mirror of
https://github.com/oxen-io/session-android.git
synced 2025-02-21 09:28:27 +00:00
Add support for dependency injection, and accompanying tests.
This commit is contained in:
parent
601e233d47
commit
9a6f65988f
@ -0,0 +1,153 @@
|
|||||||
|
package org.thoughtcrime.securesms.jobs;
|
||||||
|
|
||||||
|
import android.test.AndroidTestCase;
|
||||||
|
|
||||||
|
import org.thoughtcrime.securesms.crypto.MasterSecret;
|
||||||
|
import org.thoughtcrime.securesms.dependencies.AxolotlStorageModule;
|
||||||
|
import org.whispersystems.libaxolotl.ecc.Curve;
|
||||||
|
import org.whispersystems.libaxolotl.state.SignedPreKeyRecord;
|
||||||
|
import org.whispersystems.libaxolotl.state.SignedPreKeyStore;
|
||||||
|
import org.whispersystems.textsecure.api.TextSecureAccountManager;
|
||||||
|
import org.whispersystems.textsecure.push.SignedPreKeyEntity;
|
||||||
|
import org.whispersystems.textsecure.push.exceptions.PushNetworkException;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.LinkedList;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
import dagger.Module;
|
||||||
|
import dagger.ObjectGraph;
|
||||||
|
import dagger.Provides;
|
||||||
|
|
||||||
|
import static org.mockito.Matchers.anyInt;
|
||||||
|
import static org.mockito.Matchers.eq;
|
||||||
|
import static org.mockito.Mockito.mock;
|
||||||
|
import static org.mockito.Mockito.never;
|
||||||
|
import static org.mockito.Mockito.times;
|
||||||
|
import static org.mockito.Mockito.verify;
|
||||||
|
import static org.mockito.Mockito.verifyNoMoreInteractions;
|
||||||
|
import static org.mockito.Mockito.when;
|
||||||
|
|
||||||
|
public class CleanPreKeysJobTest extends AndroidTestCase {
|
||||||
|
|
||||||
|
public void testSignedPreKeyRotationNotRegistered() throws IOException, MasterSecretJob.RequirementNotMetException {
|
||||||
|
TextSecureAccountManager accountManager = mock(TextSecureAccountManager.class);
|
||||||
|
SignedPreKeyStore signedPreKeyStore = mock(SignedPreKeyStore.class);
|
||||||
|
MasterSecret masterSecret = mock(MasterSecret.class);
|
||||||
|
when(accountManager.getSignedPreKey()).thenReturn(null);
|
||||||
|
|
||||||
|
CleanPreKeysJob cleanPreKeysJob = new CleanPreKeysJob(getContext());
|
||||||
|
|
||||||
|
ObjectGraph objectGraph = ObjectGraph.create(new TestModule(accountManager, signedPreKeyStore));
|
||||||
|
objectGraph.inject(cleanPreKeysJob);
|
||||||
|
|
||||||
|
cleanPreKeysJob.onRun(masterSecret);
|
||||||
|
|
||||||
|
verify(accountManager).getSignedPreKey();
|
||||||
|
verifyNoMoreInteractions(signedPreKeyStore);
|
||||||
|
}
|
||||||
|
|
||||||
|
public void testSignedPreKeyEviction() throws Exception {
|
||||||
|
SignedPreKeyStore signedPreKeyStore = mock(SignedPreKeyStore.class);
|
||||||
|
TextSecureAccountManager accountManager = mock(TextSecureAccountManager.class);
|
||||||
|
SignedPreKeyEntity currentSignedPreKeyEntity = mock(SignedPreKeyEntity.class);
|
||||||
|
MasterSecret masterSecret = mock(MasterSecret.class);
|
||||||
|
|
||||||
|
when(currentSignedPreKeyEntity.getKeyId()).thenReturn(3133);
|
||||||
|
when(accountManager.getSignedPreKey()).thenReturn(currentSignedPreKeyEntity);
|
||||||
|
|
||||||
|
final SignedPreKeyRecord currentRecord = new SignedPreKeyRecord(3133, System.currentTimeMillis(), Curve.generateKeyPair(), new byte[64]);
|
||||||
|
|
||||||
|
List<SignedPreKeyRecord> records = new LinkedList<SignedPreKeyRecord>() {{
|
||||||
|
add(new SignedPreKeyRecord(2, 11, Curve.generateKeyPair(), new byte[32]));
|
||||||
|
add(new SignedPreKeyRecord(4, System.currentTimeMillis() - 100, Curve.generateKeyPair(), new byte[64]));
|
||||||
|
add(currentRecord);
|
||||||
|
add(new SignedPreKeyRecord(3, System.currentTimeMillis() - 90, Curve.generateKeyPair(), new byte[64]));
|
||||||
|
add(new SignedPreKeyRecord(1, 10, Curve.generateKeyPair(), new byte[32]));
|
||||||
|
}};
|
||||||
|
|
||||||
|
when(signedPreKeyStore.loadSignedPreKeys()).thenReturn(records);
|
||||||
|
when(signedPreKeyStore.loadSignedPreKey(eq(3133))).thenReturn(currentRecord);
|
||||||
|
|
||||||
|
CleanPreKeysJob cleanPreKeysJob = new CleanPreKeysJob(getContext());
|
||||||
|
|
||||||
|
ObjectGraph objectGraph = ObjectGraph.create(new TestModule(accountManager, signedPreKeyStore));
|
||||||
|
objectGraph.inject(cleanPreKeysJob);
|
||||||
|
|
||||||
|
cleanPreKeysJob.onRun(masterSecret);
|
||||||
|
|
||||||
|
verify(signedPreKeyStore).removeSignedPreKey(eq(1));
|
||||||
|
verify(signedPreKeyStore, times(1)).removeSignedPreKey(anyInt());
|
||||||
|
}
|
||||||
|
|
||||||
|
public void testSignedPreKeyNoEviction() throws Exception {
|
||||||
|
SignedPreKeyStore signedPreKeyStore = mock(SignedPreKeyStore.class);
|
||||||
|
TextSecureAccountManager accountManager = mock(TextSecureAccountManager.class);
|
||||||
|
SignedPreKeyEntity currentSignedPreKeyEntity = mock(SignedPreKeyEntity.class);
|
||||||
|
|
||||||
|
when(currentSignedPreKeyEntity.getKeyId()).thenReturn(3133);
|
||||||
|
when(accountManager.getSignedPreKey()).thenReturn(currentSignedPreKeyEntity);
|
||||||
|
|
||||||
|
final SignedPreKeyRecord currentRecord = new SignedPreKeyRecord(3133, System.currentTimeMillis(), Curve.generateKeyPair(), new byte[64]);
|
||||||
|
|
||||||
|
List<SignedPreKeyRecord> records = new LinkedList<SignedPreKeyRecord>() {{
|
||||||
|
add(currentRecord);
|
||||||
|
}};
|
||||||
|
|
||||||
|
when(signedPreKeyStore.loadSignedPreKeys()).thenReturn(records);
|
||||||
|
when(signedPreKeyStore.loadSignedPreKey(eq(3133))).thenReturn(currentRecord);
|
||||||
|
|
||||||
|
CleanPreKeysJob cleanPreKeysJob = new CleanPreKeysJob(getContext());
|
||||||
|
|
||||||
|
ObjectGraph objectGraph = ObjectGraph.create(new TestModule(accountManager, signedPreKeyStore));
|
||||||
|
objectGraph.inject(cleanPreKeysJob);
|
||||||
|
|
||||||
|
verify(signedPreKeyStore, never()).removeSignedPreKey(anyInt());
|
||||||
|
}
|
||||||
|
|
||||||
|
public void testConnectionError() throws Exception {
|
||||||
|
SignedPreKeyStore signedPreKeyStore = mock(SignedPreKeyStore.class);
|
||||||
|
TextSecureAccountManager accountManager = mock(TextSecureAccountManager.class);
|
||||||
|
MasterSecret masterSecret = mock(MasterSecret.class);
|
||||||
|
|
||||||
|
when(accountManager.getSignedPreKey()).thenThrow(new PushNetworkException("Connectivity error!"));
|
||||||
|
|
||||||
|
CleanPreKeysJob cleanPreKeysJob = new CleanPreKeysJob(getContext());
|
||||||
|
|
||||||
|
ObjectGraph objectGraph = ObjectGraph.create(new TestModule(accountManager, signedPreKeyStore));
|
||||||
|
objectGraph.inject(cleanPreKeysJob);
|
||||||
|
|
||||||
|
try {
|
||||||
|
cleanPreKeysJob.onRun(masterSecret);
|
||||||
|
throw new AssertionError("should have failed!");
|
||||||
|
} catch (IOException e) {
|
||||||
|
assertTrue(cleanPreKeysJob.onShouldRetry(e));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Module(injects = {CleanPreKeysJob.class})
|
||||||
|
public static class TestModule {
|
||||||
|
private final TextSecureAccountManager accountManager;
|
||||||
|
private final SignedPreKeyStore signedPreKeyStore;
|
||||||
|
|
||||||
|
private TestModule(TextSecureAccountManager accountManager, SignedPreKeyStore signedPreKeyStore) {
|
||||||
|
this.accountManager = accountManager;
|
||||||
|
this.signedPreKeyStore = signedPreKeyStore;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Provides TextSecureAccountManager provideTextSecureAccountManager() {
|
||||||
|
return accountManager;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Provides
|
||||||
|
AxolotlStorageModule.SignedPreKeyStoreFactory provideSignedPreKeyStore() {
|
||||||
|
return new AxolotlStorageModule.SignedPreKeyStoreFactory() {
|
||||||
|
@Override
|
||||||
|
public SignedPreKeyStore create(MasterSecret masterSecret) {
|
||||||
|
return signedPreKeyStore;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@ -0,0 +1,101 @@
|
|||||||
|
package org.thoughtcrime.securesms.jobs;
|
||||||
|
|
||||||
|
import android.test.AndroidTestCase;
|
||||||
|
|
||||||
|
import org.mockito.ArgumentCaptor;
|
||||||
|
import org.mockito.Mockito;
|
||||||
|
import org.thoughtcrime.securesms.crypto.MasterSecret;
|
||||||
|
import org.whispersystems.textsecure.api.TextSecureMessageSender;
|
||||||
|
import org.whispersystems.textsecure.push.PushAddress;
|
||||||
|
import org.whispersystems.textsecure.push.exceptions.NotFoundException;
|
||||||
|
import org.whispersystems.textsecure.push.exceptions.PushNetworkException;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
|
||||||
|
import dagger.Module;
|
||||||
|
import dagger.ObjectGraph;
|
||||||
|
import dagger.Provides;
|
||||||
|
|
||||||
|
import static org.mockito.Matchers.any;
|
||||||
|
import static org.mockito.Matchers.eq;
|
||||||
|
import static org.mockito.Mockito.mock;
|
||||||
|
import static org.mockito.Mockito.verify;
|
||||||
|
import static org.thoughtcrime.securesms.dependencies.TextSecureCommunicationModule.TextSecureMessageSenderFactory;
|
||||||
|
|
||||||
|
public class DeliveryReceiptJobTest extends AndroidTestCase {
|
||||||
|
|
||||||
|
public void testDelivery() throws IOException {
|
||||||
|
TextSecureMessageSender textSecureMessageSender = mock(TextSecureMessageSender.class);
|
||||||
|
long timestamp = System.currentTimeMillis();
|
||||||
|
|
||||||
|
DeliveryReceiptJob deliveryReceiptJob = new DeliveryReceiptJob(getContext(),
|
||||||
|
"+14152222222",
|
||||||
|
timestamp, "foo");
|
||||||
|
|
||||||
|
ObjectGraph objectGraph = ObjectGraph.create(new TestModule(textSecureMessageSender));
|
||||||
|
objectGraph.inject(deliveryReceiptJob);
|
||||||
|
|
||||||
|
deliveryReceiptJob.onRun();
|
||||||
|
|
||||||
|
ArgumentCaptor<PushAddress> captor = ArgumentCaptor.forClass(PushAddress.class);
|
||||||
|
verify(textSecureMessageSender).sendDeliveryReceipt(captor.capture(), eq(timestamp));
|
||||||
|
|
||||||
|
assertTrue(captor.getValue().getRelay().equals("foo"));
|
||||||
|
assertTrue(captor.getValue().getNumber().equals("+14152222222"));
|
||||||
|
}
|
||||||
|
|
||||||
|
public void testNetworkError() throws IOException {
|
||||||
|
TextSecureMessageSender textSecureMessageSender = mock(TextSecureMessageSender.class);
|
||||||
|
long timestamp = System.currentTimeMillis();
|
||||||
|
|
||||||
|
Mockito.doThrow(new PushNetworkException("network error"))
|
||||||
|
.when(textSecureMessageSender)
|
||||||
|
.sendDeliveryReceipt(any(PushAddress.class), eq(timestamp));
|
||||||
|
|
||||||
|
|
||||||
|
DeliveryReceiptJob deliveryReceiptJob = new DeliveryReceiptJob(getContext(),
|
||||||
|
"+14152222222",
|
||||||
|
timestamp, "foo");
|
||||||
|
|
||||||
|
ObjectGraph objectGraph = ObjectGraph.create(new TestModule(textSecureMessageSender));
|
||||||
|
objectGraph.inject(deliveryReceiptJob);
|
||||||
|
|
||||||
|
try {
|
||||||
|
deliveryReceiptJob.onRun();
|
||||||
|
throw new AssertionError();
|
||||||
|
} catch (IOException e) {
|
||||||
|
assertTrue(deliveryReceiptJob.onShouldRetry(e));
|
||||||
|
}
|
||||||
|
|
||||||
|
Mockito.doThrow(new NotFoundException("not found"))
|
||||||
|
.when(textSecureMessageSender)
|
||||||
|
.sendDeliveryReceipt(any(PushAddress.class), eq(timestamp));
|
||||||
|
|
||||||
|
try {
|
||||||
|
deliveryReceiptJob.onRun();
|
||||||
|
throw new AssertionError();
|
||||||
|
} catch (IOException e) {
|
||||||
|
assertFalse(deliveryReceiptJob.onShouldRetry(e));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Module(injects = DeliveryReceiptJob.class)
|
||||||
|
public static class TestModule {
|
||||||
|
|
||||||
|
private final TextSecureMessageSender textSecureMessageSender;
|
||||||
|
|
||||||
|
public TestModule(TextSecureMessageSender textSecureMessageSender) {
|
||||||
|
this.textSecureMessageSender = textSecureMessageSender;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Provides TextSecureMessageSenderFactory provideTextSecureMessageSenderFactory() {
|
||||||
|
return new TextSecureMessageSenderFactory() {
|
||||||
|
@Override
|
||||||
|
public TextSecureMessageSender create(MasterSecret masterSecret) {
|
||||||
|
return textSecureMessageSender;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@ -1,92 +0,0 @@
|
|||||||
package org.thoughtcrime.securesms.service;
|
|
||||||
|
|
||||||
import android.test.AndroidTestCase;
|
|
||||||
|
|
||||||
