forked from github/cordova-android
merging from callback
This commit is contained in:
commit
18bf4cd94b
@ -95,16 +95,6 @@ App.prototype.exitApp = function() {
|
|||||||
return PhoneGap.exec(null, null, "App", "exitApp", []);
|
return PhoneGap.exec(null, null, "App", "exitApp", []);
|
||||||
};
|
};
|
||||||
|
|
||||||
/**
|
|
||||||
* Add entry to approved list of URLs (whitelist) that will be loaded into PhoneGap container instead of default browser.
|
|
||||||
*
|
|
||||||
* @param origin URL regular expression to allow
|
|
||||||
* @param subdomains T=include all subdomains under origin
|
|
||||||
*/
|
|
||||||
App.prototype.addWhiteListEntry = function(origin, subdomains) {
|
|
||||||
return PhoneGap.exec(null, null, "App", "addWhiteListEntry", [origin, subdomains]);
|
|
||||||
};
|
|
||||||
|
|
||||||
PhoneGap.addConstructor(function() {
|
PhoneGap.addConstructor(function() {
|
||||||
navigator.app = new App();
|
navigator.app = new App();
|
||||||
});
|
});
|
||||||
|
@ -83,6 +83,17 @@ FileTransfer.prototype.upload = function(filePath, server, successCallback, erro
|
|||||||
PhoneGap.exec(successCallback, errorCallback, 'FileTransfer', 'upload', [filePath, server, fileKey, fileName, mimeType, params, debug, chunkedMode]);
|
PhoneGap.exec(successCallback, errorCallback, 'FileTransfer', 'upload', [filePath, server, fileKey, fileName, mimeType, params, debug, chunkedMode]);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Downloads a file form a given URL and saves it to the specified directory.
|
||||||
|
* @param source {String} URL of the server to receive the file
|
||||||
|
* @param target {String} Full path of the file on the device
|
||||||
|
* @param successCallback (Function} Callback to be invoked when upload has completed
|
||||||
|
* @param errorCallback {Function} Callback to be invoked upon error
|
||||||
|
*/
|
||||||
|
FileTransfer.prototype.download = function(source, target, successCallback, errorCallback) {
|
||||||
|
PhoneGap.exec(successCallback, errorCallback, 'FileTransfer', 'download', [source, target]);
|
||||||
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Options to customize the HTTP request used to upload files.
|
* Options to customize the HTTP request used to upload files.
|
||||||
* @constructor
|
* @constructor
|
||||||
|
@ -70,9 +70,6 @@ public class App extends Plugin {
|
|||||||
else if (action.equals("exitApp")) {
|
else if (action.equals("exitApp")) {
|
||||||
this.exitApp();
|
this.exitApp();
|
||||||
}
|
}
|
||||||
else if (action.equals("addWhiteListEntry")) {
|
|
||||||
this.addWhiteListEntry(args.getString(0), args.optBoolean(1));
|
|
||||||
}
|
|
||||||
return new PluginResult(status, result);
|
return new PluginResult(status, result);
|
||||||
} catch (JSONException e) {
|
} catch (JSONException e) {
|
||||||
return new PluginResult(PluginResult.Status.JSON_EXCEPTION);
|
return new PluginResult(PluginResult.Status.JSON_EXCEPTION);
|
||||||
@ -198,14 +195,4 @@ public class App extends Plugin {
|
|||||||
public void exitApp() {
|
public void exitApp() {
|
||||||
((DroidGap)this.ctx).endActivity();
|
((DroidGap)this.ctx).endActivity();
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Add entry to approved list of URLs (whitelist)
|
|
||||||
*
|
|
||||||
* @param origin URL regular expression to allow
|
|
||||||
* @param subdomains T=include all subdomains under origin
|
|
||||||
*/
|
|
||||||
public void addWhiteListEntry(String origin, boolean subdomains) {
|
|
||||||
((DroidGap)this.ctx).addWhiteListEntry(origin, subdomains);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
@ -19,7 +19,6 @@
|
|||||||
package com.phonegap;
|
package com.phonegap;
|
||||||
|
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
import java.util.Map.Entry;
|
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
import java.util.Stack;
|
import java.util.Stack;
|
||||||
import java.util.regex.Pattern;
|
import java.util.regex.Pattern;
|
||||||
@ -30,7 +29,6 @@ import java.io.IOException;
|
|||||||
import org.json.JSONArray;
|
import org.json.JSONArray;
|
||||||
import org.json.JSONException;
|
import org.json.JSONException;
|
||||||
|
|
||||||
import android.app.Activity;
|
|
||||||
import android.app.AlertDialog;
|
import android.app.AlertDialog;
|
||||||
import android.app.ProgressDialog;
|
import android.app.ProgressDialog;
|
||||||
import android.content.Context;
|
import android.content.Context;
|
||||||
@ -43,12 +41,10 @@ import android.content.res.Configuration;
|
|||||||
import android.content.res.XmlResourceParser;
|
import android.content.res.XmlResourceParser;
|
||||||
import android.graphics.Bitmap;
|
import android.graphics.Bitmap;
|
||||||
import android.graphics.Color;
|
import android.graphics.Color;
|
||||||
import android.graphics.Rect;
|
|
||||||
import android.media.AudioManager;
|
import android.media.AudioManager;
|
||||||
import android.net.Uri;
|
import android.net.Uri;
|
||||||
import android.net.http.SslError;
|
import android.net.http.SslError;
|
||||||
import android.os.Bundle;
|
import android.os.Bundle;
|
||||||
import android.util.Log;
|
|
||||||
import android.view.Display;
|
import android.view.Display;
|
||||||
import android.view.KeyEvent;
|
import android.view.KeyEvent;
|
||||||
import android.view.Menu;
|
import android.view.Menu;
|
||||||
