12 +24,16 @@ import org.whispersystems.textsecure.push.exceptions.PushNetworkException;
|
||||
import java.io.IOException;
|
||||
import java.util.List;
|
||||
|
||||
public class RefreshPreKeysJob extends MasterSecretJob {
|
||||
import javax.inject.Inject;
|
||||
|
||||
public class RefreshPreKeysJob extends MasterSecretJob implements InjectableType {
|
||||
|
||||
private static final String TAG = RefreshPreKeysJob.class.getSimpleName();
|
||||
|
||||
private static final int PREKEY_MINIMUM = 10;
|
||||
|
||||
@Inject transient TextSecureAccountManager accountManager;
|
||||
|
||||
public RefreshPreKeysJob(Context context) {
|
||||
super(context, JobParameters.newBuilder()
|
||||
.withGroupId(RefreshPreKeysJob.class.getSimpleName())
|
||||
@@ -43,12 +49,10 @@ public class RefreshPreKeysJob extends MasterSecretJob {
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onRun() throws RequirementNotMetException, IOException {
|
||||
public void onRun(MasterSecret masterSecret) throws IOException {
|
||||
if (!TextSecurePreferences.isPushRegistered(context)) return;
|
||||
|
||||
MasterSecret masterSecret = getMasterSecret();
|
||||
TextSecureAccountManager accountManager = TextSecureCommunicationFactory.createManager(context);
|
||||
int availableKeys = accountManager.getPreKeysCount();
|
||||
int availableKeys = accountManager.getPreKeysCount();
|
||||
|
||||
if (availableKeys >= PREKEY_MINIMUM && TextSecurePreferences.isSignedPreKeyRegistered(context)) {
|
||||
Log.w(TAG, "Available keys sufficient: " + availableKeys);
|
||||
@@ -65,12 +69,14 @@ public class RefreshPreKeysJob extends MasterSecretJob {
|
||||
accountManager.setPreKeys(identityKey.getPublicKey(), lastResortKeyRecord, signedPreKeyRecord, preKeyRecords);
|
||||
|
||||
TextSecurePreferences.setSignedPreKeyRegistered(context, true);
|
||||
// PreKeyService.initiateClean(context, masterSecret);
|
||||
|
||||
ApplicationContext.getInstance(context)
|
||||
.getJobManager()
|
||||
.add(new CleanPreKeysJob(context));
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetry(Throwable throwable) {
|
||||
if (throwable instanceof RequirementNotMetException) return true;
|
||||
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||
if (throwable instanceof NonSuccessfulResponseCodeException) return false;
|
||||
if (throwable instanceof PushNetworkException) return true;
|
||||
|
||||
|
@@ -62,9 +62,8 @@ public class SmsDecryptJob extends MasterSecretJob {
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onRun() throws RequirementNotMetException, NoSuchMessageException {
|
||||
MasterSecret masterSecret = getMasterSecret();
|
||||
EncryptingSmsDatabase database = DatabaseFactory.getEncryptingSmsDatabase(context);
|
||||
public void onRun(MasterSecret masterSecret) throws NoSuchMessageException {
|
||||
EncryptingSmsDatabase database = DatabaseFactory.getEncryptingSmsDatabase(context);
|
||||
|
||||
try {
|
||||
SmsMessageRecord record = database.getMessage(masterSecret, messageId);
|
||||
@@ -94,6 +93,11 @@ public class SmsDecryptJob extends MasterSecretJob {
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onCanceled() {
|
||||
// TODO
|
||||
@@ -166,12 +170,6 @@ public class SmsDecryptJob extends MasterSecretJob {
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetry(Throwable throwable) {
|
||||
if (throwable instanceof RequirementNotMetException) return true;
|
||||
return false;
|
||||
}
|
||||
|
||||
private String getAsymmetricDecryptedBody(MasterSecret masterSecret, String body)
|
||||
throws InvalidMessageException
|
||||
{
|
||||
|
@@ -53,10 +53,9 @@ public class SmsSendJob extends MasterSecretJob {
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onRun() throws RequirementNotMetException, NoSuchMessageException {
|
||||
MasterSecret masterSecret = getMasterSecret();
|
||||
EncryptingSmsDatabase database = DatabaseFactory.getEncryptingSmsDatabase(context);
|
||||
SmsMessageRecord record = database.getMessage(masterSecret, messageId);
|
||||
public void onRun(MasterSecret masterSecret) throws NoSuchMessageException {
|
||||
EncryptingSmsDatabase database = DatabaseFactory.getEncryptingSmsDatabase(context);
|
||||
SmsMessageRecord record = database.getMessage(masterSecret, messageId);
|
||||
|
||||
try {
|
||||
Log.w(TAG, "Sending message: " + messageId);
|
||||
@@ -73,6 +72,11 @@ public class SmsSendJob extends MasterSecretJob {
|
||||
}
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onCanceled() {
|
||||
Log.w(TAG, "onCanceled()");
|
||||
@@ -83,12 +87,6 @@ public class SmsSendJob extends MasterSecretJob {
|
||||
MessageNotifier.notifyMessageDeliveryFailed(context, recipients, threadId);
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetry(Throwable throwable) {
|
||||
if (throwable instanceof RequirementNotMetException) return true;
|
||||
return false;
|
||||
}
|
||||
|
||||
private void deliver(MasterSecret masterSecret, SmsMessageRecord record)
|
||||
throws UndeliverableMessageException, InsecureFallbackApprovalException
|
||||
{
|
||||
|
@@ -44,9 +44,8 @@ public class SmsSentJob extends MasterSecretJob {
|
||||
}
|
||||
|
||||
@Override
|
||||
public void onRun() throws RequirementNotMetException {
|
||||
public void onRun(MasterSecret masterSecret) {
|
||||
Log.w(TAG, "Got SMS callback: " + action + " , " + result);
|
||||
MasterSecret masterSecret = getMasterSecret();
|
||||
|
||||
switch (action) {
|
||||
case SmsDeliveryListener.SENT_SMS_ACTION:
|
||||
@@ -59,8 +58,7 @@ public class SmsSentJob extends MasterSecretJob {
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean onShouldRetry(Throwable throwable) {
|
||||
if (throwable instanceof RequirementNotMetException) return true;
|
||||
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||
return false;
|
||||
}
|
||||
|
||||
|
Reference in New Issue
Block a user