import org.whispersystems.libaxolotl.ecc.Curve;
|
|
||||||
import org.whispersystems.libaxolotl.state.SignedPreKeyRecord;
|
|
||||||
import org.whispersystems.libaxolotl.state.SignedPreKeyStore;
|
|
||||||
import org.whispersystems.textsecure.push.PushServiceSocket;
|
|
||||||
import org.whispersystems.textsecure.push.SignedPreKeyEntity;
|
|
||||||
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.util.LinkedList;
|
|
||||||
import java.util.List;
|
|
||||||
|
|
||||||
import static org.mockito.Matchers.anyInt;
|
|
||||||
import static org.mockito.Matchers.eq;
|
|
||||||
import static org.mockito.Mockito.mock;
|
|
||||||
import static org.mockito.Mockito.never;
|
|
||||||
import static org.mockito.Mockito.times;
|
|
||||||
import static org.mockito.Mockito.verify;
|
|
||||||
import static org.mockito.Mockito.verifyNoMoreInteractions;
|
|
||||||
import static org.mockito.Mockito.when;
|
|
||||||
|
|
||||||
public class PreKeyServiceTest extends AndroidTestCase {
|
|
||||||
|
|
||||||
public void testSignedPreKeyRotationNotRegistered() throws IOException {
|
|
||||||
SignedPreKeyStore signedPreKeyStore = mock(SignedPreKeyStore.class);
|
|
||||||
PushServiceSocket pushServiceSocket = mock(PushServiceSocket.class);
|
|
||||||
|
|
||||||
when(pushServiceSocket.getCurrentSignedPreKey()).thenReturn(null);
|
|
||||||
|
|
||||||
PreKeyService.CleanSignedPreKeysTask cleanTask = new PreKeyService.CleanSignedPreKeysTask(signedPreKeyStore,
|
|
||||||
pushServiceSocket);
|
|
||||||
|
|
||||||
cleanTask.run();
|
|
||||||
|
|
||||||
verify(pushServiceSocket).getCurrentSignedPreKey();
|
|
||||||
verifyNoMoreInteractions(signedPreKeyStore);
|
|
||||||
}
|
|
||||||
|
|
||||||
public void testSignedPreKeyEviction() throws Exception {
|
|
||||||
SignedPreKeyStore signedPreKeyStore = mock(SignedPreKeyStore.class);
|
|
||||||
PushServiceSocket pushServiceSocket = mock(PushServiceSocket.class);
|
|
||||||
SignedPreKeyEntity currentSignedPreKeyEntity = mock(SignedPreKeyEntity.class);
|
|
||||||
|
|
||||||
when(currentSignedPreKeyEntity.getKeyId()).thenReturn(3133);
|
|
||||||
when(pushServiceSocket.getCurrentSignedPreKey()).thenReturn(currentSignedPreKeyEntity);
|
|
||||||
|
|
||||||
final SignedPreKeyRecord currentRecord = new SignedPreKeyRecord(3133, System.currentTimeMillis(), Curve.generateKeyPair(true), new byte[64]);
|
|
||||||
|
|
||||||
List<SignedPreKeyRecord> records = new LinkedList<SignedPreKeyRecord>() {{
|
|
||||||
add(new SignedPreKeyRecord(1, 10, Curve.generateKeyPair(true), new byte[32]));
|
|
||||||
add(new SignedPreKeyRecord(2, 11, Curve.generateKeyPair(true), new byte[32]));
|
|
||||||
add(new SignedPreKeyRecord(3, System.currentTimeMillis() - 90, Curve.generateKeyPair(true), new byte[64]));
|
|
||||||
add(new SignedPreKeyRecord(4, System.currentTimeMillis() - 100, Curve.generateKeyPair(true), new byte[64]));
|
|
||||||
add(currentRecord);
|
|
||||||
}};
|
|
||||||
|
|
||||||
when(signedPreKeyStore.loadSignedPreKeys()).thenReturn(records);
|
|
||||||
when(signedPreKeyStore.loadSignedPreKey(eq(3133))).thenReturn(currentRecord);
|
|
||||||
|
|
||||||
PreKeyService.CleanSignedPreKeysTask cleanTask = new PreKeyService.CleanSignedPreKeysTask(signedPreKeyStore, pushServiceSocket);
|
|
||||||
cleanTask.run();
|
|
||||||
|
|
||||||
verify(signedPreKeyStore).removeSignedPreKey(eq(1));
|
|
||||||
verify(signedPreKeyStore).removeSignedPreKey(eq(2));
|
|
||||||
verify(signedPreKeyStore, times(2)).removeSignedPreKey(anyInt());
|
|
||||||
}
|
|
||||||
|
|
||||||
public void testSignedPreKeyNoEviction() throws Exception {
|
|
||||||
SignedPreKeyStore signedPreKeyStore = mock(SignedPreKeyStore.class);
|
|
||||||
PushServiceSocket pushServiceSocket = mock(PushServiceSocket.class);
|
|
||||||
SignedPreKeyEntity currentSignedPreKeyEntity = mock(SignedPreKeyEntity.class);
|
|
||||||
|
|
||||||
when(currentSignedPreKeyEntity.getKeyId()).thenReturn(3133);
|
|
||||||
when(pushServiceSocket.getCurrentSignedPreKey()).thenReturn(currentSignedPreKeyEntity);
|
|
||||||
|
|
||||||
final SignedPreKeyRecord currentRecord = new SignedPreKeyRecord(3133, System.currentTimeMillis(), Curve.generateKeyPair(true), new byte[64]);
|
|
||||||
|
|
||||||
List<SignedPreKeyRecord> records = new LinkedList<SignedPreKeyRecord>() {{
|
|
||||||
add(currentRecord);
|
|
||||||
}};
|
|
||||||
|
|
||||||
when(signedPreKeyStore.loadSignedPreKeys()).thenReturn(records);
|
|
||||||
when(signedPreKeyStore.loadSignedPreKey(eq(3133))).thenReturn(currentRecord);
|
|
||||||
|
|
||||||
PreKeyService.CleanSignedPreKeysTask cleanTask = new PreKeyService.CleanSignedPreKeysTask(signedPreKeyStore, pushServiceSocket);
|
|
||||||
cleanTask.run();
|
|
||||||
|
|
||||||
verify(signedPreKeyStore, never()).removeSignedPreKey(anyInt());
|
|
||||||
}
|
|
||||||
}
|
|
@ -39,6 +39,8 @@ dependencies {
|
|||||||
compile ('com.android.support:support-v4-preferencefragment:1.0.0@aar'){
|
compile ('com.android.support:support-v4-preferencefragment:1.0.0@aar'){
|
||||||
exclude module: 'support-v4'
|
exclude module: 'support-v4'
|
||||||
}
|
}
|
||||||
|
compile 'com.squareup.dagger:dagger:1.2.2'
|
||||||
|
provided 'com.squareup.dagger:dagger-compiler:1.2.2'
|
||||||
|
|
||||||
androidTestCompile 'com.squareup:fest-android:1.0.8'
|
androidTestCompile 'com.squareup:fest-android:1.0.8'
|
||||||
androidTestCompile 'com.google.dexmaker:dexmaker:1.1'
|
androidTestCompile 'com.google.dexmaker:dexmaker:1.1'
|
||||||
|
@ -19,6 +19,7 @@ package org.whispersystems.jobqueue;
|
|||||||
import android.content.Context;
|
import android.content.Context;
|
||||||
import android.util.Log;
|
import android.util.Log;
|
||||||
|
|
||||||
|
import org.whispersystems.jobqueue.dependencies.DependencyInjector;
|
||||||
import org.whispersystems.jobqueue.persistence.JobSerializer;
|
import org.whispersystems.jobqueue.persistence.JobSerializer;
|
||||||
import org.whispersystems.jobqueue.persistence.PersistentStorage;
|
import org.whispersystems.jobqueue.persistence.PersistentStorage;
|
||||||
import org.whispersystems.jobqueue.requirements.RequirementListener;
|
import org.whispersystems.jobqueue.requirements.RequirementListener;
|
||||||
@ -38,13 +39,16 @@ public class JobManager implements RequirementListener {
|
|||||||
|
|
||||||
private final PersistentStorage persistentStorage;
|
private final PersistentStorage persistentStorage;
|
||||||
private final List<RequirementProvider> requirementProviders;
|
private final List<RequirementProvider> requirementProviders;
|
||||||
|
private final DependencyInjector dependencyInjector;
|
||||||
|
|
||||||
public JobManager(Context context, String name,
|
public JobManager(Context context, String name,
|
||||||
List<RequirementProvider> requirementProviders,
|
List<RequirementProvider> requirementProviders,
|
||||||
|
DependencyInjector dependencyInjector,
|
||||||
JobSerializer jobSerializer, int consumers)
|
JobSerializer jobSerializer, int consumers)
|
||||||
{
|
{
|
||||||
this.persistentStorage = new PersistentStorage(context, name, jobSerializer);
|
this.persistentStorage = new PersistentStorage(context, name, jobSerializer, dependencyInjector);
|
||||||
this.requirementProviders = requirementProviders;
|
this.requirementProviders = requirementProviders;
|
||||||
|
this.dependencyInjector = dependencyInjector;
|
||||||
|
|
||||||
eventExecutor.execute(new LoadTask(null));
|
eventExecutor.execute(new LoadTask(null));
|
||||||
|
|
||||||
@ -84,6 +88,10 @@ public class JobManager implements RequirementListener {
|
|||||||
persistentStorage.store(job);
|
persistentStorage.store(job);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (dependencyInjector != null) {
|
||||||
|
dependencyInjector.injectDependencies(job);
|
||||||
|
}
|
||||||
|
|
||||||
job.onAdded();
|
job.onAdded();
|
||||||
jobQueue.add(job);
|
jobQueue.add(job);
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
|
@ -0,0 +1,5 @@
|
|||||||
|
package org.whispersystems.jobqueue.dependencies;
|
||||||
|
|
||||||
|
public interface DependencyInjector {
|
||||||
|
public void injectDependencies(Object object);
|
||||||
|
}
|
@ -25,6 +25,7 @@ import android.util.Log;
|
|||||||
|
|
||||||
import org.whispersystems.jobqueue.EncryptionKeys;
|
import org.whispersystems.jobqueue.EncryptionKeys;
|
||||||
import org.whispersystems.jobqueue.Job;
|
import org.whispersystems.jobqueue.Job;
|
||||||
|
import org.whispersystems.jobqueue.dependencies.DependencyInjector;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.util.LinkedList;
|
import java.util.LinkedList;
|
||||||
@ -42,12 +43,17 @@ public class PersistentStorage {
|
|||||||
private static final String DATABASE_CREATE = String.format("CREATE TABLE %s (%s INTEGER PRIMARY KEY, %s TEXT NOT NULL, %s INTEGER DEFAULT 0);",
|
private static final String DATABASE_CREATE = String.format("CREATE TABLE %s (%s INTEGER PRIMARY KEY, %s TEXT NOT NULL, %s INTEGER DEFAULT 0);",
|
||||||
TABLE_NAME, ID, ITEM, ENCRYPTED);
|
TABLE_NAME, ID, ITEM, ENCRYPTED);
|
||||||
|
|
||||||
private final DatabaseHelper databaseHelper;
|
private final DatabaseHelper databaseHelper;
|
||||||
private final JobSerializer jobSerializer;
|
private final JobSerializer jobSerializer;
|
||||||
|
private final DependencyInjector dependencyInjector;
|
||||||
|
|
||||||
public PersistentStorage(Context context, String name, JobSerializer serializer) {
|
public PersistentStorage(Context context, String name,
|
||||||
this.databaseHelper = new DatabaseHelper(context, "_jobqueue-" + name);
|
JobSerializer serializer,
|
||||||
this.jobSerializer = serializer;
|
DependencyInjector dependencyInjector)
|
||||||
|
{
|
||||||
|
this.databaseHelper = new DatabaseHelper(context, "_jobqueue-" + name);
|
||||||
|
this.jobSerializer = serializer;
|
||||||
|
this.dependencyInjector = dependencyInjector;
|
||||||
}
|
}
|
||||||
|
|
||||||
public void store(Job job) throws IOException {
|
public void store(Job job) throws IOException {
|
||||||
@ -59,10 +65,6 @@ public class PersistentStorage {
|
|||||||
job.setPersistentId(id);
|
job.setPersistentId(id);
|
||||||
}
|
}
|
||||||
|
|
||||||
// public List<Job> getAll(EncryptionKeys keys) {
|
|
||||||
// return getJobs(keys, null);
|
|
||||||
// }
|
|
||||||
|
|
||||||
public List<Job> getAllUnencrypted() {
|
public List<Job> getAllUnencrypted() {
|
||||||
return getJobs(null, ENCRYPTED + " = 0");
|
return getJobs(null, ENCRYPTED + " = 0");
|
||||||
}
|
}
|
||||||
@ -88,6 +90,11 @@ public class PersistentStorage {
|
|||||||
Job job = jobSerializer.deserialize(keys, encrypted, item);
|
Job job = jobSerializer.deserialize(keys, encrypted, item);
|
||||||
|
|
||||||
job.setPersistentId(id);
|
job.setPersistentId(id);
|
||||||
|
|
||||||
|
if (dependencyInjector != null) {
|
||||||
|
dependencyInjector.injectDependencies(job);
|
||||||
|
}
|
||||||
|
|
||||||
results.add(job);
|
results.add(job);
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
Log.w("PersistentStore", e);
|
Log.w("PersistentStore", e);
|
||||||
|
@ -1,7 +1,6 @@
|
|||||||
package org.whispersystems.textsecure.api;
|
package org.whispersystems.textsecure.api;
|
||||||
|
|
||||||
import org.whispersystems.libaxolotl.InvalidMessageException;
|
import org.whispersystems.libaxolotl.InvalidMessageException;
|
||||||
import org.whispersystems.libaxolotl.state.AxolotlStore;
|
|
||||||
import org.whispersystems.textsecure.api.crypto.AttachmentCipherInputStream;
|
import org.whispersystems.textsecure.api.crypto.AttachmentCipherInputStream;
|
||||||
import org.whispersystems.textsecure.api.messages.TextSecureAttachmentPointer;
|
import org.whispersystems.textsecure.api.messages.TextSecureAttachmentPointer;
|
||||||
import org.whispersystems.textsecure.push.PushServiceSocket;
|
import org.whispersystems.textsecure.push.PushServiceSocket;
|
||||||
@ -12,18 +11,12 @@ import java.io.InputStream;
|
|||||||
|
|
||||||
public class TextSecureMessageReceiver {
|
public class TextSecureMessageReceiver {
|
||||||
|
|
||||||
private final String signalingKey;
|
|
||||||
private final AxolotlStore axolotlStore;
|
|
||||||
private final PushServiceSocket socket;
|
private final PushServiceSocket socket;
|
||||||
|
|
||||||
public TextSecureMessageReceiver(String signalingKey, String url,
|
public TextSecureMessageReceiver(String url, PushServiceSocket.TrustStore trustStore,