@ -275,12 +271,10 @@ public class DroidGap extends PhonegapActivity {
|
|||||||
ViewGroup.LayoutParams.FILL_PARENT,
|
ViewGroup.LayoutParams.FILL_PARENT,
|
||||||
1.0F));
|
1.0F));
|
||||||
|
|
||||||
WebViewReflect.checkCompatibility();
|
|
||||||
|
|
||||||
this.appView.setWebChromeClient(new GapClient(DroidGap.this));
|
this.appView.setWebChromeClient(new GapClient(DroidGap.this));
|
||||||
this.setWebViewClient(this.appView, new GapViewClient(this));
|
this.setWebViewClient(this.appView, new GapViewClient(this));
|
||||||
|
|
||||||
this.appView.setInitialScale(100);
|
this.appView.setInitialScale(0);
|
||||||
this.appView.setVerticalScrollBarEnabled(false);
|
this.appView.setVerticalScrollBarEnabled(false);
|
||||||
this.appView.requestFocusFromTouch();
|
this.appView.requestFocusFromTouch();
|
||||||
|
|
||||||
@ -299,10 +293,10 @@ public class DroidGap extends PhonegapActivity {
|
|||||||
settings.setDatabasePath(databasePath);
|
settings.setDatabasePath(databasePath);
|
||||||
|
|
||||||
// Enable DOM storage
|
// Enable DOM storage
|
||||||
WebViewReflect.setDomStorage(settings);
|
settings.setDomStorageEnabled(true);
|
||||||
|
|
||||||
// Enable built-in geolocation
|
// Enable built-in geolocation
|
||||||
WebViewReflect.setGeolocationEnabled(settings, true);
|
settings.setGeolocationEnabled(true);
|
||||||
|
|
||||||
// Add web view but make it invisible while loading URL
|
// Add web view but make it invisible while loading URL
|
||||||
this.appView.setVisibility(View.INVISIBLE);
|
this.appView.setVisibility(View.INVISIBLE);
|
||||||
@ -311,7 +305,6 @@ public class DroidGap extends PhonegapActivity {
|
|||||||
|
|
||||||
// Clear cancel flag
|
// Clear cancel flag
|
||||||
this.cancelLoadUrl = false;
|
this.cancelLoadUrl = false;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -1592,7 +1585,7 @@ public class DroidGap extends PhonegapActivity {
|
|||||||
// Load URL on UI thread
|
// Load URL on UI thread
|
||||||
me.runOnUiThread(new Runnable() {
|
me.runOnUiThread(new Runnable() {
|
||||||
public void run() {
|
public void run() {
|
||||||
me.showWebPage(errorUrl, true, true, null);
|
me.showWebPage(errorUrl, false, true, null);
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
@ -1767,7 +1760,7 @@ public class DroidGap extends PhonegapActivity {
|
|||||||
* @param origin URL regular expression to allow
|
* @param origin URL regular expression to allow
|
||||||
* @param subdomains T=include all subdomains under origin
|
* @param subdomains T=include all subdomains under origin
|
||||||
*/
|
*/
|
||||||
public void addWhiteListEntry(String origin, boolean subdomains) {
|
private void addWhiteListEntry(String origin, boolean subdomains) {
|
||||||
try {
|
try {
|
||||||
// Unlimited access to network resources
|
// Unlimited access to network resources
|
||||||
if(origin.compareTo("*") == 0) {
|
if(origin.compareTo("*") == 0) {
|
||||||
|
@ -20,8 +20,10 @@ package com.phonegap;
|
|||||||
|
|
||||||
import java.io.DataInputStream;
|
import java.io.DataInputStream;
|
||||||
import java.io.DataOutputStream;
|
import java.io.DataOutputStream;
|
||||||
|
import java.io.File;
|
||||||
import java.io.FileInputStream;
|
import java.io.FileInputStream;
|
||||||
import java.io.FileNotFoundException;
|
import java.io.FileNotFoundException;
|
||||||
|
import java.io.FileOutputStream;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.io.InputStream;
|
import java.io.InputStream;
|
||||||
import java.net.HttpURLConnection;
|
import java.net.HttpURLConnection;
|
||||||
@ -52,98 +54,100 @@ import com.phonegap.api.PluginResult;
|
|||||||
|
|
||||||
public class FileTransfer extends Plugin {
|
public class FileTransfer extends Plugin {
|
||||||
|
|
||||||
private static final String LOG_TAG = "FileUploader";
|
private static final String LOG_TAG = "FileUploader";
|
||||||
private static final String LINE_START = "--";
|
private static final String LINE_START = "--";
|
||||||
private static final String LINE_END = "\r\n";
|
private static final String LINE_END = "\r\n";
|
||||||
private static final String BOUNDRY = "*****";
|
private static final String BOUNDRY = "*****";
|
||||||
|
|
||||||
public static int FILE_NOT_FOUND_ERR = 1;
|
public static int FILE_NOT_FOUND_ERR = 1;
|
||||||
public static int INVALID_URL_ERR = 2;
|
public static int INVALID_URL_ERR = 2;
|
||||||
public static int CONNECTION_ERR = 3;
|
public static int CONNECTION_ERR = 3;
|
||||||
|
|
||||||
private SSLSocketFactory defaultSSLSocketFactory = null;
|
private SSLSocketFactory defaultSSLSocketFactory = null;
|
||||||
private HostnameVerifier defaultHostnameVerifier = null;
|
private HostnameVerifier defaultHostnameVerifier = null;
|
||||||
|
|
||||||
/* (non-Javadoc)
|
/* (non-Javadoc)
|
||||||
* @see com.phonegap.api.Plugin#execute(java.lang.String, org.json.JSONArray, java.lang.String)
|
* @see com.phonegap.api.Plugin#execute(java.lang.String, org.json.JSONArray, java.lang.String)
|
||||||
*/
|
*/
|
||||||
@Override
|
@Override
|
||||||
public PluginResult execute(String action, JSONArray args, String callbackId) {
|
public PluginResult execute(String action, JSONArray args, String callbackId) {
|
||||||
String file = null;
|
String source = null;
|
||||||
String server = null;
|
String target = null;
|
||||||
try {
|
try {
|
||||||
file = args.getString(0);
|
