Skip to content

Conversation

@haslinghuis
Copy link
Member

@haslinghuis haslinghuis commented May 14, 2025

Status

  • Change Data Stream: Replace BufferedReader/BufferedWriter with raw InputStream/OutputStream.
  • Continuous Reading: Replace the single-call receive method with a background thread that continually reads data and uses this.notifyListeners (or bridge.trigger...) to push events (dataReceived) asynchronously to the JavaScript side.
  • Data Format: The data payload sent back to JavaScript should be a Base64-encoded string of the raw binary data, as this is the standard way to transfer binary from native to JS in a Capacitor plugin.
  • Rebase after Add USB serial support for Android (Capacitor) #4698
  • Add Android permissions to manifest
  • Add protocol to serial facade.
  • Update compatibility checks

Summary by CodeRabbit

  • New Features

    • In-app TCP socket support on Android: connect, send, receive, disconnect, connection status and incoming-data events.
    • Web fallback that logs unsupported socket use and returns safe default responses.
  • Chores

    • Packaging/build setup for the new socket plugin.
    • Plugin registration in the Android app and lifecycle cleanup integration.

@haslinghuis haslinghuis added this to the 11.0 milestone May 14, 2025
@haslinghuis haslinghuis self-assigned this May 14, 2025
@coderabbitai
Copy link
Contributor

coderabbitai bot commented May 14, 2025

Walkthrough

Adds a new Capacitor Socket plugin: Android native implementation providing TCP connect/send/receive/disconnect/getStatus with lifecycle cleanup and evented reads; a web shim returning no-op responses; TypeScript definitions and package metadata; and registers the Android plugin in MainActivity.onCreate.

Changes

Cohort / File(s) Change Summary
Android plugin class
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java
New Android Capacitor plugin implementing TCP socket operations: connect, send, receive, disconnect, getStatus; internal ConnectionState enum (DISCONNECTED, CONNECTING, CONNECTED, DISCONNECTING, ERROR) with AtomicReference, ReentrantLocks for I/O, async reader thread emitting dataReceived events, resource cleanup, unified error handling, and overridden handleOnDestroy.
Android activity registration
android/app/src/main/java/betaflight/configurator/MainActivity.java
MainActivity updated to import android.os.Bundle and betaflight.configurator.plugin.SocketPlugin, override onCreate(Bundle), call super.onCreate(...), and register SocketPlugin via registerPlugin(SocketPlugin.class).
Plugin package metadata
capacitor-plugin-socket/package.json
New package.json for the capacitor-plugin-socket package defining metadata, entry points, published files, build scripts, and peer/dev dependencies.
TypeScript API definitions
capacitor-plugin-socket/src/definitions.ts
New exported SocketPlugin interface with async methods and signatures: connect({ ip, port }), send({ data }), receive(), disconnect(), getStatus().
Plugin entrypoint
capacitor-plugin-socket/src/index.ts
New entry registering/exporting SocketPlugin via registerPlugin, re-exports definitions, and lazily loads the web implementation.
Web shim implementation
capacitor-plugin-socket/src/web.ts
New SocketPluginWeb class (extends WebPlugin) implementing the interface with stub methods that log unsupported operations and return default disconnected/no-op responses (success: false, empty data, connected: false, state: 'disconnected').

Sequence Diagram(s)

sequenceDiagram
    participant App
    participant SocketPluginAndroid as SocketPlugin (Android)
    participant TCPServer as TCP Server

    App->>SocketPluginAndroid: connect({ ip, port })
    Note right of SocketPluginAndroid `#dff0d8`: validate inputs, set CONNECTING
    SocketPluginAndroid->>TCPServer: open TCP socket (async, timeout)
    alt success
        SocketPluginAndroid-->>App: { success: true }
        Note right of SocketPluginAndroid `#dff0d8`: state -> CONNECTED, start reader thread
    else fail
        SocketPluginAndroid-->>App: { success: false, error }
        Note right of SocketPluginAndroid `#f2dede`: state -> ERROR, cleanup
    end

    App->>SocketPluginAndroid: send({ data })
    Note right of SocketPluginAndroid `#dff0d8`: writerLock, write newline-delimited, flush
    SocketPluginAndroid-->>App: { success: true/false }

    TCPServer-->>SocketPluginAndroid: data line
    SocketPluginAndroid-->>App: emit event/dataReceived

    App->>SocketPluginAndroid: getStatus()
    SocketPluginAndroid-->>App: { connected: boolean, state: string }

    App->>SocketPluginAndroid: disconnect()
    Note right of SocketPluginAndroid `#dff0d8`: set DISCONNECTING, close resources
    SocketPluginAndroid-->>App: { success: true }
    Note right of SocketPluginAndroid `#dff0d8`: state -> DISCONNECTED
Loading
sequenceDiagram
    participant App
    participant SocketPluginWeb as SocketPlugin (Web)

    App->>SocketPluginWeb: connect({ ip, port })
    SocketPluginWeb-->>App: { success: false }

    App->>SocketPluginWeb: send({ data })
    SocketPluginWeb-->>App: { success: false }

    App->>SocketPluginWeb: receive()
    SocketPluginWeb-->>App: { data: "" }

    App->>SocketPluginWeb: getStatus()
    SocketPluginWeb-->>App: { connected: false, state: "disconnected" }

    App->>SocketPluginWeb: disconnect()
    SocketPluginWeb-->>App: { success: false }
Loading

Estimated code review effort

🎯 4 (Complex) | ⏱️ ~45 minutes

  • Areas to focus review on:
    • SocketPlugin.java: concurrency (AtomicReference + ReentrantLock), state transitions, reader/writer thread lifecycle, timeouts, and error propagation.
    • Resource cleanup and lifecycle integration: handleOnDestroy and interaction with MainActivity.onCreate registration.
    • Consistency between TypeScript definitions.ts, index.ts exports, and web.ts shim behavior.
    • package.json: build/publish scripts and dependency correctness.

Pre-merge checks and finishing touches

❌ Failed checks (2 warnings)
Check name Status Explanation Resolution
Docstring Coverage ⚠️ Warning Docstring coverage is 0.00% which is insufficient. The required threshold is 80.00%. You can run @coderabbitai generate docstrings to improve docstring coverage.
Description check ⚠️ Warning The pull request description is incomplete, containing only a status checklist. Required sections like overview, implementation details, and testing are missing. Add a comprehensive description explaining the feature, implementation approach, how the plugin works, testing performed, and any known limitations or follow-up work beyond the checklist items.
✅ Passed checks (1 passed)
Check name Status Explanation
Title check ✅ Passed Title is clear, specific, and directly describes the main change: adding a custom Capacitor plugin for TCP socket support on Android.
✨ Finishing touches
  • 📝 Generate docstrings
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@haslinghuis haslinghuis moved this to App in 2025.12.0 May 14, 2025
Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 7

🧹 Nitpick comments (6)
capacitor-plugin-socket/src/definitions.ts (2)

1-6: Consider supporting binary data payloads.
Raw TCP sockets often exchange binary data. Currently send/receive use string for data. You may want to use ArrayBuffer or Uint8Array (or overloads) in the interface to handle binary payloads.


1-6: Add JSDoc comments for improved DX.
Annotating each method (connect, send, receive, disconnect) with JSDoc will surface signatures and parameter docs in editors.

capacitor-plugin-socket/src/index.ts (2)

1-1: Specify the plugin interface generic.
Use the generic on registerPlugin for full TypeScript type inference:

const SocketPlugin = registerPlugin<SocketPlugin>('SocketPlugin', {});

3-5: Add explicit iOS fallback.
Currently only web is defined. To avoid runtime errors on unsupported platforms, add an ios stub to import your web implementation:

const SocketPlugin = registerPlugin<SocketPlugin>('SocketPlugin', {
  web: () => import('./web').then(m => new m.SocketPluginWeb()),
  ios: () => import('./web').then(m => new m.SocketPluginWeb()),
});
capacitor-plugin-socket/src/web.ts (1)

5-23: Use the WebPlugin’s unimplemented helper.
Rather than console.log + default returns, call this.unimplemented() for a standardized unimplemented error:

 async connect(...) {
-  console.log('Web implementation does not support raw TCP sockets.', options);
-  return { success: false };
+  return this.unimplemented('Raw TCP sockets are not supported on web.');
 }

Apply similarly for send, receive, and disconnect.

android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1)

1-72: Add thread safety and consider using AsyncTask or ExecutorService.

The current implementation performs network operations on the main thread and lacks thread safety:

  1. Network operations on the main UI thread can cause ANR issues
  2. No proper handling of concurrent method calls
  3. Consider using background threads for socket operations

While Capacitor's executeAsync helps with background execution, you may want to implement a more robust threading strategy. Consider:

  1. Using Android's ExecutorService for managing a thread pool
  2. Implementing proper synchronization for shared resources
  3. Adding cancellation support for long-running operations

Additionally, consider implementing timeout handling for all socket operations and add proper documentation for users of this plugin, explaining:

  • When to use SSL vs. raw sockets
  • How to handle timeouts and connection failures
  • Best practices for error handling
🧰 Tools
🪛 ast-grep (0.31.1)

[info] 23-23: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 1cecebc and 2881743.

📒 Files selected for processing (6)
  • android/app/src/main/java/betaflight/configurator/MainActivity.java (1 hunks)
  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1 hunks)
  • capacitor-plugin-socket/package.json (1 hunks)
  • capacitor-plugin-socket/src/definitions.ts (1 hunks)
  • capacitor-plugin-socket/src/index.ts (1 hunks)
  • capacitor-plugin-socket/src/web.ts (1 hunks)
🧰 Additional context used
🧬 Code Graph Analysis (4)
android/app/src/main/java/betaflight/configurator/MainActivity.java (1)
capacitor-plugin-socket/src/definitions.ts (1)
  • SocketPlugin (1-6)
capacitor-plugin-socket/src/index.ts (1)
capacitor-plugin-socket/src/definitions.ts (1)
  • SocketPlugin (1-6)
capacitor-plugin-socket/src/web.ts (1)
capacitor-plugin-socket/src/definitions.ts (1)
  • SocketPlugin (1-6)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (2)
capacitor-plugin-socket/src/definitions.ts (1)
  • SocketPlugin (1-6)
capacitor-plugin-socket/src/web.ts (4)
  • connect (5-8)
  • send (10-13)
  • receive (15-18)
  • disconnect (20-23)
🪛 ast-grep (0.31.1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

[info] 23-23: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

@haslinghuis haslinghuis force-pushed the capacitor-plugin-socket branch from 2881743 to 507f32c Compare May 15, 2025 18:38
Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

♻️ Duplicate comments (7)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (7)

19-33: Improve security and robustness in connect method.

The connect method has several issues that could lead to application crashes or security vulnerabilities:

  1. No input validation
  2. No check for existing connections
  3. Using an unencrypted socket (security concern)
  4. Operations run on the main thread (may freeze UI)
  5. No socket timeout
  6. No resource cleanup on failure
🧰 Tools
🪛 ast-grep (0.31.1)

[info] 23-23: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)


35-47: Add state validation to send method.

