Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 package org.chromium.chromoting; | |
| 6 | |
| 7 import android.app.Activity; | |
| 8 import android.content.ComponentName; | |
| 9 import android.content.Intent; | |
| 10 import android.content.pm.PackageManager; | |
| 11 import android.net.Uri; | |
| 12 import android.util.Base64; | |
| 13 import android.util.Log; | |
| 14 | |
| 15 import java.security.SecureRandom; | |
| 16 import java.util.HashMap; | |
| 17 | |
| 18 /** | |
| 19 * This class is responsible for fetching a third party token from the user usin g the OAuth2 | |
| 20 * implicit flow. It pops up a third party login page located at |tokenurl|. I t relies on the | |
| 21 * |ThirdPartyTokenFetcher$OAuthRedirectActivity| to intercept the access token from the redirect at | |
| 22 * |REDIRECT_URI_SCHEME|://|REDIRECT_URI_HOST| upon successful login. | |
| 23 */ | |
| 24 public class ThirdPartyTokenFetcher { | |
| 25 /** Callback for receiving the token. */ | |
| 26 public interface Callback { | |
| 27 void onTokenFetched(String code, String accessToken); | |
| 28 } | |
| 29 | |
| 30 /** Redirect Uri. See http://tools.ietf.org/html/rfc6749#section-3.1.2. */ | |
| 31 private static final String REDIRECT_URI_SCHEME = "chromoting"; | |
| 32 | |
| 33 private static final String REDIRECT_URI_HOST = "oauthredirect"; | |
| 34 | |
| 35 private static final String REDIRECT_URI = REDIRECT_URI_SCHEME + "://" + RED IRECT_URI_HOST; | |
| 36 | |
| 37 /** | |
| 38 * Request both the authorization code and access token from the server. Se e | |
| 39 * http://tools.ietf.org/html/rfc6749#section-3.1.1. | |
| 40 */ | |
| 41 private static final String RESPONSE_TYPE = "code token"; | |
| 42 | |
| 43 /** This is used to securely generate an opaque 128 bit for the |mState| var iable. */ | |
| 44 private static SecureRandom sSecureRandom = new SecureRandom(); | |
| 45 | |
| 46 /** This is used to launch the third party login page in the browser. */ | |
| 47 private Activity mContext; | |
| 48 | |
| 49 /** | |
| 50 * An opaque value used by the client to maintain state between the request and callback. The | |
| 51 * authorization server includes this value when redirecting the user-agent back to the client. | |
| 52 * The parameter is used for preventing cross-site request forgery. See | |
| 53 * http://tools.ietf.org/html/rfc6749#section-10.12. | |
| 54 */ | |
| 55 private final String mState; | |
| 56 | |
| 57 /** Url to pop the third party login page. */ | |
| 58 private final String mTokenUrl; | |
| 59 | |
| 60 /** The client identifier. See http://tools.ietf.org/html/rfc6749#section-2. 2. */ | |
| 61 private final String mClientId; | |
| 62 | |
| 63 /** The scope of access request. See http://tools.ietf.org/html/rfc6749#sect ion-3.3. */ | |
| 64 private final String mScope; | |
| 65 | |
| 66 private final Callback mCallback; | |
| 67 | |
| 68 public ThirdPartyTokenFetcher(Activity context, | |
| 69 String tokenUrl, | |
| 70 String clientId, | |
| 71 String scope, | |
| 72 Callback callback) { | |
| 73 this.mContext = context; | |
| 74 this.mTokenUrl = tokenUrl; | |
| 75 this.mClientId = clientId; | |
| 76 this.mState = generateXsrfToken(); | |
| 77 this.mScope = scope; | |
| 78 this.mCallback = callback; | |
| 79 } | |
| 80 | |
| 81 public void fetchToken() { | |
| 82 Uri.Builder uriBuilder = Uri.parse(mTokenUrl).buildUpon(); | |
| 83 uriBuilder.appendQueryParameter("redirect_uri", REDIRECT_URI); | |
| 84 uriBuilder.appendQueryParameter("scope", mScope); | |
| 85 uriBuilder.appendQueryParameter("client_id", mClientId); | |
| 86 uriBuilder.appendQueryParameter("state", mState); | |
| 87 uriBuilder.appendQueryParameter("response_type", RESPONSE_TYPE); | |
| 88 | |
| 89 Uri uri = uriBuilder.build(); | |
| 90 Intent intent = new Intent(Intent.ACTION_VIEW, uri); | |
|
Sergey Ulanov
2014/06/16 22:55:38
Does this pop out external browser?