|
||||||
PushServiceSocket.TrustStore trustStore,
|
String user, String password)
|
||||||
String user, String password,
|
|
||||||
AxolotlStore axolotlStore)
|
|
||||||
{
|
{
|
||||||
this.axolotlStore = axolotlStore;
|
this.socket = new PushServiceSocket(url, trustStore, user, password);
|
||||||
this.signalingKey = signalingKey;
|
|
||||||
this.socket = new PushServiceSocket(url, trustStore, user, password);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public InputStream retrieveAttachment(TextSecureAttachmentPointer pointer, File destination)
|
public InputStream retrieveAttachment(TextSecureAttachmentPointer pointer, File destination)
|
||||||
|
@ -6,4 +6,8 @@ public class PushNetworkException extends IOException {
|
|||||||
public PushNetworkException(Exception exception) {
|
public PushNetworkException(Exception exception) {
|
||||||
super(exception);
|
super(exception);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public PushNetworkException(String s) {
|
||||||
|
super(s);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -20,17 +20,23 @@ import android.app.Application;
|
|||||||
import android.content.Context;
|
import android.content.Context;
|
||||||
|
|
||||||
import org.thoughtcrime.securesms.crypto.PRNGFixes;
|
import org.thoughtcrime.securesms.crypto.PRNGFixes;
|
||||||
|
import org.thoughtcrime.securesms.dependencies.AxolotlStorageModule;
|
||||||
|
import org.thoughtcrime.securesms.dependencies.InjectableType;
|
||||||
import org.thoughtcrime.securesms.jobs.persistence.EncryptingJobSerializer;
|
import org.thoughtcrime.securesms.jobs.persistence.EncryptingJobSerializer;
|
||||||
import org.thoughtcrime.securesms.jobs.GcmRefreshJob;
|
import org.thoughtcrime.securesms.jobs.GcmRefreshJob;
|
||||||
import org.thoughtcrime.securesms.jobs.requirements.MasterSecretRequirementProvider;
|
import org.thoughtcrime.securesms.jobs.requirements.MasterSecretRequirementProvider;
|
||||||
|
import org.thoughtcrime.securesms.dependencies.TextSecureCommunicationModule;
|
||||||
import org.thoughtcrime.securesms.util.TextSecurePreferences;
|
import org.thoughtcrime.securesms.util.TextSecurePreferences;
|
||||||
import org.whispersystems.jobqueue.JobManager;
|
import org.whispersystems.jobqueue.JobManager;
|
||||||
|
import org.whispersystems.jobqueue.dependencies.DependencyInjector;
|
||||||
import org.whispersystems.jobqueue.requirements.NetworkRequirementProvider;
|
import org.whispersystems.jobqueue.requirements.NetworkRequirementProvider;
|
||||||
import org.whispersystems.jobqueue.requirements.RequirementProvider;
|
import org.whispersystems.jobqueue.requirements.RequirementProvider;
|
||||||
|
|
||||||
import java.util.LinkedList;
|
import java.util.LinkedList;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
|
import dagger.ObjectGraph;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Will be called once when the TextSecure process is created.
|
* Will be called once when the TextSecure process is created.
|
||||||
*
|
*
|
||||||
@ -39,9 +45,10 @@ import java.util.List;
|
|||||||
*
|
*
|
||||||
* @author Moxie Marlinspike
|
* @author Moxie Marlinspike
|
||||||
*/
|
*/
|
||||||
public class ApplicationContext extends Application {
|
public class ApplicationContext extends Application implements DependencyInjector {
|
||||||
|
|
||||||
private JobManager jobManager;
|
private JobManager jobManager;
|
||||||
|
private ObjectGraph objectGraph;
|
||||||
|
|
||||||
public static ApplicationContext getInstance(Context context) {
|
public static ApplicationContext getInstance(Context context) {
|
||||||
return (ApplicationContext)context.getApplicationContext();
|
return (ApplicationContext)context.getApplicationContext();
|
||||||
@ -50,14 +57,23 @@ public class ApplicationContext extends Application {
|
|||||||
@Override
|
@Override
|
||||||
public void onCreate() {
|
public void onCreate() {
|
||||||
initializeRandomNumberFix();
|
initializeRandomNumberFix();
|
||||||
|
initializeDependencyInjection();
|
||||||
initializeJobManager();
|
initializeJobManager();
|
||||||
initializeGcmCheck();
|
initializeGcmCheck();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void injectDependencies(Object object) {
|
||||||
|
if (object instanceof InjectableType) {
|
||||||
|
objectGraph.inject(object);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
public JobManager getJobManager() {
|
public JobManager getJobManager() {
|
||||||
return jobManager;
|
return jobManager;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
private void initializeRandomNumberFix() {
|
private void initializeRandomNumberFix() {
|
||||||
PRNGFixes.apply();
|
PRNGFixes.apply();
|
||||||
}
|
}
|
||||||
@ -68,10 +84,15 @@ public class ApplicationContext extends Application {
|
|||||||
add(new MasterSecretRequirementProvider(ApplicationContext.this));
|
add(new MasterSecretRequirementProvider(ApplicationContext.this));
|
||||||
}};
|
}};
|
||||||
|
|
||||||
this.jobManager = new JobManager(this, "TextSecureJobs", providers,
|
this.jobManager = new JobManager(this, "TextSecureJobs", providers, this,
|
||||||
new EncryptingJobSerializer(this), 5);
|
new EncryptingJobSerializer(this), 5);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private void initializeDependencyInjection() {
|
||||||
|
this.objectGraph = ObjectGraph.create(new TextSecureCommunicationModule(this),
|
||||||
|
new AxolotlStorageModule(this));
|
||||||
|
}
|
||||||
|
|
||||||
private void initializeGcmCheck() {
|
private void initializeGcmCheck() {
|
||||||
if (TextSecurePreferences.isPushRegistered(this) &&
|
if (TextSecurePreferences.isPushRegistered(this) &&
|
||||||
TextSecurePreferences.getGcmRegistrationId(this) == null)
|
TextSecurePreferences.getGcmRegistrationId(this) == null)
|
||||||
|
@ -0,0 +1,34 @@
|
|||||||
|
package org.thoughtcrime.securesms.dependencies;
|
||||||
|
|
||||||
|
import android.content.Context;
|
||||||
|
|
||||||
|
import org.thoughtcrime.securesms.crypto.MasterSecret;
|
||||||
|
import org.thoughtcrime.securesms.crypto.storage.TextSecureAxolotlStore;
|
||||||
|
import org.thoughtcrime.securesms.jobs.CleanPreKeysJob;
|
||||||
|
import org.whispersystems.libaxolotl.state.SignedPreKeyStore;
|
||||||
|
|
||||||
|
import dagger.Module;
|
||||||
|
import dagger.Provides;
|
||||||
|
|
||||||
|
@Module (complete = false, injects = {CleanPreKeysJob.class})
|
||||||
|
public class AxolotlStorageModule {
|
||||||
|
|
||||||
|
private final Context context;
|
||||||
|
|
||||||
|
public AxolotlStorageModule(Context context) {
|
||||||
|
this.context = context;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Provides SignedPreKeyStoreFactory provideSignedPreKeyStoreFactory() {
|
||||||
|
return new SignedPreKeyStoreFactory() {
|
||||||
|
@Override
|
||||||
|
public SignedPreKeyStore create(MasterSecret masterSecret) {
|
||||||
|
return new TextSecureAxolotlStore(context, masterSecret);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
public static interface SignedPreKeyStoreFactory {
|
||||||
|
public SignedPreKeyStore create(MasterSecret masterSecret);
|
||||||
|
}
|
||||||
|
}
|
@ -0,0 +1,4 @@
|
|||||||
|
package org.thoughtcrime.securesms.dependencies;
|
||||||
|
|
||||||
|
public interface InjectableType {
|
||||||
|
}
|
@ -0,0 +1,77 @@
|
|||||||
|
package org.thoughtcrime.securesms.dependencies;
|
||||||
|
|
||||||
|
import android.content.Context;
|
||||||
|
|
||||||
|
import org.thoughtcrime.securesms.Release;
|
||||||
|
import org.thoughtcrime.securesms.crypto.MasterSecret;
|
||||||
|
import org.thoughtcrime.securesms.crypto.storage.TextSecureAxolotlStore;
|
||||||
|
import org.thoughtcrime.securesms.jobs.AttachmentDownloadJob;
|
||||||
|
import org.thoughtcrime.securesms.jobs.AvatarDownloadJob;
|
||||||
|
import org.thoughtcrime.securesms.jobs.CleanPreKeysJob;
|
||||||
|
import org.thoughtcrime.securesms.jobs.CreateSignedPreKeyJob;
|
||||||
|
import org.thoughtcrime.securesms.jobs.DeliveryReceiptJob;
|
||||||
|
import org.thoughtcrime.securesms.jobs.PushGroupSendJob;
|
||||||
|
import org.thoughtcrime.securesms.jobs.PushMediaSendJob;
|
||||||
|
import org.thoughtcrime.securesms.jobs.PushTextSendJob;
|
||||||
|
import org.thoughtcrime.securesms.jobs.RefreshPreKeysJob;
|
||||||
|
import org.thoughtcrime.securesms.push.SecurityEventListener;
|
||||||
|
import org.thoughtcrime.securesms.push.TextSecurePushTrustStore;
|
||||||
|
import org.thoughtcrime.securesms.util.TextSecurePreferences;
|
||||||
|
import org.whispersystems.libaxolotl.util.guava.Optional;
|
||||||
|
import org.whispersystems.textsecure.api.TextSecureAccountManager;
|
||||||
|
import org.whispersystems.textsecure.api.TextSecureMessageReceiver;
|
||||||
|
import org.whispersystems.textsecure.api.TextSecureMessageSender;
|
||||||
|
|
||||||
|
import dagger.Module;
|
||||||
|
import dagger.Provides;
|
||||||
|
|
||||||
|
@Module(complete = false, injects = {CleanPreKeysJob.class,
|
||||||
|
CreateSignedPreKeyJob.class,
|
||||||
|
DeliveryReceiptJob.class,
|
||||||
|
PushGroupSendJob.class,
|
||||||
|
PushTextSendJob.class,
|
||||||
|
PushMediaSendJob.class,
|
||||||
|
AttachmentDownloadJob.class,
|
||||||
|
RefreshPreKeysJob.class})
|
||||||
|
public class TextSecureCommunicationModule {
|
||||||
|
|
||||||
|
private final Context context;
|
||||||
|
|
||||||
|
public TextSecureCommunicationModule(Context context) {
|
||||||
|
this.context = context;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Provides TextSecureAccountManager provideTextSecureAccountManager() {
|
||||||
|
return new TextSecureAccountManager(Release.PUSH_URL,
|
||||||
|
new TextSecurePushTrustStore(context),
|
||||||
|
TextSecurePreferences.getLocalNumber(context),
|
||||||
|
TextSecurePreferences.getPushServerPassword(context));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Provides TextSecureMessageSenderFactory provideTextSecureMessageSenderFactory() {
|
||||||
|
return new TextSecureMessageSenderFactory() {
|
||||||
|
@Override
|
||||||
|
public TextSecureMessageSender create(MasterSecret masterSecret) {
|
||||||
|
return new TextSecureMessageSender(Release.PUSH_URL,
|
||||||
|
new TextSecurePushTrustStore(context),
|
||||||
|
TextSecurePreferences.getLocalNumber(context),
|
||||||
|
TextSecurePreferences.getPushServerPassword(context),
|
||||||
|
new TextSecureAxolotlStore(context, masterSecret),
|
||||||
|
Optional.of((TextSecureMessageSender.EventListener)
|
||||||
|
new SecurityEventListener(context)));
|
||||||
|
}
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
@Provides TextSecureMessageReceiver provideTextSecureMessageReceiver() {
|
||||||
|
return new TextSecureMessageReceiver(Release.PUSH_URL,
|
||||||
|
new TextSecurePushTrustStore(context),
|
||||||
|
TextSecurePreferences.getLocalNumber(context),
|
||||||
|
TextSecurePreferences.getPushServerPassword(context));
|
||||||
|
}
|
||||||
|
|
||||||
|
public static interface TextSecureMessageSenderFactory {
|
||||||
|
public TextSecureMessageSender create(MasterSecret masterSecret);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@ -9,8 +9,8 @@ import org.thoughtcrime.securesms.crypto.MasterSecret;
|
|||||||
import org.thoughtcrime.securesms.database.DatabaseFactory;
|
import org.thoughtcrime.securesms.database.DatabaseFactory;
|
||||||
import org.thoughtcrime.securesms.database.EncryptingPartDatabase;
|
import org.thoughtcrime.securesms.database.EncryptingPartDatabase;
|
||||||
import org.thoughtcrime.securesms.database.PartDatabase;
|
import org.thoughtcrime.securesms.database.PartDatabase;
|
||||||
|
import org.thoughtcrime.securesms.dependencies.InjectableType;
|
||||||
import org.thoughtcrime.securesms.jobs.requirements.MasterSecretRequirement;
|
import org.thoughtcrime.securesms.jobs.requirements.MasterSecretRequirement;
|
||||||
import org.thoughtcrime.securesms.push.TextSecureCommunicationFactory;
|
|
||||||
import org.thoughtcrime.securesms.util.Util;
|
import org.thoughtcrime.securesms.util.Util;
|
||||||
import org.whispersystems.jobqueue.JobParameters;
|
import org.whispersystems.jobqueue.JobParameters;
|
||||||
import org.whispersystems.jobqueue.requirements.NetworkRequirement;
|
import org.whispersystems.jobqueue.requirements.NetworkRequirement;
|
||||||
@ -26,13 +26,17 @@ import java.io.IOException;
|
|||||||