The send method should check if there's an active connection before attempting to write data. It also runs on the main thread and lacks input validation.


49-59: Potential blocking operation in receive method.

The readLine() method blocks indefinitely until data with a line terminator is available or the connection is closed, which can cause the app to freeze.


61-72: Improve resource cleanup in disconnect method.

The disconnect method only closes the socket but doesn't properly clean up all resources:

  1. Reader and writer aren't closed
  2. Class fields aren't reset
  3. No state tracking

1-72: 🛠️ Refactor suggestion

Implement a helper method for resource cleanup.

The class needs a helper method for closing resources consistently across all methods to avoid resource leaks and maintain proper state.

@PluginMethod
public void disconnect(PluginCall call) {
    try {
-        if (socket != null) socket.close();
+        closeResources();
+        isConnected = false;
        JSObject ret = new JSObject();
        ret.put("success", true);
        call.resolve(ret);
    } catch (Exception e) {
        call.reject("Disconnect failed: " + e.getMessage());
    }
}

+/**
+ * Helper method to close all resources and clean up state
+ */
+private void closeResources() {
+    try {
+        if (reader != null) {
+            reader.close();
+            reader = null;
+        }
+        if (writer != null) {
+            writer.close();
+            writer = null;
+        }
+        if (socket != null) {
+            socket.close();
+            socket = null;
+        }
+    } catch (IOException e) {
+        // Log but continue cleanup
+        Log.e("SocketPlugin", "Error closing resources", e);
+    }
+}
🧰 Tools
🪛 ast-grep (0.31.1)

[info] 23-23: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)


13-18: 🛠️ Refactor suggestion

Add connection state tracking.

The class lacks state management to track when a socket is connected. This is important for preventing operations on closed sockets and proper cleanup.

@CapacitorPlugin(name = "SocketPlugin")
public class SocketPlugin extends Plugin {
    private Socket socket;
    private BufferedReader reader;
    private BufferedWriter writer;
+    private boolean isConnected = false;

51-52: 🛠️ Refactor suggestion

Move network I/O off the main thread.

Reading from the socket on the main thread can cause UI freezes (ANR - Application Not Responding). Move this operation to a background thread.

@PluginMethod
public void receive(PluginCall call) {
+    // Verify connection state first
+    if (socket == null || !isConnected) {
+        call.reject("Not connected to any server");
+        return;
+    }
+    
+    // Use executeAsync to move this work off the main thread
+    executeAsync(() -> {
        try {
            String data = reader.readLine();
+            if (data == null) {
+                // Connection closed by server
+                closeResources();
+                isConnected = false;
+                call.reject("Connection closed by server");
+                return;
+            }
            JSObject ret = new JSObject();
            ret.put("data", data);
            call.resolve(ret);
        } catch (Exception e) {
+            closeResources();
+            isConnected = false;
            call.reject("Receive failed: " + e.getMessage());
        }
+    });
}
🧹 Nitpick comments (1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1)

1-12: Remove unused import and add class documentation.

The android.util.Log import on line 3 is not used in the code. Also, the class would benefit from proper documentation explaining its purpose and usage.

package betaflight.configurator.plugin;

-import android.util.Log;

import com.getcapacitor.JSObject;
import com.getcapacitor.Plugin;
import com.getcapacitor.PluginCall;
import com.getcapacitor.annotation.CapacitorPlugin;

import java.io.*;
import java.net.Socket;

+/**
+ * Capacitor plugin that provides raw TCP socket functionality.
+ * Implements methods to connect, send, receive, and disconnect from TCP servers.
+ */
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro
Cache: Disabled due to data retention organization setting
Knowledge Base: Disabled due to data retention organization setting

📥 Commits

Reviewing files that changed from the base of the PR and between 2881743 and 507f32c.

📒 Files selected for processing (6)
  • android/app/src/main/java/betaflight/configurator/MainActivity.java (1 hunks)
  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1 hunks)
  • capacitor-plugin-socket/package.json (1 hunks)
  • capacitor-plugin-socket/src/definitions.ts (1 hunks)
  • capacitor-plugin-socket/src/index.ts (1 hunks)
  • capacitor-plugin-socket/src/web.ts (1 hunks)
🚧 Files skipped from review as they are similar to previous changes (5)
  • android/app/src/main/java/betaflight/configurator/MainActivity.java
  • capacitor-plugin-socket/src/web.ts
  • capacitor-plugin-socket/package.json
  • capacitor-plugin-socket/src/index.ts
  • capacitor-plugin-socket/src/definitions.ts
🧰 Additional context used
🧬 Code Graph Analysis (1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (2)
capacitor-plugin-socket/src/definitions.ts (1)
  • SocketPlugin (1-6)
capacitor-plugin-socket/src/web.ts (4)
  • connect (5-8)
  • send (10-13)
  • receive (15-18)
  • disconnect (20-23)
🪛 ast-grep (0.31.1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

[info] 23-23: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

🔇 Additional comments (1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1)

23-23:

❓ Verification inconclusive

Consider using encrypted sockets for sensitive data.

The current implementation uses unencrypted sockets which could expose transmitted data to network eavesdropping. For sensitive information, consider using SSL/TLS sockets.


🏁 Script executed:

#!/bin/bash
# Check if the application is transmitting sensitive information through this socket
rg -i "password|credential|token|secret|key" --type java -C 3 android/app/src/main | grep -i "socket"

Length of output: 101


🏁 Script executed:

#!/bin/bash
# Inspect SocketPlugin.java for socket initialization patterns
echo "=== new Socket usage ==="
grep -R "new Socket" -n android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java || echo "none found"
echo "=== SSLSocket usage ==="
grep -R "SSLSocket" -n android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java || echo "none found"
echo "=== SSLContext usage ==="
grep -R "SSLContext" -n android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java || echo "none found"

Length of output: 580


Evaluate encryption for SocketPlugin.java

The SocketPlugin currently opens an unencrypted TCP socket (java.net.Socket) on line 24 without any SSL/TLS layers. If this channel ever carries sensitive data (credentials, tokens, personal info), it would be exposed to eavesdropping.

• File: android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java
– Line 24: socket = new Socket(ip, port);
– No use of SSLSocket or SSLContext detected

Please verify whether any sensitive information is sent over this socket. If so, replace Socket with an SSLSocket (or configure an SSLContext) to enable TLS encryption.

🧰 Tools
🪛 ast-grep (0.31.1)

[info] 23-23: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

@haslinghuis haslinghuis force-pushed the capacitor-plugin-socket branch from 1864ae5 to b94e7a6 Compare May 15, 2025 18:59
Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Caution

Inline review comments failed to post. This is likely due to GitHub's limits when posting large numbers of comments. If you are seeing this consistently it is likely a permissions issue. Please check "Moderation" -> "Code review limits" under your organization settings.

Actionable comments posted: 5

🧹 Nitpick comments (3)
capacitor-plugin-socket/package.json (3)

12-13: Replace placeholder author information before publishing
The "author": "Your Name" placeholder will be published to the registry as-is.

-  "author": "Your Name",
+  "author": "Betaflight Configurator Team <[email protected]>",

1-20: Add repository / bugs URLs for better traceability
Users of the plugin will not see where to report issues or view the source.

   "license": "MIT",
+  "repository": {
+    "type": "git",
+    "url": "https://github.com/betaflight-configurator/capacitor-plugin-socket"
+  },
+  "bugs": {
+    "url": "https://github.com/betaflight-configurator/capacitor-plugin-socket/issues"
+  },

8-10: Include a clean step and ensure output goes to dist/
tsc will emit files next to sources unless outDir is configured. Consider:

   "scripts": {
-    "build": "tsc"
+    "clean": "rimraf dist",
+    "build": "npm run clean && tsc -p tsconfig.json"
   },

Also add rimraf to devDependencies if you adopt this.

🛑 Comments failed to post (5)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (5)

88-96: 🛠️ Refactor suggestion

receive() performs a blocking read on the UI thread
reader.readLine() can block indefinitely, risking ANR. Off-load to a background thread:

executeAsync(() -> {
  try {
      String data = reader.readLine();
      …
  } catch (…) { … }
});

Also verify connection state (socket == null || !isConnected), and handle null results (server closed).

🤖 Prompt for AI Agents
In android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java
around lines 88 to 96, the receive() method performs a blocking read on the UI
thread using reader.readLine(), which can cause ANR issues. To fix this, wrap
the readLine() call and subsequent logic inside an executeAsync() runnable to
offload it to a background thread. Additionally, before reading, check if the
socket is null or not connected and reject the call early if so. Also handle the
case where readLine() returns null, indicating the server closed the connection,
and reject the call accordingly.

68-72: 🛠️ Refactor suggestion

send() still executed on main thread
Large writes or network stalls will freeze the UI. Similar to receive(), wrap the write in executeAsync(() -> { … }).

🤖 Prompt for AI Agents
In android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java
around lines 68 to 72, the send() method is currently executed on the main
thread, which can cause UI freezes during large writes or network delays. To fix
this, wrap the send operation inside an executeAsync(() -> { ... }) block to run
it asynchronously off the main thread, similar to how receive() is handled. This
will prevent UI blocking during socket writes.

44-53: ⚠️ Potential issue

isConnected never set to true after successful connect
Because the flag remains false, every send() call will immediately reject.

             writer = new BufferedWriter(new OutputStreamWriter(socket.getOutputStream()));
+            isConnected = true;
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

        try {
            socket = new Socket(ip, port);
            socket.setSoTimeout(30_000); // 30s timeout
            reader = new BufferedReader(new InputStreamReader(socket.getInputStream()));
            writer = new BufferedWriter(new OutputStreamWriter(socket.getOutputStream()));
            isConnected = true;
            JSObject ret = new JSObject();
            ret.put("success", true);
            call.resolve(ret);
        } catch (Exception e) {
            closeResources();
🧰 Tools
🪛 ast-grep (0.31.1)

[info] 44-44: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

🤖 Prompt for AI Agents
In android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java
around lines 44 to 53, the isConnected flag is not set to true after a
successful socket connection, causing all send() calls to reject immediately. To
fix this, set isConnected to true right after the socket and streams are
successfully initialized and before resolving the call, ensuring the flag
accurately reflects the connection state.

24-35: 🛠️ Refactor suggestion

Potential NPE from auto-unboxing Integer port value
call.getInt("port") returns Integer; if absent it becomes null and unboxing into int throws.

-        int port = call.getInt("port");
+        Integer port = call.getInt("port");

Then adjust subsequent comparisons (port == null || port < 1 …).

📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

        String ip = call.getString("ip");
-       int port = call.getInt("port");
+       Integer port = call.getInt("port");

        // Validate inputs
        if (ip == null || ip.isEmpty()) {
            call.reject("IP address is required");
            return;
        }

        if (port <= 0 || port > 65535) {
            call.reject("Invalid port number");
            return;
        }
🤖 Prompt for AI Agents
In android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java
around lines 24 to 35, the code uses call.getInt("port") which returns an
Integer that may be null, causing a NullPointerException when auto-unboxed to
int. Change the port variable to Integer and check if it is null before
performing numeric comparisons. Update the validation condition to verify port
is not null and within the valid range before proceeding.

