introduced keyserver sync adapter
This commit is contained in:
parent
e643e098e2
commit
1ef6f883e3
|
@ -800,6 +800,20 @@
|
||||||
android:resource="@xml/custom_pgp_contacts_structure" />
|
android:resource="@xml/custom_pgp_contacts_structure" />
|
||||||
</service>
|
</service>
|
||||||
|
|
||||||
|
<service
|
||||||
|
android:name=".service.KeyserverSyncAdapterService"
|
||||||
|
android:exported="true"
|
||||||
|
android:process=":sync"
|
||||||
|
tools:ignore="ExportedService">
|
||||||
|
<intent-filter>
|
||||||
|
<action android:name="android.content.SyncAdapter" />
|
||||||
|
</intent-filter>
|
||||||
|
|
||||||
|
<meta-data
|
||||||
|
android:name="android.content.SyncAdapter"
|
||||||
|
android:resource="@xml/keyserver_sync_adapter_desc" />
|
||||||
|
</service>
|
||||||
|
|
||||||
<!-- Storage Provider for temporary decrypted files -->
|
<!-- Storage Provider for temporary decrypted files -->
|
||||||
<provider
|
<provider
|
||||||
android:name=".provider.TemporaryStorageProvider"
|
android:name=".provider.TemporaryStorageProvider"
|
||||||
|
|
|
@ -81,6 +81,11 @@ public final class Constants {
|
||||||
public static final File APP_DIR_FILE = new File(APP_DIR, "export.asc");
|
public static final File APP_DIR_FILE = new File(APP_DIR, "export.asc");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public static final class Notification {
|
||||||
|
public static final int PASSPHRASE_CACHE = 1;
|
||||||
|
public static final int KEYSERVER_SYNC_FAIL_ORBOT = 2;
|
||||||
|
}
|
||||||
|
|
||||||
public static final class Pref {
|
public static final class Pref {
|
||||||
public static final String PASSPHRASE_CACHE_TTL = "passphraseCacheTtl";
|
public static final String PASSPHRASE_CACHE_TTL = "passphraseCacheTtl";
|
||||||
public static final String PASSPHRASE_CACHE_SUBS = "passphraseCacheSubs";
|
public static final String PASSPHRASE_CACHE_SUBS = "passphraseCacheSubs";
|
||||||
|
|
|
@ -196,9 +196,9 @@ public class HkpKeyserver extends Keyserver {
|
||||||
/**
|
/**
|
||||||
* returns a client with pinned certificate if necessary
|
* returns a client with pinned certificate if necessary
|
||||||
*
|
*
|
||||||
* @param url
|
* @param url url to be queried by client
|
||||||
* @param proxy
|
* @param proxy proxy to be used by client
|
||||||
* @return
|
* @return client with a pinned certificate if necesary
|
||||||
*/
|
*/
|
||||||
public static OkHttpClient getClient(URL url, Proxy proxy) throws IOException {
|
public static OkHttpClient getClient(URL url, Proxy proxy) throws IOException {
|
||||||
OkHttpClient client = new OkHttpClient();
|
OkHttpClient client = new OkHttpClient();
|
||||||
|
|
|
@ -22,6 +22,7 @@ package org.sufficientlysecure.keychain.operations;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.net.Proxy;
|
import java.net.Proxy;
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
|
import java.util.GregorianCalendar;
|
||||||
import java.util.HashSet;
|
import java.util.HashSet;
|
||||||
import java.util.Iterator;
|
import java.util.Iterator;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
@ -305,15 +306,25 @@ public class ImportOperation extends BaseOperation<ImportKeyringParcel> {
|
||||||
}
|
}
|
||||||
if (!result.success()) {
|
if (!result.success()) {
|
||||||
badKeys += 1;
|
badKeys += 1;
|
||||||
} else if (result.updated()) {
|
|
||||||
updatedKeys += 1;
|
|
||||||
importedMasterKeyIds.add(key.getMasterKeyId());
|
|
||||||
} else {
|
} else {
|
||||||
newKeys += 1;
|
if (result.updated()) {
|
||||||
if (key.isSecret()) {
|
updatedKeys += 1;
|
||||||
secret += 1;
|
importedMasterKeyIds.add(key.getMasterKeyId());
|
||||||
|
} else {
|
||||||
|
newKeys += 1;
|
||||||
|
if (key.isSecret()) {
|
||||||
|
secret += 1;
|
||||||
|
}
|
||||||
|
importedMasterKeyIds.add(key.getMasterKeyId());
|
||||||
|
}
|
||||||
|
if (entry.mBytes == null) {
|
||||||
|
// synonymous to isDownloadFromKeyserver.
|
||||||
|
// If no byte data was supplied, import from keyserver took place
|
||||||
|
// this prevents file imports being noted as keyserver imports
|
||||||
|
mProviderHelper.renewKeyLastUpdatedTime(key.getMasterKeyId(),
|
||||||
|
GregorianCalendar.getInstance().getTimeInMillis(),
|
||||||
|
TimeUnit.MILLISECONDS);
|
||||||
}
|
}
|
||||||
importedMasterKeyIds.add(key.getMasterKeyId());
|
|
||||||
}
|
}
|
||||||
|
|
||||||
log.add(result, 2);
|
log.add(result, 2);
|
||||||
|
@ -386,7 +397,7 @@ public class ImportOperation extends BaseOperation<ImportKeyringParcel> {
|
||||||
|
|
||||||
@NonNull
|
@NonNull
|
||||||
@Override
|
@Override
|
||||||
public OperationResult execute(ImportKeyringParcel importInput, CryptoInputParcel cryptoInput) {
|
public ImportKeyResult execute(ImportKeyringParcel importInput, CryptoInputParcel cryptoInput) {
|
||||||
ArrayList<ParcelableKeyRing> keyList = importInput.mKeyList;
|
ArrayList<ParcelableKeyRing> keyList = importInput.mKeyList;
|
||||||
String keyServer = importInput.mKeyserver;
|
String keyServer = importInput.mKeyserver;
|
||||||
|
|
||||||
|
@ -497,7 +508,7 @@ public class ImportOperation extends BaseOperation<ImportKeyringParcel> {
|
||||||
Progressable mProgressable;
|
Progressable mProgressable;
|
||||||
private int mTotalKeys;
|
private int mTotalKeys;
|
||||||
private int mImportedKeys = 0;
|
private int mImportedKeys = 0;
|
||||||
ArrayList<Long> mImportedMasterKeyIds = new ArrayList<Long>();
|
ArrayList<Long> mImportedMasterKeyIds = new ArrayList<>();
|
||||||
private int mBadKeys = 0;
|
private int mBadKeys = 0;
|
||||||
private int mNewKeys = 0;
|
private int mNewKeys = 0;
|
||||||
private int mUpdatedKeys = 0;
|
private int mUpdatedKeys = 0;
|
||||||
|
@ -515,7 +526,9 @@ public class ImportOperation extends BaseOperation<ImportKeyringParcel> {
|
||||||
public KeyImportAccumulator(int totalKeys, Progressable externalProgressable) {
|
public KeyImportAccumulator(int totalKeys, Progressable externalProgressable) {
|
||||||
mTotalKeys = totalKeys;