source = args.getString(0);
|
||||||
server = args.getString(1);
|
target = args.getString(1);
|
||||||
}
|
}
|
||||||
catch (JSONException e) {
|
catch (JSONException e) {
|
||||||
Log.d(LOG_TAG, "Missing filename or server name");
|
Log.d(LOG_TAG, "Missing source or target");
|
||||||
return new PluginResult(PluginResult.Status.JSON_EXCEPTION, "Missing filename or server name");
|
return new PluginResult(PluginResult.Status.JSON_EXCEPTION, "Missing source or target");
|
||||||
}
|
}
|
||||||
|
|
||||||
// Setup the options
|
try {
|
||||||
String fileKey = null;
|
if (action.equals("upload")) {
|
||||||
String fileName = null;
|
// Setup the options
|
||||||
String mimeType = null;
|
String fileKey = null;
|
||||||
|
String fileName = null;
|
||||||
|
String mimeType = null;
|
||||||
|
|
||||||
fileKey = getArgument(args, 2, "file");
|
fileKey = getArgument(args, 2, "file");
|
||||||
fileName = getArgument(args, 3, "image.jpg");
|
fileName = getArgument(args, 3, "image.jpg");
|
||||||
mimeType = getArgument(args, 4, "image/jpeg");
|
mimeType = getArgument(args, 4, "image/jpeg");
|
||||||
|
JSONObject params = args.optJSONObject(5);
|
||||||
try {
|
boolean trustEveryone = args.optBoolean(6);
|
||||||
JSONObject params = args.optJSONObject(5);
|
boolean chunkedMode = args.optBoolean(7);
|
||||||
boolean trustEveryone = args.optBoolean(6);
|
FileUploadResult r = upload(source, target, fileKey, fileName, mimeType, params, trustEveryone, chunkedMode);
|
||||||
boolean chunkedMode = args.getBoolean(7);
|
Log.d(LOG_TAG, "****** About to return a result from upload");
|
||||||
|
return new PluginResult(PluginResult.Status.OK, r.toJSONObject());
|
||||||
if (action.equals("upload")) {
|
} else if (action.equals("download")) {
|
||||||
FileUploadResult r = upload(file, server, fileKey, fileName, mimeType, params, trustEveryone, chunkedMode);
|
JSONObject r = download(source, target);
|
||||||
Log.d(LOG_TAG, "****** About to return a result from upload");
|
Log.d(LOG_TAG, "****** About to return a result from download");
|
||||||
return new PluginResult(PluginResult.Status.OK, r.toJSONObject());
|
return new PluginResult(PluginResult.Status.OK, r, "window.localFileSystem._castEntry");
|
||||||
} else {
|
} else {
|
||||||
return new PluginResult(PluginResult.Status.INVALID_ACTION);
|
return new PluginResult(PluginResult.Status.INVALID_ACTION);
|
||||||
}
|
}
|
||||||
} catch (FileNotFoundException e) {
|
} catch (FileNotFoundException e) {
|
||||||
Log.e(LOG_TAG, e.getMessage(), e);
|
Log.e(LOG_TAG, e.getMessage(), e);
|
||||||
JSONObject error = createFileUploadError(FILE_NOT_FOUND_ERR);
|
JSONObject error = createFileTransferError(FILE_NOT_FOUND_ERR, source, target);
|
||||||
return new PluginResult(PluginResult.Status.IO_EXCEPTION, error);
|
return new PluginResult(PluginResult.Status.IO_EXCEPTION, error);
|
||||||
} catch (IllegalArgumentException e) {
|
} catch (IllegalArgumentException e) {
|
||||||
Log.e(LOG_TAG, e.getMessage(), e);
|
Log.e(LOG_TAG, e.getMessage(), e);
|
||||||
JSONObject error = createFileUploadError(INVALID_URL_ERR);
|
JSONObject error = createFileTransferError(INVALID_URL_ERR, source, target);
|
||||||
return new PluginResult(PluginResult.Status.IO_EXCEPTION, error);
|
return new PluginResult(PluginResult.Status.IO_EXCEPTION, error);
|
||||||
} catch (SSLException e) {
|
} catch (SSLException e) {
|
||||||
Log.e(LOG_TAG, e.getMessage(), e);
|
Log.e(LOG_TAG, e.getMessage(), e);
|
||||||
Log.d(LOG_TAG, "Got my ssl exception!!!");
|
Log.d(LOG_TAG, "Got my ssl exception!!!");
|
||||||
JSONObject error = createFileUploadError(CONNECTION_ERR);
|
JSONObject error = createFileTransferError(CONNECTION_ERR, source, target);
|
||||||
return new PluginResult(PluginResult.Status.IO_EXCEPTION, error);
|
return new PluginResult(PluginResult.Status.IO_EXCEPTION, error);
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
Log.e(LOG_TAG, e.getMessage(), e);
|
Log.e(LOG_TAG, e.getMessage(), e);
|
||||||
JSONObject error = createFileUploadError(CONNECTION_ERR);
|
JSONObject error = createFileTransferError(CONNECTION_ERR, source, target);
|
||||||
return new PluginResult(PluginResult.Status.IO_EXCEPTION, error);
|
return new PluginResult(PluginResult.Status.IO_EXCEPTION, error);
|
||||||
} catch (JSONException e) {
|
} catch (JSONException e) {
|
||||||
Log.e(LOG_TAG, e.getMessage(), e);
|
Log.e(LOG_TAG, e.getMessage(), e);
|
||||||
return new PluginResult(PluginResult.Status.JSON_EXCEPTION);
|
return new PluginResult(PluginResult.Status.JSON_EXCEPTION);
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// always verify the host - don't check for certificate
|
|
||||||
final static HostnameVerifier DO_NOT_VERIFY = new HostnameVerifier() {
|
|
||||||
public boolean verify(String hostname, SSLSession session) {
|
|
||||||
return true;
|
|
||||||
}
|
}
|
||||||
};
|
}
|
||||||
|
|
||||||
/**
|
// always verify the host - don't check for certificate
|
||||||
* This function will install a trust manager that will blindly trust all SSL
|
final static HostnameVerifier DO_NOT_VERIFY = new HostnameVerifier() {
|
||||||
* certificates. The reason this code is being added is to enable developers
|
public boolean verify(String hostname, SSLSession session) {
|
||||||
* to do development using self signed SSL certificates on their web server.