129-133: ⚠️ Potential issue

Missing Log import – compilation will fail
Log.e is referenced but android.util.Log is not imported.

+import android.util.Log;
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

// at the top of android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

package betaflight.configurator.plugin;

import android.util.Log;
import com.getcapacitor.JSObject;
import com.getcapacitor.Plugin;
import com.getcapacitor.PluginCall;
import com.getcapacitor.annotation.CapacitorPlugin;
// … rest of imports and class definition
🤖 Prompt for AI Agents
In android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java
around lines 129 to 133, the code uses Log.e for error logging but does not
import android.util.Log, causing a compilation error. Add the import statement
for android.util.Log at the top of the file with the other imports to fix this
issue.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 3

♻️ Duplicate comments (2)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (2)

44-56: 🛠️ Refactor suggestion

Blocking network I/O is still executed on the UI thread

new Socket(...) and stream construction are potentially slow and will freeze the UI, causing ANRs on older devices.
A previous review already pointed this out; consider wrapping the whole block in executeAsync(() -> { … }).

🧰 Tools
🪛 ast-grep (0.31.1)

[info] 44-44: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)


87-97: ⚠️ Potential issue

receive is blocking & lacks state checks

All earlier concerns remain:

  • No socket != null && isConnected check.
  • readLine() blocks indefinitely on the UI thread.
  • data == null (server closed) is not handled.

Please apply the earlier suggestion: guard state, use executeAsync, and handle EOF.

🧹 Nitpick comments (2)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (2)

112-134: UI-thread hopping for a simple log is unnecessary & getContext() may not exist

getContext().getActivity() is not part of the public Plugin API; use getActivity() directly, or just:

-        // Log but continue cleanup
-        getContext().getActivity().runOnUiThread(() -> 
-            Log.e("SocketPlugin", "Error closing resources", e));
+        // Log but continue cleanup
+        Log.e("SocketPlugin", "Error closing resources", e);

This also eliminates the need to obtain the main-thread handler.


44-46: Consider encrypted transport (SSL/TLS) when handling credentials or PII

Static analysis flags the clear-text Socket; if the plugin will ever carry sensitive data, plan an SSLSocket option or document the security trade-offs.

🧰 Tools
🪛 ast-grep (0.31.1)

[info] 44-44: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro
Cache: Disabled due to data retention organization setting
Knowledge Base: Disabled due to data retention organization setting

📥 Commits

Reviewing files that changed from the base of the PR and between 1864ae5 and b94e7a6.

📒 Files selected for processing (6)
  • android/app/src/main/java/betaflight/configurator/MainActivity.java (1 hunks)
  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1 hunks)
  • capacitor-plugin-socket/package.json (1 hunks)
  • capacitor-plugin-socket/src/definitions.ts (1 hunks)
  • capacitor-plugin-socket/src/index.ts (1 hunks)
  • capacitor-plugin-socket/src/web.ts (1 hunks)
🚧 Files skipped from review as they are similar to previous changes (5)
  • android/app/src/main/java/betaflight/configurator/MainActivity.java
  • capacitor-plugin-socket/src/definitions.ts
  • capacitor-plugin-socket/src/web.ts
  • capacitor-plugin-socket/src/index.ts
  • capacitor-plugin-socket/package.json
🧰 Additional context used
🪛 ast-grep (0.31.1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

[info] 44-44: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

@haslinghuis haslinghuis force-pushed the capacitor-plugin-socket branch 2 times, most recently from 84f4673 to acfa06d Compare May 15, 2025 19:07
Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Caution

Inline review comments failed to post. This is likely due to GitHub's limits when posting large numbers of comments. If you are seeing this consistently it is likely a permissions issue. Please check "Moderation" -> "Code review limits" under your organization settings.

Actionable comments posted: 2

♻️ Duplicate comments (2)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (2)

38-56: 🛠️ Refactor suggestion

⚠️ Potential issue

connect never sets isConnected and still blocks the main thread

  1. isConnected is never flipped to true; every later send/receive call will be rejected.
  2. All network I/O is executed on the UI thread → risk of ANR.
-    try {
-        socket = new Socket(ip, port);
+    executeAsync(() -> {
+        try {
+            socket = new Socket(ip, port);
             socket.setSoTimeout(30_000); // 30 s timeout
             reader = new BufferedReader(new InputStreamReader(socket.getInputStream()));
             writer = new BufferedWriter(new OutputStreamWriter(socket.getOutputStream()));
+            isConnected = true;                   // 🟢 mark connected
             JSObject ret = new JSObject();
             ret.put("success", true);
-            call.resolve(ret);
-        } catch (Exception e) {
-            closeResources();
-            call.reject("Connection failed: " + e.getMessage());
-        }
+            call.resolve(ret);
+        } catch (Exception e) {
+            closeResources();
+            call.reject("Connection failed: " + e.getMessage());
+        }
+    });
🧰 Tools
🪛 ast-grep (0.31.1)

[info] 44-44: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)


58-85: 🛠️ Refactor suggestion

send still runs on UI thread and lacks framing / synchronization

Large writes can stall the UI and concurrent calls may corrupt the stream.

Suggested adjustments:

  1. Wrap the logic in executeAsync.
  2. synchronized(writer) to prevent concurrent writes.
  3. Append a newline or convert to bytes if the protocol is line-oriented/binary.
-    try {
-        writer.write(data);
-        writer.flush();
+    executeAsync(() -> {
+        try {
+            synchronized (writer) {
+                writer.write(data);
+                writer.flush();
+            }
+            JSObject ret = new JSObject();
+            ret.put("success", true);
+            call.resolve(ret);
+        } catch (Exception e) {
+            closeResources();
+            isConnected = false;
+            call.reject("Send failed: " + e.getMessage());
+        }
+    });
-        JSObject ret = new JSObject();
-        ret.put("success", true);
-        call.resolve(ret);
-    } catch (Exception e) {
-        closeResources();
-        isConnected = false;
-        call.reject("Send failed: " + e.getMessage());
-    }
🧹 Nitpick comments (2)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (2)

116-134: Potential NPE when getActivity() is null & missing error logging strategy

getContext().getActivity() may return null when the plugin is used without an Activity (e.g. in background). Consider using Log directly or gating the UI-thread call:

if (getContext() != null && getContext().getActivity() != null) {
    getContext().getActivity().runOnUiThread(
        () -> Log.e("SocketPlugin", "Error closing resources", e));
} else {
    Log.e("SocketPlugin", "Error closing resources", e);
}

Also consider switching wildcard java.io.* import to explicit classes for clarity.


44-46: Unencrypted socket — evaluate need for TLS

Static analysis flags clear-text transmission (new Socket(ip, port)). If the data is sensitive, migrate to SSLSocketFactory or document why plain TCP is acceptable.

🧰 Tools
🪛 ast-grep (0.31.1)

[info] 44-44: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

🛑 Comments failed to post (2)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (2)

87-97: 🛠️ Refactor suggestion

⚠️ Potential issue

receive can freeze the UI and lacks connection/state checks

readLine() blocks indefinitely on the main thread and there is no guard for disconnected sockets; on failure resources stay open.

Key fixes:

  1. Check socket != null && !socket.isClosed() && isConnected.
  2. Run the blocking read inside executeAsync.
  3. Handle null return (peer closed) and call closeResources().
🤖 Prompt for AI Agents
In android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java
around lines 87 to 97, the receive method blocks the main thread by calling
readLine() directly and does not check socket connection state, risking UI
freeze and resource leaks. Fix this by first verifying socket is not null, not
closed, and connected before reading. Move the blocking readLine() call inside
an executeAsync block to avoid blocking the UI thread. Also, handle the case
where readLine() returns null (indicating the peer closed the connection) by
calling closeResources() to clean up properly.

3-10: ⚠️ Potential issue

Missing imports lead to compilation failure

@PluginMethod and Log are referenced but not imported, so the file will not compile.

 import com.getcapacitor.annotation.CapacitorPlugin;
+import com.getcapacitor.annotation.PluginMethod;   // annotation in use
+
+import android.util.Log;                          // used in closeResources
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

import com.getcapacitor.JSObject;
import com.getcapacitor.Plugin;
import com.getcapacitor.PluginCall;
import com.getcapacitor.annotation.CapacitorPlugin;
import com.getcapacitor.annotation.PluginMethod;

import android.util.Log;

import java.io.*;
import java.net.Socket;
🤖 Prompt for AI Agents
In android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java
around lines 3 to 10, the imports for @PluginMethod and Log are missing, causing
compilation errors. Add the import statements for com.getcapacitor.PluginMethod
and android.util.Log to resolve the missing references and ensure the file
compiles successfully.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 4

🧹 Nitpick comments (6)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (6)

1-23: Refine imports and class‐level documentation
The wildcard import java.io.* can be replaced with explicit imports (BufferedReader, InputStreamReader, BufferedWriter, OutputStreamWriter, IOException) to improve readability and avoid accidental namespace collisions. Also, consider moving import android.util.Log; next to other Android imports for consistency.


24-34: Enhance parameter validation feedback
Current checks reject on missing/empty IP or invalid port, but don’t include the invalid value in the error. Consider:

-    if (ip == null || ip.isEmpty()) {
-        call.reject("IP address is required");
+    if (ip == null || ip.isEmpty()) {
+        call.reject("IP address is required: received '" + ip + "'");
         return;
     }
-    if (port <= 0 || port > 65535) {
-        call.reject("Invalid port number");
+    if (port <= 0 || port > 65535) {
+        call.reject("Invalid port number: " + port);
         return;
     }

40-47: Prevent double‐registration race
The duplicate‐connection guard checks socket.isClosed(), but doesn’t account for a connection in progress. Consider synchronizing access to socket or using an explicit lock to avoid a race condition when two connect calls happen in quick succession.

🧰 Tools
🪛 ast-grep (0.31.1)

[info] 46-46: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)


46-55: Handle encrypted connections or document trust boundary
Static analysis flagged an unencrypted Socket. If this plugin may transport sensitive data, either switch to SSLSocketFactory (SSLSocket) or clearly document that it’s intended for plain‐text debug use only.

🧰 Tools
🪛 ast-grep (0.31.1)

[info] 46-46: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)


61-69: Early‐return input validation is good—align formatting
The @PluginMethod annotation on send is flush‐left; indent it to match other methods for consistency.


115-137: Simplify resource cleanup logging
You post the Log.e call back on the UI thread; logging can occur on the current thread safely. You can simplify:

-    getContext().getActivity().runOnUiThread(() -> 
-        Log.e("SocketPlugin", "Error closing resources", e));
+    Log.e("SocketPlugin", "Error closing resources", e);

This avoids unnecessary UI thread marshaling.

📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro
Cache: Disabled due to data retention organization setting
Knowledge Base: Disabled due to data retention organization setting

📥 Commits

Reviewing files that changed from the base of the PR and between 84f4673 and acfa06d.