If yes, then I
kelvinp
2014/06/17 00:02:57
Spoke offline with Sergey and Renato. We are usin
| |
| 91 | |
| 92 // Verify that the device can launch an application for this intent, oth erwise | |
| 93 // startActivity() may crash the application. | |
|
Sergey Ulanov
2014/06/16 22:55:38
Can we just catch exception thrown by startActivit
kelvinp
2014/06/17 00:02:56
Good point.
| |
| 94 if (null == intent.resolveActivity(mContext.getPackageManager())) { | |
| 95 Log.e("ThirdPartyAuth", "No browser is installed to open " + uri); | |
| 96 this.failFetchToken(); | |
| 97 return; | |
| 98 } | |
| 99 Log.i("ThirdPartyAuth", "fetchToken() url:" + uri); | |
| 100 OAuthRedirectActivity.setEnabled(mContext, true); | |
| 101 mContext.startActivity(intent); | |
| 102 } | |
| 103 | |
| 104 private boolean isValidIntent(Intent intent) { | |
| 105 assert intent != null; | |
| 106 | |
| 107 final String action = intent.getAction(); | |
| 108 | |
| 109 Uri data = intent.getData(); | |
| 110 if (data != null) { | |
| 111 String scheme = data.getScheme(); | |
| 112 String host = data.getHost(); | |
|
Sergey Ulanov
2014/06/16 22:55:38
I think you want getAuthority here, to also verify
kelvinp
2014/06/17 00:02:56
Done for the extra variables.
I kept the call to g
| |
| 113 return Intent.ACTION_VIEW.equals(action) && | |
| 114 REDIRECT_URI_SCHEME.equals(scheme) && | |
| 115 REDIRECT_URI_HOST.equals(host); | |
| 116 } | |
| 117 return false; | |
| 118 } | |
| 119 | |
| 120 public boolean handleTokenFetched(Intent intent) { | |
| 121 assert intent != null; | |
| 122 | |
| 123 if (!isValidIntent(intent)) { | |
| 124 Log.w("ThirdPartyAuth", "Ignoring unmatched intent."); | |
| 125 return false; | |
| 126 } | |
| 127 | |
| 128 Uri data = intent.getData(); | |
| 129 HashMap<String, String> params = getFragmentParameters(data); | |
| 130 | |
| 131 final String accessToken = params.get("access_token"); | |
| 132 final String code = params.get("code"); | |
| 133 final String state = params.get("state"); | |
| 134 | |
| 135 if (!mState.equals(state)) { | |
| 136 Log.e("ThirdPartyAuth", "Ignoring redirect with invalid state."); | |
| 137 return false; | |
| 138 } | |
| 139 | |
| 140 if (code == null || accessToken == null) { | |
| 141 Log.e("ThirdPartyAuth", "Ignoring redirect with missing code or toke n."); | |
| 142 return false; | |
|
rmsousa
2014/06/16 22:13:15
This would ignore explicit errors (where the error
kelvinp
2014/06/17 00:02:56
Done.