|
return true;
|
||||||
*
|
}
|
||||||
* The standard HttpsURLConnection class will throw an exception on self
|
};
|
||||||
* signed certificates if this code is not run.
|
|
||||||
*/
|
/**
|
||||||
private void trustAllHosts() {
|
* This function will install a trust manager that will blindly trust all SSL
|
||||||
|
* certificates. The reason this code is being added is to enable developers
|
||||||
|
* to do development using self signed SSL certificates on their web server.
|
||||||
|
*
|
||||||
|
* The standard HttpsURLConnection class will throw an exception on self
|
||||||
|
* signed certificates if this code is not run.
|
||||||
|
*/
|
||||||
|
private void trustAllHosts() {
|
||||||
// Create a trust manager that does not validate certificate chains
|
// Create a trust manager that does not validate certificate chains
|
||||||
TrustManager[] trustAllCerts = new TrustManager[] { new X509TrustManager() {
|
TrustManager[] trustAllCerts = new TrustManager[] { new X509TrustManager() {
|
||||||
public java.security.cert.X509Certificate[] getAcceptedIssuers() {
|
public java.security.cert.X509Certificate[] getAcceptedIssuers() {
|
||||||
return new java.security.cert.X509Certificate[] {};
|
return new java.security.cert.X509Certificate[] {};
|
||||||
}
|
}
|
||||||
|
|
||||||
public void checkClientTrusted(X509Certificate[] chain,
|
public void checkClientTrusted(X509Certificate[] chain,
|
||||||
@ -157,50 +161,52 @@ public class FileTransfer extends Plugin {
|
|||||||
|
|
||||||
// Install the all-trusting trust manager
|
// Install the all-trusting trust manager
|
||||||
try {
|
try {
|
||||||
// Backup the current SSL socket factory
|
// Backup the current SSL socket factory
|
||||||
defaultSSLSocketFactory = HttpsURLConnection.getDefaultSSLSocketFactory();
|
defaultSSLSocketFactory = HttpsURLConnection.getDefaultSSLSocketFactory();
|
||||||
// Install our all trusting manager
|
// Install our all trusting manager
|
||||||
SSLContext sc = SSLContext.getInstance("TLS");
|
SSLContext sc = SSLContext.getInstance("TLS");
|
||||||
sc.init(null, trustAllCerts, new java.security.SecureRandom());
|
sc.init(null, trustAllCerts, new java.security.SecureRandom());
|
||||||
HttpsURLConnection.setDefaultSSLSocketFactory(sc.getSocketFactory());
|
HttpsURLConnection.setDefaultSSLSocketFactory(sc.getSocketFactory());
|
||||||
} catch (Exception e) {
|
} catch (Exception e) {
|
||||||
Log.e(LOG_TAG, e.getMessage(), e);
|
Log.e(LOG_TAG, e.getMessage(), e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Create an error object based on the passed in errorCode
|
* Create an error object based on the passed in errorCode
|
||||||
* @param errorCode the error
|
* @param errorCode the error
|
||||||
* @return JSONObject containing the error
|
* @return JSONObject containing the error
|
||||||
*/
|
*/
|
||||||
private JSONObject createFileUploadError(int errorCode) {
|
private JSONObject createFileTransferError(int errorCode, String source, String target) {
|
||||||
JSONObject error = null;
|
JSONObject error = null;
|
||||||
try {
|
try {
|
||||||
error = new JSONObject();
|
error = new JSONObject();
|
||||||
error.put("code", errorCode);
|
error.put("code", errorCode);
|
||||||
} catch (JSONException e) {
|
error.put("source", source);
|
||||||
Log.e(LOG_TAG, e.getMessage(), e);
|
error.put("target", target);
|
||||||
}
|
} catch (JSONException e) {
|
||||||
return error;
|
Log.e(LOG_TAG, e.getMessage(), e);
|
||||||
}
|
}
|
||||||
|
return error;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Convenience method to read a parameter from the list of JSON args.
|
* Convenience method to read a parameter from the list of JSON args.