📒 Files selected for processing (3)
  • android/app/src/main/java/betaflight/configurator/MainActivity.java (1 hunks)
  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1 hunks)
  • capacitor-plugin-socket/package.json (1 hunks)
🚧 Files skipped from review as they are similar to previous changes (2)
  • android/app/src/main/java/betaflight/configurator/MainActivity.java
  • capacitor-plugin-socket/package.json
🧰 Additional context used
🪛 ast-grep (0.31.1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

[info] 46-46: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

🔇 Additional comments (1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1)

102-113: Safe disconnect & state reset is correct
The disconnect method cleanly closes resources and flips isConnected. Good use of the helper.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Nitpick comments (1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1)

100-115: Consider non-blocking read alternatives.

The readLine() call will block indefinitely if no newline character is received, which could lead to resource leaks if the connection stays idle.

Consider implementing a timeout mechanism or alternative read approach:

 getBridge().getExecutor().execute(() -> {
     try {
-        String data = reader.readLine();
+        // Option 1: Use socket timeout already set
+        String data = reader.readLine();
+        if (data == null) {
+            call.reject("Connection closed by server");
+            closeResources();
+            isConnected = false;
+            return;
+        }
         
         // Option 2: Alternative - read with fixed buffer size
         // char[] buffer = new char[8192];
         // int length = reader.read(buffer, 0, buffer.length);
         // String data = new String(buffer, 0, length);
         
         JSObject ret = new JSObject();
         ret.put("data", data);
         call.resolve(ret);
     } catch (Exception e) {
         closeResources();
         isConnected = false;
         call.reject("Receive failed: " + e.getMessage());
     }
 });
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro
Cache: Disabled due to data retention organization setting
Knowledge Base: Disabled due to data retention organization setting

📥 Commits

Reviewing files that changed from the base of the PR and between acfa06d and e337188.

📒 Files selected for processing (1)
  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1 hunks)
🧰 Additional context used
🪛 ast-grep (0.31.1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

[info] 48-48: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

⏰ Context from checks skipped due to timeout of 90000ms (1)
  • GitHub Check: deploy
🔇 Additional comments (6)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (6)

1-16: Well-structured package and imports with clear documentation.

The package structure and imports are appropriate for a Capacitor plugin. The class documentation clearly explains the plugin's purpose, which is good practice.


17-22: Good class structure with proper field initialization.

The class is correctly annotated with @CapacitorPlugin and extends Plugin as required. The instance variables for socket, reader, writer, and connection state are appropriately defined.


64-98: Well-designed send method with thread safety.

The send method includes proper input validation, connection state checking, and runs write operations on a background thread. The synchronization on the writer prevents concurrent modification issues, and appending a newline for framing is appropriate for text-based protocols.


117-128: Well-implemented disconnect method.

The disconnect method properly cleans up resources and maintains state consistency. The error handling is appropriate.


130-152: Well-designed resource cleanup helper.

The closeResources method thoroughly cleans up all open resources in the correct order, nullifies references, and handles exceptions properly. Using the UI thread for logging is appropriate.


24-62:

❓ Verification inconclusive

Well-implemented connect method with security considerations.

The connect method has proper input validation, duplicate connection prevention, and runs network operations on a background thread. Setting a timeout is a good practice.

However, the socket communication is not encrypted, which could be a security concern if sensitive data is transmitted.

Consider using an SSLSocket for secure communication if sensitive data will be transmitted. If encryption is not required for your specific use case, add a comment explaining why.


🏁 Script executed:

#!/bin/bash
# Check if this app handles sensitive data elsewhere that might require encryption
rg -A 2 "password|token|credential|api_key" --type java

Length of output: 57


Verify encryption requirements for socket communication

No references to passwords, tokens, credentials, or API keys were found in the Java codebase. If you are confident that only non-sensitive data is sent over this socket, please add a comment in SocketPlugin.java explaining why unencrypted communication is acceptable. If there is any chance you’ll transmit credentials or other sensitive information in the future, switch to an SSLSocket to ensure data is encrypted in transit.

• File to update:

  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (in the connect method)
🧰 Tools
🪛 ast-grep (0.31.1)

[info] 48-48: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

♻️ Duplicate comments (1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1)

110-118: 🛠️ Refactor suggestion

Inconsistent error handling in receive method.

Unlike the send method, the receive method doesn't clean up resources or update connection state when an error occurs. This could lead to resource leaks and inconsistent state.

            } catch (Exception e) {
+                closeResources();
+                isConnected = false;
                call.reject("Receive failed: " + e.getMessage());
            }
🧹 Nitpick comments (2)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (2)

3-3: Unused import that should be removed.

The android.util.Log import is currently only used in the closeResources method for error logging. If that's the only usage, it's fine to keep, but if you're not going to use it elsewhere, consider using a more Capacitor-specific logging approach.

-import android.util.Log;

122-132: Consider running disconnect on a background thread.

Although disconnect operations are typically quick, they can occasionally block. For consistency with other methods and to avoid potential UI freezes, consider running the disconnect operation on a background thread.

    @PluginMethod
    public void disconnect(PluginCall call) {
-        try {
-            closeResources();
-            isConnected = false;
-            JSObject ret = new JSObject();
-            ret.put("success", true);
-            call.resolve(ret);
-        } catch (Exception e) {
-            call.reject("Disconnect failed: " + e.getMessage());
-        }
+        getBridge().getExecutor().execute(() -> {
+            try {
+                closeResources();
+                isConnected = false;
+                JSObject ret = new JSObject();
+                ret.put("success", true);
+                call.resolve(ret);
+            } catch (Exception e) {
+                call.reject("Disconnect failed: " + e.getMessage());
+            }
+        });
    }
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro
Cache: Disabled due to data retention organization setting
Knowledge Base: Disabled due to data retention organization setting

📥 Commits

Reviewing files that changed from the base of the PR and between e337188 and bf1924a.

📒 Files selected for processing (1)
  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1 hunks)
🧰 Additional context used
🪛 ast-grep (0.31.1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

[info] 48-48: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

🔇 Additional comments (2)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (2)

1-157: Overall implementation looks solid with good error handling and background threading.

The plugin follows Capacitor's conventions correctly and implements proper validation, background threading, and resource management. The synchronization for writes is a good practice to prevent race conditions. The code has addressed previous review comments effectively.

🧰 Tools
🪛 ast-grep (0.31.1)

[info] 48-48: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)


46-61:

❓ Verification inconclusive

Consider using encrypted socket for sensitive communications.

The current implementation uses a plain Socket which transmits data in cleartext. If this plugin will handle sensitive information, consider using SSLSocket instead.


🏁 Script executed:

#!/bin/bash
# Check if this app transmits sensitive information that would require encryption
# Look for any existing SSL/TLS usage in the codebase
rg -A 2 "SSLSocket|SSLSocketFactory|TLS|SSL" --type java

Length of output: 58


Evaluate data sensitivity and add TLS if needed

I ran a search across the Java code and didn’t find any existing use of SSLSocket, SSLSocketFactory, TLS, or SSL. The current implementation in SocketPlugin.java (lines 46–61) uses a plain Socket, which sends everything in cleartext.

If this plugin ever handles sensitive or security-critical data (e.g. credentials, configuration parameters that must be protected, or commands over untrusted networks), please switch to an encrypted socket (for example, via SSLSocketFactory/SSLContext) and validate certificates to ensure confidentiality and integrity.

• Affected file:
• android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (lines 46–61)

🧰 Tools
🪛 ast-grep (0.31.1)

[info] 48-48: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

♻️ Duplicate comments (1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1)

122-124: 🛠️ Refactor suggestion

Ensure resources are cleaned up on receive failure
Mirror the send error path by closing resources and resetting isConnected when receive throws an exception:

- } catch (Exception e) {
-     call.reject("Receive failed: " + e.getMessage());
- }
+ } catch (Exception e) {
+     closeResources();
+     isConnected = false;
+     call.reject("Receive failed: " + e.getMessage());
+ }
🧹 Nitpick comments (2)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (2)

49-50: Consider supporting encrypted connections
The plugin currently uses an unencrypted Socket for raw TCP. For production or sensitive data, consider allowing an SSLSocket via SSLSocketFactory, or clearly document that this is intended only for trusted networks.


159-163: Use a static TAG constant for logging and guard against null activity
Extract the log tag into private static final String TAG = "SocketPlugin" and check getContext()/getActivity() before runOnUiThread to avoid possible NPEs:

+ private static final String TAG = "SocketPlugin";
...
- getContext().getActivity().runOnUiThread(() ->
-     Log.e("SocketPlugin", "Error closing resources", e));
+ if (getContext() != null && getContext().getActivity() != null) {
+     getContext().getActivity().runOnUiThread(() ->
+         Log.e(TAG, "Error closing resources", e));
+ }
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro
Cache: Disabled due to data retention organization setting
Knowledge Base: Disabled due to data retention organization setting

📥 Commits

Reviewing files that changed from the base of the PR and between bf1924a and cfefb6a.

📒 Files selected for processing (1)
  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1 hunks)
🧰 Additional context used
🪛 ast-grep (0.31.1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

[info] 48-48: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

🔇 Additional comments (4)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (4)

53-60: Verify thread‐safety of call.resolve()/call.reject()
Resolving or rejecting PluginCall instances from a background executor may have threading implications within the Capacitor runtime. Confirm these calls are safe off the main thread, or alternatively dispatch them back to the UI thread:

getBridge().getExecutor().execute(() -> {
    // ...
    call.resolve(ret);
    // or
    getActivity().runOnUiThread(() -> call.resolve(ret));
});

65-72: Solid input validation in send
The null-check for data correctly guards against missing payloads before attempting to write. Nice work.


80-88: Good use of background thread and synchronization in send
Offloading the write and flush to the executor and synchronizing on writer prevents UI blocking and race conditions.


129-136: Effective cleanup and state reset in disconnect
Calling closeResources() and resetting the isConnected flag ensures no sockets or streams linger after disconnect.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

♻️ Duplicate comments (1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1)

1-166: 💡 Verification agent

🧩 Analysis chain

Consider using encrypted socket communication for sensitive data.

The current implementation uses an unencrypted Socket, which could allow traffic interception by malicious actors.


🌐 Web query:

When should I use SSLSocket instead of Socket in Java?

💡 Result:

You should use SSLSocket instead of Socket in Java when transferring sensitive data over insecure communication channels. The SSLSocket class provides critical security protections that regular Socket does not offer, making it essential for secure communications.

Security Protections Provided by SSLSocket

SSLSocket extends the basic Socket class but adds several important security layers through protocols like Secure Sockets Layer (SSL) and Transport Layer Security (TLS)[1][2]. These additional protections include:

Integrity Protection: SSL prevents modification of messages by active attackers, ensuring that data cannot be tampered with during transmission[1].

Authentication: SSLSocket provides peer authentication capabilities. In most implementations, servers are always authenticated, and clients can be authenticated when requested by servers[1][4].

Confidentiality: SSLSocket encrypts data being sent between client and server, protecting sensitive information such as financial data or personal information from eavesdropping by passive wiretappers[1].

Specific Use Cases

You should use SSLSocket rather than Socket in the following scenarios:

  1. When handling sensitive data: Any application that deals with personal information, financial data, login credentials, or other confidential information[1].