import java.io.InputStream;
|
import java.io.InputStream;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
|
import javax.inject.Inject;
|
||||||
|
|
||||||
import ws.com.google.android.mms.MmsException;
|
import ws.com.google.android.mms.MmsException;
|
||||||
import ws.com.google.android.mms.pdu.PduPart;
|
import ws.com.google.android.mms.pdu.PduPart;
|
||||||
|
|
||||||
public class AttachmentDownloadJob extends MasterSecretJob {
|
public class AttachmentDownloadJob extends MasterSecretJob implements InjectableType {
|
||||||
|
|
||||||
private static final String TAG = AttachmentDownloadJob.class.getSimpleName();
|
private static final String TAG = AttachmentDownloadJob.class.getSimpleName();
|
||||||
|
|
||||||
|
@Inject transient TextSecureMessageReceiver messageReceiver;
|
||||||
|
|
||||||
private final long messageId;
|
private final long messageId;
|
||||||
|
|
||||||
public AttachmentDownloadJob(Context context, long messageId) {
|
public AttachmentDownloadJob(Context context, long messageId) {
|
||||||
@ -49,9 +53,8 @@ public class AttachmentDownloadJob extends MasterSecretJob {
|
|||||||
public void onAdded() {}
|
public void onAdded() {}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onRun() throws RequirementNotMetException, IOException {
|
public void onRun(MasterSecret masterSecret) throws IOException {
|
||||||
MasterSecret masterSecret = getMasterSecret();
|
PartDatabase database = DatabaseFactory.getEncryptingPartDatabase(context, masterSecret);
|
||||||
PartDatabase database = DatabaseFactory.getEncryptingPartDatabase(context, masterSecret);
|
|
||||||
|
|
||||||
Log.w(TAG, "Downloading push parts for: " + messageId);
|
Log.w(TAG, "Downloading push parts for: " + messageId);
|
||||||
|
|
||||||
@ -65,23 +68,17 @@ public class AttachmentDownloadJob extends MasterSecretJob {
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onCanceled() {
|
public void onCanceled() {
|
||||||
try {
|
PartDatabase database = DatabaseFactory.getPartDatabase(context);
|
||||||
MasterSecret masterSecret = getMasterSecret();
|
List<Pair<Long, PduPart>> parts = database.getParts(messageId, false);
|
||||||
PartDatabase database = DatabaseFactory.getEncryptingPartDatabase(context, masterSecret);
|
|
||||||
List<Pair<Long, PduPart>> parts = database.getParts(messageId, false);
|
|
||||||
|
|
||||||
for (Pair<Long, PduPart> partPair : parts) {
|
for (Pair<Long, PduPart> partPair : parts) {
|
||||||
markFailed(masterSecret, messageId, partPair.second, partPair.first);
|
markFailed(messageId, partPair.second, partPair.first);
|
||||||
}
|
|
||||||
} catch (RequirementNotMetException e) {
|
|
||||||
Log.w(TAG, e);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean onShouldRetry(Throwable throwable) {
|
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||||
if (throwable instanceof PushNetworkException) return true;
|
if (throwable instanceof PushNetworkException) return true;
|
||||||
if (throwable instanceof RequirementNotMetException) return true;
|
|
||||||
|
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
@ -89,7 +86,6 @@ public class AttachmentDownloadJob extends MasterSecretJob {
|
|||||||
private void retrievePart(MasterSecret masterSecret, PduPart part, long messageId, long partId)
|
private void retrievePart(MasterSecret masterSecret, PduPart part, long messageId, long partId)
|
||||||
throws IOException
|
throws IOException
|
||||||
{
|
{
|
||||||
TextSecureMessageReceiver receiver = TextSecureCommunicationFactory.createReceiver(context, masterSecret);
|
|
||||||
EncryptingPartDatabase database = DatabaseFactory.getEncryptingPartDatabase(context, masterSecret);
|
EncryptingPartDatabase database = DatabaseFactory.getEncryptingPartDatabase(context, masterSecret);
|
||||||
File attachmentFile = null;
|
File attachmentFile = null;
|
||||||
|
|
||||||
@ -97,12 +93,12 @@ public class AttachmentDownloadJob extends MasterSecretJob {
|
|||||||
attachmentFile = createTempFile();
|
attachmentFile = createTempFile();
|
||||||
|
|
||||||
TextSecureAttachmentPointer pointer = createAttachmentPointer(masterSecret, part);
|
TextSecureAttachmentPointer pointer = createAttachmentPointer(masterSecret, part);
|
||||||
InputStream attachment = receiver.retrieveAttachment(pointer, attachmentFile);
|
InputStream attachment = messageReceiver.retrieveAttachment(pointer, attachmentFile);
|
||||||
|
|
||||||
database.updateDownloadedPart(messageId, partId, part, attachment);
|
database.updateDownloadedPart(messageId, partId, part, attachment);
|
||||||
} catch (InvalidPartException | NonSuccessfulResponseCodeException | InvalidMessageException | MmsException e) {
|
} catch (InvalidPartException | NonSuccessfulResponseCodeException | InvalidMessageException | MmsException e) {
|
||||||
Log.w(TAG, e);
|
Log.w(TAG, e);
|
||||||
markFailed(masterSecret, messageId, part, partId);
|
markFailed(messageId, part, partId);
|
||||||
} finally {
|
} finally {
|
||||||
if (attachmentFile != null)
|
if (attachmentFile != null)
|
||||||
attachmentFile.delete();
|
attachmentFile.delete();
|
||||||
@ -140,9 +136,9 @@ public class AttachmentDownloadJob extends MasterSecretJob {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private void markFailed(MasterSecret masterSecret, long messageId, PduPart part, long partId) {
|
private void markFailed(long messageId, PduPart part, long partId) {
|
||||||
try {
|
try {
|
||||||
EncryptingPartDatabase database = DatabaseFactory.getEncryptingPartDatabase(context, masterSecret);
|
PartDatabase database = DatabaseFactory.getPartDatabase(context);
|
||||||
database.updateFailedDownloadedPart(messageId, partId, part);
|
database.updateFailedDownloadedPart(messageId, partId, part);
|
||||||
} catch (MmsException e) {
|
} catch (MmsException e) {
|
||||||
Log.w(TAG, e);
|
Log.w(TAG, e);
|
||||||
|
@ -5,6 +5,7 @@ import android.graphics.Bitmap;
|
|||||||
import android.util.Log;
|
import android.util.Log;
|
||||||
|
|
||||||
import org.thoughtcrime.securesms.Release;
|
import org.thoughtcrime.securesms.Release;
|
||||||
|
import org.thoughtcrime.securesms.crypto.MasterSecret;
|
||||||
import org.thoughtcrime.securesms.database.DatabaseFactory;
|
import org.thoughtcrime.securesms.database.DatabaseFactory;
|
||||||
import org.thoughtcrime.securesms.database.GroupDatabase;
|
import org.thoughtcrime.securesms.database.GroupDatabase;
|
||||||
import org.thoughtcrime.securesms.jobs.requirements.MasterSecretRequirement;
|
import org.thoughtcrime.securesms.jobs.requirements.MasterSecretRequirement;
|
||||||
@ -47,7 +48,7 @@ public class AvatarDownloadJob extends MasterSecretJob {
|
|||||||
public void onAdded() {}
|
public void onAdded() {}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onRun() throws IOException {
|
public void onRun(MasterSecret masterSecret) throws IOException {
|
||||||
GroupDatabase database = DatabaseFactory.getGroupDatabase(context);
|
GroupDatabase database = DatabaseFactory.getGroupDatabase(context);
|
||||||
GroupDatabase.GroupRecord record = database.getGroup(groupId);
|
GroupDatabase.GroupRecord record = database.getGroup(groupId);
|
||||||
File attachment = null;
|
File attachment = null;
|
||||||
@ -90,7 +91,7 @@ public class AvatarDownloadJob extends MasterSecretJob {
|
|||||||
public void onCanceled() {}
|
public void onCanceled() {}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean onShouldRetry(Throwable throwable) {
|
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||||
if (throwable instanceof IOException) return true;
|
if (throwable instanceof IOException) return true;
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
@ -4,10 +4,8 @@ import android.content.Context;
|
|||||||
import android.util.Log;
|
import android.util.Log;
|
||||||
|
|
||||||
import org.thoughtcrime.securesms.crypto.MasterSecret;
|
import org.thoughtcrime.securesms.crypto.MasterSecret;
|
||||||
import org.thoughtcrime.securesms.crypto.storage.TextSecureAxolotlStore;
|
import org.thoughtcrime.securesms.dependencies.InjectableType;
|
||||||
import org.thoughtcrime.securesms.jobs.requirements.MasterSecretRequirement;
|
import org.thoughtcrime.securesms.jobs.requirements.MasterSecretRequirement;
|
||||||
import org.thoughtcrime.securesms.push.TextSecureCommunicationFactory;
|
|
||||||
import org.thoughtcrime.securesms.util.VisibleForTesting;
|
|
||||||
import org.whispersystems.jobqueue.JobParameters;
|
import org.whispersystems.jobqueue.JobParameters;
|
||||||
import org.whispersystems.libaxolotl.InvalidKeyIdException;
|
import org.whispersystems.libaxolotl.InvalidKeyIdException;
|
||||||
import org.whispersystems.libaxolotl.state.SignedPreKeyRecord;
|
import org.whispersystems.libaxolotl.state.SignedPreKeyRecord;
|
||||||
@ -20,17 +18,23 @@ import org.whispersystems.textsecure.push.exceptions.PushNetworkException;
|
|||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.util.Collections;
|
import java.util.Collections;
|
||||||
import java.util.Comparator;
|
import java.util.Comparator;
|
||||||
import java.util.Iterator;
|
|
||||||
import java.util.LinkedList;
|
import java.util.LinkedList;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.concurrent.TimeUnit;
|
import java.util.concurrent.TimeUnit;
|
||||||
|
|
||||||
public class CleanPreKeysJob extends MasterSecretJob {
|
import javax.inject.Inject;
|
||||||
|
|
||||||
|
import static org.thoughtcrime.securesms.dependencies.AxolotlStorageModule.SignedPreKeyStoreFactory;
|
||||||
|
|
||||||
|
public class CleanPreKeysJob extends MasterSecretJob implements InjectableType {
|
||||||
|
|
||||||
private static final String TAG = CleanPreKeysJob.class.getSimpleName();
|
private static final String TAG = CleanPreKeysJob.class.getSimpleName();
|
||||||
|
|
||||||
private static final int ARCHIVE_AGE_DAYS = 15;
|
private static final int ARCHIVE_AGE_DAYS = 15;
|
||||||
|
|
||||||
|
@Inject transient TextSecureAccountManager accountManager;
|
||||||
|
@Inject transient SignedPreKeyStoreFactory signedPreKeyStoreFactory;
|
||||||
|
|
||||||
public CleanPreKeysJob(Context context) {
|
public CleanPreKeysJob(Context context) {
|
||||||
super(context, JobParameters.newBuilder()
|
super(context, JobParameters.newBuilder()
|
||||||
.withGroupId(CleanPreKeysJob.class.getSimpleName())
|
.withGroupId(CleanPreKeysJob.class.getSimpleName())
|
||||||
@ -45,40 +49,33 @@ public class CleanPreKeysJob extends MasterSecretJob {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onRun() throws RequirementNotMetException, IOException {
|
public void onRun(MasterSecret masterSecret) throws IOException {
|
||||||
try {
|
try {
|
||||||
MasterSecret masterSecret = getMasterSecret();
|
SignedPreKeyStore signedPreKeyStore = signedPreKeyStoreFactory.create(masterSecret);
|
||||||
SignedPreKeyStore signedPreKeyStore = createSignedPreKeyStore(context, masterSecret);
|
|
||||||
TextSecureAccountManager accountManager = createAccountManager(context);
|
|
||||||
|
|
||||||
SignedPreKeyEntity currentSignedPreKey = accountManager.getSignedPreKey();
|
SignedPreKeyEntity currentSignedPreKey = accountManager.getSignedPreKey();
|
||||||
|
|
||||||
if (currentSignedPreKey == null) return;
|
if (currentSignedPreKey == null) return;
|
||||||
|
|
||||||
SignedPreKeyRecord currentRecord = signedPreKeyStore.loadSignedPreKey(currentSignedPreKey.getKeyId());
|
SignedPreKeyRecord currentRecord = signedPreKeyStore.loadSignedPreKey(currentSignedPreKey.getKeyId());
|
||||||
List<SignedPreKeyRecord> allRecords = signedPreKeyStore.loadSignedPreKeys();
|
List<SignedPreKeyRecord> allRecords = signedPreKeyStore.loadSignedPreKeys();
|
||||||
List<SignedPreKeyRecord> oldRecords = removeRecordFrom(currentRecord, allRecords);
|
LinkedList<SignedPreKeyRecord> oldRecords = removeRecordFrom(currentRecord, allRecords);
|
||||||
|
|
||||||
Collections.sort(oldRecords, new SignedPreKeySorter());
|
Collections.sort(oldRecords, new SignedPreKeySorter());
|
||||||
|
|
||||||
Log.w(TAG, "Old signed prekey record count: " + oldRecords.size());
|
Log.w(TAG, "Old signed prekey record count: " + oldRecords.size());
|
||||||
|
|
||||||
if (oldRecords.size() < 2) {
|
boolean foundAgedRecord = false;
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
SignedPreKeyRecord latestRecord = oldRecords.get(0);
|
for (SignedPreKeyRecord oldRecord : oldRecords) {