|
mTotalKeys = totalKeys;
|
||||||
mProgressable = externalProgressable;
|
mProgressable = externalProgressable;
|
||||||
mProgressable.setProgress(0, totalKeys);
|
if (mProgressable != null) {
|
||||||
|
mProgressable.setProgress(0, totalKeys);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public int getTotalKeys() {
|
public int getTotalKeys() {
|
||||||
|
@ -529,7 +542,9 @@ public class ImportOperation extends BaseOperation<ImportKeyringParcel> {
|
||||||
public synchronized void accumulateKeyImport(ImportKeyResult result) {
|
public synchronized void accumulateKeyImport(ImportKeyResult result) {
|
||||||
mImportedKeys++;
|
mImportedKeys++;
|
||||||
|
|
||||||
mProgressable.setProgress(mImportedKeys, mTotalKeys);
|
if (mProgressable != null) {
|
||||||
|
mProgressable.setProgress(mImportedKeys, mTotalKeys);
|
||||||
|
}
|
||||||
|
|
||||||
mImportLog.addAll(result.getLog().toList());//accumulates log
|
mImportLog.addAll(result.getLog().toList());//accumulates log
|
||||||
mBadKeys += result.mBadKeys;
|
mBadKeys += result.mBadKeys;
|
||||||
|
|
|
@ -51,6 +51,11 @@ public class KeychainContract {
|
||||||
String EXPIRY = "expiry";
|
String EXPIRY = "expiry";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
interface UpdatedKeysColumns {
|
||||||
|
String MASTER_KEY_ID = "master_key_id"; // not a database id
|
||||||
|
String LAST_UPDATED = "last_updated"; // time since epoch in seconds
|
||||||
|
}
|
||||||
|
|
||||||
interface UserPacketsColumns {
|
interface UserPacketsColumns {
|
||||||
String MASTER_KEY_ID = "master_key_id"; // foreign key to key_rings._ID
|
String MASTER_KEY_ID = "master_key_id"; // foreign key to key_rings._ID
|
||||||
String TYPE = "type"; // not a database id
|
String TYPE = "type"; // not a database id
|
||||||
|
@ -97,6 +102,8 @@ public class KeychainContract {
|
||||||
|
|
||||||
public static final String BASE_KEY_RINGS = "key_rings";
|
public static final String BASE_KEY_RINGS = "key_rings";
|
||||||
|
|
||||||
|
public static final String BASE_UPDATED_KEYS = "updated_keys";
|
||||||
|
|
||||||
public static final String PATH_UNIFIED = "unified";
|
public static final String PATH_UNIFIED = "unified";
|
||||||
|
|
||||||
public static final String PATH_FIND = "find";
|
public static final String PATH_FIND = "find";
|
||||||
|
@ -234,6 +241,16 @@ public class KeychainContract {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public static class UpdatedKeys implements UpdatedKeysColumns, BaseColumns {
|
||||||
|
public static final Uri CONTENT_URI = BASE_CONTENT_URI_INTERNAL.buildUpon()
|
||||||
|
.appendPath(BASE_UPDATED_KEYS).build();
|
||||||
|
|
||||||
|
public static final String CONTENT_TYPE
|
||||||
|
= "vnd.android.cursor.dir/vnd.org.sufficientlysecure.keychain.provider.updated_keys";
|
||||||
|
public static final String CONTENT_ITEM_TYPE
|
||||||
|
= "vnd.android.cursor.item/vnd.org.sufficientlysecure.keychain.provider.updated_keys";
|
||||||
|
}
|
||||||
|
|
||||||
public static class UserPackets implements UserPacketsColumns, BaseColumns {
|
public static class UserPackets implements UserPacketsColumns, BaseColumns {
|
||||||
public static final String VERIFIED = "verified";
|
public static final String VERIFIED = "verified";
|
||||||
public static final Uri CONTENT_URI = BASE_CONTENT_URI_INTERNAL.buildUpon()
|
public static final Uri CONTENT_URI = BASE_CONTENT_URI_INTERNAL.buildUpon()
|
||||||
|
|
|
@ -34,6 +34,7 @@ import org.sufficientlysecure.keychain.provider.KeychainContract.ApiAppsColumns;
|
||||||
import org.sufficientlysecure.keychain.provider.KeychainContract.CertsColumns;
|
import org.sufficientlysecure.keychain.provider.KeychainContract.CertsColumns;
|
||||||
import org.sufficientlysecure.keychain.provider.KeychainContract.KeyRingsColumns;
|
import org.sufficientlysecure.keychain.provider.KeychainContract.KeyRingsColumns;
|
||||||
import org.sufficientlysecure.keychain.provider.KeychainContract.KeysColumns;
|
import org.sufficientlysecure.keychain.provider.KeychainContract.KeysColumns;
|
||||||
|
import org.sufficientlysecure.keychain.provider.KeychainContract.UpdatedKeysColumns;
|
||||||
import org.sufficientlysecure.keychain.provider.KeychainContract.UserPacketsColumns;
|
import org.sufficientlysecure.keychain.provider.KeychainContract.UserPacketsColumns;
|
||||||
import org.sufficientlysecure.keychain.ui.ConsolidateDialogActivity;
|
import org.sufficientlysecure.keychain.ui.ConsolidateDialogActivity;
|
||||||
import org.sufficientlysecure.keychain.util.Log;
|
import org.sufficientlysecure.keychain.util.Log;
|
||||||
|
@ -53,7 +54,7 @@ import java.io.IOException;
|
||||||
*/
|
*/
|
||||||
public class KeychainDatabase extends SQLiteOpenHelper {
|
public class KeychainDatabase extends SQLiteOpenHelper {
|
||||||
private static final String DATABASE_NAME = "openkeychain.db";
|
private static final String DATABASE_NAME = "openkeychain.db";
|
||||||
private static final int DATABASE_VERSION = 11;
|
private static final int DATABASE_VERSION = 12;
|
||||||
static Boolean apgHack = false;
|
static Boolean apgHack = false;
|
||||||
private Context mContext;
|
private Context mContext;
|
||||||
|
|
||||||
|
@ -61,6 +62,7 @@ public class KeychainDatabase extends SQLiteOpenHelper {
|
||||||
String KEY_RINGS_PUBLIC = "keyrings_public";
|
String KEY_RINGS_PUBLIC = "keyrings_public";
|
||||||
String KEY_RINGS_SECRET = "keyrings_secret";
|
String KEY_RINGS_SECRET = "keyrings_secret";
|
||||||
String KEYS = "keys";
|
String KEYS = "keys";
|
||||||
|
String UPDATED_KEYS = "updated_keys";
|
||||||
String USER_PACKETS = "user_packets";
|
String USER_PACKETS = "user_packets";
|
||||||
String CERTS = "certs";
|
String CERTS = "certs";
|
||||||
String API_APPS = "api_apps";
|
String API_APPS = "api_apps";
|
||||||
|
@ -144,6 +146,14 @@ public class KeychainDatabase extends SQLiteOpenHelper {
|
||||||
+ Tables.USER_PACKETS + "(" + UserPacketsColumns.MASTER_KEY_ID + ", " + UserPacketsColumns.RANK + ") ON DELETE CASCADE"