  2. For secure Remote Method Invocation (RMI): When using Java RMI, which depends on object serialization, serialized data must be protected in transit[1].

  3. When communicating across untrusted networks: Any data transmitted over public networks like the internet should use secure sockets[1][5].

  4. For compliance requirements: Many regulatory standards require secure communications for sensitive data transfers[1].

Implementation Comparison

Implementing SSLSocket involves a few more steps than using a regular Socket, but the security benefits are substantial. A basic SSLSocket implementation requires:

  1. Initializing an SSLContext
  2. Creating an SSLSocketFactory from the context
  3. Using the factory to create an SSLSocket
  4. Starting the SSL handshake process[5][6]

For example, client-side implementation requires:

// Initialize SSLContext
SSLContext sslContext = SSLContext.getInstance("TLS");
sslContext.init(null, trustManagerFactory.getTrustManagers(), null);

// Create SSLSocket
SSLSocketFactory sslSocketFactory = sslContext.getSocketFactory();
SSLSocket sslSocket = (SSLSocket) sslSocketFactory.createSocket("localhost", 8443);

// Start SSL handshake
sslSocket.startHandshake();

While SSLSocket adds security, it's worth noting that it may introduce some performance overhead compared to plain Socket connections[3]. However, this trade-off is necessary and justified when security is a requirement.

Citations:


Switch to SSLSocket for secure communications

The plugin currently opens a plain Socket, which sends all data—including potentially sensitive payloads—in clear text over the network. To prevent eavesdropping, tampering, and meet common compliance requirements, you should use Java’s SSLSocket (TLS) instead:

• File: android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java
• Method: connect(PluginCall)

Example refactor for connect(...):

- socket = new Socket(ip, port);
+ // Initialize SSL context (e.g. TLSv1.2+)
+ SSLContext sslContext = SSLContext.getInstance("TLS");
+ sslContext.init(null, /* custom TrustManagers if needed */ null, null);
+ SSLSocketFactory factory = sslContext.getSocketFactory();
+ SSLSocket sslSocket = (SSLSocket) factory.createSocket(ip, port);
+ sslSocket.startHandshake();
+ socket = sslSocket;

Next steps:

  • Configure a TrustManager/KeyManager if you need custom certificates or mutual auth.
  • Verify hostname on the server certificate to avoid MITM attacks.
  • Adjust timeouts and cipher suites as required by your security policy.
🧰 Tools
🪛 ast-grep (0.31.1)

[info] 49-49: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

🧹 Nitpick comments (1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1)

86-88: Consider making newline behavior configurable.

The current implementation always appends a newline character after the data, which assumes a line-based protocol. This might not be appropriate for all TCP protocols.

                synchronized (writer) {
-                    // Append newline for framing; adjust as needed for your protocol
-                    writer.write(data);
-                    writer.newLine();
+                    // Allow configurable newline behavior
+                    boolean appendNewline = call.getBoolean("appendNewline", true);
+                    writer.write(data);
+                    if (appendNewline) {
+                        writer.newLine();
+                    }
                    writer.flush();
                }
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro
Cache: Disabled due to data retention organization setting
Knowledge Base: Disabled due to data retention organization setting

📥 Commits

Reviewing files that changed from the base of the PR and between cfefb6a and 39715ab.

📒 Files selected for processing (1)
  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1 hunks)
🧰 Additional context used
🪛 ast-grep (0.31.1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

[info] 49-49: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

⏰ Context from checks skipped due to timeout of 90000ms (1)
  • GitHub Check: deploy

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (3)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (3)

131-142: Consider executing disconnect on a background thread.

While the disconnect implementation correctly cleans up resources, it runs on the calling thread which is likely the UI thread. Socket closure can be blocking.

 @PluginMethod
 public void disconnect(PluginCall call) {
-    try {
-        closeResources();
-        isConnected = false;
-        JSObject ret = new JSObject();
-        ret.put("success", true);
-        call.resolve(ret);
-    } catch (Exception e) {
-        call.reject("Disconnect failed: " + e.getMessage());
-    }
+    getBridge().getExecutor().execute(() -> {
+        try {
+            closeResources();
+            isConnected = false;
+            JSObject ret = new JSObject();
+            ret.put("success", true);
+            call.resolve(ret);
+        } catch (Exception e) {
+            call.reject("Disconnect failed: " + e.getMessage());
+        }
+    });
 }

144-167: Thorough resource cleanup implementation.

The closeResources method properly:

  • Closes all resources in the correct order
  • Nullifies references to prevent memory leaks
  • Updates connection state on failures
  • Handles exceptions gracefully with logging
  • Runs logging on the UI thread

Consider adding a writer.flush() before closing to ensure all buffered data is sent.

         if (writer != null) {
+            writer.flush(); // Ensure all buffered data is sent
             writer.close();
             writer = null;
         }

24-63:

❓ Verification inconclusive

Consider using encrypted socket for sensitive data.

The implementation correctly validates inputs, prevents duplicate connections, and moves network operations to a background thread. The timeout setting is a good practice.

However, the code uses an unencrypted socket which could expose transmitted data to interception.

If your application transmits sensitive data, consider using SSLSocket instead:

-                socket = new Socket(ip, port);
+                SSLSocketFactory factory = (SSLSocketFactory) SSLSocketFactory.getDefault();
+                socket = (SSLSocket) factory.createSocket(ip, port);

This would require adding these imports:

import javax.net.ssl.SSLSocket;
import javax.net.ssl.SSLSocketFactory;

🏁 Script executed:

#!/bin/bash
# Description: Check if secure communications are required elsewhere in the app

# Check for SSL/TLS usage
rg -A 2 "SSLSocket|SSLSocketFactory|TrustManager|KeyStore" --type java

# Check for sensitive data patterns
rg -A 2 "password|credential|token|key|secret|auth" --type java

Length of output: 138


Verify encryption requirements for Socket connections

File: android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java
Lines: 24-63

Ripgrep across the Java codebase didn’t detect any existing SSL/TLS usage (SSLSocketFactory, TrustManager, KeyStore, etc.) or common sensitive-data patterns (password, token, key, secret). Absence of evidence isn’t evidence of absence—if this plugin ever carries credentials or other sensitive information, you should consider switching to an SSLSocket:

-                socket = new Socket(ip, port);
+                SSLSocketFactory factory = (SSLSocketFactory) SSLSocketFactory.getDefault();
+                socket = (SSLSocket) factory.createSocket(ip, port);

And add these imports:

import javax.net.ssl.SSLSocket;
import javax.net.ssl.SSLSocketFactory;

Please verify whether encrypted communication is required for your use case.

🧰 Tools
🪛 ast-grep (0.31.1)

[info] 49-49: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro
Cache: Disabled due to data retention organization setting
Knowledge Base: Disabled due to data retention organization setting

📥 Commits

Reviewing files that changed from the base of the PR and between 39715ab and e777360.

📒 Files selected for processing (1)
  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1 hunks)
🧰 Additional context used
🪛 ast-grep (0.31.1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

[info] 49-49: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

🔇 Additional comments (4)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (4)

1-16: Well-structured package declarations and class documentation.

The class is properly organized with appropriate imports and clear documentation that explains the plugin's purpose. The Capacitor plugin annotation is correctly set up.


19-22: Good field declarations with proper connection state tracking.

The class fields are well-defined, including the boolean flag to track connection state. This will help prevent operations on closed sockets.


65-99: Thread-safe send implementation with proper validation.

The send method implementation is robust with:

  • Input validation
  • Connection state verification
  • Background thread execution
  • Synchronized writer access
  • Protocol framing with newline
  • Proper error handling and resource cleanup

This addresses all the concerns from previous reviews.


101-129: Excellent non-blocking receive implementation with peer disconnection handling.

The receive method correctly:

  • Validates connection state before proceeding
  • Executes read operations on a background thread
  • Handles the case when a peer closes the connection (null readLine return)
  • Properly manages resources on exceptions
  • Returns data in the correct format

This addresses all previous concerns about blocking reads and error handling.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🧹 Nitpick comments (3)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (3)

49-54: Raw TCP is sent in cleartext – evaluate TLS or document threat model

Static analysis flags the plain new Socket(ip, port) instantiation. If credentials or other sensitive data traverse this channel, consider upgrading to SSLSocketFactory or at least documenting why encryption is unnecessary in your context (e.g. LAN-only diagnostics).

🧰 Tools
🪛 ast-grep (0.38.1)

[info] 49-49: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)


150-160: flush() in cleanup can block – usually unnecessary before close()

BufferedWriter.close() already performs an implicit flush. Calling flush() first can add latency or block during error paths (e.g. lost network). You can safely drop it and rely on close().


86-88: Assumed protocol framing – maybe make configurable

Appending newLine() hard-codes a text-based framing scheme. If binary protocols or CRLF expectations arise, consider exposing a boolean/enum option (e.g. terminator) so callers can pick the delimiter, or document the newline requirement clearly.

📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro
Cache: Disabled due to data retention organization setting
Knowledge Base: Disabled due to data retention organization setting

📥 Commits

Reviewing files that changed from the base of the PR and between e777360 and 30e43e2.

📒 Files selected for processing (1)
  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1 hunks)
🧰 Additional context used
🪛 ast-grep (0.38.1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

[info] 49-49: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

🔇 Additional comments (1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1)

30-40: Input validation looks solid

The guard clauses for IP emptiness and port range prevent common misuse and avoid NullPointerException from unboxing. Nicely done.

@haslinghuis haslinghuis force-pushed the capacitor-plugin-socket branch from 30e43e2 to 6e8146c Compare May 16, 2025 15:49
Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Nitpick comments (3)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (3)

25-63: Consider encrypted transport or document security implications
The connect method creates a raw Socket, which is unencrypted by default (static analysis flagged CWE-319). If you intend to transmit sensitive information, integrate SSLSocketFactory to enable TLS or clearly document that this plugin provides unauthenticated plain-text TCP. Providing an option to configure SSL/TLS will make this plugin more versatile and secure.

🧰 Tools
🪛 ast-grep (0.38.1)

[info] 49-49: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)


105-133: Capture reader locally to avoid race conditions
You check reader != null before scheduling the background task, but you don't capture it inside the executor. If disconnect races in before the task runs, reader may be null and trigger an NPE. Mirror the send approach by doing:

BufferedReader localReader = reader;
if (localReader == null) {
  call.reject("Connection lost");
  return;
}
String data = localReader.readLine();

153-174: closeResources cleanup looks robust
The helper neatly closes streams, nullifies references, logs errors on the UI thread, and resets isConnected. As a minor nitpick, you can remove the explicit writer.flush()close() will flush internally—or separate its exception handling if you want to log flush-specific failures.

📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro
Cache: Disabled due to data retention organization setting
Knowledge Base: Disabled due to data retention organization setting

📥 Commits

Reviewing files that changed from the base of the PR and between 30e43e2 and 6e8146c.