| |
| 143 } | |
| 144 | |
| 145 Log.i("ThirdPartyAuth", "handleTokenFetched()."); | |
| 146 mCallback.onTokenFetched(code, accessToken); | |
| 147 OAuthRedirectActivity.setEnabled(mContext, false); | |
| 148 return true; | |
| 149 } | |
| 150 | |
| 151 private void failFetchToken() { | |
| 152 mCallback.onTokenFetched("", ""); | |
| 153 } | |
| 154 | |
| 155 /** Generate a 128 bit URL-safe opaque string to prevent cross site request forgery (XSRF).*/ | |
| 156 private static String generateXsrfToken() { | |
| 157 byte[] bytes = new byte[16]; | |
| 158 sSecureRandom.nextBytes(bytes); | |
| 159 // Uses a variant of Base64 to make sure the URL is URL safe: | |
| 160 // URL_SAFE replaces - with _ and + with /. | |
| 161 // NO_WRAP removes the trailing newline character. | |
| 162 // NO_PADDING removes any trailing =. | |
| 163 return Base64.encodeToString(bytes, Base64.URL_SAFE | Base64.NO_WRAP | B ase64.NO_PADDING); | |
| 164 } | |
| 165 | |
| 166 /** Parses the fragment string into a key value pair. */ | |
| 167 private static HashMap<String, String> getFragmentParameters(Uri uri) { | |
| 168 assert uri != null; | |
| 169 HashMap<String, String> result = new HashMap<String, String>(); | |
| 170 | |
| 171 final String fragment = uri.getFragment(); | |
| 172 | |
| 173 if (fragment != null) { | |
| 174 String[] parts = fragment.split("&"); | |
| 175 | |
| 176 for (String part : parts) { | |
| 177 String keyValuePair[] = part.split("=", 2); | |
| 178 if (keyValuePair.length == 2) { | |
| 179 result.put(keyValuePair[0], keyValuePair[1]); | |
| 180 } | |
| 181 } | |
| 182 } | |
| 183 return result; | |
| 184 }; | |
| 185 | |
| 186 /** | |
| 187 * In the OAuth2 implicit flow, the browser will be redirected to | |
| 188 * |REDIRECT_URI_SCHEME|://|REDIRECT_URI_HOST| upon a successful login. OAut hRedirectActivity | |
| 189 * uses an intent filter in the manifest to intercept the URL and launch the chromoting app. | |
| 190 * | |
| 191 * Unfortunately, Most browsers on Android, e.g. chrome, reloads the URL whe n a browser | |
| 192 * tab is activated. As a result, chromoting is launched unintentionally wh en the user restarts | |
| 193 * chrome or closes other tabs that causes the |redirect URL| to become the topmost tab. | |
| 194 * | |
| 195 * To solve the problem, the redirect intent-filter is declared in a separat e activity, | |
| 196 * |OAuthRedirectActivity| instead of the MainActivity. In this way, we can disable it, | |
| 197 * together with its intent filter, by default. |OAuthRedirectActivity| is o nly enabled when | |
| 198 * there is a pending token fetch request. | |
| 199 */ | |
| 200 public static class OAuthRedirectActivity extends Activity { | |
| 201 @Override | |
| 202 public void onStart() { | |
| 203 super.onStart(); | |
| 204 // |OAuthRedirectActivity| runs in its own task, it needs to route t he intent back | |
| 205 // to Chromoting.java to access the state of the current request. | |
| 206 Intent intent = getIntent(); | |
| 207 intent.setClass(this, Chromoting.class); | |
| 208 startActivity(intent); | |
| 209 finishActivity(0); | |
| 210 } | |
| 211 | |
| 212 public static void setEnabled(Activity context, boolean enabled) { | |
| 213 int state = enabled ? PackageManager.COMPONENT_ENABLED_STATE_ENABLED | |
| 214 : PackageManager.COMPONENT_ENABLED_STATE_DEFAULT ; | |
| 215 context.getPackageManager().setComponentEnabledSetting( | |
| 216 new ComponentName( | |
| 217 context.getApplicationContext(), | |
| 218 ThirdPartyTokenFetcher.OAuthRedirectActivity.class), | |
| 219 state, | |
| 220 PackageManager.DONT_KILL_APP); | |
| 221 } | |
| 222 } | |
| 223 } | |
| OLD | NEW |