|
+ Tables.USER_PACKETS + "(" + UserPacketsColumns.MASTER_KEY_ID + ", " + UserPacketsColumns.RANK + ") ON DELETE CASCADE"
|
||||||
+ ")";
|
+ ")";
|
||||||
|
|
||||||
|
private static final String CREATE_UPDATE_KEYS =
|
||||||
|
"CREATE TABLE IF NOT EXISTS " + Tables.UPDATED_KEYS + " ("
|
||||||
|
+ UpdatedKeysColumns.MASTER_KEY_ID + " INTEGER PRIMARY KEY, "
|
||||||
|
+ UpdatedKeysColumns.LAST_UPDATED + " INTEGER, "
|
||||||
|
+ "FOREIGN KEY(" + UpdatedKeysColumns.MASTER_KEY_ID + ") REFERENCES "
|
||||||
|
+ Tables.KEY_RINGS_PUBLIC + "(" + KeyRingsColumns.MASTER_KEY_ID + ") ON DELETE CASCADE"
|
||||||
|
+ ")";
|
||||||
|
|
||||||
private static final String CREATE_API_APPS =
|
private static final String CREATE_API_APPS =
|
||||||
"CREATE TABLE IF NOT EXISTS " + Tables.API_APPS + " ("
|
"CREATE TABLE IF NOT EXISTS " + Tables.API_APPS + " ("
|
||||||
+ BaseColumns._ID + " INTEGER PRIMARY KEY AUTOINCREMENT, "
|
+ BaseColumns._ID + " INTEGER PRIMARY KEY AUTOINCREMENT, "
|
||||||
|
@ -206,6 +216,7 @@ public class KeychainDatabase extends SQLiteOpenHelper {
|
||||||
db.execSQL(CREATE_KEYS);
|
db.execSQL(CREATE_KEYS);
|
||||||
db.execSQL(CREATE_USER_PACKETS);
|
db.execSQL(CREATE_USER_PACKETS);
|
||||||
db.execSQL(CREATE_CERTS);
|
db.execSQL(CREATE_CERTS);
|
||||||
|
db.execSQL(CREATE_UPDATE_KEYS);
|
||||||
db.execSQL(CREATE_API_APPS);
|
db.execSQL(CREATE_API_APPS);
|
||||||
db.execSQL(CREATE_API_APPS_ACCOUNTS);
|
db.execSQL(CREATE_API_APPS_ACCOUNTS);
|
||||||
db.execSQL(CREATE_API_APPS_ALLOWED_KEYS);
|
db.execSQL(CREATE_API_APPS_ALLOWED_KEYS);
|
||||||
|
@ -278,8 +289,11 @@ public class KeychainDatabase extends SQLiteOpenHelper {
|
||||||
// fix problems in database, see #1402 for details
|
// fix problems in database, see #1402 for details
|
||||||
// https://github.com/open-keychain/open-keychain/issues/1402
|
// https://github.com/open-keychain/open-keychain/issues/1402
|
||||||
db.execSQL("DELETE FROM api_accounts WHERE key_id BETWEEN 0 AND 3");
|
db.execSQL("DELETE FROM api_accounts WHERE key_id BETWEEN 0 AND 3");
|
||||||
|
case 12:
|
||||||
|
db.execSQL(CREATE_UPDATE_KEYS);
|
||||||
if (oldVersion == 10) {
|
if (oldVersion == 10) {
|
||||||
// no consolidate if we are updating from 10, we're just here for the api_accounts fix
|
// no consolidate if we are updating from 10, we're just here for
|
||||||
|
// the api_accounts fix and the new update keys table
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -38,6 +38,7 @@ import org.sufficientlysecure.keychain.provider.KeychainContract.Certs;
|
||||||
import org.sufficientlysecure.keychain.provider.KeychainContract.KeyRingData;
|
import org.sufficientlysecure.keychain.provider.KeychainContract.KeyRingData;
|
||||||
import org.sufficientlysecure.keychain.provider.KeychainContract.KeyRings;
|
import org.sufficientlysecure.keychain.provider.KeychainContract.KeyRings;
|
||||||
import org.sufficientlysecure.keychain.provider.KeychainContract.Keys;
|
import org.sufficientlysecure.keychain.provider.KeychainContract.Keys;
|
||||||
|
import org.sufficientlysecure.keychain.provider.KeychainContract.UpdatedKeys;
|
||||||
import org.sufficientlysecure.keychain.provider.KeychainContract.UserPackets;
|
import org.sufficientlysecure.keychain.provider.KeychainContract.UserPackets;
|
||||||
import org.sufficientlysecure.keychain.provider.KeychainContract.UserPacketsColumns;
|
import org.sufficientlysecure.keychain.provider.KeychainContract.UserPacketsColumns;
|
||||||
import org.sufficientlysecure.keychain.provider.KeychainDatabase.Tables;
|
import org.sufficientlysecure.keychain.provider.KeychainDatabase.Tables;
|
||||||
|
@ -72,6 +73,9 @@ public class KeychainProvider extends ContentProvider {
|
||||||
private static final int KEY_RINGS_FIND_BY_EMAIL = 400;
|
private static final int KEY_RINGS_FIND_BY_EMAIL = 400;
|
||||||
private static final int KEY_RINGS_FIND_BY_SUBKEY = 401;
|
private static final int KEY_RINGS_FIND_BY_SUBKEY = 401;
|
||||||
|
|
||||||
|
private static final int UPDATED_KEYS = 500;
|
||||||
|
private static final int UPDATED_KEYS_SPECIFIC = 501;
|
||||||
|
|
||||||
protected UriMatcher mUriMatcher;
|
protected UriMatcher mUriMatcher;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -179,6 +183,12 @@ public class KeychainProvider extends ContentProvider {
|
||||||
matcher.addURI(authority, KeychainContract.BASE_API_APPS + "/*/"
|
matcher.addURI(authority, KeychainContract.BASE_API_APPS + "/*/"
|
||||||
+ KeychainContract.PATH_ALLOWED_KEYS, API_ALLOWED_KEYS);
|
+ KeychainContract.PATH_ALLOWED_KEYS, API_ALLOWED_KEYS);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* to access table containing last updated dates of keys
|
||||||
|
*/
|
||||||
|
matcher.addURI(authority, KeychainContract.BASE_UPDATED_KEYS, UPDATED_KEYS);
|
||||||
|
matcher.addURI(authority, KeychainContract.BASE_UPDATED_KEYS + "/*", UPDATED_KEYS_SPECIFIC);
|
||||||
|
|
||||||
return matcher;
|
return matcher;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -218,6 +228,11 @@ public class KeychainProvider extends ContentProvider {
|
||||||
case KEY_RING_SECRET:
|
case KEY_RING_SECRET:
|
||||||
return KeyRings.CONTENT_ITEM_TYPE;
|
return KeyRings.CONTENT_ITEM_TYPE;
|
||||||
|
|
||||||
|
case UPDATED_KEYS:
|
||||||
|
return UpdatedKeys.CONTENT_TYPE;
|
||||||
|
case UPDATED_KEYS_SPECIFIC:
|
||||||
|
return UpdatedKeys.CONTENT_ITEM_TYPE;
|
||||||
|
|
||||||
case API_APPS:
|
case API_APPS:
|
||||||
return ApiApps.CONTENT_TYPE;
|
return ApiApps.CONTENT_TYPE;
|
||||||
|
|
||||||
|
@ -606,6 +621,22 @@ public class KeychainProvider extends ContentProvider {
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
case UPDATED_KEYS:
|
||||||
|
case UPDATED_KEYS_SPECIFIC: {
|
||||||
|
HashMap<String, String> projectionMap = new HashMap<>();
|
||||||
|
qb.setTables(Tables.UPDATED_KEYS);
|
||||||
|
projectionMap.put(UpdatedKeys.MASTER_KEY_ID, Tables.UPDATED_KEYS + "."
