[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [orbot/master] some lint cleanups



commit 75a64760e8eb25a8555797fd95bac3dd165282f4
Author: n8fr8 <nathan@xxxxxxxxxxxxxxxxxxxx>
Date:   Mon Feb 22 14:47:17 2021 -0500

    some lint cleanups
---
 .../torproject/android/service/OrbotService.java   | 131 ++++++++-------------
 1 file changed, 48 insertions(+), 83 deletions(-)

diff --git a/orbotservice/src/main/java/org/torproject/android/service/OrbotService.java b/orbotservice/src/main/java/org/torproject/android/service/OrbotService.java
index 7f6612a9..4aae0cef 100644
--- a/orbotservice/src/main/java/org/torproject/android/service/OrbotService.java
+++ b/orbotservice/src/main/java/org/torproject/android/service/OrbotService.java
@@ -42,7 +42,6 @@ import com.jaredrummler.android.shell.CommandResult;
 import net.freehaven.tor.control.TorControlCommands;
 import net.freehaven.tor.control.TorControlConnection;
 
-import org.apache.commons.io.FileUtils;
 import org.torproject.android.service.util.CustomShell;
 import org.torproject.android.service.util.CustomTorResourceInstaller;
 import org.torproject.android.service.util.DummyActivity;
@@ -72,6 +71,7 @@ import java.util.Collections;
 import java.util.Date;
 import java.util.HashMap;
 import java.util.Iterator;
+import java.util.Objects;
 import java.util.Random;
 import java.util.StringTokenizer;
 import java.util.concurrent.ExecutorService;
@@ -357,6 +357,28 @@ public class OrbotService extends VpnService implements TorServiceConstants, Orb
                 "ajax.aspnetcdn.com", null, true, false, true, 3);
     }
 
+    /*
+    This is to host a snowflake entrance node / bridge
+     */
+    private void runSnowflakeProxy () {
+        
+        // @param capacity Maximum concurrent clients. OPTIONAL. Defaults to 10, if 0.
+// @param broker Broker URL. OPTIONAL. Defaults to https://snowflake-broker.bamsoftware.com/, if empty.
+// @param relay WebSocket relay URL. OPTIONAL. Defaults to wss://snowflake.bamsoftware.com/, if empty.
+// @param stun STUN URL. OPTIONAL. Defaults to stun:stun.stunprotocol.org:3478, if empty.
+// @param logFile Name of log file. OPTIONAL
+// @param keepLocalAddresses Keep local LAN address ICE candidates.
+// @param unsafeLogging Prevent logs from being scrubbed.
+
+        int capacity = 3;
+        String broker = "https://snowflake-broker.bamsoftware.com/";;
+        String relay = "wss://snowflake.bamsoftware.com/";
+        String stun = "stun:stun.stunprotocol.org:3478";
+        String logFile = null;
+        boolean keepLocalAddresses = true;
+        boolean unsafeLogging = false;
+        IPtProxy.startSnowflakeProxy(capacity, broker, relay, stun, logFile, keepLocalAddresses, unsafeLogging);
+    }
     /**
      * if someone stops during startup, we may have to wait for the conn port to be setup, so we can properly shutdown tor
      */
@@ -429,19 +451,6 @@ public class OrbotService extends VpnService implements TorServiceConstants, Orb
             if (!appCacheHome.exists())
                 appCacheHome.mkdirs();
 
-
-            debug("listing files in DataDirectory: " + appCacheHome.getAbsolutePath());
-            Iterator<File> files = FileUtils.iterateFiles(appCacheHome, null, true);
-            while (files.hasNext()) {
-                File fileNext = files.next();
-                debug(fileNext.getAbsolutePath()
-                        + " length=" + fileNext.length()
-                        + " rw=" + fileNext.canRead() + "/" + fileNext.canWrite()
-                        + " lastMod=" + new Date(fileNext.lastModified()).toLocaleString()
-
-                );
-            }
-
             fileTorRc = new File(appBinHome, TORRC_ASSET_KEY);
             fileControlPort = new File(getFilesDir(), TOR_CONTROL_PORT_FILE);
             filePid = new File(getFilesDir(), TOR_PID_FILE);
@@ -721,11 +730,11 @@ public class OrbotService extends VpnService implements TorServiceConstants, Orb
         try {
 