|
||||||
* @param args the args passed to the Plugin
|
* @param args the args passed to the Plugin
|
||||||
* @param position the position to retrieve the arg from
|
* @param position the position to retrieve the arg from
|
||||||
* @param defaultString the default to be used if the arg does not exist
|
* @param defaultString the default to be used if the arg does not exist
|
||||||
* @return String with the retrieved value
|
* @return String with the retrieved value
|
||||||
*/
|
*/
|
||||||
private String getArgument(JSONArray args, int position, String defaultString) {
|
private String getArgument(JSONArray args, int position, String defaultString) {
|
||||||
String arg = defaultString;
|
String arg = defaultString;
|
||||||
if(args.length() >= position) {
|
if(args.length() >= position) {
|
||||||
arg = args.optString(position);
|
arg = args.optString(position);
|
||||||
if (arg == null || "null".equals(arg)) {
|
if (arg == null || "null".equals(arg)) {
|
||||||
arg = defaultString;
|
arg = defaultString;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return arg;
|
return arg;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Uploads the specified file to the server URL provided using an HTTP
|
* Uploads the specified file to the server URL provided using an HTTP
|
||||||
@ -213,140 +219,140 @@ public class FileTransfer extends Plugin {
|
|||||||
* @param params key:value pairs of user-defined parameters
|
* @param params key:value pairs of user-defined parameters
|
||||||
* @return FileUploadResult containing result of upload request
|
* @return FileUploadResult containing result of upload request
|
||||||
*/
|
*/
|
||||||
public FileUploadResult upload(String file, String server, final String fileKey, final String fileName,
|
public FileUploadResult upload(String file, String server, final String fileKey, final String fileName,
|
||||||
final String mimeType, JSONObject params, boolean trustEveryone, boolean chunkedMode) throws IOException, SSLException {
|
final String mimeType, JSONObject params, boolean trustEveryone, boolean chunkedMode) throws IOException, SSLException {
|
||||||
// Create return object
|
// Create return object
|
||||||
FileUploadResult result = new FileUploadResult();
|
FileUploadResult result = new FileUploadResult();
|
||||||
|
|
||||||
// Get a input stream of the file on the phone
|
// Get a input stream of the file on the phone
|
||||||
InputStream fileInputStream = getPathFromUri(file);
|
InputStream fileInputStream = getPathFromUri(file);
|
||||||
|
|
||||||
HttpURLConnection conn = null;
|
HttpURLConnection conn = null;
|
||||||
DataOutputStream dos = null;
|
DataOutputStream dos = null;
|
||||||
|
|
||||||
int bytesRead, bytesAvailable, bufferSize;
|
int bytesRead, bytesAvailable, bufferSize;
|
||||||
long totalBytes;
|
long totalBytes;
|
||||||
byte[] buffer;
|
byte[] buffer;
|
||||||
int maxBufferSize = 8096;
|
int maxBufferSize = 8096;
|
||||||
|
|
||||||
//------------------ CLIENT REQUEST
|
//------------------ CLIENT REQUEST
|
||||||
// open a URL connection to the server
|
// open a URL connection to the server
|
||||||
URL url = new URL(server);
|
URL url = new URL(server);
|
||||||
|
|
||||||
// Open a HTTP connection to the URL based on protocol
|
// Open a HTTP connection to the URL based on protocol
|
||||||
if (url.getProtocol().toLowerCase().equals("https")) {
|
if (url.getProtocol().toLowerCase().equals("https")) {
|
||||||
// Using standard HTTPS connection. Will not allow self signed certificate
|
// Using standard HTTPS connection. Will not allow self signed certificate
|
||||||
if (!trustEveryone) {
|
if (!trustEveryone) {
|
||||||
conn = (HttpsURLConnection) url.openConnection();
|
conn = (HttpsURLConnection) url.openConnection();
|
||||||
}
|
}
|
||||||
// Use our HTTPS connection that blindly trusts everyone.
|
// Use our HTTPS connection that blindly trusts everyone.
|
||||||
// This should only be used in debug environments
|
// This should only be used in debug environments
|
||||||
else {
|
else {
|
||||||
// Setup the HTTPS connection class to trust everyone
|
// Setup the HTTPS connection class to trust everyone
|
||||||
trustAllHosts();
|
trustAllHosts();
|
||||||
HttpsURLConnection https = (HttpsURLConnection) url.openConnection();
|
HttpsURLConnection https = (HttpsURLConnection) url.openConnection();
|
||||||
// Save the current hostnameVerifier
|
// Save the current hostnameVerifier
|
||||||
defaultHostnameVerifier = https.getHostnameVerifier();
|
defaultHostnameVerifier = https.getHostnameVerifier();
|
||||||
// Setup the connection not to verify hostnames
|
// Setup the connection not to verify hostnames
|
||||||
https.setHostnameVerifier(DO_NOT_VERIFY);
|
https.setHostnameVerifier(DO_NOT_VERIFY);
|
||||||
conn = https;
|
conn = https;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
// Return a standard HTTP connection
|
// Return a standard HTTP connection
|
||||||
else {
|
else {
|
||||||
conn = (HttpURLConnection) url.openConnection();
|
conn = (HttpURLConnection) url.openConnection();
|
||||||
}
|
}
|
||||||
|
|
||||||
// Allow Inputs
|
// Allow Inputs
|
||||||
conn.setDoInput(true);
|
conn.setDoInput(true);
|
||||||
|
|
||||||
// Allow Outputs
|
// Allow Outputs
|
||||||
conn.setDoOutput(true);
|
conn.setDoOutput(true);
|
||||||
|
|
||||||
// Don't use a cached copy.
|
// Don't use a cached copy.
|
||||||
conn.setUseCaches(false);
|
conn.setUseCaches(false);
|
||||||
|
|
||||||
// Use a post method.
|
// Use a post method.