|
||||||
|
+ UpdatedKeys.MASTER_KEY_ID);
|
||||||
|
projectionMap.put(UpdatedKeys.LAST_UPDATED, Tables.UPDATED_KEYS + "."
|
||||||
|
+ UpdatedKeys.LAST_UPDATED);
|
||||||
|
qb.setProjectionMap(projectionMap);
|
||||||
|
if (match == UPDATED_KEYS_SPECIFIC) {
|
||||||
|
qb.appendWhere(UpdatedKeys.MASTER_KEY_ID + " = ");
|
||||||
|
qb.appendWhereEscapeString(uri.getPathSegments().get(1));
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
case API_APPS: {
|
case API_APPS: {
|
||||||
qb.setTables(Tables.API_APPS);
|
qb.setTables(Tables.API_APPS);
|
||||||
|
|
||||||
|
@ -726,6 +757,12 @@ public class KeychainProvider extends ContentProvider {
|
||||||
keyId = values.getAsLong(Certs.MASTER_KEY_ID);
|
keyId = values.getAsLong(Certs.MASTER_KEY_ID);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
case UPDATED_KEYS: {
|
||||||
|
long updatedKeyId = db.replace(Tables.UPDATED_KEYS, null, values);
|
||||||
|
rowUri = UpdatedKeys.CONTENT_URI.buildUpon().appendPath("" + updatedKeyId)
|
||||||
|
.build();
|
||||||
|
break;
|
||||||
|
}
|
||||||
case API_APPS: {
|
case API_APPS: {
|
||||||
db.insertOrThrow(Tables.API_APPS, null, values);
|
db.insertOrThrow(Tables.API_APPS, null, values);
|
||||||
break;
|
break;
|
||||||
|
|
|
@ -59,6 +59,7 @@ import org.sufficientlysecure.keychain.provider.KeychainContract.KeyRingData;
|
||||||
import org.sufficientlysecure.keychain.provider.KeychainContract.KeyRings;
|
import org.sufficientlysecure.keychain.provider.KeychainContract.KeyRings;
|
||||||
import org.sufficientlysecure.keychain.provider.KeychainContract.Keys;
|
import org.sufficientlysecure.keychain.provider.KeychainContract.Keys;
|
||||||
import org.sufficientlysecure.keychain.provider.KeychainContract.UserPackets;
|
import org.sufficientlysecure.keychain.provider.KeychainContract.UserPackets;
|
||||||
|
import org.sufficientlysecure.keychain.provider.KeychainContract.UpdatedKeys;
|
||||||
import org.sufficientlysecure.keychain.remote.AccountSettings;
|
import org.sufficientlysecure.keychain.remote.AccountSettings;
|
||||||
import org.sufficientlysecure.keychain.remote.AppSettings;
|
import org.sufficientlysecure.keychain.remote.AppSettings;
|
||||||
import org.sufficientlysecure.keychain.ui.util.KeyFormattingUtils;
|
import org.sufficientlysecure.keychain.ui.util.KeyFormattingUtils;
|
||||||
|
@ -82,6 +83,7 @@ import java.util.HashSet;
|
||||||
import java.util.Iterator;
|
import java.util.Iterator;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
|
import java.util.concurrent.TimeUnit;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* This class contains high level methods for database access. Despite its
|
* This class contains high level methods for database access. Despite its
|
||||||
|
@ -685,6 +687,41 @@ public class ProviderHelper {
|
||||||
mIndent -= 1;
|
mIndent -= 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// before deleting key, retrieve it's last updated time
|
||||||
|
final int INDEX_MASTER_KEY_ID = 0;
|
||||||
|
final int INDEX_LAST_UPDATED = 1;
|
||||||
|
Cursor lastUpdatedCursor = mContentResolver.query(
|
||||||
|
UpdatedKeys.CONTENT_URI,
|
||||||
|
new String[]{
|
||||||
|
UpdatedKeys.MASTER_KEY_ID,
|
||||||
|
UpdatedKeys.LAST_UPDATED
|
||||||
|
},
|
||||||
|
UpdatedKeys.MASTER_KEY_ID + " = ?",
|
||||||
|
new String[]{"" + masterKeyId},
|
||||||
|
null
|
||||||
|
);
|
||||||
|
ContentValues lastUpdatedEntry = null;
|
||||||
|
if (lastUpdatedCursor.moveToNext()) {
|
||||||
|
lastUpdatedEntry = new ContentValues(2);
|
||||||
|
lastUpdatedEntry.put(UpdatedKeys.MASTER_KEY_ID,
|
||||||
|
lastUpdatedCursor.getLong(INDEX_MASTER_KEY_ID));
|
||||||
|
lastUpdatedEntry.put(UpdatedKeys.LAST_UPDATED,
|
||||||
|
lastUpdatedCursor.getLong(INDEX_LAST_UPDATED));
|
||||||
|
Log.e("PHILIP", "cv: " + lastUpdatedEntry + " actual: " + masterKeyId);
|
||||||
|
}
|
||||||
|
lastUpdatedCursor.close();
|
||||||
|
|
||||||
|
if (lastUpdatedEntry != null) {
|
||||||
|
// there was an entry to re-insert
|
||||||
|
// this operation must happen after the new key is inserted
|
||||||
|
operations.add(
|
||||||
|
ContentProviderOperation
|
||||||
|
.newInsert(UpdatedKeys.CONTENT_URI)
|
||||||
|
.withValues(lastUpdatedEntry)
|
||||||
|
.build()
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
// delete old version of this keyRing, which also deletes all keys and userIds on cascade
|
// delete old version of this keyRing, which also deletes all keys and userIds on cascade
|
||||||
int deleted = mContentResolver.delete(
|
int deleted = mContentResolver.delete(
|
||||||
|
@ -1239,6 +1276,28 @@ public class ProviderHelper {
|
||||||
}
|
}
|
||||||
|
|
||||||
// 2. wipe database (IT'S DANGEROUS)
|
// 2. wipe database (IT'S DANGEROUS)
|
||||||
|
|
||||||
|
// first, backup our list of updated key times
|
||||||
|
ArrayList<ContentValues> updatedKeysValues = new ArrayList<>();
|
||||||
|
final int INDEX_MASTER_KEY_ID = 0;
|
||||||
|
final int INDEX_LAST_UPDATED = 1;
|
||||||
|
Cursor lastUpdatedCursor = mContentResolver.query(
|
||||||
|
UpdatedKeys.CONTENT_URI,
|
||||||
|
new String[]{
|
||||||
|
UpdatedKeys.MASTER_KEY_ID,
|
||||||
|
UpdatedKeys.LAST_UPDATED
|
||||||
|
},
|
||||||
|
