Merge branch 'saml_based_federated_single_sign_on' into saml_based_federated_single_s...
authorDavid A. Velasco <dvelasco@solidgear.es>
Fri, 23 Aug 2013 12:37:14 +0000 (14:37 +0200)
committerDavid A. Velasco <dvelasco@solidgear.es>
Fri, 23 Aug 2013 12:37:14 +0000 (14:37 +0200)
1  2 
res/layout-land/account_setup.xml
res/layout/account_setup.xml
src/com/owncloud/android/authentication/AuthenticatorActivity.java

@@@ -43,6 -43,7 +43,7 @@@
                    android:layout_width="0dp"\r
                    android:layout_height="match_parent"\r
                    android:layout_weight="1"\r
+                   android:id="@+id/scroll"\r
                    android:fillViewport="true"\r
                    android:orientation="vertical" >\r
                                                \r
@@@ -50,7 -51,6 +51,6 @@@
                            android:id="@+id/LinearLayout1"\r
                            android:layout_width="match_parent"\r
                            android:layout_height="wrap_content"\r
-                           android:focusable="true"\r
                            android:gravity="center"\r
                            android:orientation="vertical"\r
                            android:padding="8dp" >\r
                        android:onClick="onRefreshClick"\r
                                    android:text="@string/auth_check_server"\r
                                    android:visibility="gone" />\r
 -              \r
 +                              <TextView\r
 +                                  android:id="@+id/auth_message"\r
 +                                  android:layout_width="wrap_content"\r
 +                                  android:layout_height="wrap_content"\r
 +                                  android:layout_gravity="fill_horizontal"\r
 +                                  android:text="@string/auth_expired_basic_auth_toast" \r
 +                                  android:visibility="gone"\r
 +                                  android:layout_marginBottom="10dp"/>\r
                            <FrameLayout \r
                                android:id="@+id/hostUrlFrame"\r
                                        android:layout_width="match_parent"\r
      android:layout_height="match_parent"\r
      android:layout_gravity="center"\r
      android:fillViewport="true"\r
-     android:orientation="vertical" >\r
+     android:orientation="vertical" \r
+     android:id="@+id/scroll"\r
+     >\r
  \r
      <LinearLayout\r
          android:layout_width="match_parent"\r
          android:layout_height="wrap_content"\r
-         android:focusable="true"\r
          android:gravity="center"\r
          android:orientation="vertical"\r
          android:padding="8dp" >\r
              android:onClick="onRefreshClick"\r
              android:text="@string/auth_check_server"\r
              android:visibility="gone" />\r
 +        \r
 +        <TextView\r
 +            android:id="@+id/auth_message"\r
 +            android:layout_width="wrap_content"\r
 +            android:layout_height="wrap_content"\r
 +            android:layout_gravity="fill_horizontal"\r
 +            android:text="@string/auth_expired_basic_auth_toast"\r
 +            android:visibility="gone"\r
 +            android:layout_marginBottom="10dp" />\r
  \r
            <FrameLayout \r
                android:id="@+id/hostUrlFrame"\r
@@@ -18,6 -18,8 +18,6 @@@
  \r
  package com.owncloud.android.authentication;\r
  \r
 -import java.net.URLDecoder;\r
 -\r
  import android.accounts.Account;\r
  import android.accounts.AccountManager;\r
  import android.app.AlertDialog;\r
@@@ -49,6 -51,7 +49,6 @@@ import android.widget.CheckBox
  import android.widget.EditText;\r
  import android.widget.TextView;\r
  import android.widget.TextView.OnEditorActionListener;\r