📒 Files selected for processing (1)
  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1 hunks)
🧰 Additional context used
🪛 ast-grep (0.38.1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

[info] 49-49: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket(ip, port)
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

⏰ Context from checks skipped due to timeout of 90000ms (1)
  • GitHub Check: deploy
🔇 Additional comments (2)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (2)

65-103: send method correctly offloads work and guards state
Great use of getBridge().getExecutor() to avoid ANRs, input validation, capture of writer, synchronized writes, and cleanup on error. Just verify in your Capacitor version that invoking call.resolve/call.reject from a background thread is safe.


135-147: Verify background-thread context for disconnect callbacks
disconnect offloads cleanup to the executor, which is good, but now the call.resolve fires off the background thread. Ensure that downstream JavaScript consumers don’t rely on callbacks coming from the UI thread or expect immediate synchronous cleanup.

@haslinghuis
Copy link
Member Author

@coderabbitio We are stuck in an endless review loop here. All changes made are made on your requests, but keep getting more requests after that for the same file. Please provide a full refactor and working solution for android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java.

@coderabbitai
Copy link
Contributor

coderabbitai bot commented May 16, 2025

Tip

For best results, initiate chat on the files or code changes.

@coderabbitai
Copy link
Contributor

coderabbitai bot commented May 16, 2025

A summary of the edits CodeRabbit can apply:

We will fully refactor SocketPlugin.java to improve thread safety, resource management, error handling, and overall code structure.

A plan of each step that CodeRabbit will take in order to execute the edits for each file (with inline rough draft snippets):

✏️ android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

Replace the entire contents of SocketPlugin.java with the following improved implementation:

package betaflight.configurator.plugin;

import android.util.Log;
import com.getcapacitor.JSObject;
import com.getcapacitor.Plugin;
import com.getcapacitor.PluginCall;
import com.getcapacitor.PluginMethod;
import com.getcapacitor.annotation.CapacitorPlugin;
import java.io.BufferedReader;
import java.io.BufferedWriter;
import java.io.IOException;
import java.io.InputStreamReader;
import java.io.OutputStreamWriter;
import java.net.InetSocketAddress;
import java.net.Socket;
import java.util.concurrent.atomic.AtomicReference;
import java.util.concurrent.locks.ReentrantLock;

/**
 * Capacitor plugin that provides raw TCP socket functionality with thread safety,
 * robust resource management, and comprehensive error handling.
 */
@CapacitorPlugin(name = "SocketPlugin")
public class SocketPlugin extends Plugin {
    private static final String TAG = "SocketPlugin";

    // Error messages
    private static final String ERROR_IP_REQUIRED = "IP address is required";
    private static final String ERROR_INVALID_PORT = "Invalid port number";
    private static final String ERROR_ALREADY_CONNECTED = "Already connected; please disconnect first";
    private static final String ERROR_NOT_CONNECTED = "Not connected to any server";
    private static final String ERROR_DATA_REQUIRED = "Data is required";
    private static final String ERROR_CONNECTION_LOST = "Connection lost";
    private static final String ERROR_CONNECTION_CLOSED = "Connection closed by peer";

    // Connection settings
    private static final int DEFAULT_TIMEOUT_MS = 30_000;
    private static final int MIN_PORT = 1;
    private static final int MAX_PORT = 65535;

    private enum ConnectionState {
        DISCONNECTED,
        CONNECTING,
        CONNECTED,
        DISCONNECTING,
        ERROR
    }

    // Thread-safe state and locks
    private final AtomicReference<ConnectionState> state = new AtomicReference<>(ConnectionState.DISCONNECTED);
    private final ReentrantLock socketLock = new ReentrantLock();
    private final ReentrantLock writerLock = new ReentrantLock();

    private Socket socket;
    private BufferedReader reader;
    private BufferedWriter writer;

    @PluginMethod
    public void connect(final PluginCall call) {
        call.setKeepAlive(true);
        String ip = call.getString("ip");
        int port = call.getInt("port", -1);

        if (ip == null || ip.isEmpty()) {
            call.reject(ERROR_IP_REQUIRED);
            call.setKeepAlive(false);
            return;
        }
        if (port < MIN_PORT || port > MAX_PORT) {
            call.reject(ERROR_INVALID_PORT);
            call.setKeepAlive(false);
            return;
        }
        if (!compareAndSetState(ConnectionState.DISCONNECTED, ConnectionState.CONNECTING)) {
            call.reject(ERROR_ALREADY_CONNECTED);
            call.setKeepAlive(false);
            return;
        }

        getBridge().getExecutor().execute(() -> {
            socketLock.lock();
            try {
                socket = new Socket();
                socket.connect(new InetSocketAddress(ip, port), DEFAULT_TIMEOUT_MS);
                socket.setSoTimeout(DEFAULT_TIMEOUT_MS);

                reader = new BufferedReader(new InputStreamReader(socket.getInputStream()));
                writer = new BufferedWriter(new OutputStreamWriter(socket.getOutputStream()));

                state.set(ConnectionState.CONNECTED);
                JSObject result = new JSObject();
                result.put("success", true);
                call.resolve(result);
                Log.d(TAG, "Connected to " + ip + ":" + port);
            } catch (Exception e) {
                state.set(ConnectionState.ERROR);
                closeResourcesInternal();
                call.reject("Connection failed: " + e.getMessage());
                Log.e(TAG, "Connection failed", e);
            } finally {
                socketLock.unlock();
                call.setKeepAlive(false);
            }
        });
    }

    @PluginMethod
    public void send(final PluginCall call) {
        String data = call.getString("data");
        if (data == null || data.isEmpty()) {
            call.reject(ERROR_DATA_REQUIRED);
            return;
        }
        if (state.get() != ConnectionState.CONNECTED) {
            call.reject(ERROR_NOT_CONNECTED);
            return;
        }
        call.setKeepAlive(true);

        getBridge().getExecutor().execute(() -> {
            writerLock.lock();
            try {
                if (writer == null || state.get() != ConnectionState.CONNECTED) {
                    call.reject(ERROR_CONNECTION_LOST);
                    return;
                }
                writer.write(data);
                writer.newLine();
                writer.flush();

                JSObject result = new JSObject();
                result.put("success", true);
                call.resolve(result);
                Log.d(TAG, "Sent data: " + truncateForLog(data));
            } catch (Exception e) {
                handleCommunicationError(e, "Send failed", call);
            } finally {
                writerLock.unlock();
                call.setKeepAlive(false);
            }
        });
    }

    @PluginMethod
    public void receive(final PluginCall call) {
        if (state.get() != ConnectionState.CONNECTED || reader == null) {
            call.reject(ERROR_NOT_CONNECTED);
            return;
        }
        call.setKeepAlive(true);

        getBridge().getExecutor().execute(() -> {
            try {
                String data = reader.readLine();
                if (data == null) {
                    handleCommunicationError(new IOException("End of stream"), ERROR_CONNECTION_CLOSED, call);
                    return;
                }
                JSObject result = new JSObject();
                result.put("data", data);
                call.resolve(result);
                Log.d(TAG, "Received data: " + truncateForLog(data));
            } catch (Exception e) {
                handleCommunicationError(e, "Receive failed", call);
            } finally {
                call.setKeepAlive(false);
            }
        });
    }

    @PluginMethod
    public void disconnect(final PluginCall call) {
        ConnectionState current = state.get();
        if (current == ConnectionState.DISCONNECTED) {
            JSObject result = new JSObject();
            result.put("success", true);
            call.resolve(result);
            return;
        }
        if (!compareAndSetState(current, ConnectionState.DISCONNECTING)) {
            call.reject("Invalid state for disconnect: " + current);
            return;
        }
        call.setKeepAlive(true);

        getBridge().getExecutor().execute(() -> {
            socketLock.lock();
            try {
                closeResourcesInternal();
                state.set(ConnectionState.DISCONNECTED);
                JSObject result = new JSObject();
                result.put("success", true);
                call.resolve(result);
                Log.d(TAG, "Disconnected successfully");
            } catch (Exception e) {
                state.set(ConnectionState.ERROR);
                call.reject("Disconnect failed: " + e.getMessage());
                Log.e(TAG, "Disconnect failed", e);
            } finally {
                socketLock.unlock();
                call.setKeepAlive(false);
            }
        });
    }

    @Override
    protected void handleOnDestroy() {
        socketLock.lock();
        try {
            state.set(ConnectionState.DISCONNECTING);
            closeResourcesInternal();
            state.set(ConnectionState.DISCONNECTED);
        } catch (Exception e) {
            Log.e(TAG, "Error cleaning up resources on destroy", e);
        } finally {
            socketLock.unlock();
        }
        super.handleOnDestroy();
    }

    private void closeResourcesInternal() {
        if (reader != null) {
            try { reader.close(); } catch (IOException e) { Log.e(TAG, "Error closing reader", e);} finally { reader = null; }
        }
        if (writer != null) {
            try { writer.flush(); writer.close(); } catch (IOException e) { Log.e(TAG, "Error closing writer", e);} finally { writer = null; }
        }
        if (socket != null) {
            try { socket.close(); } catch (IOException e) { Log.e(TAG, "Error closing socket", e);} finally { socket = null; }
        }
    }

    private void handleCommunicationError(Exception error, String message, PluginCall call) {
        socketLock.lock();
        try {
            state.set(ConnectionState.ERROR);
            closeResourcesInternal();
            state.set(ConnectionState.DISCONNECTED);
            call.reject(message + ": " + error.getMessage());
            Log.e(TAG, message, error);
        } finally {
            socketLock.unlock();
        }
    }

    private boolean compareAndSetState(ConnectionState expected, ConnectionState newState) {
        return state.compareAndSet(expected, newState);
    }

    private String truncateForLog(String data) {
        if (data == null) return "null";
        final int maxLen = 100;
        if (data.length() <= maxLen) return data;
        return data.substring(0, maxLen) + "... (" + data.length() + " chars)";
    }
}

Build the Android project, deploy the Capacitor app to a device or emulator, and exercise the SocketPlugin by calling its connect, send, receive, and disconnect methods. Verify that operations succeed, errors are handled gracefully, logs are produced as expected, and resources are cleaned up on disconnect or app termination.

A summary of the context that CodeRabbit is considering across the codebase:

Ensure that java.util.concurrent.atomic.AtomicReference and java.util.concurrent.locks.ReentrantLock are available for thread-safe state management.

  • Created local commit - (🔄 Check again to try again)

@coderabbitai
Copy link
Contributor

coderabbitai bot commented May 16, 2025

Caution

CodeRabbit has failed to create a local commit with your edits.

1 similar comment
@coderabbitai
Copy link
Contributor

coderabbitai bot commented May 16, 2025

Caution

CodeRabbit has failed to create a local commit with your edits.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Nitpick comments (1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1)

221-231: Consider separating resource closing into individual methods.

While the current implementation works well, having individual methods for closing each resource type (reader, writer, socket) could improve readability and maintainability.