null, null, null);
|
||||||
|
while (lastUpdatedCursor.moveToNext()) {
|
||||||
|
ContentValues values = new ContentValues();
|
||||||
|
values.put(UpdatedKeys.MASTER_KEY_ID,
|
||||||
|
lastUpdatedCursor.getLong(INDEX_MASTER_KEY_ID));
|
||||||
|
values.put(UpdatedKeys.LAST_UPDATED,
|
||||||
|
lastUpdatedCursor.getLong(INDEX_LAST_UPDATED));
|
||||||
|
updatedKeysValues.add(values);
|
||||||
|
}
|
||||||
|
lastUpdatedCursor.close();
|
||||||
|
|
||||||
log.add(LogType.MSG_CON_DB_CLEAR, indent);
|
log.add(LogType.MSG_CON_DB_CLEAR, indent);
|
||||||
mContentResolver.delete(KeyRings.buildUnifiedKeyRingsUri(), null, null);
|
mContentResolver.delete(KeyRings.buildUnifiedKeyRingsUri(), null, null);
|
||||||
|
|
||||||
|
@ -1288,6 +1347,10 @@ public class ProviderHelper {
|
||||||
new ProgressFixedScaler(progress, 25, 99, 100, R.string.progress_con_reimport))
|
new ProgressFixedScaler(progress, 25, 99, 100, R.string.progress_con_reimport))
|
||||||
.serialKeyRingImport(itPublics, numPublics, null, null);
|
.serialKeyRingImport(itPublics, numPublics, null, null);
|
||||||
log.add(result, indent);
|
log.add(result, indent);
|
||||||
|
// re-insert our backed up list of updated key times
|
||||||
|
// TODO: can this cause issues in case a public key re-import failed?
|
||||||
|
mContentResolver.bulkInsert(UpdatedKeys.CONTENT_URI,
|
||||||
|
updatedKeysValues.toArray(new ContentValues[updatedKeysValues.size()]));
|
||||||
} else {
|
} else {
|
||||||
log.add(LogType.MSG_CON_REIMPORT_PUBLIC_SKIP, indent);
|
log.add(LogType.MSG_CON_REIMPORT_PUBLIC_SKIP, indent);
|
||||||
}
|
}
|
||||||
|
@ -1397,6 +1460,14 @@ public class ProviderHelper {
|
||||||
return getKeyRingAsArmoredString(data);
|
return getKeyRingAsArmoredString(data);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public Uri renewKeyLastUpdatedTime(long masterKeyId, long time, TimeUnit timeUnit) {
|
||||||
|
ContentValues values = new ContentValues();
|
||||||
|
values.put(UpdatedKeys.MASTER_KEY_ID, masterKeyId);
|
||||||
|
values.put(UpdatedKeys.LAST_UPDATED, timeUnit.toSeconds(time));
|
||||||
|
|
||||||
|
return mContentResolver.insert(UpdatedKeys.CONTENT_URI, values);
|
||||||
|
}
|
||||||
|
|
||||||
public ArrayList<String> getRegisteredApiApps() {
|
public ArrayList<String> getRegisteredApiApps() {
|
||||||
Cursor cursor = mContentResolver.query(ApiApps.CONTENT_URI, null, null, null, null);
|
Cursor cursor = mContentResolver.query(ApiApps.CONTENT_URI, null, null, null, null);
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,234 @@
|
||||||
|
package org.sufficientlysecure.keychain.service;
|
||||||
|
|
||||||
|
import android.accounts.Account;
|
||||||
|
import android.app.Notification;
|
||||||
|
import android.app.NotificationManager;
|
||||||
|
import android.app.PendingIntent;
|
||||||
|
import android.app.Service;
|
||||||
|
import android.content.AbstractThreadedSyncAdapter;
|
||||||
|
import android.content.ContentProviderClient;
|
||||||
|
import android.content.Context;
|
||||||
|
import android.content.Intent;
|
||||||
|
import android.content.SyncResult;
|
||||||
|
import android.database.Cursor;
|
||||||
|
import android.graphics.Bitmap;
|
||||||
|
import android.graphics.Canvas;
|
||||||
|
import android.graphics.drawable.Drawable;
|
||||||
|
import android.os.Build;
|
||||||
|
import android.os.Bundle;
|
||||||
|
import android.os.IBinder;
|
||||||
|
import android.support.v4.app.NotificationCompat;
|
||||||
|
|
||||||
|
import org.sufficientlysecure.keychain.Constants;
|
||||||
|
import org.sufficientlysecure.keychain.R;
|
||||||
|
import org.sufficientlysecure.keychain.keyimport.ParcelableKeyRing;
|
||||||
|
import org.sufficientlysecure.keychain.operations.ImportOperation;
|
||||||
|
import org.sufficientlysecure.keychain.operations.results.ImportKeyResult;
|
||||||
|
import org.sufficientlysecure.keychain.provider.KeychainContract;
|
||||||
|
import org.sufficientlysecure.keychain.provider.ProviderHelper;
|
||||||
|
import org.sufficientlysecure.keychain.service.input.CryptoInputParcel;
|
||||||
|
import org.sufficientlysecure.keychain.ui.MainActivity;
|
||||||
|
import org.sufficientlysecure.keychain.ui.util.KeyFormattingUtils;
|
||||||
|
import org.sufficientlysecure.keychain.util.Log;
|
||||||
|
import org.sufficientlysecure.keychain.util.ParcelableProxy;
|
||||||
|
import org.sufficientlysecure.keychain.util.Preferences;
|
||||||
|
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.GregorianCalendar;
|
||||||
|
import java.util.concurrent.TimeUnit;
|
||||||
|
import java.util.concurrent.atomic.AtomicBoolean;
|
||||||
|
|
||||||
|
public class KeyserverSyncAdapterService extends Service {
|
||||||
|
|
||||||
|
private static final String ACTION_IGNORE_TOR = "ignore_tor";
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public int onStartCommand(Intent intent, int flags, int startId) {
|
||||||
|
Log.e("PHILIP", "Sync adapter service starting");
|
||||||
|
switch (intent.getAction()) {
|
||||||
|
case ACTION_IGNORE_TOR: {
|
||||||
|
updateKeysFromKeyserver(this,
|
||||||
|
new CryptoInputParcel(ParcelableProxy.getForNoProxy()));
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// TODO: correct flag?