 -import android.widget.Toast;\r
  \r
  import com.actionbarsherlock.app.SherlockDialogFragment;\r
  import com.owncloud.android.Log_OC;\r
@@@ -86,8 -89,6 +86,8 @@@ implements  OnRemoteOperationListener, 
      public static final String EXTRA_ACTION = "ACTION";\r
      public static final String EXTRA_ENFORCED_UPDATE = "ENFORCE_UPDATE";\r
  \r
 +    private static final String KEY_AUTH_MESSAGE_VISIBILITY = "AUTH_MESSAGE_VISIBILITY";\r
 +    private static final String KEY_AUTH_MESSAGE_TEXT = "AUTH_MESSAGE_TEXT";\r
      private static final String KEY_HOST_URL_TEXT = "HOST_URL_TEXT";\r
      private static final String KEY_OC_VERSION = "OC_VERSION";\r
      private static final String KEY_ACCOUNT = "ACCOUNT";\r
      private String mHostBaseUrl;\r
      private OwnCloudVersion mDiscoveredVersion;\r
  \r
 -    private int mServerStatusText, mServerStatusIcon;\r
 +    private String mAuthMessageText;\r
 +    private int mAuthMessageVisibility, mServerStatusText, mServerStatusIcon;\r
      private boolean mServerIsChecked, mServerIsValid, mIsSslConn;\r
      private int mAuthStatusText, mAuthStatusIcon;    \r
      private TextView mAuthStatusLayout;\r
      private byte mAction;\r
      private Account mAccount;\r
  \r
 +    private TextView mAuthMessage;\r
 +    \r
      private EditText mHostUrlInput;\r
      private boolean mHostUrlInputEnabled;\r
      private View mRefreshButton;\r
  \r
-     private String mCurrentAuthTokenType;\r
+     private String mAuthTokenType;\r
      \r
      private EditText mUsernameInput;\r
      private EditText mPasswordInput;\r
  \r
          /// set view and get references to view elements\r
          setContentView(R.layout.account_setup);\r
 +        mAuthMessage = (TextView) findViewById(R.id.auth_message);\r
          mHostUrlInput = (EditText) findViewById(R.id.hostUrlInput);\r
          mHostUrlInput.setText(getString(R.string.server_url));  // valid although R.string.server_url is an empty string\r
          mUsernameInput = (EditText) findViewById(R.id.account_username);\r
  \r
          if (savedInstanceState == null) {\r
              /// connection state and info\r
 +            mAuthMessageVisibility = View.GONE;\r
              mServerStatusText = mServerStatusIcon = 0;\r
              mServerIsValid = false;\r
              mServerIsChecked = false;\r
                  }\r
                  mHostBaseUrl = normalizeUrl(mAccountMgr.getUserData(mAccount, AccountAuthenticator.KEY_OC_BASE_URL));\r
                  mHostUrlInput.setText(mHostBaseUrl);\r
 +                String userName = mAccount.name.substring(0, mAccount.name.lastIndexOf('@'));\r
 +                mUsernameInput.setText(userName);\r
              }\r
              initAuthorizationMethod();  // checks intent and setup.xml to determine mCurrentAuthorizationMethod\r
              mJustCreated = true;\r
              \r
          } else {\r
              /// connection state and info\r
 +            mAuthMessageVisibility = savedInstanceState.getInt(KEY_AUTH_MESSAGE_VISIBILITY);\r
 +            mAuthMessageText = savedInstanceState.getString(KEY_AUTH_MESSAGE_TEXT);\r
              mServerIsValid = savedInstanceState.getBoolean(KEY_SERVER_VALID);\r
              mServerIsChecked = savedInstanceState.getBoolean(KEY_SERVER_CHECKED);\r
              mServerStatusText = savedInstanceState.getInt(KEY_SERVER_STATUS_TEXT);\r
  \r
              // account data, if updating\r
              mAccount = savedInstanceState.getParcelable(KEY_ACCOUNT);\r
-             mCurrentAuthTokenType = savedInstanceState.getString(AccountAuthenticator.KEY_AUTH_TOKEN_TYPE);\r
-             if (mCurrentAuthTokenType == null) {\r
-                 mCurrentAuthTokenType =  AccountAuthenticator.AUTH_TOKEN_TYPE_PASSWORD;\r
+             mAuthTokenType = savedInstanceState.getString(AccountAuthenticator.KEY_AUTH_TOKEN_TYPE);\r