- private void closeResourcesInternal() {
-     if (reader != null) {
-         try { reader.close(); } catch (IOException e) { Log.e(TAG, "Error closing reader", e);} finally { reader = null; }
-     }
-     if (writer != null) {
-         try { writer.flush(); writer.close(); } catch (IOException e) { Log.e(TAG, "Error closing writer", e);} finally { writer = null; }
-     }
-     if (socket != null) {
-         try { socket.close(); } catch (IOException e) { Log.e(TAG, "Error closing socket", e);} finally { socket = null; }
-     }
- }
+ private void closeResourcesInternal() {
+     closeReader();
+     closeWriter();
+     closeSocket();
+ }
+
+ private void closeReader() {
+     if (reader != null) {
+         try { 
+             reader.close(); 
+         } catch (IOException e) { 
+             Log.e(TAG, "Error closing reader", e);
+         } finally { 
+             reader = null; 
+         }
+     }
+ }
+
+ private void closeWriter() {
+     if (writer != null) {
+         try { 
+             writer.flush(); 
+             writer.close(); 
+         } catch (IOException e) { 
+             Log.e(TAG, "Error closing writer", e);
+         } finally { 
+             writer = null; 
+         }
+     }
+ }
+
+ private void closeSocket() {
+     if (socket != null) {
+         try { 
+             socket.close(); 
+         } catch (IOException e) { 
+             Log.e(TAG, "Error closing socket", e);
+         } finally { 
+             socket = null; 
+         }
+     }
+ }
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro
Cache: Disabled due to data retention organization setting
Knowledge Base: Disabled due to data retention organization setting

📥 Commits

Reviewing files that changed from the base of the PR and between 6e8146c and 7c25def.

📒 Files selected for processing (1)
  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1 hunks)
🧰 Additional context used
🪛 ast-grep (0.38.1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

[info] 82-82: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket()
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

🔇 Additional comments (9)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (9)

19-24: Well-designed Capacitor plugin structure with clear documentation.

The class is properly annotated with @CapacitorPlugin and has clear documentation explaining its purpose and features. The plugin name matches the class name, making it consistent and easy to understand.


27-40: Excellent use of constants for error messages and settings.

Using string constants for error messages enhances maintainability and consistency throughout the codebase. The connection settings constants are also well-defined with appropriate names and values.


41-56: Good use of enum and thread-safe fields.

The ConnectionState enum provides a clear state model, and the thread-safety approach using AtomicReference and ReentrantLock is appropriate for a multi-threaded environment where socket operations run on background threads.


107-142: Good implementation of asynchronous send operation with thread safety.

The method correctly validates input, checks connection state, and performs I/O operations asynchronously on a background thread with proper synchronization and error handling. The use of truncateForLog is a nice touch to prevent log pollution.


144-169: Appropriately handling null response in receive method.

The receive method correctly detects when the connection is closed by the peer (when readLine() returns null) and handles this case properly by transitioning to an error state and cleaning up resources.


171-204: Robust disconnect implementation with proper state management.

The disconnect method is well-implemented with state validation, thread safety, and proper resource cleanup. It also handles the case where the socket is already disconnected, avoiding unnecessary operations.


206-219: Excellent resource cleanup in handleOnDestroy.

The override of handleOnDestroy ensures that resources are properly cleaned up when the plugin is destroyed, preventing resource leaks. The use of locks ensures that cleanup operations don't conflict with ongoing operations.


233-244: Good centralized error handling approach.

The handleCommunicationError method centralizes error handling logic, making the code more maintainable and consistent. It appropriately transitions state, cleans up resources, and logs errors.


246-255: Well-implemented helper methods.

The helper methods for state comparison and log truncation are well-implemented. The truncateForLog method is a particularly nice touch that prevents log pollution when dealing with large data payloads.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

♻️ Duplicate comments (1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1)

95-99: Critical: Reset state to DISCONNECTED after connection failure.

When a connection attempt fails, the state is set to ERROR (line 96) and resources are cleaned up, but the state is never reset to DISCONNECTED. Because the connect() method guard (line 74) requires the state to be DISCONNECTED, all subsequent connection attempts will be permanently blocked.

This differs from the pattern in handleCommunicationError() (lines 241-252), which correctly resets the state to DISCONNECTED after cleanup.

Apply this diff to allow reconnection after failures:

             } catch (Exception e) {
                 state.set(ConnectionState.ERROR);
                 closeResourcesInternal();
+                state.set(ConnectionState.DISCONNECTED);
                 call.reject("Connection failed: " + e.getMessage());
                 Log.e(TAG, "Connection failed", e);
🧹 Nitpick comments (1)
capacitor-plugin-socket/package.json (1)

8-10: Add rimraf to devDependencies.

The build script references rimraf but it's not listed in devDependencies. This will cause build failures unless rimraf is installed globally or inherited from a parent workspace.

Apply this diff to fix the dependency:

   "devDependencies": {
+    "rimraf": "^5.0.0",
     "typescript": "^5.0.0"
   }
📜 Review details

Configuration used: Path: .coderabbit.yaml

Review profile: CHILL

Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 6e6dd70 and 98362b9.

📒 Files selected for processing (6)
  • android/app/src/main/java/betaflight/configurator/MainActivity.java (1 hunks)
  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1 hunks)
  • capacitor-plugin-socket/package.json (1 hunks)
  • capacitor-plugin-socket/src/definitions.ts (1 hunks)
  • capacitor-plugin-socket/src/index.ts (1 hunks)
  • capacitor-plugin-socket/src/web.ts (1 hunks)
🚧 Files skipped from review as they are similar to previous changes (3)
  • capacitor-plugin-socket/src/definitions.ts
  • capacitor-plugin-socket/src/web.ts
  • capacitor-plugin-socket/src/index.ts
🧰 Additional context used
🧠 Learnings (1)
📚 Learning: 2025-06-09T00:32:21.385Z
Learnt from: haslinghuis
Repo: betaflight/betaflight-configurator PR: 0
File: :0-0
Timestamp: 2025-06-09T00:32:21.385Z
Learning: In the betaflight-configurator codebase, port paths use counter prefixes (e.g., "bluetooth1", "bluetooth2", "serial1") rather than direct protocol identifiers. The protocol selection logic correctly uses `portPath.startsWith("bluetooth")` to detect bluetooth ports regardless of the counter suffix, rather than direct string matching against protocol map keys.

Applied to files:

  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java
🧬 Code graph analysis (2)
android/app/src/main/java/betaflight/configurator/MainActivity.java (1)
capacitor-plugin-socket/src/definitions.ts (1)
  • SocketPlugin (1-7)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (2)
capacitor-plugin-socket/src/definitions.ts (1)
  • SocketPlugin (1-7)
capacitor-plugin-socket/src/web.ts (5)
  • connect (7-10)
  • send (12-15)
  • receive (17-20)
  • disconnect (22-25)
  • getStatus (27-30)
🪛 ast-grep (0.39.9)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

[info] 82-82: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket()
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

🔇 Additional comments (3)
android/app/src/main/java/betaflight/configurator/MainActivity.java (1)

3-13: LGTM! Plugin registration implemented correctly.

The SocketPlugin is properly registered in the onCreate lifecycle method, making it available to the Capacitor bridge. The implementation follows the standard Capacitor plugin registration pattern.

android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (2)

19-57: Excellent foundation with strong thread-safety primitives.

The class structure demonstrates solid engineering:

  • Clear ConnectionState enum for state machine
  • AtomicReference for thread-safe state transitions
  • Separate ReentrantLock instances for socket and writer to minimize contention
  • Well-defined error message constants

1-264: Strong implementation with excellent patterns—address state reset in error handlers.

Overall, this is a well-engineered plugin implementation with several commendable qualities:

Thread safety: Proper use of AtomicReference, ReentrantLock, and background execution
Resource management: Comprehensive cleanup in closeResourcesInternal() and handleOnDestroy()
Error handling: Centralized error handling in handleCommunicationError() with clear error messages
API completeness: All required methods (connect, send, receive, disconnect, getStatus) are present
Logging: Good observability with data truncation for large payloads

The primary issue is inconsistent state management in error handlers for connect() and disconnect(), which can block subsequent operations. Once those are addressed, the plugin will be production-ready for its intended use case of communicating with embedded microcontrollers.

Based on learnings: Plain TCP sockets are intentional for microcontroller communication and don't require SSL/TLS.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

♻️ Duplicate comments (2)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (2)

200-204: Reset state to DISCONNECTED after disconnect failure

When disconnect() encounters an exception, the state is set to ERROR (line 201) but never reset to DISCONNECTED. While less critical than the connect() issue (since line 179 allows retrying when already DISCONNECTED), this creates an inconsistent state where resources have been released but the plugin appears to be in an error condition.

For consistency with handleCommunicationError() and to ensure clean state management, reset the state after cleanup:

             } catch (Exception e) {
                 state.set(ConnectionState.ERROR);
+                closeResourcesInternal();
+                state.set(ConnectionState.DISCONNECTED);
                 call.reject("Disconnect failed: " + e.getMessage());
                 Log.e(TAG, "Disconnect failed", e);

95-100: Reset state to DISCONNECTED after connection failure to allow retries

After a failed connection attempt, the state is set to ERROR (line 96) but never reset to DISCONNECTED. Because connect() guards with compareAndSetState(ConnectionState.DISCONNECTED, ConnectionState.CONNECTING) (line 74), subsequent connection attempts will be permanently blocked once the plugin enters the ERROR state.

Your handleCommunicationError method (lines 244–255) demonstrates the correct pattern—reset to DISCONNECTED after cleanup. Apply the same pattern here:

             } catch (Exception e) {
                 state.set(ConnectionState.ERROR);
                 closeResourcesInternal();
+                state.set(ConnectionState.DISCONNECTED);
                 call.reject("Connection failed: " + e.getMessage());
                 Log.e(TAG, "Connection failed", e);
📜 Review details

Configuration used: Path: .coderabbit.yaml

Review profile: CHILL

Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 98362b9 and 6948cee.

📒 Files selected for processing (1)
  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1 hunks)
🧰 Additional context used
🧠 Learnings (1)
📚 Learning: 2025-06-09T00:32:21.385Z
Learnt from: haslinghuis
Repo: betaflight/betaflight-configurator PR: 0
File: :0-0
Timestamp: 2025-06-09T00:32:21.385Z
Learning: In the betaflight-configurator codebase, port paths use counter prefixes (e.g., "bluetooth1", "bluetooth2", "serial1") rather than direct protocol identifiers. The protocol selection logic correctly uses `portPath.startsWith("bluetooth")` to detect bluetooth ports regardless of the counter suffix, rather than direct string matching against protocol map keys.

Applied to files:

  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java
🧬 Code graph analysis (1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (3)
capacitor-plugin-socket/src/definitions.ts (1)
  • SocketPlugin (1-7)
capacitor-plugin-socket/src/index.ts (1)
  • SocketPlugin (8-8)
capacitor-plugin-socket/src/web.ts (5)
  • connect (7-10)
  • send (12-15)
  • receive (17-20)
  • disconnect (22-25)
  • getStatus (27-30)
🪛 ast-grep (0.39.9)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

[info] 82-82: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket()
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

🔇 Additional comments (1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1)

211-267: Excellent implementation with strong engineering practices

The remaining methods demonstrate solid design:

  • getStatus(): Clean query interface for connection state
  • handleOnDestroy(): Proper cleanup with lock acquisition and state transitions
  • closeResourcesInternal(): Robust resource cleanup with individual error handling
  • handleCommunicationError(): Centralized error handling with correct state reset pattern (ERROR → DISCONNECTED)
  • Helper utilities: Well-designed for thread safety and logging

Overall, this implementation demonstrates strong thread-safety (AtomicReference + ReentrantLocks), comprehensive error handling, and proper resource management. The issues flagged above are targeted fixes to ensure consistent state transitions across all error paths.