|
||||||
|
return START_NOT_STICKY;
|
||||||
|
}
|
||||||
|
|
||||||
|
private static AtomicBoolean sCancelled = new AtomicBoolean(false);
|
||||||
|
|
||||||
|
private class KeyserverSyncAdapter extends AbstractThreadedSyncAdapter {
|
||||||
|
|
||||||
|
public KeyserverSyncAdapter() {
|
||||||
|
super(KeyserverSyncAdapterService.this, true);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onPerformSync(Account account, Bundle extras, String authority,
|
||||||
|
ContentProviderClient provider, SyncResult syncResult) {
|
||||||
|
Log.d(Constants.TAG, "Performing a keyserver sync!");
|
||||||
|
|
||||||
|
updateKeysFromKeyserver(KeyserverSyncAdapterService.this, new CryptoInputParcel());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public IBinder onBind(Intent intent) {
|
||||||
|
return new KeyserverSyncAdapter().getSyncAdapterBinder();
|
||||||
|
}
|
||||||
|
|
||||||
|
public static void updateKeysFromKeyserver(Context context,
|
||||||
|
CryptoInputParcel cryptoInputParcel) {
|
||||||
|
/**
|
||||||
|
* 1. Get keys which have been updated recently and therefore do not need to
|
||||||
|
* be updated now
|
||||||
|
* 2. Get list of all keys and filter out ones that don't need to be updated
|
||||||
|
* 3. Update the remaining keys.
|
||||||
|
* At any time, if the operation is to be cancelled, the sCancelled AtomicBoolean may be set
|
||||||
|
*/
|
||||||
|
|
||||||
|
// 1. Get keys which have been updated recently and don't need to updated now
|
||||||
|
final int INDEX_UPDATED_KEYS_MASTER_KEY_ID = 0;
|
||||||
|
final int INDEX_LAST_UPDATED = 1;
|
||||||
|
|
||||||
|
final long TIME_DAY = TimeUnit.DAYS.toSeconds(1);
|
||||||
|
final long CURRENT_TIME = GregorianCalendar.getInstance().get(GregorianCalendar.SECOND);
|
||||||
|
Log.e("PHILIP", "day: " + TIME_DAY);
|
||||||
|
Cursor updatedKeysCursor = context.getContentResolver().query(
|
||||||
|
KeychainContract.UpdatedKeys.CONTENT_URI,
|
||||||
|
new String[]{
|
||||||
|
KeychainContract.UpdatedKeys.MASTER_KEY_ID,
|
||||||
|
KeychainContract.UpdatedKeys.LAST_UPDATED
|
||||||
|
},
|
||||||
|
"? - " + KeychainContract.UpdatedKeys.LAST_UPDATED + " < " + TIME_DAY,
|
||||||
|
new String[]{"" + CURRENT_TIME},
|
||||||
|
null
|
||||||
|
);
|
||||||
|
|
||||||
|
ArrayList<Long> ignoreMasterKeyIds = new ArrayList<>();
|
||||||
|
while (updatedKeysCursor.moveToNext()) {
|
||||||
|
long masterKeyId = updatedKeysCursor.getLong(INDEX_UPDATED_KEYS_MASTER_KEY_ID);
|
||||||
|
Log.d(Constants.TAG, "Keyserver sync: {" + masterKeyId + "} last updated at {"
|
||||||
|
+ updatedKeysCursor.getLong(INDEX_LAST_UPDATED) + "}s");
|
||||||
|
ignoreMasterKeyIds.add(masterKeyId);
|
||||||
|
}
|
||||||
|
updatedKeysCursor.close();
|
||||||
|
|
||||||
|
// 2. Make a list of public keys which should be updated
|
||||||
|
final int INDEX_MASTER_KEY_ID = 0;
|
||||||
|
final int INDEX_FINGERPRINT = 1;
|
||||||
|
Cursor keyCursor = context.getContentResolver().query(
|
||||||
|
KeychainContract.KeyRings.buildUnifiedKeyRingsUri(),
|
||||||
|
new String[]{
|
||||||
|
KeychainContract.KeyRings.MASTER_KEY_ID,
|
||||||
|
KeychainContract.KeyRings.FINGERPRINT
|
||||||
|
},
|
||||||
|
null,
|
||||||
|
null,
|
||||||
|
null
|
||||||
|
);
|
||||||
|
|
||||||
|
if (keyCursor == null) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
ArrayList<ParcelableKeyRing> keyList = new ArrayList<>();
|
||||||
|
while (keyCursor.moveToNext()) {
|
||||||
|
long keyId = keyCursor.getLong(INDEX_MASTER_KEY_ID);
|
||||||
|
if (ignoreMasterKeyIds.contains(keyId)) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
String fingerprint = KeyFormattingUtils
|
||||||
|
.convertFingerprintToHex(keyCursor.getBlob(INDEX_FINGERPRINT));
|
||||||
|
String hexKeyId = KeyFormattingUtils
|
||||||
|
.convertKeyIdToHex(keyId);
|
||||||
|
// we aren't updating from keybase as of now
|
||||||
|
keyList.add(new ParcelableKeyRing(fingerprint, hexKeyId, null));
|
||||||
|
}
|
||||||
|
keyCursor.close();
|
||||||
|
|
||||||
|
if (sCancelled.get()) {
|
||||||
|
// if we've already been cancelled
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// 3. Actually update the keys
|
||||||
|
Log.e("PHILIP", keyList.toString());
|
||||||
|
ImportOperation importOp = new ImportOperation(context, new ProviderHelper(context), null);
|
||||||
|
ImportKeyResult result = importOp.execute(
|
||||||
|
new ImportKeyringParcel(keyList,
|
||||||
|
Preferences.getPreferences(context).getPreferredKeyserver()),
|
||||||
|
cryptoInputParcel
|
||||||
|
);
|
||||||
|
if (result.isPending()) {
|
||||||
|
NotificationManager manager =
|
||||||
|
(NotificationManager) context.getSystemService(NOTIFICATION_SERVICE);
|
||||||
|
manager.notify(Constants.Notification.KEYSERVER_SYNC_FAIL_ORBOT,
|
||||||
|
getOrbotNoification(context));
|
||||||
|
|
||||||
|
Log.d(Constants.TAG, "Keyserver sync failed due to pending result " +
|
||||||
|
result.getRequiredInputParcel().mType);
|
||||||
|
} else {
|
||||||
|
Log.d(Constants.TAG, "Background keyserver sync completed: new " + result.mNewKeys
|
||||||
|
+ " updated " + result.mUpdatedKeys + " bad " + result.mBadKeys);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public static void preventAndCancelUpdates() {
|
||||||
|
// TODO: PHILIP uncomment!