+             if (mAuthTokenType == null) {\r
+                 mAuthTokenType =  AccountAuthenticator.AUTH_TOKEN_TYPE_PASSWORD;\r
                  \r
              }\r
  \r
  \r
          }\r
  \r
 +        if (mAuthMessageVisibility== View.VISIBLE) {\r
 +            showAuthMessage(mAuthMessageText);\r
 +        }\r
 +        else {\r
 +            hideAuthMessage();\r
 +        }\r
          adaptViewAccordingToAuthenticationMethod();\r
          showServerStatus();\r
          showAuthStatus();\r
          if (mServerIsChecked && !mServerIsValid && refreshButtonEnabled) showRefreshButton();\r
          mOkButton.setEnabled(mServerIsValid); // state not automatically recovered in configuration changes\r
  \r
-         if (AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mCurrentAuthTokenType) || \r
+         if (AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mAuthTokenType) || \r
                  !AUTH_OPTIONAL.equals(getString(R.string.auth_method_oauth2))) {\r
              mOAuth2Check.setVisibility(View.GONE);\r
          }\r
              }\r
          });\r
          \r
+         findViewById(R.id.scroll).setOnTouchListener(new OnTouchListener() {\r
+             @Override\r
+             public boolean onTouch(View view, MotionEvent event) {\r
+                 if (event.getAction() == MotionEvent.ACTION_DOWN) {\r
+                     if (AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mAuthTokenType) &&\r
+                             mHostUrlInput.hasFocus()) {\r
+                         checkOcServer();\r
+                     }\r
+                 }\r
+                 return false;\r
+             }\r
+         });\r
      }\r
      \r
     \r
          boolean oAuthRequired = false;\r
          boolean samlWebSsoRequired = false;\r
  \r
-         mCurrentAuthTokenType = getIntent().getExtras().getString(AccountAuthenticator.KEY_AUTH_TOKEN_TYPE);\r
+         mAuthTokenType = getIntent().getExtras().getString(AccountAuthenticator.KEY_AUTH_TOKEN_TYPE);\r
          mAccount = getIntent().getExtras().getParcelable(EXTRA_ACCOUNT);\r
          \r
          // TODO could be a good moment to validate the received token type, if not null\r
          \r
-         if (mCurrentAuthTokenType == null) {    \r
+         if (mAuthTokenType == null) {    \r
              if (mAccount != null) {\r
                  /// same authentication method than the one used to create the account to update\r
                  oAuthRequired = (mAccountMgr.getUserData(mAccount, AccountAuthenticator.KEY_SUPPORTS_OAUTH2) != null);\r
                  samlWebSsoRequired = AUTH_ON.equals(getString(R.string.auth_method_saml_web_sso));            \r
              }\r
              if (oAuthRequired) {\r
-                 mCurrentAuthTokenType = AccountAuthenticator.AUTH_TOKEN_TYPE_ACCESS_TOKEN;\r
+                 mAuthTokenType = AccountAuthenticator.AUTH_TOKEN_TYPE_ACCESS_TOKEN;\r
              } else if (samlWebSsoRequired) {\r
-                 mCurrentAuthTokenType = AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE;\r
+                 mAuthTokenType = AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE;\r
              } else {\r
-                 mCurrentAuthTokenType = AccountAuthenticator.AUTH_TOKEN_TYPE_PASSWORD;\r
+                 mAuthTokenType = AccountAuthenticator.AUTH_TOKEN_TYPE_PASSWORD;\r
              }\r
          }\r
      \r
              mUsernameInput.setText(userName);\r
          }\r
          \r
-         mOAuth2Check.setChecked(AccountAuthenticator.AUTH_TOKEN_TYPE_ACCESS_TOKEN.equals(mCurrentAuthTokenType));\r
+         mOAuth2Check.setChecked(AccountAuthenticator.AUTH_TOKEN_TYPE_ACCESS_TOKEN.equals(mAuthTokenType));\r
          \r
      }\r
  \r
          super.onSaveInstanceState(outState);\r