|
||||||
long latestRecordArchiveDuration = System.currentTimeMillis() - latestRecord.getTimestamp();
|
long archiveDuration = System.currentTimeMillis() - oldRecord.getTimestamp();
|
||||||
|
|
||||||
if (latestRecordArchiveDuration >= TimeUnit.DAYS.toMillis(ARCHIVE_AGE_DAYS)) {
|
if (archiveDuration >= TimeUnit.DAYS.toMillis(ARCHIVE_AGE_DAYS)) {
|
||||||
Iterator<SignedPreKeyRecord> iterator = oldRecords.iterator();
|
if (!foundAgedRecord) {
|
||||||
iterator.next();
|
foundAgedRecord = true;
|
||||||
|
} else {
|
||||||
while (iterator.hasNext()) {
|
Log.w(TAG, "Removing signed prekey record: " + oldRecord.getId() + " with timestamp: " + oldRecord.getTimestamp());
|
||||||
SignedPreKeyRecord expiredRecord = iterator.next();
|
signedPreKeyStore.removeSignedPreKey(oldRecord.getId());
|
||||||
Log.w(TAG, "Removing signed prekey record: " + expiredRecord.getId() + " with timestamp: " + expiredRecord.getTimestamp());
|
}
|
||||||
|
|
||||||
signedPreKeyStore.removeSignedPreKey(expiredRecord.getId());
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} catch (InvalidKeyIdException e) {
|
} catch (InvalidKeyIdException e) {
|
||||||
@ -87,8 +84,7 @@ public class CleanPreKeysJob extends MasterSecretJob {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean onShouldRetry(Throwable throwable) {
|
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||||
if (throwable instanceof RequirementNotMetException) return true;
|
|
||||||
if (throwable instanceof NonSuccessfulResponseCodeException) return false;
|
if (throwable instanceof NonSuccessfulResponseCodeException) return false;
|
||||||
if (throwable instanceof PushNetworkException) return true;
|
if (throwable instanceof PushNetworkException) return true;
|
||||||
return false;
|
return false;
|
||||||
@ -99,11 +95,11 @@ public class CleanPreKeysJob extends MasterSecretJob {
|
|||||||
Log.w(TAG, "Failed to execute clean signed prekeys task.");
|
Log.w(TAG, "Failed to execute clean signed prekeys task.");
|
||||||
}
|
}
|
||||||
|
|
||||||
private List<SignedPreKeyRecord> removeRecordFrom(SignedPreKeyRecord currentRecord,
|
private LinkedList<SignedPreKeyRecord> removeRecordFrom(SignedPreKeyRecord currentRecord,
|
||||||
List<SignedPreKeyRecord> records)
|
List<SignedPreKeyRecord> records)
|
||||||
|
|
||||||
{
|
{
|
||||||
List<SignedPreKeyRecord> others = new LinkedList<>();
|
LinkedList<SignedPreKeyRecord> others = new LinkedList<>();
|
||||||
|
|
||||||
for (SignedPreKeyRecord record : records) {
|
for (SignedPreKeyRecord record : records) {
|
||||||
if (record.getId() != currentRecord.getId()) {
|
if (record.getId() != currentRecord.getId()) {
|
||||||
@ -114,20 +110,11 @@ public class CleanPreKeysJob extends MasterSecretJob {
|
|||||||
return others;
|
return others;
|
||||||
}
|
}
|
||||||
|
|
||||||
@VisibleForTesting
|
|
||||||
protected TextSecureAccountManager createAccountManager(Context context) {
|
|
||||||
return TextSecureCommunicationFactory.createManager(context);
|
|
||||||
}
|
|
||||||
|
|
||||||
protected SignedPreKeyStore createSignedPreKeyStore(Context context, MasterSecret masterSecret) {
|
|
||||||
return new TextSecureAxolotlStore(context, masterSecret);
|
|
||||||
}
|
|
||||||
|
|
||||||
private static class SignedPreKeySorter implements Comparator<SignedPreKeyRecord> {
|
private static class SignedPreKeySorter implements Comparator<SignedPreKeyRecord> {
|
||||||
@Override
|
@Override
|
||||||
public int compare(SignedPreKeyRecord lhs, SignedPreKeyRecord rhs) {
|
public int compare(SignedPreKeyRecord lhs, SignedPreKeyRecord rhs) {
|
||||||
if (lhs.getTimestamp() < rhs.getTimestamp()) return -1;
|
if (lhs.getTimestamp() > rhs.getTimestamp()) return -1;
|
||||||
else if (lhs.getTimestamp() > rhs.getTimestamp()) return 1;
|
else if (lhs.getTimestamp() < rhs.getTimestamp()) return 1;
|
||||||
else return 0;
|
else return 0;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -6,6 +6,7 @@ import android.util.Log;
|
|||||||
import org.thoughtcrime.securesms.crypto.IdentityKeyUtil;
|
import org.thoughtcrime.securesms.crypto.IdentityKeyUtil;
|
||||||
import org.thoughtcrime.securesms.crypto.MasterSecret;
|
import org.thoughtcrime.securesms.crypto.MasterSecret;
|
||||||
import org.thoughtcrime.securesms.crypto.PreKeyUtil;
|
import org.thoughtcrime.securesms.crypto.PreKeyUtil;
|
||||||
|
import org.thoughtcrime.securesms.dependencies.InjectableType;
|
||||||
import org.thoughtcrime.securesms.push.TextSecureCommunicationFactory;
|
import org.thoughtcrime.securesms.push.TextSecureCommunicationFactory;
|
||||||
import org.thoughtcrime.securesms.util.ParcelUtil;
|
import org.thoughtcrime.securesms.util.ParcelUtil;
|
||||||
import org.thoughtcrime.securesms.util.TextSecurePreferences;
|
import org.thoughtcrime.securesms.util.TextSecurePreferences;
|
||||||
@ -15,13 +16,18 @@ import org.whispersystems.jobqueue.requirements.NetworkRequirement;
|
|||||||
import org.whispersystems.libaxolotl.IdentityKeyPair;
|
import org.whispersystems.libaxolotl.IdentityKeyPair;
|
||||||
import org.whispersystems.libaxolotl.state.SignedPreKeyRecord;
|
import org.whispersystems.libaxolotl.state.SignedPreKeyRecord;
|
||||||
import org.whispersystems.textsecure.api.TextSecureAccountManager;
|
import org.whispersystems.textsecure.api.TextSecureAccountManager;
|
||||||
|
import org.whispersystems.textsecure.push.exceptions.PushNetworkException;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
|
|
||||||
public class CreateSignedPreKeyJob extends ContextJob {
|
import javax.inject.Inject;
|
||||||
|
|
||||||
|
public class CreateSignedPreKeyJob extends ContextJob implements InjectableType {
|
||||||
|
|
||||||
private static final String TAG = CreateSignedPreKeyJob.class.getSimpleName();
|
private static final String TAG = CreateSignedPreKeyJob.class.getSimpleName();
|
||||||
|
|
||||||
|
@Inject transient TextSecureAccountManager accountManager;
|
||||||
|
|
||||||
public CreateSignedPreKeyJob(Context context, MasterSecret masterSecret) {
|
public CreateSignedPreKeyJob(Context context, MasterSecret masterSecret) {
|
||||||
super(context, JobParameters.newBuilder()
|
super(context, JobParameters.newBuilder()
|
||||||
.withPersistence()
|
.withPersistence()
|
||||||
@ -35,7 +41,7 @@ public class CreateSignedPreKeyJob extends ContextJob {
|
|||||||
public void onAdded() {}
|
public void onAdded() {}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onRun() throws Throwable {
|
public void onRun() throws IOException {
|
||||||
MasterSecret masterSecret = ParcelUtil.deserialize(getEncryptionKeys().getEncoded(), MasterSecret.CREATOR);
|
MasterSecret masterSecret = ParcelUtil.deserialize(getEncryptionKeys().getEncoded(), MasterSecret.CREATOR);
|
||||||
|
|
||||||
if (TextSecurePreferences.isSignedPreKeyRegistered(context)) {
|
if (TextSecurePreferences.isSignedPreKeyRegistered(context)) {
|
||||||
@ -43,9 +49,8 @@ public class CreateSignedPreKeyJob extends ContextJob {
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
IdentityKeyPair identityKeyPair = IdentityKeyUtil.getIdentityKeyPair(context, masterSecret);
|
IdentityKeyPair identityKeyPair = IdentityKeyUtil.getIdentityKeyPair(context, masterSecret);
|
||||||
SignedPreKeyRecord signedPreKeyRecord = PreKeyUtil.generateSignedPreKey(context, masterSecret, identityKeyPair);
|
SignedPreKeyRecord signedPreKeyRecord = PreKeyUtil.generateSignedPreKey(context, masterSecret, identityKeyPair);
|
||||||
TextSecureAccountManager accountManager = TextSecureCommunicationFactory.createManager(context);
|
|
||||||
|
|
||||||
accountManager.setSignedPreKey(signedPreKeyRecord);
|
accountManager.setSignedPreKey(signedPreKeyRecord);
|
||||||
TextSecurePreferences.setSignedPreKeyRegistered(context, true);
|
TextSecurePreferences.setSignedPreKeyRegistered(context, true);
|
||||||
@ -56,11 +61,7 @@ public class CreateSignedPreKeyJob extends ContextJob {
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean onShouldRetry(Throwable throwable) {
|
public boolean onShouldRetry(Throwable throwable) {
|
||||||
if (throwable instanceof IOException) {
|
if (throwable instanceof PushNetworkException) return true;
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
Log.w(TAG, throwable);
|
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -4,6 +4,8 @@ import android.content.Context;
|
|||||||
import android.util.Log;
|
import android.util.Log;
|
||||||
|
|
||||||
import org.thoughtcrime.securesms.Release;
|
import org.thoughtcrime.securesms.Release;
|
||||||
|
import org.thoughtcrime.securesms.dependencies.InjectableType;
|
||||||
|
import org.thoughtcrime.securesms.dependencies.TextSecureCommunicationModule;
|
||||||
import org.thoughtcrime.securesms.push.TextSecurePushTrustStore;
|
import org.thoughtcrime.securesms.push.TextSecurePushTrustStore;
|
||||||
import org.thoughtcrime.securesms.util.TextSecurePreferences;
|
import org.thoughtcrime.securesms.util.TextSecurePreferences;
|
||||||
import org.whispersystems.jobqueue.JobParameters;
|
import org.whispersystems.jobqueue.JobParameters;
|
||||||
@ -16,10 +18,16 @@ import org.whispersystems.textsecure.push.exceptions.PushNetworkException;
|
|||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
|
|
||||||
public class DeliveryReceiptJob extends ContextJob {
|
import javax.inject.Inject;
|
||||||
|
|
||||||
|
import static org.thoughtcrime.securesms.dependencies.TextSecureCommunicationModule.TextSecureMessageSenderFactory;
|
||||||
|
|
||||||
|
public class DeliveryReceiptJob extends ContextJob implements InjectableType {
|
||||||
|
|
||||||
private static final String TAG = DeliveryReceiptJob.class.getSimpleName();
|
private static final String TAG = DeliveryReceiptJob.class.getSimpleName();
|
||||||
|
|
||||||
|
@Inject transient TextSecureMessageSenderFactory messageSenderFactory;
|
||||||
|
|
||||||
private final String destination;
|
private final String destination;
|
||||||
private final long timestamp;
|
private final long timestamp;
|
||||||
private final String relay;
|
private final String relay;
|
||||||
@ -42,14 +50,9 @@ public class DeliveryReceiptJob extends ContextJob {
|
|||||||
@Override
|
@Override
|
||||||
public void onRun() throws IOException {
|
public void onRun() throws IOException {
|
||||||
Log.w("DeliveryReceiptJob", "Sending delivery receipt...");
|
Log.w("DeliveryReceiptJob", "Sending delivery receipt...");
|
||||||
TextSecureMessageSender messageSender =
|
TextSecureMessageSender messageSender = messageSenderFactory.create(null);
|
||||||
new TextSecureMessageSender(Release.PUSH_URL,
|
PushAddress pushAddress = new PushAddress(-1, destination, 1, relay);
|
||||||
new TextSecurePushTrustStore(context),
|
|
||||||
TextSecurePreferences.getLocalNumber(context),
|
|
||||||
TextSecurePreferences.getPushServerPassword(context),
|
|
||||||
null, Optional.<TextSecureMessageSender.EventListener>absent());
|
|
||||||
|
|
||||||
PushAddress pushAddress = new PushAddress(-1, destination, 1, relay);
|
|
||||||
messageSender.sendDeliveryReceipt(pushAddress, timestamp);
|
messageSender.sendDeliveryReceipt(pushAddress, timestamp);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -12,7 +12,22 @@ public abstract class MasterSecretJob extends ContextJob {
|
|||||||
super(context, parameters);
|
super(context, parameters);
|
||||||
}
|
}
|
||||||
|
|
||||||
protected MasterSecret getMasterSecret() throws RequirementNotMetException {
|
@Override
|
||||||
|
public void onRun() throws Throwable {
|
||||||
|
MasterSecret masterSecret = getMasterSecret();
|
||||||
|
onRun(masterSecret);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean onShouldRetry(Throwable throwable) {
|
||||||
|
if (throwable instanceof RequirementNotMetException) return true;
|
||||||
|
return onShouldRetryThrowable(throwable);
|
||||||
|
}
|
||||||
|
|
||||||
|
public abstract void onRun(MasterSecret masterSecret) throws Throwable;
|
||||||
|
public abstract boolean onShouldRetryThrowable(Throwable throwable);
|
||||||
|
|
||||||
|
private MasterSecret getMasterSecret() throws RequirementNotMetException {
|
||||||
MasterSecret masterSecret = KeyCachingService.getMasterSecret(context);
|
MasterSecret masterSecret = KeyCachingService.getMasterSecret(context);
|
||||||
|
|
||||||
if (masterSecret == null) throw new RequirementNotMetException();
|
if (masterSecret == null) throw new RequirementNotMetException();
|
||||||
|
@ -74,10 +74,9 @@ public class MmsDownloadJob extends MasterSecretJob {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onRun() throws RequirementNotMetException {
|
public void onRun(MasterSecret masterSecret) {
|
||||||
Log.w(TAG, "MmsDownloadJob:onRun()");
|
Log.w(TAG, "MmsDownloadJob:onRun()");
|
||||||
|
|
||||||
MasterSecret masterSecret = getMasterSecret();
|
|
||||||
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
||||||
Optional<NotificationInd> notification = database.getNotification(messageId);
|
Optional<NotificationInd> notification = database.getNotification(messageId);
|
||||||
|
|
||||||
@ -180,7 +179,7 @@ public class MmsDownloadJob extends MasterSecretJob {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean onShouldRetry(Throwable throwable) {
|
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -60,10 +60,9 @@ public class MmsSendJob extends MasterSecretJob {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onRun() throws RequirementNotMetException, MmsException, NoSuchMessageException {
|
public void onRun(MasterSecret masterSecret) throws MmsException, NoSuchMessageException {
|
||||||
MasterSecret masterSecret = getMasterSecret();
|
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
||||||
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
SendReq message = database.getOutgoingMessage(masterSecret, messageId);
|
||||||
SendReq message = database.getOutgoingMessage(masterSecret, messageId);
|
|
||||||
|
|
||||||
try {
|
try {
|
||||||
MmsSendResult result = deliver(masterSecret, message);
|
MmsSendResult result = deliver(masterSecret, message);
|
||||||
@ -85,8 +84,7 @@ public class MmsSendJob extends MasterSecretJob {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean onShouldRetry(Throwable throwable) {
|
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||||
if (throwable instanceof RequirementNotMetException) return true;
|
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -69,24 +69,22 @@ public class PushDecryptJob extends MasterSecretJob {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onRun() throws RequirementNotMetException, NoSuchMessageException {
|
public void onRun(MasterSecret masterSecret) throws NoSuchMessageException {
|
||||||
MasterSecret masterSecret = getMasterSecret();
|
PushDatabase database = DatabaseFactory.getPushDatabase(context);
|
||||||
PushDatabase database = DatabaseFactory.getPushDatabase(context);
|
TextSecureEnvelope envelope = database.get(messageId);
|
||||||
TextSecureEnvelope envelope = database.get(messageId);
|
|
||||||
|
|
||||||
handleMessage(masterSecret, envelope);
|
handleMessage(masterSecret, envelope);
|
||||||
database.delete(messageId);
|
database.delete(messageId);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onCanceled() {
|
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||||
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean onShouldRetry(Throwable throwable) {
|
public void onCanceled() {
|
||||||
if (throwable instanceof RequirementNotMetException) return true;
|
|
||||||
return false;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
private void handleMessage(MasterSecret masterSecret, TextSecureEnvelope envelope) {
|
private void handleMessage(MasterSecret masterSecret, TextSecureEnvelope envelope) {
|
||||||
|
@ -8,9 +8,9 @@ import org.thoughtcrime.securesms.database.DatabaseFactory;
|
|||||||
import org.thoughtcrime.securesms.database.MmsDatabase;
|
import org.thoughtcrime.securesms.database.MmsDatabase;
|
||||||
import org.thoughtcrime.securesms.database.MmsSmsColumns;
|
import org.thoughtcrime.securesms.database.MmsSmsColumns;
|
||||||
import org.thoughtcrime.securesms.database.NoSuchMessageException;
|
import org.thoughtcrime.securesms.database.NoSuchMessageException;
|
||||||
|
import org.thoughtcrime.securesms.dependencies.InjectableType;
|
||||||
import org.thoughtcrime.securesms.jobs.requirements.MasterSecretRequirement;
|
import org.thoughtcrime.securesms.jobs.requirements.MasterSecretRequirement;
|
||||||
import org.thoughtcrime.securesms.mms.PartParser;
|
import org.thoughtcrime.securesms.mms.PartParser;
|
||||||
import org.thoughtcrime.securesms.push.TextSecureCommunicationFactory;
|
|
||||||
import org.thoughtcrime.securesms.recipients.Recipient;
|
import org.thoughtcrime.securesms.recipients.Recipient;
|
||||||
import org.thoughtcrime.securesms.recipients.RecipientFormattingException;
|
import org.thoughtcrime.securesms.recipients.RecipientFormattingException;
|
||||||
import org.thoughtcrime.securesms.recipients.Recipients;
|
import org.thoughtcrime.securesms.recipients.Recipients;
|
||||||
@ -19,10 +19,10 @@ import org.thoughtcrime.securesms.util.GroupUtil;
|
|||||||
import org.whispersystems.jobqueue.JobParameters;
|
import org.whispersystems.jobqueue.JobParameters;
|
||||||
import org.whispersystems.jobqueue.requirements.NetworkRequirement;
|
import org.whispersystems.jobqueue.requirements.NetworkRequirement;
|
||||||
import org.whispersystems.textsecure.api.TextSecureMessageSender;
|
import org.whispersystems.textsecure.api.TextSecureMessageSender;
|
||||||
|
import org.whispersystems.textsecure.api.crypto.UntrustedIdentityException;
|
||||||
import org.whispersystems.textsecure.api.messages.TextSecureAttachment;
|
import org.whispersystems.textsecure.api.messages.TextSecureAttachment;
|
||||||
import org.whispersystems.textsecure.api.messages.TextSecureGroup;
|
import org.whispersystems.textsecure.api.messages.TextSecureGroup;
|
||||||
import org.whispersystems.textsecure.api.messages.TextSecureMessage;
|
import org.whispersystems.textsecure.api.messages.TextSecureMessage;
|
||||||
import org.whispersystems.textsecure.api.crypto.UntrustedIdentityException;
|
|
||||||
import org.whispersystems.textsecure.push.PushAddress;
|
import org.whispersystems.textsecure.push.PushAddress;
|
||||||
import org.whispersystems.textsecure.push.PushMessageProtos;
|
import org.whispersystems.textsecure.push.PushMessageProtos;
|
||||||
import org.whispersystems.textsecure.push.exceptions.EncapsulatedExceptions;
|
import org.whispersystems.textsecure.push.exceptions.EncapsulatedExceptions;
|
||||||
@ -33,13 +33,19 @@ import java.io.IOException;
|
|||||||
import java.util.LinkedList;
|
import java.util.LinkedList;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
|
import javax.inject.Inject;
|
||||||
|
|
||||||
import ws.com.google.android.mms.MmsException;
|
import ws.com.google.android.mms.MmsException;
|
||||||
import ws.com.google.android.mms.pdu.SendReq;
|
import ws.com.google.android.mms.pdu.SendReq;
|
||||||
|
|
||||||
public class PushGroupSendJob extends PushSendJob {
|
import static org.thoughtcrime.securesms.dependencies.TextSecureCommunicationModule.TextSecureMessageSenderFactory;
|
||||||
|
|
||||||
|
public class PushGroupSendJob extends PushSendJob implements InjectableType {
|
||||||
|
|
||||||
private static final String TAG = PushGroupSendJob.class.getSimpleName();
|
private static final String TAG = PushGroupSendJob.class.getSimpleName();
|
||||||
|
|
||||||
|
@Inject transient TextSecureMessageSenderFactory messageSenderFactory;
|
||||||
|
|
||||||
private final long messageId;
|
private final long messageId;
|
||||||
|
|
||||||
public PushGroupSendJob(Context context, long messageId, String destination) {
|
public PushGroupSendJob(Context context, long messageId, String destination) {
|
||||||
@ -60,10 +66,9 @@ public class PushGroupSendJob extends PushSendJob {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onRun() throws RequirementNotMetException, MmsException, IOException, NoSuchMessageException {
|
public void onRun(MasterSecret masterSecret) throws MmsException, IOException, NoSuchMessageException {
|
||||||
MasterSecret masterSecret = getMasterSecret();
|
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
||||||
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
SendReq message = database.getOutgoingMessage(masterSecret, messageId);
|
||||||
SendReq message = database.getOutgoingMessage(masterSecret, messageId);
|
|
||||||
|
|
||||||
try {
|
try {
|
||||||
deliver(masterSecret, message);
|
deliver(masterSecret, message);
|
||||||
@ -92,21 +97,20 @@ public class PushGroupSendJob extends PushSendJob {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onCanceled() {
|
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||||
DatabaseFactory.getMmsDatabase(context).markAsSentFailed(messageId);
|
if (throwable instanceof IOException) return true;
|
||||||
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean onShouldRetry(Throwable throwable) {
|
public void onCanceled() {
|
||||||
if (throwable instanceof RequirementNotMetException) return true;
|
DatabaseFactory.getMmsDatabase(context).markAsSentFailed(messageId);
|
||||||
if (throwable instanceof IOException) return true;
|
|
||||||
return false;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
private void deliver(MasterSecret masterSecret, SendReq message)
|
private void deliver(MasterSecret masterSecret, SendReq message)
|
||||||
throws IOException, RecipientFormattingException, InvalidNumberException, EncapsulatedExceptions
|
throws IOException, RecipientFormattingException, InvalidNumberException, EncapsulatedExceptions
|
||||||
{
|
{
|
||||||
TextSecureMessageSender messageSender = TextSecureCommunicationFactory.createSender(context, masterSecret);
|
TextSecureMessageSender messageSender = messageSenderFactory.create(masterSecret);
|
||||||
byte[] groupId = GroupUtil.getDecodedId(message.getTo()[0].getString());
|
byte[] groupId = GroupUtil.getDecodedId(message.getTo()[0].getString());
|
||||||
Recipients recipients = DatabaseFactory.getGroupDatabase(context).getGroupMembers(groupId, false);
|
Recipients recipients = DatabaseFactory.getGroupDatabase(context).getGroupMembers(groupId, false);
|
||||||
List<PushAddress> addresses = getPushAddresses(recipients);
|
List<PushAddress> addresses = getPushAddresses(recipients);
|
||||||
|
@ -9,8 +9,8 @@ import org.thoughtcrime.securesms.crypto.storage.TextSecureAxolotlStore;
|
|||||||
import org.thoughtcrime.securesms.database.DatabaseFactory;
|
import org.thoughtcrime.securesms.database.DatabaseFactory;
|
||||||
import org.thoughtcrime.securesms.database.MmsDatabase;
|
import org.thoughtcrime.securesms.database.MmsDatabase;
|
||||||
import org.thoughtcrime.securesms.database.NoSuchMessageException;
|
import org.thoughtcrime.securesms.database.NoSuchMessageException;
|
||||||
|
import org.thoughtcrime.securesms.dependencies.InjectableType;
|
||||||
import org.thoughtcrime.securesms.mms.PartParser;
|
import org.thoughtcrime.securesms.mms.PartParser;
|
||||||
import org.thoughtcrime.securesms.push.TextSecureCommunicationFactory;
|
|
||||||
import org.thoughtcrime.securesms.recipients.Recipient;
|
import org.thoughtcrime.securesms.recipients.Recipient;
|
||||||
import org.thoughtcrime.securesms.recipients.RecipientFactory;
|
import org.thoughtcrime.securesms.recipients.RecipientFactory;
|
||||||
import org.thoughtcrime.securesms.recipients.RecipientFormattingException;
|
import org.thoughtcrime.securesms.recipients.RecipientFormattingException;
|
||||||
@ -21,9 +21,9 @@ import org.thoughtcrime.securesms.transport.RetryLaterException;
|
|||||||
import org.thoughtcrime.securesms.transport.SecureFallbackApprovalException;
|
import org.thoughtcrime.securesms.transport.SecureFallbackApprovalException;
|
||||||
import org.whispersystems.libaxolotl.state.AxolotlStore;
|
import org.whispersystems.libaxolotl.state.AxolotlStore;
|
||||||
import org.whispersystems.textsecure.api.TextSecureMessageSender;
|
import org.whispersystems.textsecure.api.TextSecureMessageSender;
|
||||||
|
import org.whispersystems.textsecure.api.crypto.UntrustedIdentityException;
|
||||||
import org.whispersystems.textsecure.api.messages.TextSecureAttachment;
|
import org.whispersystems.textsecure.api.messages.TextSecureAttachment;
|
||||||
import org.whispersystems.textsecure.api.messages.TextSecureMessage;
|
import org.whispersystems.textsecure.api.messages.TextSecureMessage;
|
||||||
import org.whispersystems.textsecure.api.crypto.UntrustedIdentityException;
|
|
||||||
import org.whispersystems.textsecure.push.PushAddress;
|
import org.whispersystems.textsecure.push.PushAddress;
|
||||||
import org.whispersystems.textsecure.push.UnregisteredUserException;
|
import org.whispersystems.textsecure.push.UnregisteredUserException;
|
||||||
import org.whispersystems.textsecure.storage.RecipientDevice;
|
import org.whispersystems.textsecure.storage.RecipientDevice;
|
||||||
@ -32,13 +32,19 @@ import org.whispersystems.textsecure.util.InvalidNumberException;
|
|||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
|
import javax.inject.Inject;
|
||||||
|
|
||||||
import ws.com.google.android.mms.MmsException;
|
import ws.com.google.android.mms.MmsException;
|
||||||
import ws.com.google.android.mms.pdu.SendReq;
|
import ws.com.google.android.mms.pdu.SendReq;
|
||||||
|
|
||||||
public class PushMediaSendJob extends PushSendJob {
|
import static org.thoughtcrime.securesms.dependencies.TextSecureCommunicationModule.TextSecureMessageSenderFactory;
|
||||||
|
|
||||||
|
public class PushMediaSendJob extends PushSendJob implements InjectableType {
|
||||||
|
|
||||||
private static final String TAG = PushMediaSendJob.class.getSimpleName();
|
private static final String TAG = PushMediaSendJob.class.getSimpleName();
|
||||||
|
|
||||||
|
@Inject transient TextSecureMessageSenderFactory messageSenderFactory;
|
||||||
|
|
||||||
private final long messageId;
|
private final long messageId;
|
||||||
|
|
||||||
public PushMediaSendJob(Context context, long messageId, String destination) {
|
public PushMediaSendJob(Context context, long messageId, String destination) {
|
||||||
@ -52,12 +58,11 @@ public class PushMediaSendJob extends PushSendJob {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onRun()
|
public void onRun(MasterSecret masterSecret)
|
||||||
throws RequirementNotMetException, RetryLaterException, MmsException, NoSuchMessageException
|
throws RetryLaterException, MmsException, NoSuchMessageException
|
||||||
{
|
{
|
||||||
MasterSecret masterSecret = getMasterSecret();
|
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
||||||
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
SendReq message = database.getOutgoingMessage(masterSecret, messageId);
|
||||||
SendReq message = database.getOutgoingMessage(masterSecret, messageId);
|
|
||||||
|
|
||||||
try {
|
try {
|
||||||
deliver(masterSecret, message);
|
deliver(masterSecret, message);
|
||||||
@ -80,25 +85,25 @@ public class PushMediaSendJob extends PushSendJob {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||||
|
if (throwable instanceof RequirementNotMetException) return true;
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onCanceled() {
|
public void onCanceled() {
|
||||||
DatabaseFactory.getMmsDatabase(context).markAsSentFailed(messageId);
|
DatabaseFactory.getMmsDatabase(context).markAsSentFailed(messageId);
|
||||||
notifyMediaMessageDeliveryFailed(context, messageId);
|
notifyMediaMessageDeliveryFailed(context, messageId);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
public boolean onShouldRetry(Throwable throwable) {
|
|
||||||
if (throwable instanceof RetryLaterException) return true;
|
|
||||||
if (throwable instanceof RequirementNotMetException) return true;
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
private void deliver(MasterSecret masterSecret, SendReq message)
|
private void deliver(MasterSecret masterSecret, SendReq message)
|
||||||
throws RetryLaterException, SecureFallbackApprovalException,
|
throws RetryLaterException, SecureFallbackApprovalException,
|
||||||
InsecureFallbackApprovalException, UntrustedIdentityException
|
InsecureFallbackApprovalException, UntrustedIdentityException
|
||||||
{
|
{
|
||||||
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
MmsDatabase database = DatabaseFactory.getMmsDatabase(context);
|
||||||
TextSecureMessageSender messageSender = TextSecureCommunicationFactory.createSender(context, masterSecret);
|
TextSecureMessageSender messageSender = messageSenderFactory.create(masterSecret);
|
||||||
String destination = message.getTo()[0].getString();
|
String destination = message.getTo()[0].getString();
|
||||||
boolean isSmsFallbackSupported = isSmsFallbackSupported(context, destination);
|
boolean isSmsFallbackSupported = isSmsFallbackSupported(context, destination);
|
||||||
|
|
||||||
|
@ -10,8 +10,8 @@ import org.thoughtcrime.securesms.database.DatabaseFactory;
|
|||||||
import org.thoughtcrime.securesms.database.EncryptingSmsDatabase;
|
import org.thoughtcrime.securesms.database.EncryptingSmsDatabase;
|
||||||
import org.thoughtcrime.securesms.database.NoSuchMessageException;
|
import org.thoughtcrime.securesms.database.NoSuchMessageException;
|
||||||
import org.thoughtcrime.securesms.database.model.SmsMessageRecord;
|
import org.thoughtcrime.securesms.database.model.SmsMessageRecord;
|
||||||
|
import org.thoughtcrime.securesms.dependencies.InjectableType;
|
||||||
import org.thoughtcrime.securesms.notifications.MessageNotifier;
|
import org.thoughtcrime.securesms.notifications.MessageNotifier;
|
||||||
import org.thoughtcrime.securesms.push.TextSecureCommunicationFactory;
|
|
||||||
import org.thoughtcrime.securesms.recipients.Recipient;
|
import org.thoughtcrime.securesms.recipients.Recipient;
|
||||||
import org.thoughtcrime.securesms.recipients.Recipients;
|
import org.thoughtcrime.securesms.recipients.Recipients;
|
||||||
import org.thoughtcrime.securesms.sms.IncomingIdentityUpdateMessage;
|
import org.thoughtcrime.securesms.sms.IncomingIdentityUpdateMessage;
|
||||||
@ -20,8 +20,8 @@ import org.thoughtcrime.securesms.transport.RetryLaterException;
|
|||||||
import org.thoughtcrime.securesms.transport.SecureFallbackApprovalException;
|
import org.thoughtcrime.securesms.transport.SecureFallbackApprovalException;
|
||||||
import org.whispersystems.libaxolotl.state.AxolotlStore;
|
import org.whispersystems.libaxolotl.state.AxolotlStore;
|
||||||
import org.whispersystems.textsecure.api.TextSecureMessageSender;
|
import org.whispersystems.textsecure.api.TextSecureMessageSender;
|
||||||
import org.whispersystems.textsecure.api.messages.TextSecureMessage;
|
|
||||||
import org.whispersystems.textsecure.api.crypto.UntrustedIdentityException;
|
import org.whispersystems.textsecure.api.crypto.UntrustedIdentityException;
|
||||||
|
import org.whispersystems.textsecure.api.messages.TextSecureMessage;
|
||||||
import org.whispersystems.textsecure.push.PushAddress;
|
import org.whispersystems.textsecure.push.PushAddress;
|
||||||
import org.whispersystems.textsecure.push.UnregisteredUserException;
|
import org.whispersystems.textsecure.push.UnregisteredUserException;
|
||||||
import org.whispersystems.textsecure.storage.RecipientDevice;
|
import org.whispersystems.textsecure.storage.RecipientDevice;
|
||||||
@ -29,10 +29,16 @@ import org.whispersystems.textsecure.util.InvalidNumberException;
|
|||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
|
|
||||||
public class PushTextSendJob extends PushSendJob {
|
import javax.inject.Inject;
|
||||||
|
|
||||||
|
import static org.thoughtcrime.securesms.dependencies.TextSecureCommunicationModule.TextSecureMessageSenderFactory;
|
||||||
|
|
||||||
|
public class PushTextSendJob extends PushSendJob implements InjectableType {
|
||||||
|
|
||||||
private static final String TAG = PushTextSendJob.class.getSimpleName();
|
private static final String TAG = PushTextSendJob.class.getSimpleName();
|
||||||
|
|
||||||
|
@Inject transient TextSecureMessageSenderFactory messageSenderFactory;
|
||||||
|
|
||||||
private final long messageId;
|
private final long messageId;
|
||||||
|
|
||||||
public PushTextSendJob(Context context, long messageId, String destination) {
|
public PushTextSendJob(Context context, long messageId, String destination) {
|
||||||
@ -46,9 +52,7 @@ public class PushTextSendJob extends PushSendJob {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onRun() throws RequirementNotMetException, NoSuchMessageException, RetryLaterException
|
public void onRun(MasterSecret masterSecret) throws NoSuchMessageException, RetryLaterException {
|
||||||
{
|
|
||||||
MasterSecret masterSecret = getMasterSecret();
|
|
||||||
EncryptingSmsDatabase database = DatabaseFactory.getEncryptingSmsDatabase(context);
|
EncryptingSmsDatabase database = DatabaseFactory.getEncryptingSmsDatabase(context);
|
||||||
SmsMessageRecord record = database.getMessage(masterSecret, messageId);
|
SmsMessageRecord record = database.getMessage(masterSecret, messageId);
|
||||||
String destination = record.getIndividualRecipient().getNumber();
|
String destination = record.getIndividualRecipient().getNumber();
|
||||||
@ -77,7 +81,24 @@ public class PushTextSendJob extends PushSendJob {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public void deliver(MasterSecret masterSecret, SmsMessageRecord message, String destination)
|
@Override
|
||||||
|
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||||
|
if (throwable instanceof RetryLaterException) return true;
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onCanceled() {
|
||||||
|
DatabaseFactory.getSmsDatabase(context).markAsSentFailed(messageId);
|
||||||
|
|
||||||
|
long threadId = DatabaseFactory.getSmsDatabase(context).getThreadIdForMessage(messageId);
|
||||||
|
Recipients recipients = DatabaseFactory.getThreadDatabase(context).getRecipientsForThreadId(threadId);
|
||||||
|
|
||||||
|
MessageNotifier.notifyMessageDeliveryFailed(context, recipients, threadId);
|
||||||
|
}
|
||||||
|
|
||||||
|
private void deliver(MasterSecret masterSecret, SmsMessageRecord message, String destination)
|
||||||
throws UntrustedIdentityException, SecureFallbackApprovalException,
|
throws UntrustedIdentityException, SecureFallbackApprovalException,
|
||||||
InsecureFallbackApprovalException, RetryLaterException
|
InsecureFallbackApprovalException, RetryLaterException
|
||||||
{
|
{
|
||||||
@ -85,7 +106,7 @@ public class PushTextSendJob extends PushSendJob {
|
|||||||
|
|
||||||
try {
|
try {
|
||||||
PushAddress address = getPushAddress(message.getIndividualRecipient());
|
PushAddress address = getPushAddress(message.getIndividualRecipient());
|
||||||
TextSecureMessageSender messageSender = TextSecureCommunicationFactory.createSender(context, masterSecret);
|
TextSecureMessageSender messageSender = messageSenderFactory.create(masterSecret);
|
||||||
|
|
||||||
if (message.isEndSession()) {
|
if (message.isEndSession()) {
|
||||||
messageSender.sendMessage(address, new TextSecureMessage(message.getDateSent(), null,
|
messageSender.sendMessage(address, new TextSecureMessage(message.getDateSent(), null,
|
||||||
@ -105,24 +126,6 @@ public class PushTextSendJob extends PushSendJob {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
public boolean onShouldRetry(Throwable throwable) {
|
|
||||||
if (throwable instanceof RequirementNotMetException) return true;
|
|
||||||
if (throwable instanceof RetryLaterException) return true;
|
|
||||||
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void onCanceled() {
|
|
||||||
DatabaseFactory.getSmsDatabase(context).markAsSentFailed(messageId);
|
|
||||||
|
|
||||||
long threadId = DatabaseFactory.getSmsDatabase(context).getThreadIdForMessage(messageId);
|
|
||||||
Recipients recipients = DatabaseFactory.getThreadDatabase(context).getRecipientsForThreadId(threadId);
|
|
||||||
|
|
||||||
MessageNotifier.notifyMessageDeliveryFailed(context, recipients, threadId);
|
|
||||||
}
|
|
||||||
|
|
||||||
private void fallbackOrAskApproval(MasterSecret masterSecret, SmsMessageRecord smsMessage, String destination)
|
private void fallbackOrAskApproval(MasterSecret masterSecret, SmsMessageRecord smsMessage, String destination)
|
||||||
throws SecureFallbackApprovalException, InsecureFallbackApprovalException
|
throws SecureFallbackApprovalException, InsecureFallbackApprovalException
|
||||||
{
|
{
|
||||||
|
@ -3,9 +3,11 @@ package org.thoughtcrime.securesms.jobs;
|
|||||||
import android.content.Context;
|
import android.content.Context;
|
||||||
import android.util.Log;
|
import android.util.Log;
|
||||||
|
|
||||||
|
import org.thoughtcrime.securesms.ApplicationContext;
|
||||||
import org.thoughtcrime.securesms.crypto.IdentityKeyUtil;
|
import org.thoughtcrime.securesms.crypto.IdentityKeyUtil;