|
||||||
|
// sCancelled.set(true);
|
||||||
|
}
|
||||||
|
|
||||||
|
public static void allowUpdates() {
|
||||||
|
sCancelled.set(false);
|
||||||
|
}
|
||||||
|
|
||||||
|
private static Notification getOrbotNoification(Context context) {
|
||||||
|
// TODO: PHILIP work in progress
|
||||||
|
NotificationCompat.Builder builder = new NotificationCompat.Builder(context);
|
||||||
|
builder.setSmallIcon(R.drawable.ic_stat_notify_24dp)
|
||||||
|
.setLargeIcon(getBitmap(R.drawable.ic_launcher, context))
|
||||||
|
.setContentTitle(context.getString(R.string.keyserver_sync_orbot_notif_title))
|
||||||
|
.setContentText(context.getString(R.string.keyserver_sync_orbot_notif_msg));
|
||||||
|
|
||||||
|
// In case the user decides to not use tor
|
||||||
|
Intent ignoreTorIntent = new Intent(context, KeyserverSyncAdapterService.class);
|
||||||
|
ignoreTorIntent.setAction(ACTION_IGNORE_TOR);
|
||||||
|
PendingIntent ignoreTorPi = PendingIntent.getService(
|
||||||
|
context,
|
||||||
|
Constants.Notification.KEYSERVER_SYNC_FAIL_ORBOT,
|
||||||
|
ignoreTorIntent,
|
||||||
|
PendingIntent.FLAG_CANCEL_CURRENT
|
||||||
|
);
|
||||||
|
|
||||||
|
builder.addAction(R.drawable.abc_ic_clear_mtrl_alpha,
|
||||||
|
context.getString(R.string.keyserver_sync_orbot_notif_ignore),
|
||||||
|
ignoreTorPi);
|
||||||
|
|
||||||
|
return builder.build();
|
||||||
|
}
|
||||||
|
|
||||||
|
// from de.azapps.mirakel.helper.Helpers from https://github.com/MirakelX/mirakel-android
|
||||||
|
private static Bitmap getBitmap(int resId, Context context) {
|
||||||
|
int mLargeIconWidth = (int) context.getResources().getDimension(
|
||||||
|
android.R.dimen.notification_large_icon_width);
|
||||||
|
int mLargeIconHeight = (int) context.getResources().getDimension(
|
||||||
|
android.R.dimen.notification_large_icon_height);
|
||||||
|
Drawable d;
|
||||||
|
if (Build.VERSION.SDK_INT < Build.VERSION_CODES.LOLLIPOP) {
|
||||||
|
// noinspection deprecation (can't help it at this api level)
|
||||||
|
d = context.getResources().getDrawable(resId);
|
||||||
|
} else {
|
||||||
|
d = context.getDrawable(resId);
|
||||||
|
}
|
||||||
|
if (d == null) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
Bitmap b = Bitmap.createBitmap(mLargeIconWidth, mLargeIconHeight, Bitmap.Config.ARGB_8888);
|
||||||
|
Canvas c = new Canvas(b);
|
||||||
|
d.setBounds(0, 0, mLargeIconWidth, mLargeIconHeight);
|
||||||
|
d.draw(c);
|
||||||
|
return b;
|
||||||
|
}
|
||||||
|
}
|
|
@ -101,8 +101,6 @@ public class PassphraseCacheService extends Service {
|
||||||
|
|
||||||
private static final long DEFAULT_TTL = 15;
|
private static final long DEFAULT_TTL = 15;
|
||||||
|
|
||||||
private static final int NOTIFICATION_ID = 1;
|
|
||||||
|
|
||||||
private static final int MSG_PASSPHRASE_CACHE_GET_OKAY = 1;
|
private static final int MSG_PASSPHRASE_CACHE_GET_OKAY = 1;
|
||||||
private static final int MSG_PASSPHRASE_CACHE_GET_KEY_NOT_FOUND = 2;
|
private static final int MSG_PASSPHRASE_CACHE_GET_KEY_NOT_FOUND = 2;
|
||||||
|
|
||||||
|
@ -477,7 +475,7 @@ public class PassphraseCacheService extends Service {
|
||||||
|
|
||||||
private void updateService() {
|
private void updateService() {
|
||||||
if (mPassphraseCache.size() > 0) {
|
if (mPassphraseCache.size() > 0) {
|
||||||
startForeground(NOTIFICATION_ID, getNotification());
|
startForeground(Constants.Notification.PASSPHRASE_CACHE, getNotification());
|
||||||
} else {
|
} else {
|
||||||
// stop whole service if no cached passphrases remaining
|
// stop whole service if no cached passphrases remaining
|
||||||
Log.d(Constants.TAG, "PassphraseCacheService: No passphrases remaining in memory, stopping service!");
|
Log.d(Constants.TAG, "PassphraseCacheService: No passphrases remaining in memory, stopping service!");
|
||||||
|
|
|
@ -48,7 +48,6 @@ import org.sufficientlysecure.keychain.service.RevokeKeyringParcel;
|
||||||
import org.sufficientlysecure.keychain.service.input.CryptoInputParcel;
|
import org.sufficientlysecure.keychain.service.input.CryptoInputParcel;
|
||||||
import org.sufficientlysecure.keychain.ui.base.CryptoOperationHelper;
|
import org.sufficientlysecure.keychain.ui.base.CryptoOperationHelper;
|
||||||
import org.sufficientlysecure.keychain.ui.dialog.CustomAlertDialogBuilder;
|
import org.sufficientlysecure.keychain.ui.dialog.CustomAlertDialogBuilder;
|
||||||
import org.sufficientlysecure.keychain.ui.util.Notify;
|
|
||||||
import org.sufficientlysecure.keychain.ui.util.ThemeChanger;
|
import org.sufficientlysecure.keychain.ui.util.ThemeChanger;
|
||||||
import org.sufficientlysecure.keychain.util.Log;
|
import org.sufficientlysecure.keychain.util.Log;
|
||||||
|
|
||||||
|
|
|
@ -25,7 +25,6 @@ import java.util.HashMap;
|
||||||
|
|
||||||
import android.animation.ObjectAnimator;
|
import android.animation.ObjectAnimator;
|
||||||
import android.annotation.TargetApi;
|
import android.annotation.TargetApi;
|
||||||
import android.app.Activity;
|
|
||||||
import android.content.Context;
|
import android.content.Context;
|
||||||
import android.content.Intent;
|
import android.content.Intent;
|
||||||
import android.database.Cursor;
|
import android.database.Cursor;
|
||||||
|
@ -65,15 +64,14 @@ import org.sufficientlysecure.keychain.operations.results.OperationResult;
|
||||||