  \r
          /// connection state and info\r
 +        outState.putInt(KEY_AUTH_MESSAGE_VISIBILITY, mAuthMessage.getVisibility());\r
 +        outState.putString(KEY_AUTH_MESSAGE_TEXT, mAuthMessage.getText().toString());\r
          outState.putInt(KEY_SERVER_STATUS_TEXT, mServerStatusText);\r
          outState.putInt(KEY_SERVER_STATUS_ICON, mServerStatusIcon);\r
          outState.putBoolean(KEY_SERVER_VALID, mServerIsValid);\r
          if (mAccount != null) {\r
              outState.putParcelable(KEY_ACCOUNT, mAccount);\r
          }\r
-         outState.putString(AccountAuthenticator.KEY_AUTH_TOKEN_TYPE, mCurrentAuthTokenType);\r
+         outState.putString(AccountAuthenticator.KEY_AUTH_TOKEN_TYPE, mAuthTokenType);\r
          \r
          // refresh button enabled\r
          outState.putBoolean(KEY_REFRESH_BUTTON_ENABLED, (mRefreshButton.getVisibility() == View.VISIBLE));\r
      protected void onResume() {\r
          super.onResume();\r
          if (mAction == ACTION_UPDATE_TOKEN && mJustCreated && getIntent().getBooleanExtra(EXTRA_ENFORCED_UPDATE, false)) {\r
-             if (AccountAuthenticator.AUTH_TOKEN_TYPE_ACCESS_TOKEN.equals(mCurrentAuthTokenType)) {\r
 -            if (mOAuth2Check.isChecked())\r
 -                Toast.makeText(this, R.string.auth_expired_oauth_token_toast, Toast.LENGTH_LONG).show();\r
 -            else\r
 -                Toast.makeText(this, R.string.auth_expired_basic_auth_toast, Toast.LENGTH_LONG).show();\r
++            if (AccountAuthenticator.AUTH_TOKEN_TYPE_ACCESS_TOKEN.equals(mAuthTokenType)) {\r
 +                //Toast.makeText(this, R.string.auth_expired_oauth_token_toast, Toast.LENGTH_LONG).show();\r
 +                showAuthMessage(getString(R.string.auth_expired_oauth_token_toast));\r
-             } else if (AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mCurrentAuthTokenType)) {\r
++            } else if (AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mAuthTokenType)) {\r
 +                //Toast.makeText(this, R.string.auth_expired_saml_sso_token_toast, Toast.LENGTH_LONG).show();\r
 +                showAuthMessage(getString(R.string.auth_expired_saml_sso_token_toast));\r
 +            } else {\r
 +                //Toast.makeText(this, R.string.auth_expired_basic_auth_toast, Toast.LENGTH_LONG).show();\r
 +                showAuthMessage(getString(R.string.auth_expired_basic_auth_toast));\r
 +            }\r
          }\r
  \r
          if (mNewCapturedUriFromOAuth2Redirection != null) {\r
              return;\r
          }\r
  \r
-         hideAuthMessage();\r
-         if (AccountAuthenticator.AUTH_TOKEN_TYPE_ACCESS_TOKEN.equals(mCurrentAuthTokenType)) {\r
+         if (AccountAuthenticator.AUTH_TOKEN_TYPE_ACCESS_TOKEN.equals(mAuthTokenType)) {\r
              startOauthorization();\r
-         } else if (AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mCurrentAuthTokenType)) { \r
+         } else if (AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mAuthTokenType)) { \r
              startSamlBasedFederatedSingleSignOnAuthorization();\r
          } else {\r
              checkBasicAuthorization();\r
       */\r
      private void checkBasicAuthorization() {\r
          /// get the path to the root folder through WebDAV from the version server\r
-         String webdav_path = AccountUtils.getWebdavPath(mDiscoveredVersion, mCurrentAuthTokenType);\r
+         String webdav_path = AccountUtils.getWebdavPath(mDiscoveredVersion, mAuthTokenType);\r
  \r
          /// get basic credentials entered by user\r
          String username = mUsernameInput.getText().toString();\r
          showDialog(DIALOG_LOGIN_PROGRESS);\r
          \r
          /// get the path to the root folder through WebDAV from the version server\r
-         String webdav_path = AccountUtils.getWebdavPath(mDiscoveredVersion, mCurrentAuthTokenType);\r