             // STATUS_STARTING is set in onCreate()
-            if (mCurrentStatus == STATUS_STOPPING) {
+            if (mCurrentStatus.equals(STATUS_STOPPING)) {
                 // these states should probably be handled better
                 sendCallbackLogMessage("Ignoring start request, currently " + mCurrentStatus);
                 return;
-            } else if (mCurrentStatus == STATUS_ON && (mLastProcessId != -1)) {
+            } else if (mCurrentStatus.equals(STATUS_ON) && (mLastProcessId != -1)) {
                 showConnectedToTorNetworkNotification();
                 sendCallbackLogMessage("Ignoring start request, already started.");
                 // setTorNetworkEnabled (true);
@@ -948,7 +957,7 @@ public class OrbotService extends VpnService implements TorServiceConstants, Orb
 
         logNotice(getString(R.string.waiting_for_control_port));
 
-        while (conn == null && attempt++ < maxTries && (mCurrentStatus != STATUS_OFF)) {
+        while (conn == null && attempt++ < maxTries && (!mCurrentStatus.equals(STATUS_OFF))) {
             try {
                 controlPort = getControlPort();
                 if (controlPort != -1) {
@@ -1127,10 +1136,12 @@ public class OrbotService extends VpnService implements TorServiceConstants, Orb
                     try {
                         int iconId = R.drawable.ic_stat_tor;
 
-                        if (conn != null && mCurrentStatus == STATUS_ON && Prefs.expandedNotifications())
-                            showToolbarNotification(getString(R.string.newnym), NOTIFY_ID, iconId);
+                        if (conn != null) {
+                            if (mCurrentStatus.equals(STATUS_ON) && Prefs.expandedNotifications())
+                                showToolbarNotification(getString(R.string.newnym), NOTIFY_ID, iconId);
 
-                        conn.signal(TorControlCommands.SIGNAL_NEWNYM);
+                            conn.signal(TorControlCommands.SIGNAL_NEWNYM);
+                        }
 
                     } catch (Exception ioe) {
                         debug("error requesting newnym: " + ioe.getLocalizedMessage());
@@ -1200,52 +1211,6 @@ public class OrbotService extends VpnService implements TorServiceConstants, Orb
         return intent;
     }
 
-    /*
-     *  Another way to do this would be to use the Observer pattern by defining the
-     *  BroadcastReciever in the Android manifest.
-     */
-
-    /**
-     * private final BroadcastReceiver mNetworkStateReceiver = new BroadcastReceiver() {
-     *
-     * @Override public void onReceive(Context context, Intent intent) {
-     * <p>
-     * if (mCurrentStatus == STATUS_OFF)
-     * return;
-     * <p>
-     * SharedPreferences prefs = Prefs.getSharedPrefs(getApplicationContext());
-     * <p>
-     * boolean doNetworKSleep = prefs.getBoolean(OrbotConstants.PREF_DISABLE_NETWORK, true);
-     * <p>
-     * final ConnectivityManager cm = (ConnectivityManager) getSystemService(Context.CONNECTIVITY_SERVICE);
-     * final NetworkInfo netInfo = cm.getActiveNetworkInfo();
-     * <p>
-     * boolean newConnectivityState = false;
-     * int newNetType = -1;
-     * <p>
-     * if (netInfo!=null)
-     * newNetType = netInfo.getType();
-     * <p>
-     * if(netInfo != null && netInfo.isConnected()) {
-     * // WE ARE CONNECTED: DO SOMETHING
-     * newConnectivityState = true;
-     * }
-     * else {
-     * // WE ARE NOT: DO SOMETHING ELSE
-     * newConnectivityState = false;
-     * }
-     * <p>
-     * if (newConnectivityState != mConnectivity) {
-     * mConnectivity = newConnectivityState;
-     * <p>
-     * //if (mConnectivity)
-     * //  newIdentity();
-     * }
-     * <p>
-     * }
-     * };
-     **/
-
     private StringBuffer processSettingsImpl(StringBuffer extraLines) throws IOException {
         logNotice(getString(R.string.updating_settings_in_tor_service));
         SharedPreferences prefs = Prefs.getSharedPrefs(getApplicationContext());
@@ -1275,17 +1240,17 @@ public class OrbotService extends VpnService implements TorServiceConstants, Orb
                     String proxyPass = prefs.getString("pref_proxy_password", null);
 
                     if ((proxyHost != null && proxyHost.length() > 0) && (proxyPort != null && proxyPort.length() > 0)) {
-                        extraLines.append(proxyType + "Proxy" + ' ' + proxyHost + ':' + proxyPort).append('\n');
+                        extraLines.append(proxyType).append("Proxy").append(' ').append(proxyHost).append(':').append(proxyPort).append('\n');
 