import org.sufficientlysecure.keychain.provider.KeychainContract;
|
import org.sufficientlysecure.keychain.provider.KeychainContract;
|
||||||
import org.sufficientlysecure.keychain.provider.KeychainContract.KeyRings;
|
import org.sufficientlysecure.keychain.provider.KeychainContract.KeyRings;
|
||||||
import org.sufficientlysecure.keychain.provider.KeychainDatabase;
|
import org.sufficientlysecure.keychain.provider.KeychainDatabase;
|
||||||
import org.sufficientlysecure.keychain.provider.ProviderHelper;
|
|
||||||
import org.sufficientlysecure.keychain.service.ConsolidateInputParcel;
|
import org.sufficientlysecure.keychain.service.ConsolidateInputParcel;
|
||||||
import org.sufficientlysecure.keychain.service.ImportKeyringParcel;
|
import org.sufficientlysecure.keychain.service.ImportKeyringParcel;
|
||||||
|
import org.sufficientlysecure.keychain.service.KeyserverSyncAdapterService;
|
||||||
|
import org.sufficientlysecure.keychain.service.input.CryptoInputParcel;
|
||||||
import org.sufficientlysecure.keychain.ui.adapter.KeyAdapter;
|
import org.sufficientlysecure.keychain.ui.adapter.KeyAdapter;
|
||||||
import org.sufficientlysecure.keychain.ui.base.CryptoOperationHelper;
|
import org.sufficientlysecure.keychain.ui.base.CryptoOperationHelper;
|
||||||
import org.sufficientlysecure.keychain.ui.util.KeyFormattingUtils;
|
|
||||||
import org.sufficientlysecure.keychain.ui.util.FormattingUtils;
|
import org.sufficientlysecure.keychain.ui.util.FormattingUtils;
|
||||||
import org.sufficientlysecure.keychain.ui.util.Notify;
|
import org.sufficientlysecure.keychain.ui.util.Notify;
|
||||||
import org.sufficientlysecure.keychain.ui.util.Notify.Style;
|
|
||||||
import org.sufficientlysecure.keychain.util.FabContainer;
|
import org.sufficientlysecure.keychain.util.FabContainer;
|
||||||
import org.sufficientlysecure.keychain.util.Log;
|
import org.sufficientlysecure.keychain.util.Log;
|
||||||
import org.sufficientlysecure.keychain.util.Preferences;
|
import org.sufficientlysecure.keychain.util.Preferences;
|
||||||
|
@ -522,7 +520,9 @@ public class KeyListFragment extends LoaderFragment
|
||||||
}
|
}
|
||||||
|
|
||||||
private void updateAllKeys() {
|
private void updateAllKeys() {
|
||||||
Activity activity = getActivity();
|
// TODO: PHILIP just for testing, remove!
|
||||||
|
KeyserverSyncAdapterService.updateKeysFromKeyserver(getActivity(), new CryptoInputParcel());
|
||||||
|
/*Activity activity = getActivity();
|
||||||
if (activity == null) {
|
if (activity == null) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
@ -563,7 +563,7 @@ public class KeyListFragment extends LoaderFragment
|
||||||
|
|
||||||
mImportOpHelper = new CryptoOperationHelper<>(1, this,
|
mImportOpHelper = new CryptoOperationHelper<>(1, this,
|
||||||
this, R.string.progress_updating);
|
this, R.string.progress_updating);
|
||||||
mImportOpHelper.cryptoOperation();
|
mImportOpHelper.cryptoOperation();*/
|
||||||
}
|
}
|
||||||
|
|
||||||
private void consolidate() {
|
private void consolidate() {
|
||||||
|
@ -647,6 +647,18 @@ public class KeyListFragment extends LoaderFragment
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onResume() {
|
||||||
|
super.onResume();
|
||||||
|
KeyserverSyncAdapterService.preventAndCancelUpdates();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onPause() {
|
||||||
|
super.onPause();
|
||||||
|
KeyserverSyncAdapterService.allowUpdates();
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void fabMoveUp(int height) {
|
public void fabMoveUp(int height) {
|
||||||
ObjectAnimator anim = ObjectAnimator.ofFloat(mFab, "translationY", 0, -height);
|
ObjectAnimator anim = ObjectAnimator.ofFloat(mFab, "translationY", 0, -height);
|
||||||
|
|
|
@ -1351,6 +1351,12 @@
|
||||||
<string name="passp_cache_notif_clear">"Clear Passwords"</string>
|
<string name="passp_cache_notif_clear">"Clear Passwords"</string>
|
||||||
<string name="passp_cache_notif_pwd">"Password"</string>
|
<string name="passp_cache_notif_pwd">"Password"</string>
|
||||||
|
|
||||||
|
<!-- Keyserver sync -->
|
||||||
|
<string name="keyserver_sync_orbot_notif_title">"Orbot not running"</string>
|
||||||
|
<string name="keyserver_sync_orbot_notif_msg">"Keyserver sync failed since Orbot is not running. What would you like to do?"</string>
|
||||||
|
<string name="keyserver_sync_orbot_notif_start">"Start Orbot"</string>
|
||||||
|
<string name="keyserver_sync_orbot_notif_ignore">"Don't use Tor"</string>
|
||||||
|
|
||||||
<!-- First Time -->
|
<!-- First Time -->
|
||||||
<string name="first_time_text1">"Take back your privacy with OpenKeychain!"</string>
|
<string name="first_time_text1">"Take back your privacy with OpenKeychain!"</string>
|
||||||
<string name="first_time_create_key">"Create my key"</string>
|
<string name="first_time_create_key">"Create my key"</string>
|
||||||
|
|
|
@ -0,0 +1,8 @@
|
||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
<sync-adapter xmlns:android="http://schemas.android.com/apk/res/android"
|
||||||
|
android:contentAuthority="org.sufficientlysecure.keychain.debug.provider"
|
||||||
|
android:accountType="@string/account_type"
|
||||||
|
android:supportsUploading="false"
|
||||||
|
android:userVisible="true"
|
||||||
|
android:allowParallelSyncs="false"
|
||||||
|
android:isAlwaysSyncable="true" />
|
Loading…
Reference in a new issue