+         String webdav_path = AccountUtils.getWebdavPath(mDiscoveredVersion, mAuthTokenType);\r
  \r
          /// test credentials accessing the root folder\r
          mAuthCheckOperation = new  ExistenceCheckOperation("", this, false);\r
              onGetOAuthAccessTokenFinish((OAuth2GetAccessToken)operation, result);\r
  \r
          } else if (operation instanceof ExistenceCheckOperation)  {\r
-             if (AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mCurrentAuthTokenType)) {\r
+             if (AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mAuthTokenType)) {\r
                  onSamlBasedFederatedSingleSignOnAuthorizationStart(operation, result);\r
                  \r
              } else {\r
              // NOTHING TO DO ; can't find out what situation that leads to the exception in this code, but user logs signal that it happens\r
          }\r
          \r
 -        if (result.isTemporalRedirection() || result.isIdPRedirection()) {\r
 +        if (result.isTemporalRedirection() && result.isIdPRedirection()) {\r
              String url = result.getRedirectedLocation();\r
-             String targetUrl = mHostBaseUrl + AccountUtils.getWebdavPath(mDiscoveredVersion, mCurrentAuthTokenType);\r
+             String targetUrl = mHostBaseUrl + AccountUtils.getWebdavPath(mDiscoveredVersion, mAuthTokenType);\r
              \r
              // Show dialog\r
              mSamlDialog = SamlWebViewDialog.newInstance(url, targetUrl);            \r
              }\r
  \r
          }\r
-         Log_OC.d(TAG, "URL Normalize " + url);\r
          return (url != null ? url : "");\r
      }\r
  \r
          case ACCOUNT_NOT_NEW:\r
              mAuthStatusText = R.string.auth_account_not_new;\r
              break;\r
 +        case ACCOUNT_NOT_THE_SAME:\r
 +            mAuthStatusText = R.string.auth_account_not_the_same;\r
 +            break;\r
          case UNHANDLED_HTTP_CODE:\r
          case UNKNOWN_ERROR:\r
              mAuthStatusText = R.string.auth_unknown_error_title;\r
              // NOTHING TO DO ; can't find out what situation that leads to the exception in this code, but user logs signal that it happens\r
          }\r
  \r
-         String webdav_path = AccountUtils.getWebdavPath(mDiscoveredVersion, mCurrentAuthTokenType);\r
+         String webdav_path = AccountUtils.getWebdavPath(mDiscoveredVersion, mAuthTokenType);\r
          if (result.isSuccess() && webdav_path != null) {\r
              /// be gentle with the user\r
              showDialog(DIALOG_LOGIN_PROGRESS);\r
          if (result.isSuccess()) {\r
              Log_OC.d(TAG, "Successful access - time to save the account");\r
  \r
 -            boolean success = true;\r
 +            boolean success = false;\r
              if (mAction == ACTION_CREATE) {\r
                  success = createAccount();\r
  \r
              } else {\r
 -                updateToken();\r
 +                success = updateToken();\r
              }\r
  \r
              if (success) {\r
       * Sets the proper response to get that the Account Authenticator that started this activity saves \r
       * a new authorization token for mAccount.\r
       */\r
 -    private void updateToken() {\r
 +    private boolean updateToken() {\r
          Bundle response = new Bundle();\r
          response.putString(AccountManager.KEY_ACCOUNT_NAME, mAccount.name);\r
          response.putString(AccountManager.KEY_ACCOUNT_TYPE, mAccount.type);\r
          \r
-         if (AccountAuthenticator.AUTH_TOKEN_TYPE_ACCESS_TOKEN.equals(mCurrentAuthTokenType)) { \r
+         if (AccountAuthenticator.AUTH_TOKEN_TYPE_ACCESS_TOKEN.equals(mAuthTokenType)) { \r
              response.putString(AccountManager.KEY_AUTHTOKEN, mAuthToken);\r