|
||||||
conn.setRequestMethod("POST");
|
conn.setRequestMethod("POST");
|
||||||
conn.setRequestProperty("Connection", "Keep-Alive");
|
conn.setRequestProperty("Connection", "Keep-Alive");
|
||||||
conn.setRequestProperty("Content-Type", "multipart/form-data;boundary="+BOUNDRY);
|
conn.setRequestProperty("Content-Type", "multipart/form-data;boundary="+BOUNDRY);
|
||||||
|
|
||||||
// Set the cookies on the response
|
// Set the cookies on the response
|
||||||
String cookie = CookieManager.getInstance().getCookie(server);
|
String cookie = CookieManager.getInstance().getCookie(server);
|
||||||
if (cookie != null) {
|
if (cookie != null) {
|
||||||
conn.setRequestProperty("Cookie", cookie);
|
conn.setRequestProperty("Cookie", cookie);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Should set this up as an option
|
// Should set this up as an option
|
||||||
if (chunkedMode) {
|
if (chunkedMode) {
|
||||||
conn.setChunkedStreamingMode(maxBufferSize);
|
conn.setChunkedStreamingMode(maxBufferSize);
|
||||||
}
|
}
|
||||||
|
|
||||||
dos = new DataOutputStream( conn.getOutputStream() );
|
dos = new DataOutputStream( conn.getOutputStream() );
|
||||||
|
|
||||||
// Send any extra parameters
|
// Send any extra parameters
|
||||||
try {
|
try {
|
||||||
for (Iterator iter = params.keys(); iter.hasNext();) {
|
for (Iterator iter = params.keys(); iter.hasNext();) {
|
||||||
Object key = iter.next();
|
Object key = iter.next();
|
||||||
dos.writeBytes(LINE_START + BOUNDRY + LINE_END);
|
dos.writeBytes(LINE_START + BOUNDRY + LINE_END);
|
||||||
dos.writeBytes("Content-Disposition: form-data; name=\"" + key.toString() + "\";");
|
dos.writeBytes("Content-Disposition: form-data; name=\"" + key.toString() + "\";");
|
||||||
dos.writeBytes(LINE_END + LINE_END);
|
dos.writeBytes(LINE_END + LINE_END);
|
||||||
dos.write(params.getString(key.toString()).getBytes());
|
dos.write(params.getString(key.toString()).getBytes());
|
||||||
dos.writeBytes(LINE_END);
|
dos.writeBytes(LINE_END);
|
||||||
}
|
}
|
||||||
} catch (JSONException e) {
|
} catch (JSONException e) {
|
||||||
Log.e(LOG_TAG, e.getMessage(), e);
|
Log.e(LOG_TAG, e.getMessage(), e);
|
||||||
}
|
}
|
||||||
|
|
||||||
dos.writeBytes(LINE_START + BOUNDRY + LINE_END);
|
dos.writeBytes(LINE_START + BOUNDRY + LINE_END);
|
||||||
dos.writeBytes("Content-Disposition: form-data; name=\"" + fileKey + "\";" + " filename=\"" + fileName +"\"" + LINE_END);
|
dos.writeBytes("Content-Disposition: form-data; name=\"" + fileKey + "\";" + " filename=\"" + fileName +"\"" + LINE_END);
|
||||||
dos.writeBytes("Content-Type: " + mimeType + LINE_END);
|
dos.writeBytes("Content-Type: " + mimeType + LINE_END);
|
||||||
dos.writeBytes(LINE_END);
|
dos.writeBytes(LINE_END);
|
||||||
|
|
||||||
// create a buffer of maximum size
|
// create a buffer of maximum size
|
||||||
bytesAvailable = fileInputStream.available();
|
bytesAvailable = fileInputStream.available();
|
||||||
bufferSize = Math.min(bytesAvailable, maxBufferSize);
|
bufferSize = Math.min(bytesAvailable, maxBufferSize);
|
||||||
buffer = new byte[bufferSize];
|
buffer = new byte[bufferSize];
|
||||||
|
|
||||||
// read file and write it into form...
|
// read file and write it into form...
|
||||||
bytesRead = fileInputStream.read(buffer, 0, bufferSize);
|
bytesRead = fileInputStream.read(buffer, 0, bufferSize);
|
||||||
totalBytes = 0;
|
totalBytes = 0;
|
||||||
|
|
||||||
while (bytesRead > 0) {
|
while (bytesRead > 0) {
|
||||||
totalBytes += bytesRead;
|
totalBytes += bytesRead;
|
||||||
result.setBytesSent(totalBytes);
|
result.setBytesSent(totalBytes);
|
||||||
dos.write(buffer, 0, bufferSize);
|
dos.write(buffer, 0, bufferSize);
|
||||||
bytesAvailable = fileInputStream.available();
|
bytesAvailable = fileInputStream.available();
|
||||||
bufferSize = Math.min(bytesAvailable, maxBufferSize);
|
bufferSize = Math.min(bytesAvailable, maxBufferSize);
|
||||||
bytesRead = fileInputStream.read(buffer, 0, bufferSize);
|
bytesRead = fileInputStream.read(buffer, 0, bufferSize);
|
||||||
}
|
}
|
||||||
|
|
||||||
// send multipart form data necesssary after file data...
|
// send multipart form data necesssary after file data...