                         if (proxyUser != null && proxyPass != null) {
                             if (proxyType.equalsIgnoreCase("socks5")) {
-                                extraLines.append("Socks5ProxyUsername" + ' ' + proxyUser).append('\n');
-                                extraLines.append("Socks5ProxyPassword" + ' ' + proxyPass).append('\n');
+                                extraLines.append("Socks5ProxyUsername").append(' ').append(proxyUser).append('\n');
+                                extraLines.append("Socks5ProxyPassword").append(' ').append(proxyPass).append('\n');
                             } else
-                                extraLines.append(proxyType + "ProxyAuthenticator" + ' ' + proxyUser + ':' + proxyPort).append('\n');
+                                extraLines.append(proxyType).append("ProxyAuthenticator").append(' ').append(proxyUser).append(':').append(proxyPort).append('\n');
 
                         } else if (proxyPass != null)
-                            extraLines.append(proxyType + "ProxyAuthenticator" + ' ' + proxyUser + ':' + proxyPort).append('\n');
+                            extraLines.append(proxyType).append("ProxyAuthenticator").append(' ').append(proxyUser).append(':').append(proxyPort).append('\n');
                     }
                 }
             }
@@ -1335,25 +1300,25 @@ public class OrbotService extends VpnService implements TorServiceConstants, Orb
         File fileGeoIP6 = new File(appBinHome, GEOIP6_ASSET_KEY);
 
         if (fileGeoIP.exists()) {
-            extraLines.append("GeoIPFile" + ' ' + fileGeoIP.getCanonicalPath()).append('\n');
-            extraLines.append("GeoIPv6File" + ' ' + fileGeoIP6.getCanonicalPath()).append('\n');
+            extraLines.append("GeoIPFile" + ' ').append(fileGeoIP.getCanonicalPath()).append('\n');
+            extraLines.append("GeoIPv6File" + ' ').append(fileGeoIP6.getCanonicalPath()).append('\n');
         }
 
         if (!TextUtils.isEmpty(entranceNodes))
-            extraLines.append("EntryNodes" + ' ' + entranceNodes).append('\n');
+            extraLines.append("EntryNodes" + ' ').append(entranceNodes).append('\n');
 
         if (!TextUtils.isEmpty(exitNodes))
-            extraLines.append("ExitNodes" + ' ' + exitNodes).append('\n');
+            extraLines.append("ExitNodes" + ' ').append(exitNodes).append('\n');
 
         if (!TextUtils.isEmpty(excludeNodes))
-            extraLines.append("ExcludeNodes" + ' ' + excludeNodes).append('\n');
+            extraLines.append("ExcludeNodes" + ' ').append(excludeNodes).append('\n');
 
-        extraLines.append("StrictNodes" + ' ' + (enableStrictNodes ? "1" : "0")).append('\n');
+        extraLines.append("StrictNodes" + ' ').append(enableStrictNodes ? "1" : "0").append('\n');
 
         try {
             if (ReachableAddresses) {
                 String ReachableAddressesPorts = prefs.getString(OrbotConstants.PREF_REACHABLE_ADDRESSES_PORTS, "*:80,*:443");
-                extraLines.append("ReachableAddresses" + ' ' + ReachableAddressesPorts).append('\n');
+                extraLines.append("ReachableAddresses" + ' ').append(ReachableAddressesPorts).append('\n');
             }
 
         } catch (Exception e) {
@@ -1363,14 +1328,14 @@ public class OrbotService extends VpnService implements TorServiceConstants, Orb
 
         try {
             if (becomeRelay && (!useBridges) && (!ReachableAddresses)) {
-                int ORPort = Integer.parseInt(prefs.getString(OrbotConstants.PREF_OR_PORT, "9001"));
+                int ORPort = Integer.parseInt(Objects.requireNonNull(prefs.getString(OrbotConstants.PREF_OR_PORT, "9001")));
                 String nickname = prefs.getString(OrbotConstants.PREF_OR_NICKNAME, "Orbot");
                 String dnsFile = writeDNSFile();
 
-                extraLines.append("ServerDNSResolvConfFile" + ' ' + dnsFile).append('\n');
-                extraLines.append("ORPort" + ' ' + ORPort).append('\n');
-                extraLines.append("Nickname" + ' ' + nickname).append('\n');
-                extraLines.append("ExitPolicy" + ' ' + "reject *:*").append('\n');
+                extraLines.append("ServerDNSResolvConfFile").append(' ').append(dnsFile).append('\n');
+                extraLines.append("ORPort").append(' ').append(ORPort).append('\n');
+                extraLines.append("Nickname").append(' ').append(nickname).append('\n');
+                StringBuffer append = extraLines.append("ExitPolicy").append(' ').append("reject *:*").append('\n');
 
             }
         } catch (Exception e) {



_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits