Back to project page LDCMediaGoblin.
The source code is released under:
GNU General Public License
If you think the Android project LDCMediaGoblin listed in this page is inappropriate, such as containing malicious code/tools or violating the copyright, please email info at java2s dot com, thanks.
/* * This file is part of MediaGoblin for Android (MGA). * Copyright (C) 2012, MediaGoblin for Android Contributors; * see AUTHORS.// w w w . j a v a 2 s .c o m * * MGA is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * MGA is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with MGA. If not, see <http://www.gnu.org/licenses/>. * */ package org.LinuxdistroCommunity.android.authenticator; import org.LinuxdistroCommunity.android.Constants; import org.LinuxdistroCommunity.android.LoginActivity; import android.accounts.AbstractAccountAuthenticator; import android.accounts.Account; import android.accounts.AccountAuthenticatorResponse; import android.accounts.AccountManager; import android.accounts.NetworkErrorException; import android.content.Context; import android.content.Intent; import android.os.Bundle; import android.util.Log; /** * This class is an implementation of AbstractAccountAuthenticator for * authenticating accounts in the org.mediagoblin.android domain. The * interesting thing that this class demonstrates is the use of authTokens as * part of the authentication process. In the account setup UI, the user enters * their username and password. But for our subsequent calls off to the service * for syncing, we want to use an authtoken instead - so we're not continually * sending the password over the wire. getAuthToken() will be called when * SyncAdapter calls AccountManager.blockingGetAuthToken(). When we get called, * we need to return the appropriate authToken for the specified account. If we * already have an authToken stored in the account, we return that authToken. If * we don't, but we do have a username and password, then we'll attempt to talk * to the sample service to fetch an authToken. If that fails (or we didn't have * a username/password), then we need to prompt the user - so we create an * AuthenticatorActivity intent and return that. That will display the dialog * that prompts the user for their login information. */ class Authenticator extends AbstractAccountAuthenticator { /** The tag used to log to adb console. **/ private static final String TAG = "Authenticator"; // Authentication Service context private final Context mContext; public Authenticator(Context context) { super(context); mContext = context; } @Override public Bundle addAccount(AccountAuthenticatorResponse response, String accountType, String authTokenType, String[] requiredFeatures, Bundle options) { Log.v(TAG, "addAccount()"); final Intent intent = new Intent(mContext, LoginActivity.class); intent.putExtra(AccountManager.KEY_ACCOUNT_AUTHENTICATOR_RESPONSE, response); final Bundle bundle = new Bundle(); bundle.putParcelable(AccountManager.KEY_INTENT, intent); return bundle; } @Override public Bundle confirmCredentials( AccountAuthenticatorResponse response, Account account, Bundle options) { Log.v(TAG, "confirmCredentials()"); return null; } @Override public Bundle editProperties(AccountAuthenticatorResponse response, String accountType) { Log.v(TAG, "editProperties()"); throw new UnsupportedOperationException(); } @Override public Bundle getAuthToken(AccountAuthenticatorResponse response, Account account, String authTokenType, Bundle loginOptions) throws NetworkErrorException { Log.v(TAG, "getAuthToken()"); // If the caller requested an authToken type we don't support, then // return an error if (!authTokenType.equals(Constants.AUTHTOKEN_TYPE)) { final Bundle result = new Bundle(); result.putString(AccountManager.KEY_ERROR_MESSAGE, "invalid authTokenType"); return result; } // Extract the username and password from the Account Manager, and ask // the server for an appropriate AuthToken. final AccountManager am = AccountManager.get(mContext); final String auth_token = am.getPassword(account); if (auth_token != null) { final Bundle result = new Bundle(); result.putString(AccountManager.KEY_ACCOUNT_NAME, account.name); result.putString(AccountManager.KEY_ACCOUNT_TYPE, Constants.ACCOUNT_TYPE); result.putString(AccountManager.KEY_AUTHTOKEN, auth_token); return result; } // If we get here, then we couldn't access the user's password - so we // need to re-prompt them for their credentials. We do that by creating // an intent to display our AuthenticatorActivity panel. final Intent intent = new Intent(mContext, LoginActivity.class); intent.putExtra(Constants.KEY_SERVER, am.getUserData(account, Constants.KEY_SERVER)); //intent.putExtra(LoginActivity.PARAM_AUTHTOKEN_TYPE, authTokenType); intent.putExtra(AccountManager.KEY_ACCOUNT_AUTHENTICATOR_RESPONSE, response); final Bundle bundle = new Bundle(); bundle.putParcelable(AccountManager.KEY_INTENT, intent); return bundle; } @Override public String getAuthTokenLabel(String authTokenType) { // null means we don't support multiple authToken types Log.v(TAG, "getAuthTokenLabel()"); return null; } @Override public Bundle hasFeatures( AccountAuthenticatorResponse response, Account account, String[] features) { // This call is used to query whether the Authenticator supports // specific features. We don't expect to get called, so we always // return false (no) for any queries. Log.v(TAG, "hasFeatures()"); final Bundle result = new Bundle(); result.putBoolean(AccountManager.KEY_BOOLEAN_RESULT, false); return result; } @Override public Bundle updateCredentials(AccountAuthenticatorResponse response, Account account, String authTokenType, Bundle loginOptions) { Log.v(TAG, "updateCredentials()"); return null; } }