2011-09-08 10:23:44 +00:00
|
|
|
package org.fox.ttrss;
|
|
|
|
|
|
|
|
import java.io.BufferedReader;
|
2011-11-29 04:03:38 +00:00
|
|
|
import java.io.IOException;
|
2012-09-19 12:01:31 +00:00
|
|
|
import java.io.InputStream;
|
2011-09-08 10:23:44 +00:00
|
|
|
import java.io.InputStreamReader;
|
2012-09-18 09:08:57 +00:00
|
|
|
import java.io.OutputStream;
|
|
|
|
import java.io.UnsupportedEncodingException;
|
|
|
|
import java.net.HttpURLConnection;
|
2011-11-27 13:57:05 +00:00
|
|
|
import java.net.URL;
|
2012-09-19 12:01:31 +00:00
|
|
|
import java.nio.CharBuffer;
|
2012-09-18 09:08:57 +00:00
|
|
|
import java.security.cert.CertificateException;
|
2011-09-08 10:23:44 +00:00
|
|
|
import java.util.HashMap;
|
|
|
|
|
2012-09-18 09:08:57 +00:00
|
|
|
import javax.net.ssl.HttpsURLConnection;
|
|
|
|
import javax.net.ssl.SSLContext;
|
|
|
|
import javax.net.ssl.TrustManager;
|
|
|
|
import javax.net.ssl.X509TrustManager;
|
|
|
|
|
2012-09-19 12:01:31 +00:00
|
|
|
import org.apache.http.util.CharArrayBuffer;
|
|
|
|
|
2012-09-18 09:08:57 +00:00
|
|
|
import java.security.cert.X509Certificate;
|
2011-09-08 10:23:44 +00:00
|
|
|
|
2011-11-27 10:18:04 +00:00
|
|
|
import android.content.Context;
|
|
|
|
import android.content.SharedPreferences;
|
2012-09-19 09:14:50 +00:00
|
|
|
import android.net.ConnectivityManager;
|
|
|
|
import android.net.NetworkInfo;
|
2011-11-22 12:49:21 +00:00
|
|
|
import android.os.AsyncTask;
|
2012-09-18 09:08:57 +00:00
|
|
|
import android.os.Build;
|
2011-11-27 10:18:04 +00:00
|
|
|
import android.preference.PreferenceManager;
|
2012-09-18 09:08:57 +00:00
|
|
|
import android.util.Base64;
|
2011-09-08 11:28:38 +00:00
|
|
|
import android.util.Log;
|
|
|
|
|
2011-09-08 10:23:44 +00:00
|
|
|
import com.google.gson.Gson;
|
|
|
|
import com.google.gson.JsonElement;
|
2011-11-29 04:03:38 +00:00
|
|
|
import com.google.gson.JsonObject;
|
2011-09-08 10:23:44 +00:00
|
|
|
import com.google.gson.JsonParser;
|
|
|
|
|
2011-11-22 12:49:21 +00:00
|
|
|
public class ApiRequest extends AsyncTask<HashMap<String,String>, Integer, JsonElement> {
|
2011-09-08 10:23:44 +00:00
|
|
|
private final String TAG = this.getClass().getSimpleName();
|
|
|
|
|
2011-11-29 04:03:38 +00:00
|
|
|
public enum ApiError { NO_ERROR, HTTP_UNAUTHORIZED, HTTP_FORBIDDEN, HTTP_NOT_FOUND,
|
2012-09-19 09:14:50 +00:00
|
|
|
HTTP_SERVER_ERROR, HTTP_OTHER_ERROR, SSL_REJECTED, PARSE_ERROR, IO_ERROR, OTHER_ERROR, API_DISABLED,
|
|
|
|
API_UNKNOWN, LOGIN_FAILED, INVALID_URL, INCORRECT_USAGE, NETWORK_UNAVAILABLE };
|
2011-11-22 12:49:21 +00:00
|
|
|
|
2011-11-29 04:03:38 +00:00
|
|
|
public static final int API_STATUS_OK = 0;
|
|
|
|
public static final int API_STATUS_ERR = 1;
|
|
|
|
|
2011-11-22 12:49:21 +00:00
|
|
|
private String m_api;
|
2011-11-27 07:04:28 +00:00
|
|
|
private boolean m_trustAny = false;
|
2011-11-27 10:18:04 +00:00
|
|
|
private boolean m_transportDebugging = false;
|
2012-09-19 05:45:03 +00:00
|
|
|
protected int m_responseCode = 0;
|
|
|
|
protected String m_responseMessage;
|
2011-11-29 04:03:38 +00:00
|
|
|
protected int m_apiStatusCode = 0;
|
2012-09-19 12:07:11 +00:00
|
|
|
protected boolean m_canUseProgress = false;
|
2011-11-29 05:25:13 +00:00
|
|
|
protected Context m_context;
|
2011-11-27 13:57:05 +00:00
|
|
|
private SharedPreferences m_prefs;
|
2011-11-29 04:03:38 +00:00
|
|
|
|
|
|
|
protected ApiError m_lastError;
|
2011-11-22 12:49:21 +00:00
|
|
|
|
2011-11-27 10:18:04 +00:00
|
|
|
public ApiRequest(Context context) {
|
|
|
|
m_context = context;
|
2011-11-22 12:49:21 +00:00
|
|
|
|
2011-11-27 13:57:05 +00:00
|
|
|
m_prefs = PreferenceManager.getDefaultSharedPreferences(m_context);
|
2011-11-27 10:18:04 +00:00
|
|
|
|
2011-12-01 06:58:19 +00:00
|
|
|
m_api = m_prefs.getString("ttrss_url", null).trim();
|
2011-11-27 13:57:05 +00:00
|
|
|
m_trustAny = m_prefs.getBoolean("ssl_trust_any", false);
|
|
|
|
m_transportDebugging = m_prefs.getBoolean("transport_debugging", false);
|
2011-11-29 04:03:38 +00:00
|
|
|
m_lastError = ApiError.NO_ERROR;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
protected int getErrorMessage() {
|
|
|
|
switch (m_lastError) {
|
|
|
|
case NO_ERROR:
|
|
|
|
return R.string.error_unknown;
|
|
|
|
case HTTP_UNAUTHORIZED:
|
|
|
|
return R.string.error_http_unauthorized;
|
|
|
|
case HTTP_FORBIDDEN:
|
|
|
|
return R.string.error_http_forbidden;
|
|
|
|
case HTTP_NOT_FOUND:
|
|
|
|
return R.string.error_http_not_found;
|
|
|
|
case HTTP_SERVER_ERROR:
|
|
|
|
return R.string.error_http_server_error;
|
|
|
|
case HTTP_OTHER_ERROR:
|
|
|
|
return R.string.error_http_other_error;
|
|
|
|
case SSL_REJECTED:
|
|
|
|
return R.string.error_ssl_rejected;
|
|
|
|
case PARSE_ERROR:
|
|
|
|
return R.string.error_parse_error;
|
|
|
|
case IO_ERROR:
|
|
|
|
return R.string.error_io_error;
|
|
|
|
case OTHER_ERROR:
|
|
|
|
return R.string.error_other_error;
|
|
|
|
case API_DISABLED:
|
|
|
|
return R.string.error_api_disabled;
|
|
|
|
case API_UNKNOWN:
|
|
|
|
return R.string.error_api_unknown;
|
|
|
|
case LOGIN_FAILED:
|
|
|
|
return R.string.error_login_failed;
|
2011-12-01 06:58:19 +00:00
|
|
|
case INVALID_URL:
|
|
|
|
return R.string.error_invalid_api_url;
|
2011-12-06 11:29:57 +00:00
|
|
|
case INCORRECT_USAGE:
|
|
|
|
return R.string.error_api_incorrect_usage;
|
2012-09-19 09:14:50 +00:00
|
|
|
case NETWORK_UNAVAILABLE:
|
|
|
|
return R.string.error_network_unavailable;
|
2011-11-29 04:03:38 +00:00
|
|
|
default:
|
|
|
|
Log.d(TAG, "getErrorMessage: unknown error code=" + m_lastError);
|
|
|
|
return R.string.error_unknown;
|
|
|
|
}
|
2011-11-27 07:04:28 +00:00
|
|
|
}
|
|
|
|
|
2011-11-22 12:49:21 +00:00
|
|
|
@Override
|
|
|
|