|
||||||
dos.writeBytes(LINE_END);
|
dos.writeBytes(LINE_END);
|
||||||
dos.writeBytes(LINE_START + BOUNDRY + LINE_START + LINE_END);
|
dos.writeBytes(LINE_START + BOUNDRY + LINE_START + LINE_END);
|
||||||
|
|
||||||
// close streams
|
// close streams
|
||||||
fileInputStream.close();
|
fileInputStream.close();
|
||||||
dos.flush();
|
dos.flush();
|
||||||
dos.close();
|
dos.close();
|
||||||
|
|
||||||
//------------------ read the SERVER RESPONSE
|
//------------------ read the SERVER RESPONSE
|
||||||
StringBuffer responseString = new StringBuffer("");
|
StringBuffer responseString = new StringBuffer("");
|
||||||
DataInputStream inStream;
|
DataInputStream inStream;
|
||||||
try {
|
try {
|
||||||
inStream = new DataInputStream ( conn.getInputStream() );
|
inStream = new DataInputStream ( conn.getInputStream() );
|
||||||
} catch(FileNotFoundException e) {
|
} catch(FileNotFoundException e) {
|
||||||
throw new IOException("Received error from server");
|
throw new IOException("Received error from server");
|
||||||
}
|
}
|
||||||
|
|
||||||
String line;
|
String line;
|
||||||
while (( line = inStream.readLine()) != null) {
|
while (( line = inStream.readLine()) != null) {
|
||||||
responseString.append(line);
|
responseString.append(line);
|
||||||
}
|
}
|
||||||
Log.d(LOG_TAG, "got response from server");
|
Log.d(LOG_TAG, "got response from server");
|
||||||
Log.d(LOG_TAG, responseString.toString());
|
Log.d(LOG_TAG, responseString.toString());
|
||||||
|
|
||||||
// send request and retrieve response
|
// send request and retrieve response
|
||||||
result.setResponseCode(conn.getResponseCode());
|
result.setResponseCode(conn.getResponseCode());
|
||||||
result.setResponse(responseString.toString());
|
result.setResponse(responseString.toString());
|
||||||
|
|
||||||
@ -355,14 +361,62 @@ public class FileTransfer extends Plugin {
|
|||||||
|
|
||||||
// Revert back to the proper verifier and socket factories
|
// Revert back to the proper verifier and socket factories
|
||||||
if (trustEveryone && url.getProtocol().toLowerCase().equals("https")) {
|
if (trustEveryone && url.getProtocol().toLowerCase().equals("https")) {
|
||||||
((HttpsURLConnection)conn).setHostnameVerifier(defaultHostnameVerifier);
|
((HttpsURLConnection)conn).setHostnameVerifier(defaultHostnameVerifier);
|
||||||
HttpsURLConnection.setDefaultSSLSocketFactory(defaultSSLSocketFactory);
|
HttpsURLConnection.setDefaultSSLSocketFactory(defaultSSLSocketFactory);
|
||||||
}
|
}
|
||||||
|
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
* Downloads a file form a given URL and saves it to the specified directory.
|
||||||
|
*
|
||||||
|
* @param source URL of the server to receive the file
|
||||||
|
* @param target Full path of the file on the file system
|
||||||
|
* @return JSONObject the downloaded file
|
||||||
|
*/
|
||||||
|
public JSONObject download(String source, String target) throws IOException {
|
||||||
|
try {
|
||||||
|
File file = new File(target);
|
||||||
|
|
||||||
|
// create needed directories
|
||||||
|
file.getParentFile().mkdirs();
|
||||||
|
|
||||||
|
// connect to server
|
||||||
|
URL url = new URL(source);
|
||||||
|
HttpURLConnection connection = (HttpURLConnection) url.openConnection();
|
||||||
|
connection.setRequestMethod("GET");
|
||||||
|
connection.setDoOutput(true);
|
||||||
|
connection.connect();
|
||||||
|
|
||||||
|
Log.d(LOG_TAG, "Download file:" + url);
|
||||||
|
|
||||||
|
InputStream inputStream = connection.getInputStream();
|
||||||
|
byte[] buffer = new byte[1024];
|
||||||
|
int bytesRead = 0;
|
||||||
|
|
||||||
|
FileOutputStream outputStream = new FileOutputStream(file);
|
||||||
|
|
||||||
|
// write bytes to file
|
||||||
|
while ( (bytesRead = inputStream.read(buffer)) > 0 ) {
|
||||||
|
outputStream.write(buffer,0, bytesRead);
|
||||||
|
}
|
||||||
|
|
||||||
|
outputStream.close();
|
||||||
|
|
||||||
|
Log.d(LOG_TAG, "Saved file: " + target);
|
||||||
|
|
||||||
|
// create FileEntry object
|
||||||
|
FileUtils fileUtil = new FileUtils();
|
||||||
|
|
||||||
|
return fileUtil.getEntry(file);
|
||||||
|
} catch (Exception e) {
|
||||||
|
Log.d(LOG_TAG, e.getMessage(), e);
|
||||||
|
throw new IOException("Error while downloading");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
* Get an input stream based on file path or content:// uri
|
* Get an input stream based on file path or content:// uri
|
||||||
*
|
*
|
||||||
* @param path
|
* @param path
|
||||||
@ -370,16 +424,16 @@ public class FileTransfer extends Plugin {
|
|||||||
* @throws FileNotFoundException
|
* @throws FileNotFoundException
|
||||||
*/
|
*/
|
||||||
private InputStream getPathFromUri(String path) throws FileNotFoundException {
|
private InputStream getPathFromUri(String path) throws FileNotFoundException {
|
||||||
if (path.startsWith("content:")) {
|
if (path.startsWith("content:")) {
|
||||||
Uri uri = Uri.parse(path);
|
Uri uri = Uri.parse(path);
|
||||||
return ctx.getContentResolver().openInputStream(uri);
|
return ctx.getContentResolver().openInputStream(uri);
|
||||||
}
|
}
|
||||||
else if (path.startsWith("file://")) {
|
else if (path.startsWith("file://")) {
|
||||||
return new FileInputStream(path.substring(7));
|
return new FileInputStream(path.substring(7));
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
return new FileInputStream(path);
|
return new FileInputStream(path);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
File diff suppressed because it is too large
Load Diff
@ -1,140 +0,0 @@
|
|||||||
/*
|
|
||||||
Licensed to the Apache Software Foundation (ASF) under one
|
|
||||||
or more contributor license agreements. See the NOTICE file
|
|
||||||
distributed with this work for additional information
|
|
||||||
regarding copyright ownership. The ASF licenses this file
|
|
||||||
to you under the Apache License, Version 2.0 (the
|
|
||||||
"License"); you may not use this file except in compliance
|
|
||||||
with the License. You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing,
|
|
||||||
software distributed under the License is distributed on an
|
|
||||||
"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
|
||||||
KIND, either express or implied. See the License for the
|
|
||||||
specific language governing permissions and limitations
|
|
||||||
under the License.
|
|
||||||
*/
|
|
||||||
package com.phonegap;
|
|
||||||
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.lang.reflect.InvocationTargetException;
|
|
||||||
import java.lang.reflect.Method;
|
|
||||||
|
|
||||||
import android.webkit.WebSettings;
|
|
||||||
|
|
||||||
public class WebViewReflect {
|
|
||||||
private static Method mWebSettings_setDatabaseEnabled;
|
|
||||||
private static Method mWebSettings_setDatabasePath;
|
|
||||||
private static Method mWebSettings_setDomStorageEnabled;
|
|
||||||
private static Method mWebSettings_setGeolocationEnabled;
|
|
||||||
|
|
||||||
static
|
|
||||||
{
|
|
||||||
checkCompatibility();
|
|
||||||
}
|
|
||||||
|
|
||||||
private static void setDatabaseEnabled(boolean e) throws IOException {
|
|
||||||
try
|
|
||||||
{
|
|
||||||
mWebSettings_setDatabaseEnabled.invoke(e);
|
|
||||||
}
|
|
||||||
catch (InvocationTargetException ite) {
|
|
||||||
/* unpack original exception when possible */
|
|
||||||
Throwable cause = ite.getCause();
|
|
||||||
if (cause instanceof IOException) {
|
|
||||||
throw (IOException) cause;
|
|
||||||
} else if (cause instanceof RuntimeException) {
|
|
||||||
throw (RuntimeException) cause;
|
|
||||||
} else if (cause instanceof Error) {
|
|
||||||
throw (Error) cause;
|
|
||||||
} else {
|
|
||||||
/* unexpected checked exception; wrap and re-throw */
|
|
||||||
throw new RuntimeException(ite);
|
|
||||||
}
|
|
||||||
} catch (IllegalAccessException ie) {
|
|
||||||
System.err.println("unexpected " + ie);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
public static void checkCompatibility() {
|
|
||||||
try {
|
|
||||||
mWebSettings_setDatabaseEnabled = WebSettings.class.getMethod(
|
|
||||||
"setDatabaseEnabled", new Class[] { boolean.class } );
|
|
||||||
mWebSettings_setDatabasePath = WebSettings.class.getMethod(
|
|
||||||
"setDatabasePath", new Class[] { String.class });
|
|
||||||
mWebSettings_setDomStorageEnabled = WebSettings.class.getMethod(
|
|
||||||
"setDomStorageEnabled", new Class[] { boolean.class });
|
|
||||||
mWebSettings_setGeolocationEnabled = WebSettings.class.getMethod(
|
|
||||||
"setGeolocationEnabled", new Class[] { boolean.class });
|
|
||||||
/* success, this is a newer device */
|
|
||||||
} catch (NoSuchMethodException nsme) {
|
|
||||||
/* failure, must be older device */
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
public static void setStorage(WebSettings setting, boolean enable, String path) {
|
|
||||||
if (mWebSettings_setDatabaseEnabled != null) {
|
|
||||||
/* feature is supported */
|
|
||||||
try {
|
|
||||||
mWebSettings_setDatabaseEnabled.invoke(setting, enable);
|
|
||||||
mWebSettings_setDatabasePath.invoke(setting, path);
|
|
||||||
} catch (IllegalArgumentException e) {
|
|
||||||
// TODO Auto-generated catch block
|
|
||||||
e.printStackTrace();
|
|
||||||
} catch (IllegalAccessException e) {
|
|
||||||
// TODO Auto-generated catch block
|
|
||||||
e.printStackTrace();
|
|
||||||
} catch (InvocationTargetException e) {
|
|
||||||
// TODO Auto-generated catch block
|
|
||||||
e.printStackTrace();
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
/* feature not supported, do something else */
|
|
||||||
}
|
|
||||||
}
|
|
||||||
public static void setGeolocationEnabled(WebSettings setting, boolean enable) {
|
|
||||||
if (mWebSettings_setGeolocationEnabled != null) {
|
|
||||||
/* feature is supported */
|
|
||||||
try {
|
|
||||||
mWebSettings_setGeolocationEnabled.invoke(setting, enable);
|
|
||||||
} catch (IllegalArgumentException e) {
|
|
||||||
// TODO Auto-generated catch block
|
|
||||||
e.printStackTrace();
|
|
||||||
} catch (IllegalAccessException e) {
|
|
||||||
// TODO Auto-generated catch block
|
|
||||||
e.printStackTrace();
|
|
||||||
} catch (InvocationTargetException e) {
|
|
||||||
// TODO Auto-generated catch block
|
|
||||||
e.printStackTrace();
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
/* feature not supported, do something else */
|
|
||||||
System.out.println("Native Geolocation not supported - we're ok");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
public static void setDomStorage(WebSettings setting)
|
|
||||||
{
|
|
||||||
if(mWebSettings_setDomStorageEnabled != null)
|
|
||||||
{
|
|
||||||
/* feature is supported */
|
|
||||||
try {
|
|
||||||
mWebSettings_setDomStorageEnabled.invoke(setting, true);
|
|
||||||
} catch (IllegalArgumentException e) {
|
|
||||||
// TODO Auto-generated catch block
|
|
||||||
e.printStackTrace();
|
|
||||||
} catch (IllegalAccessException e) {
|
|
||||||
// TODO Auto-generated catch block
|
|
||||||
e.printStackTrace();
|
|
||||||
} catch (InvocationTargetException e) {
|
|
||||||
// TODO Auto-generated catch block
|
|
||||||
e.printStackTrace();
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
/* feature not supported, do something else */
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
}
|
|
Loading…
Reference in New Issue
Block a user