              // the next line is necessary; by now, notifications are calling directly to the AuthenticatorActivity to update, without AccountManager intervention\r
-             mAccountMgr.setAuthToken(mAccount, mCurrentAuthTokenType, mAuthToken);\r
+             mAccountMgr.setAuthToken(mAccount, mAuthTokenType, mAuthToken);\r
              \r
-         } else if (AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mCurrentAuthTokenType)) {\r
+         } else if (AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mAuthTokenType)) {\r
 +            String username = getUserNameForSamlSso();\r
 +            if (!mUsernameInput.getText().toString().equals(username)) {\r
 +                // fail - not a new account, but an existing one; disallow\r
 +                RemoteOperationResult result = new RemoteOperationResult(ResultCode.ACCOUNT_NOT_THE_SAME); \r
 +                updateAuthStatusIconAndText(result);\r
 +                showAuthStatus();\r
 +                Log_OC.d(TAG, result.getLogMessage());\r
 +                \r
 +                return false;\r
 +            }\r
 +            \r
              response.putString(AccountManager.KEY_AUTHTOKEN, mAuthToken);\r
              // the next line is necessary; by now, notifications are calling directly to the AuthenticatorActivity to update, without AccountManager intervention\r
-             mAccountMgr.setAuthToken(mAccount, mCurrentAuthTokenType, mAuthToken);\r
+             mAccountMgr.setAuthToken(mAccount, mAuthTokenType, mAuthToken);\r
              \r
          } else {\r
              response.putString(AccountManager.KEY_AUTHTOKEN, mPasswordInput.getText().toString());\r
              mAccountMgr.setPassword(mAccount, mPasswordInput.getText().toString());\r
          }\r
          setAccountAuthenticatorResult(response);\r
 +        \r
 +        return true;\r
      }\r
  \r
  \r
       */\r
      private boolean createAccount() {\r
          /// create and save new ownCloud account\r
-         boolean isOAuth = AccountAuthenticator.AUTH_TOKEN_TYPE_ACCESS_TOKEN.equals(mCurrentAuthTokenType);\r
-         boolean isSaml =  AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mCurrentAuthTokenType);\r
+         boolean isOAuth = AccountAuthenticator.AUTH_TOKEN_TYPE_ACCESS_TOKEN.equals(mAuthTokenType);\r
+         boolean isSaml =  AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mAuthTokenType);\r
  \r
          Uri uri = Uri.parse(mHostBaseUrl);\r
          String username = mUsernameInput.getText().toString().trim();\r
              Log_OC.d(TAG, result.getLogMessage());\r
              return false;\r
              \r
 -            \r
          } else {\r
          \r
              if (isOAuth || isSaml) {\r
                  intent.putExtra(AccountManager.KEY_AUTHTOKEN,   AccountAuthenticator.ACCOUNT_TYPE); */\r
              intent.putExtra(AccountManager.KEY_USERDATA,        username);\r
              if (isOAuth || isSaml) {\r
-                 mAccountMgr.setAuthToken(mAccount, mCurrentAuthTokenType, mAuthToken);\r
+                 mAccountMgr.setAuthToken(mAccount, mAuthTokenType, mAuthToken);\r
              }\r
              /// add user data to the new account; TODO probably can be done in the last parameter addAccountExplicitly, or in KEY_USERDATA\r
              mAccountMgr.setUserData(mAccount, AccountAuthenticator.KEY_OC_VERSION,    mDiscoveredVersion.toString());\r
              Bundle bundle = new Bundle();\r
              bundle.putBoolean(ContentResolver.SYNC_EXTRAS_MANUAL, true);\r
              ContentResolver.requestSync(mAccount, AccountAuthenticator.AUTHORITY, bundle);\r
 +            syncAccount();\r
 +//          Bundle bundle = new Bundle();\r
 +//          bundle.putBoolean(ContentResolver.SYNC_EXTRAS_MANUAL, true);\r
 +//          ContentResolver.requestSync(mAccount, AccountAuthenticator.AUTHORITY, bundle);\r