protected JsonElement doInBackground(HashMap<String, String>... params) {
|
|
|
|
|
2012-09-19 09:14:50 +00:00
|
|
|
if (!isNetworkAvailable()) {
|
|
|
|
m_lastError = ApiError.NETWORK_UNAVAILABLE;
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2011-11-22 12:49:21 +00:00
|
|
|
Gson gson = new Gson();
|
|
|
|
|
|
|
|
String requestStr = gson.toJson(new HashMap<String,String>(params[0]));
|
2012-09-18 09:08:57 +00:00
|
|
|
byte[] postData = null;
|
|
|
|
|
|
|
|
try {
|
|
|
|
postData = requestStr.getBytes("UTF-8");
|
|
|
|
} catch (UnsupportedEncodingException e) {
|
|
|
|
m_lastError = ApiError.OTHER_ERROR;
|
|
|
|
e.printStackTrace();
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
disableConnectionReuseIfNecessary();
|
2011-11-22 12:49:21 +00:00
|
|
|
|
2011-11-27 10:18:04 +00:00
|
|
|
if (m_transportDebugging) Log.d(TAG, ">>> (" + requestStr + ") " + m_api);
|
2011-11-27 07:04:28 +00:00
|
|
|
|
2012-09-18 09:08:57 +00:00
|
|
|
if (m_trustAny) trustAllHosts();
|
|
|
|
|
|
|
|
URL url;
|
2011-11-22 12:49:21 +00:00
|
|
|
|
2011-12-01 06:58:19 +00:00
|
|
|
try {
|
2012-09-18 09:08:57 +00:00
|
|
|
url = new URL(m_api + "/api/");
|
|
|
|
} catch (Exception e) {
|
|
|
|
m_lastError = ApiError.INVALID_URL;
|
|
|
|
e.printStackTrace();
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
HttpURLConnection conn = (HttpURLConnection) url.openConnection();
|
|
|
|
|
2011-12-01 06:58:19 +00:00
|
|
|
String httpLogin = m_prefs.getString("http_login", "").trim();
|
|
|
|
String httpPassword = m_prefs.getString("http_password", "").trim();
|
2011-11-22 12:49:21 +00:00
|
|
|
|
2011-12-01 06:58:19 +00:00
|
|
|
if (httpLogin.length() > 0) {
|
|
|
|
if (m_transportDebugging) Log.d(TAG, "Using HTTP Basic authentication.");
|
|
|
|
|
2012-09-18 09:08:57 +00:00
|
|
|
conn.setRequestProperty("Authorization", "Basic " +
|
|
|
|
Base64.encode((httpLogin + ":" + httpPassword).getBytes("UTF-8"), Base64.NO_WRAP));
|
2011-12-01 06:58:19 +00:00
|
|
|
}
|
2012-06-19 20:44:37 +00:00
|
|
|
|
2012-09-18 09:08:57 +00:00
|
|
|
conn.setDoInput(true);
|
|
|
|
conn.setDoOutput(true);
|
|
|
|
conn.setUseCaches(false);
|
|
|
|
conn.setRequestMethod("POST");
|
|
|
|
conn.setRequestProperty("Content-Length", Integer.toString(postData.length));
|
|
|
|
|
|
|
|
OutputStream out = conn.getOutputStream();
|
|
|
|
out.write(postData);
|
|
|
|
out.close();
|
2012-09-19 12:01:31 +00:00
|
|
|
|
2012-09-19 05:45:03 +00:00
|
|
|
m_responseCode = conn.getResponseCode();
|
|
|
|
m_responseMessage = conn.getResponseMessage();
|
2012-09-19 12:01:31 +00:00
|
|
|
|
2012-09-19 05:45:03 +00:00
|
|
|
switch (m_responseCode) {
|
|
|
|
case HttpURLConnection.HTTP_OK:
|
2012-09-19 12:01:31 +00:00
|
|
|
StringBuffer response = new StringBuffer();
|
|
|
|
InputStreamReader in = new InputStreamReader(conn.getInputStream(), "UTF-8");
|
|
|
|
char[] buf = new char[256];
|
|
|
|
int read = 0;
|
|
|
|
int total = 0;
|
|
|
|
|
|
|
|
int contentLength = conn.getHeaderFieldInt("Api-Content-Length", -1);
|
|
|
|
|
2012-09-19 12:07:11 +00:00
|
|
|
m_canUseProgress = (contentLength != -1);
|
|
|
|
|
2012-09-19 12:01:31 +00:00
|
|
|
while ((read = in.read(buf)) >= 0) {
|
|
|
|
response.append(buf, 0, read);
|
|
|
|
total += read;
|
|
|
|
publishProgress(Integer.valueOf(total), Integer.valueOf(contentLength));
|
2011-11-29 04:03:38 +00:00
|
|
|
}
|
2012-09-19 12:01:31 +00:00
|
|
|
|
2011-11-29 04:03:38 +00:00
|
|
|
if (m_transportDebugging) Log.d(TAG, "<<< " + response);
|
|
|
|
|
|
|
|
JsonParser parser = new JsonParser();
|
|
|
|
|
2012-09-19 12:01:31 +00:00
|
|
|
JsonElement result = parser.parse(response.toString());
|
2011-11-29 04:03:38 +00:00
|
|
|
JsonObject resultObj = result.getAsJsonObject();
|
|
|
|
|
|
|
|
m_apiStatusCode = resultObj.get("status").getAsInt();
|
|
|
|
|
2012-09-18 09:08:57 +00:00
|
|
|
conn.disconnect();
|
2012-05-02 04:35:53 +00:00
|
|
|
|
2011-11-29 04:03:38 +00:00
|
|
|
switch (m_apiStatusCode) {
|
|
|
|
case API_STATUS_OK:
|
|
|
|
return result.getAsJsonObject().get("content");
|
|
|
|
case API_STATUS_ERR:
|
|
|
|
JsonObject contentObj = resultObj.get("content").getAsJsonObject();
|
|
|
|
String error = contentObj.get("error").getAsString();
|
|
|
|
|
|
|
|
if (error.equals("LOGIN_ERROR")) {
|
|
|
|
m_lastError = ApiError.LOGIN_FAILED;
|
|
|
|
} else if (error.equals("API_DISABLED")) {
|
2011-12-12 10:56:38 +00:00
|
|
|
m_lastError = ApiError.API_DISABLED;
|
2011-12-02 15:41:11 +00:00
|
|
|
} else if (error.equals("NOT_LOGGED_IN")) {
|
|
|
|
m_lastError = ApiError.LOGIN_FAILED;
|
2011-12-06 11:29:57 +00:00
|
|
|
} else if (error.equals("INCORRECT_USAGE")) {
|
|
|
|
m_lastError = ApiError.INCORRECT_USAGE;
|
2011-11-29 04:03:38 +00:00
|
|
|
} else {
|
2011-12-01 08:47:21 +00:00
|
|
|
Log.d(TAG, "Unknown API error: " + error);
|
2011-11-29 04:03:38 +00:00
|
|
|
m_lastError = ApiError.API_UNKNOWN;
|
|
|
|
}
|
|
|
|
}
|
2012-05-02 04:35:53 +00:00
|
|
|
|
2011-11-29 04:03:38 +00:00
|
|
|
return null;
|
2012-09-19 05:45:03 +00:00
|
|
|
case HttpURLConnection.HTTP_UNAUTHORIZED:
|
2011-11-29 04:03:38 +00:00
|
|
|
m_lastError = ApiError.HTTP_UNAUTHORIZED;
|
|
|
|
break;
|
2012-09-19 05:45:03 +00:00
|
|
|
case HttpURLConnection.HTTP_FORBIDDEN:
|
2011-11-29 04:03:38 +00:00
|
|
|
m_lastError = ApiError.HTTP_FORBIDDEN;
|
|
|
|
break;
|
2012-09-19 05:45:03 +00:00
|
|
|
case HttpURLConnection.HTTP_NOT_FOUND:
|
2011-11-29 04:03:38 +00:00
|
|
|
m_lastError = ApiError.HTTP_NOT_FOUND;
|
|
|
|
break;
|
2012-09-19 05:45:03 +00:00
|
|
|
case HttpURLConnection.HTTP_INTERNAL_ERROR:
|
2011-11-29 04:03:38 +00:00
|
|
|
m_lastError = ApiError.HTTP_SERVER_ERROR;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
m_lastError = ApiError.HTTP_OTHER_ERROR;
|
|
|
|
break;
|
2011-09-08 10:23:44 +00:00
|
|
|
}
|
2012-09-18 09:08:57 +00:00
|
|
|
|
|
|
|
conn.disconnect();
|
|
|
|
return null;
|
2011-11-29 04:03:38 +00:00
|
|
|
} catch (javax.net.ssl.SSLPeerUnverifiedException e) {
|
|
|
|
m_lastError = ApiError.SSL_REJECTED;
|
|
|
|
e.printStackTrace();
|
|
|
|
} catch (IOException e) {
|
|
|
|
m_lastError = ApiError.IO_ERROR;
|
|
|
|
e.printStackTrace();
|
|
|
|
} catch (com.google.gson.JsonSyntaxException e) {
|
|
|
|
m_lastError = ApiError.PARSE_ERROR;
|
|
|
|
e.printStackTrace();
|
2011-09-08 10:23:44 +00:00
|
|
|
} catch (Exception e) {
|
2011-11-29 04:03:38 +00:00
|
|
|
m_lastError = ApiError.OTHER_ERROR;
|
2011-09-08 10:23:44 +00:00
|
|
|
e.printStackTrace();
|
|
|
|
}
|
|
|
|
|
|
|
|
return null;
|
|
|
|
}
|
2012-09-18 09:08:57 +00:00
|
|
|
|
|
|
|
private static void trustAllHosts() {
|
|
|
|
X509TrustManager easyTrustManager = new X509TrustManager() {
|
|
|
|
|
|
|
|
public void checkClientTrusted(
|
|
|
|
X509Certificate[] chain,
|
|
|
|
String authType) throws CertificateException {
|
|
|
|
// Oh, I am easy!
|
|
|
|
}
|
|
|
|
|
|
|
|
public void checkServerTrusted(
|
|
|
|
X509Certificate[] chain,
|
|
|
|
String authType) throws CertificateException {
|
|
|
|
// Oh, I am easy!
|
|
|
|
}
|
|
|
|
|
|
|
|
public X509Certificate[] getAcceptedIssuers() {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
// Create a trust manager that does not validate certificate chains
|
|
|
|
TrustManager[] trustAllCerts = new TrustManager[] {easyTrustManager};
|
|
|
|
|
|
|
|
// Install the all-trusting trust manager
|
|
|
|
try {
|
|
|
|
SSLContext sc = SSLContext.getInstance("TLS");
|
|
|
|
|
|
|
|
sc.init(null, trustAllCerts, new java.security.SecureRandom());
|
|
|
|
|
|
|
|
HttpsURLConnection.setDefaultSSLSocketFactory(sc.getSocketFactory());
|
|
|
|
|
|
|
|
} catch (Exception e) {
|
|
|
|
e.printStackTrace();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-09-19 09:37:12 +00:00
|
|
|
@SuppressWarnings("deprecation")
|
2012-09-18 09:08:57 +00:00
|
|
|
private static void disableConnectionReuseIfNecessary() {
|
|
|
|
// HTTP connection reuse which was buggy pre-froyo
|
|
|
|
if (Integer.parseInt(Build.VERSION.SDK) < Build.VERSION_CODES.FROYO) {
|
|
|
|
System.setProperty("http.keepAlive", "false");
|
|
|
|
}
|
|
|
|
}
|
2012-09-19 09:14:50 +00:00
|
|
|
|
|
|
|
protected boolean isNetworkAvailable() {
|
|
|
|
ConnectivityManager cm = (ConnectivityManager)
|
|
|
|
m_context.getSystemService(Context.CONNECTIVITY_SERVICE);
|
|
|
|
NetworkInfo networkInfo = cm.getActiveNetworkInfo();
|
|
|
|
|
|
|
|
// if no network is available networkInfo will be null
|
|
|
|
// otherwise check if we are connected
|
|
|
|
if (networkInfo != null && networkInfo.isConnected()) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
2011-09-08 10:23:44 +00:00
|
|
|
}
|