Note: Static analysis flags the unencrypted socket (line 83), but per the PR objectives and past discussions, plain TCP is intentional for embedded microcontroller communication. Based on learnings.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

♻️ Duplicate comments (2)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (2)

99-108: Reset state to DISCONNECTED after connection error to allow retry.

After a connection failure, the state is set to ERROR and resources are cleaned up, but the state is never reset to DISCONNECTED. This prevents any subsequent connection attempts because the guard at line 76 requires the state to be DISCONNECTED.

Apply this diff to reset the state after cleanup:

             } catch (Exception e) {
                 state.set(ConnectionState.ERROR);
                 closeResourcesInternal();
+                state.set(ConnectionState.DISCONNECTED);
                 call.reject("Connection failed: " + e.getMessage());
                 Log.e(TAG, "Connection failed", e);

Note: This pattern is already correctly implemented in handleCommunicationError() (line 297) and should be applied consistently.


180-187: Clean up resources and reset state after disconnect error.

When disconnect() encounters an exception, the state is set to ERROR but resources are never cleaned up and the state is never reset. This leaves the plugin in an inconsistent state with potential resource leaks.

Apply this diff to ensure proper cleanup and state reset:

             } catch (Exception e) {
                 state.set(ConnectionState.ERROR);
+                closeResourcesInternal();
+                state.set(ConnectionState.DISCONNECTED);
                 call.reject("Disconnect failed: " + e.getMessage());
                 Log.e(TAG, "Disconnect failed", e);

This mirrors the cleanup pattern used in handleCommunicationError() and ensures consistent behavior.

🧹 Nitpick comments (1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1)

285-290: Consider improving readability of resource cleanup.

The resource cleanup logic is functionally correct but compressed onto single lines, which makes it harder to read and maintain. For better clarity, consider formatting each resource closure across multiple lines.

Example reformatting:

 private void closeResourcesInternal() {
     stopReaderThread();
-    if (input != null) { try { input.close(); } catch (IOException e) { Log.e(TAG, "Error closing input stream", e); } finally { input = null; } }
-    if (output != null) { try { output.close(); } catch (IOException e) { Log.e(TAG, "Error closing output stream", e); } finally { output = null; } }
-    if (socket != null) { try { socket.close(); } catch (IOException e) { Log.e(TAG, "Error closing socket", e); } finally { socket = null; } }
+    if (input != null) {
+        try {
+            input.close();
+        } catch (IOException e) {
+            Log.e(TAG, "Error closing input stream", e);
+        } finally {
+            input = null;
+        }
+    }
+    if (output != null) {
+        try {
+            output.close();
+        } catch (IOException e) {
+            Log.e(TAG, "Error closing output stream", e);
+        } finally {
+            output = null;
+        }
+    }
+    if (socket != null) {
+        try {
+            socket.close();
+        } catch (IOException e) {
+            Log.e(TAG, "Error closing socket", e);
+        } finally {
+            socket = null;
+        }
+    }
 }
📜 Review details

Configuration used: Path: .coderabbit.yaml

Review profile: CHILL

Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 6948cee and a128d44.

📒 Files selected for processing (1)
  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1 hunks)
🧰 Additional context used
🧠 Learnings (1)
📚 Learning: 2025-06-09T00:32:21.385Z
Learnt from: haslinghuis
Repo: betaflight/betaflight-configurator PR: 0
File: :0-0
Timestamp: 2025-06-09T00:32:21.385Z
Learning: In the betaflight-configurator codebase, port paths use counter prefixes (e.g., "bluetooth1", "bluetooth2", "serial1") rather than direct protocol identifiers. The protocol selection logic correctly uses `portPath.startsWith("bluetooth")` to detect bluetooth ports regardless of the counter suffix, rather than direct string matching against protocol map keys.

Applied to files:

  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java
🧬 Code graph analysis (1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (2)
capacitor-plugin-socket/src/definitions.ts (1)
  • SocketPlugin (1-7)
capacitor-plugin-socket/src/web.ts (5)
  • connect (7-10)
  • send (12-15)
  • receive (17-20)
  • disconnect (22-25)
  • getStatus (27-30)
🪛 ast-grep (0.39.9)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

[info] 84-84: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket()
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

🔇 Additional comments (5)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (5)

1-59: LGTM! Excellent class structure and thread-safety setup.

The class is well-organized with:

  • Clear constant definitions for error messages and configuration
  • Proper thread-safety primitives (AtomicReference, ReentrantLock)
  • Well-defined ConnectionState enum
  • Comprehensive documentation

111-146: LGTM! Send method is well-implemented.

The method demonstrates excellent practices:

  • Thorough input validation and state checking
  • Background execution to avoid blocking the main thread
  • Proper synchronization with writerLock
  • Double-check of state and output stream inside the lock to prevent race conditions
  • Newline framing consistent with the reader thread logic
  • Centralized error handling via handleCommunicationError()

148-154: LGTM! Correct deprecation of polling-based receive.

The method correctly rejects calls and directs users to the event-driven dataReceived approach, which aligns with the PR objectives for continuous background reading.


191-197: LGTM! Clean status query implementation.

The method provides a simple, thread-safe way to query the current connection state without performing any operations.


199-212: LGTM! Proper lifecycle cleanup.

The override correctly manages cleanup when the plugin is destroyed, with appropriate locking, state management, and resource cleanup.

@haslinghuis
Copy link
Member Author

@coderabbitai - full review

@coderabbitai
Copy link
Contributor

coderabbitai bot commented Nov 11, 2025

@haslinghuis I'll perform a full review of PR #4471 now.

✅ Actions performed

Full review triggered.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

♻️ Duplicate comments (2)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (2)

182-185: Reset state and clean up resources after disconnect failure.

When disconnect() encounters an exception, the state is set to ERROR without calling closeResourcesInternal() or resetting to DISCONNECTED. This leaves the plugin in an inconsistent state and prevents future operations.

For consistency with handleCommunicationError() (lines 288-290) and to ensure proper resource cleanup, add cleanup and state reset.

Apply this diff:

             } catch (Exception e) {
                 state.set(ConnectionState.ERROR);
+                closeResourcesInternal();
+                state.set(ConnectionState.DISCONNECTED);
                 call.reject("Disconnect failed: " + e.getMessage());
                 Log.e(TAG, "Disconnect failed", e);

101-105: Reset state to DISCONNECTED after connection failure to allow retry.

When the connection attempt fails, the state is set to ERROR and resources are cleaned up, but the state is never reset to DISCONNECTED. Since connect() requires the state to be DISCONNECTED (line 78 guard), any subsequent connection attempt will be permanently rejected with "Already connected".

Apply this diff:

             } catch (Exception e) {
                 state.set(ConnectionState.ERROR);
                 closeResourcesInternal();
+                state.set(ConnectionState.DISCONNECTED);
                 call.reject("Connection failed: " + e.getMessage());
                 Log.e(TAG, "Connection failed", e);
🧹 Nitpick comments (1)
capacitor-plugin-socket/src/web.ts (1)

12-30: Consider using NOT_SUPPORTED_MESSAGE consistently across all methods.

The NOT_SUPPORTED_MESSAGE constant is defined and used in the connect method but not in send, receive, disconnect, and getStatus. For consistency and easier maintenance, consider using it throughout.

Apply this diff:

   async send(options: { data: string }): Promise<{ success: boolean }> {
-    console.log('Web implementation does not support raw TCP sockets.', options);
+    console.log(this.NOT_SUPPORTED_MESSAGE, options);
     return { success: false };
   }
 
   async receive(): Promise<{ data: string }> {
-    console.log('Web implementation does not support raw TCP sockets.');
+    console.log(this.NOT_SUPPORTED_MESSAGE);
     return { data: '' };
   }
 
   async disconnect(): Promise<{ success: boolean }> {
-    console.log('Web implementation does not support raw TCP sockets.');
+    console.log(this.NOT_SUPPORTED_MESSAGE);
     return { success: false };
   }
 
   async getStatus(): Promise<{ connected: boolean; state: string }> {
-    console.log('Web implementation does not support raw TCP sockets.');
+    console.log(this.NOT_SUPPORTED_MESSAGE);
     return { connected: false, state: 'disconnected' };
   }
📜 Review details

Configuration used: Path: .coderabbit.yaml

Review profile: CHILL

Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 2b6d727 and a11c50a.

📒 Files selected for processing (6)
  • android/app/src/main/java/betaflight/configurator/MainActivity.java (1 hunks)
  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1 hunks)
  • capacitor-plugin-socket/package.json (1 hunks)
  • capacitor-plugin-socket/src/definitions.ts (1 hunks)
  • capacitor-plugin-socket/src/index.ts (1 hunks)
  • capacitor-plugin-socket/src/web.ts (1 hunks)
🧰 Additional context used
🧠 Learnings (1)
📚 Learning: 2025-06-09T00:32:21.385Z
Learnt from: haslinghuis
Repo: betaflight/betaflight-configurator PR: 0
File: :0-0
Timestamp: 2025-06-09T00:32:21.385Z
Learning: In the betaflight-configurator codebase, port paths use counter prefixes (e.g., "bluetooth1", "bluetooth2", "serial1") rather than direct protocol identifiers. The protocol selection logic correctly uses `portPath.startsWith("bluetooth")` to detect bluetooth ports regardless of the counter suffix, rather than direct string matching against protocol map keys.

Applied to files:

  • android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java
🪛 ast-grep (0.39.9)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java

[info] 86-86: "Detected use of a Java socket that is not encrypted. As a result, the
traffic could be read by an attacker intercepting the network traffic. Use
an SSLSocket created by 'SSLSocketFactory' or 'SSLServerSocketFactory'
instead."
Context: new Socket()
Note: [CWE-319] Cleartext Transmission of Sensitive Information [REFERENCES]
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures

(unencrypted-socket-java)

🔇 Additional comments (1)
android/app/src/main/java/betaflight/configurator/plugin/SocketPlugin.java (1)

1-60: Excellent implementation with strong engineering practices.

The overall design is outstanding:

  • Thread safety: AtomicReference for state management and ReentrantLock synchronization prevent race conditions
  • Resource management: Comprehensive cleanup in closeResourcesInternal() with proper null checks and individual try-catch blocks
  • Error handling: Centralized handleCommunicationError() provides consistent cleanup and state transitions
  • Architecture: Clear ConnectionState enum and well-structured methods

The continuous reader thread with Base64-encoded event emission is a solid approach for asynchronous data handling.

@sonarqubecloud
Copy link

@github-actions
Copy link
Contributor

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

Status: App

Development

Successfully merging this pull request may close these issues.

2 participants