              return true;\r
          }\r
      }\r
      public void onCheckClick(View view) {\r
          CheckBox oAuth2Check = (CheckBox)view;\r
          if (oAuth2Check.isChecked()) {\r
-             mCurrentAuthTokenType = AccountAuthenticator.AUTH_TOKEN_TYPE_ACCESS_TOKEN;\r
+             mAuthTokenType = AccountAuthenticator.AUTH_TOKEN_TYPE_ACCESS_TOKEN;\r
          } else {\r
-             mCurrentAuthTokenType = AccountAuthenticator.AUTH_TOKEN_TYPE_PASSWORD;\r
+             mAuthTokenType = AccountAuthenticator.AUTH_TOKEN_TYPE_PASSWORD;\r
          }\r
          adaptViewAccordingToAuthenticationMethod();\r
      }\r
       * the current authorization method.\r
       */\r
      private void adaptViewAccordingToAuthenticationMethod () {\r
-         if (AccountAuthenticator.AUTH_TOKEN_TYPE_ACCESS_TOKEN.equals(mCurrentAuthTokenType)) {\r
+         if (AccountAuthenticator.AUTH_TOKEN_TYPE_ACCESS_TOKEN.equals(mAuthTokenType)) {\r
              // OAuth 2 authorization\r
              mOAuthAuthEndpointText.setVisibility(View.VISIBLE);\r
              mOAuthTokenEndpointText.setVisibility(View.VISIBLE);\r
              mUsernameInput.setVisibility(View.GONE);\r
              mPasswordInput.setVisibility(View.GONE);\r
              \r
-         } else if (AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mCurrentAuthTokenType)) {\r
+         } else if (AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mAuthTokenType)) {\r
              // SAML-based web Single Sign On\r
              mOAuthAuthEndpointText.setVisibility(View.GONE);\r
              mOAuthTokenEndpointText.setVisibility(View.GONE);\r
              }\r
              \r
          } else if (actionId == EditorInfo.IME_ACTION_NEXT && inputField != null && inputField.equals(mHostUrlInput)) {\r
-             if (AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mCurrentAuthTokenType)) {\r
+             if (AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mAuthTokenType)) {\r
                  checkOcServer();\r
              }\r
          }\r
          mAuthToken = sessionCookie;\r
          \r
          if (sessionCookie != null && sessionCookie.length() > 0) {\r
-             Log_OC.d(TAG, "Successful SSO - time to save the account");\r
              mAuthToken = sessionCookie;\r
 -            boolean success = true;\r
 +            boolean success = false;\r
              if (mAction == ACTION_CREATE) {\r
                  success = createAccount();\r
          \r
              } else {\r
 -                updateToken();\r
 +                success = updateToken();\r
              }\r
              if (success) {\r
                  finish();\r
      \r
      }\r
      \r
 +    /** Show auth_message \r
 +     * \r
 +     * @param message\r
 +     */\r
 +    private void showAuthMessage(String message) {\r
 +       mAuthMessage.setVisibility(View.VISIBLE);\r
 +       mAuthMessage.setText(message);\r
 +    }\r
 +    \r
 +    private void hideAuthMessage() {\r
 +        mAuthMessage.setVisibility(View.GONE);\r
 +    }\r
  \r
-     \r
      private void syncAccount(){\r
          /// immediately request for the synchronization of the new account\r
          Bundle bundle = new Bundle();\r
          bundle.putBoolean(ContentResolver.SYNC_EXTRAS_MANUAL, true);\r
          ContentResolver.requestSync(mAccount, AccountAuthenticator.AUTHORITY, bundle);\r
      }\r
+     \r
+     @Override\r
+     public boolean onTouchEvent(MotionEvent event) {\r
+         if (AccountAuthenticator.AUTH_TOKEN_TYPE_SAML_WEB_SSO_SESSION_COOKIE.equals(mAuthTokenType) &&\r
+                 mHostUrlInput.hasFocus() && event.getAction() == MotionEvent.ACTION_DOWN) {\r
+             checkOcServer();\r
+         }\r
+         return super.onTouchEvent(event);\r
+     }\r
  }\r