|
||||||
import org.thoughtcrime.securesms.crypto.MasterSecret;
|
import org.thoughtcrime.securesms.crypto.MasterSecret;
|
||||||
import org.thoughtcrime.securesms.crypto.PreKeyUtil;
|
import org.thoughtcrime.securesms.crypto.PreKeyUtil;
|
||||||
|
import org.thoughtcrime.securesms.dependencies.InjectableType;
|
||||||
import org.thoughtcrime.securesms.jobs.requirements.MasterSecretRequirement;
|
import org.thoughtcrime.securesms.jobs.requirements.MasterSecretRequirement;
|
||||||
import org.thoughtcrime.securesms.push.TextSecureCommunicationFactory;
|
import org.thoughtcrime.securesms.push.TextSecureCommunicationFactory;
|
||||||
import org.thoughtcrime.securesms.util.TextSecurePreferences;
|
import org.thoughtcrime.securesms.util.TextSecurePreferences;
|
||||||
@ -22,12 +24,16 @@ import org.whispersystems.textsecure.push.exceptions.PushNetworkException;
|
|||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
public class RefreshPreKeysJob extends MasterSecretJob {
|
import javax.inject.Inject;
|
||||||
|
|
||||||
|
public class RefreshPreKeysJob extends MasterSecretJob implements InjectableType {
|
||||||
|
|
||||||
private static final String TAG = RefreshPreKeysJob.class.getSimpleName();
|
private static final String TAG = RefreshPreKeysJob.class.getSimpleName();
|
||||||
|
|
||||||
private static final int PREKEY_MINIMUM = 10;
|
private static final int PREKEY_MINIMUM = 10;
|
||||||
|
|
||||||
|
@Inject transient TextSecureAccountManager accountManager;
|
||||||
|
|
||||||
public RefreshPreKeysJob(Context context) {
|
public RefreshPreKeysJob(Context context) {
|
||||||
super(context, JobParameters.newBuilder()
|
super(context, JobParameters.newBuilder()
|
||||||
.withGroupId(RefreshPreKeysJob.class.getSimpleName())
|
.withGroupId(RefreshPreKeysJob.class.getSimpleName())
|
||||||
@ -43,12 +49,10 @@ public class RefreshPreKeysJob extends MasterSecretJob {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onRun() throws RequirementNotMetException, IOException {
|
public void onRun(MasterSecret masterSecret) throws IOException {
|
||||||
if (!TextSecurePreferences.isPushRegistered(context)) return;
|
if (!TextSecurePreferences.isPushRegistered(context)) return;
|
||||||
|
|
||||||
MasterSecret masterSecret = getMasterSecret();
|
int availableKeys = accountManager.getPreKeysCount();
|
||||||
TextSecureAccountManager accountManager = TextSecureCommunicationFactory.createManager(context);
|
|
||||||
int availableKeys = accountManager.getPreKeysCount();
|
|
||||||
|
|
||||||
if (availableKeys >= PREKEY_MINIMUM && TextSecurePreferences.isSignedPreKeyRegistered(context)) {
|
if (availableKeys >= PREKEY_MINIMUM && TextSecurePreferences.isSignedPreKeyRegistered(context)) {
|
||||||
Log.w(TAG, "Available keys sufficient: " + availableKeys);
|
Log.w(TAG, "Available keys sufficient: " + availableKeys);
|
||||||
@ -65,12 +69,14 @@ public class RefreshPreKeysJob extends MasterSecretJob {
|
|||||||
accountManager.setPreKeys(identityKey.getPublicKey(), lastResortKeyRecord, signedPreKeyRecord, preKeyRecords);
|
accountManager.setPreKeys(identityKey.getPublicKey(), lastResortKeyRecord, signedPreKeyRecord, preKeyRecords);
|
||||||
|
|
||||||
TextSecurePreferences.setSignedPreKeyRegistered(context, true);
|
TextSecurePreferences.setSignedPreKeyRegistered(context, true);
|
||||||
// PreKeyService.initiateClean(context, masterSecret);
|
|
||||||
|
ApplicationContext.getInstance(context)
|
||||||
|
.getJobManager()
|
||||||
|
.add(new CleanPreKeysJob(context));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean onShouldRetry(Throwable throwable) {
|
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||||
if (throwable instanceof RequirementNotMetException) return true;
|
|
||||||
if (throwable instanceof NonSuccessfulResponseCodeException) return false;
|
if (throwable instanceof NonSuccessfulResponseCodeException) return false;
|
||||||
if (throwable instanceof PushNetworkException) return true;
|
if (throwable instanceof PushNetworkException) return true;
|
||||||
|
|
||||||
|
@ -62,9 +62,8 @@ public class SmsDecryptJob extends MasterSecretJob {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onRun() throws RequirementNotMetException, NoSuchMessageException {
|
public void onRun(MasterSecret masterSecret) throws NoSuchMessageException {
|
||||||
MasterSecret masterSecret = getMasterSecret();
|
EncryptingSmsDatabase database = DatabaseFactory.getEncryptingSmsDatabase(context);
|
||||||
EncryptingSmsDatabase database = DatabaseFactory.getEncryptingSmsDatabase(context);
|
|
||||||
|
|
||||||
try {
|
try {
|
||||||
SmsMessageRecord record = database.getMessage(masterSecret, messageId);
|
SmsMessageRecord record = database.getMessage(masterSecret, messageId);
|
||||||
@ -94,6 +93,11 @@ public class SmsDecryptJob extends MasterSecretJob {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onCanceled() {
|
public void onCanceled() {
|
||||||
// TODO
|
// TODO
|
||||||
@ -166,12 +170,6 @@ public class SmsDecryptJob extends MasterSecretJob {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
public boolean onShouldRetry(Throwable throwable) {
|
|
||||||
if (throwable instanceof RequirementNotMetException) return true;
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
private String getAsymmetricDecryptedBody(MasterSecret masterSecret, String body)
|
private String getAsymmetricDecryptedBody(MasterSecret masterSecret, String body)
|
||||||
throws InvalidMessageException
|
throws InvalidMessageException
|
||||||
{
|
{
|
||||||
|
@ -53,10 +53,9 @@ public class SmsSendJob extends MasterSecretJob {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onRun() throws RequirementNotMetException, NoSuchMessageException {
|
public void onRun(MasterSecret masterSecret) throws NoSuchMessageException {
|
||||||
MasterSecret masterSecret = getMasterSecret();
|
EncryptingSmsDatabase database = DatabaseFactory.getEncryptingSmsDatabase(context);
|
||||||
EncryptingSmsDatabase database = DatabaseFactory.getEncryptingSmsDatabase(context);
|
SmsMessageRecord record = database.getMessage(masterSecret, messageId);
|
||||||
SmsMessageRecord record = database.getMessage(masterSecret, messageId);
|
|
||||||
|
|
||||||
try {
|
try {
|
||||||
Log.w(TAG, "Sending message: " + messageId);
|
Log.w(TAG, "Sending message: " + messageId);
|
||||||
@ -73,6 +72,11 @@ public class SmsSendJob extends MasterSecretJob {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onCanceled() {
|
public void onCanceled() {
|
||||||
Log.w(TAG, "onCanceled()");
|
Log.w(TAG, "onCanceled()");
|
||||||
@ -83,12 +87,6 @@ public class SmsSendJob extends MasterSecretJob {
|
|||||||
MessageNotifier.notifyMessageDeliveryFailed(context, recipients, threadId);
|
MessageNotifier.notifyMessageDeliveryFailed(context, recipients, threadId);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
public boolean onShouldRetry(Throwable throwable) {
|
|
||||||
if (throwable instanceof RequirementNotMetException) return true;
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
private void deliver(MasterSecret masterSecret, SmsMessageRecord record)
|
private void deliver(MasterSecret masterSecret, SmsMessageRecord record)
|
||||||
throws UndeliverableMessageException, InsecureFallbackApprovalException
|
throws UndeliverableMessageException, InsecureFallbackApprovalException
|
||||||
{
|
{
|
||||||
|
@ -44,9 +44,8 @@ public class SmsSentJob extends MasterSecretJob {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onRun() throws RequirementNotMetException {
|
public void onRun(MasterSecret masterSecret) {
|
||||||
Log.w(TAG, "Got SMS callback: " + action + " , " + result);
|
Log.w(TAG, "Got SMS callback: " + action + " , " + result);
|
||||||
MasterSecret masterSecret = getMasterSecret();
|
|
||||||
|
|
||||||
switch (action) {
|
switch (action) {
|
||||||
case SmsDeliveryListener.SENT_SMS_ACTION:
|
case SmsDeliveryListener.SENT_SMS_ACTION:
|
||||||
@ -59,8 +58,7 @@ public class SmsSentJob extends MasterSecretJob {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean onShouldRetry(Throwable throwable) {
|
public boolean onShouldRetryThrowable(Throwable throwable) {
|
||||||
if (throwable instanceof RequirementNotMetException) return true;
|
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -0,0 +1,32 @@
|
|||||||
|
package org.thoughtcrime.securesms.push;
|
||||||
|
|
||||||
|
import android.content.Context;
|
||||||
|
|
||||||
|
import org.thoughtcrime.securesms.ApplicationContext;
|
||||||
|
import org.thoughtcrime.securesms.crypto.SecurityEvent;
|
||||||
|
import org.thoughtcrime.securesms.database.DatabaseFactory;
|
||||||
|
import org.thoughtcrime.securesms.jobs.RefreshPreKeysJob;
|
||||||
|
import org.thoughtcrime.securesms.recipients.RecipientFactory;
|
||||||
|
import org.thoughtcrime.securesms.recipients.Recipients;
|
||||||
|
import org.whispersystems.textsecure.api.TextSecureMessageSender;
|
||||||
|
|
||||||
|
public class SecurityEventListener implements TextSecureMessageSender.EventListener {
|
||||||
|
private final Context context;
|
||||||
|
|
||||||
|
public SecurityEventListener(Context context) {
|
||||||
|
this.context = context.getApplicationContext();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onSecurityEvent(long recipientId) {
|
||||||
|
Recipients recipients = RecipientFactory.getRecipientsForIds(context, String.valueOf(recipientId), false);
|
||||||
|
long threadId = DatabaseFactory.getThreadDatabase(context).getThreadIdFor(recipients);
|
||||||
|
|
||||||
|
SecurityEvent.broadcastSecurityUpdateEvent(context, threadId);
|
||||||
|
|
||||||
|
ApplicationContext.getInstance(context)
|
||||||
|
.getJobManager()
|
||||||
|
.add(new RefreshPreKeysJob(context));
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@ -18,23 +18,6 @@ import org.whispersystems.textsecure.api.TextSecureMessageSender;
|
|||||||
import static org.whispersystems.textsecure.api.TextSecureMessageSender.EventListener;
|
import static org.whispersystems.textsecure.api.TextSecureMessageSender.EventListener;
|
||||||
|
|
||||||
public class TextSecureCommunicationFactory {
|
public class TextSecureCommunicationFactory {
|
||||||
public static TextSecureMessageSender createSender(Context context, MasterSecret masterSecret) {
|
|
||||||
return new TextSecureMessageSender(Release.PUSH_URL,
|
|
||||||
new TextSecurePushTrustStore(context),
|
|
||||||
TextSecurePreferences.getLocalNumber(context),
|
|
||||||
TextSecurePreferences.getPushServerPassword(context),
|
|
||||||
new TextSecureAxolotlStore(context, masterSecret),
|
|
||||||
Optional.of((EventListener)new SecurityEventListener(context)));
|
|
||||||
}
|
|
||||||
|
|
||||||
public static TextSecureMessageReceiver createReceiver(Context context, MasterSecret masterSecret) {
|
|
||||||
return new TextSecureMessageReceiver(TextSecurePreferences.getSignalingKey(context),
|
|
||||||
Release.PUSH_URL,
|
|
||||||
new TextSecurePushTrustStore(context),
|
|
||||||
TextSecurePreferences.getLocalNumber(context),
|
|
||||||
TextSecurePreferences.getPushServerPassword(context),
|
|
||||||
new TextSecureAxolotlStore(context, masterSecret));
|
|
||||||
}
|
|
||||||
|
|
||||||
public static TextSecureAccountManager createManager(Context context) {
|
public static TextSecureAccountManager createManager(Context context) {
|
||||||
return new TextSecureAccountManager(Release.PUSH_URL,
|
return new TextSecureAccountManager(Release.PUSH_URL,
|
||||||
@ -48,19 +31,4 @@ public class TextSecureCommunicationFactory {
|
|||||||
number, password);
|
number, password);
|
||||||
}
|
}
|
||||||
|
|
||||||
private static class SecurityEventListener implements EventListener {
|
|
||||||
|
|
||||||
private final Context context;
|
|
||||||
|
|
||||||
public SecurityEventListener(Context context) {
|
|
||||||
this.context = context.getApplicationContext();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void onSecurityEvent(long recipientId) {
|
|
||||||
Recipients recipients = RecipientFactory.getRecipientsForIds(context, String.valueOf(recipientId), false);
|
|
||||||
long threadId = DatabaseFactory.getThreadDatabase(context).getThreadIdFor(recipients);
|
|
||||||
SecurityEvent.broadcastSecurityUpdateEvent(context, threadId);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user