632 lines
28 KiB
Java
632 lines
28 KiB
Java
/*
|
|
* Copyright (C) 2017 Schürmann & Breitmoser GbR
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package org.sufficientlysecure.keychain.service;
|
|
|
|
|
|
import java.util.ArrayList;
|
|
import java.util.GregorianCalendar;
|
|
import java.util.Random;
|
|
import java.util.concurrent.TimeUnit;
|
|
import java.util.concurrent.atomic.AtomicBoolean;
|
|
|
|
import android.accounts.Account;
|
|
import android.app.AlarmManager;
|
|
import android.app.Notification;
|
|
import android.app.NotificationManager;
|
|
import android.app.PendingIntent;
|
|
import android.app.Service;
|
|
import android.content.AbstractThreadedSyncAdapter;
|
|
import android.content.ContentProviderClient;
|
|
import android.content.ContentResolver;
|
|
import android.content.Context;
|
|
import android.content.Intent;
|
|
import android.content.SyncResult;
|
|
import android.database.Cursor;
|
|
import android.graphics.Bitmap;
|
|
import android.graphics.Canvas;
|
|
import android.graphics.drawable.Drawable;
|
|
import android.net.ConnectivityManager;
|
|
import android.net.NetworkInfo;
|
|
import android.os.Build;
|
|
import android.os.Bundle;
|
|
import android.os.Handler;
|
|
import android.os.IBinder;
|
|
import android.os.Message;
|
|
import android.os.Messenger;
|
|
import android.os.PowerManager;
|
|
import android.os.SystemClock;
|
|
import android.support.v4.app.NotificationCompat;
|
|
|
|
import org.sufficientlysecure.keychain.Constants;
|
|
import org.sufficientlysecure.keychain.KeychainApplication;
|
|
import org.sufficientlysecure.keychain.R;
|
|
import org.sufficientlysecure.keychain.keyimport.ParcelableKeyRing;
|
|
import org.sufficientlysecure.keychain.network.NetworkReceiver;
|
|
import org.sufficientlysecure.keychain.network.orbot.OrbotHelper;
|
|
import org.sufficientlysecure.keychain.operations.ImportOperation;
|
|
import org.sufficientlysecure.keychain.operations.results.ImportKeyResult;
|
|
import org.sufficientlysecure.keychain.operations.results.OperationResult;
|
|
import org.sufficientlysecure.keychain.provider.KeyWritableRepository;
|
|
import org.sufficientlysecure.keychain.provider.KeychainContract;
|
|
import org.sufficientlysecure.keychain.service.input.CryptoInputParcel;
|
|
import org.sufficientlysecure.keychain.ui.OrbotRequiredDialogActivity;
|
|
import org.sufficientlysecure.keychain.ui.util.KeyFormattingUtils;
|
|
import org.sufficientlysecure.keychain.util.Log;
|
|
import org.sufficientlysecure.keychain.util.ParcelableProxy;
|
|
import org.sufficientlysecure.keychain.util.Preferences;
|
|
|
|
public class KeyserverSyncAdapterService extends Service {
|
|
|
|
// how often a sync should be initiated, in s
|
|
public static final long SYNC_INTERVAL =
|
|
Constants.DEBUG_KEYSERVER_SYNC
|
|
? TimeUnit.MINUTES.toSeconds(1) : TimeUnit.DAYS.toSeconds(3);
|
|
// time since last update after which a key should be updated again, in s
|
|
public static final long KEY_UPDATE_LIMIT =
|
|
Constants.DEBUG_KEYSERVER_SYNC ? 1 : TimeUnit.DAYS.toSeconds(7);
|
|
// time by which a sync is postponed in case screen is on
|
|
public static final long SYNC_POSTPONE_TIME =
|
|
Constants.DEBUG_KEYSERVER_SYNC ? 30 * 1000 : TimeUnit.MINUTES.toMillis(5);
|
|
// Time taken by Orbot before a new circuit is created
|
|
public static final int ORBOT_CIRCUIT_TIMEOUT_SECONDS =
|
|
Constants.DEBUG_KEYSERVER_SYNC ? 2 : (int) TimeUnit.MINUTES.toSeconds(10);
|
|
|
|
|
|
private static final String ACTION_IGNORE_TOR = "ignore_tor";
|
|
private static final String ACTION_UPDATE_ALL = "update_all";
|
|
public static final String ACTION_SYNC_NOW = "sync_now";
|
|
private static final String ACTION_DISMISS_NOTIFICATION = "cancel_sync";
|
|
private static final String ACTION_START_ORBOT = "start_orbot";
|
|
private static final String ACTION_CANCEL = "cancel";
|
|
|
|
private AtomicBoolean mCancelled = new AtomicBoolean(false);
|
|
|
|
@Override
|
|
public int onStartCommand(final Intent intent, int flags, final int startId) {
|
|
if (intent == null || intent.getAction() == null) {
|
|
// introduced due to https://github.com/open-keychain/open-keychain/issues/1573
|
|
return START_NOT_STICKY; // we can't act on this Intent and don't want it redelivered
|
|
}
|
|
|
|
if (!isSyncEnabled()) {
|
|
// if we have initiated a sync, but the user disabled it in preferences since
|
|
return START_NOT_STICKY;
|
|
}
|
|
|
|
switch (intent.getAction()) {
|
|
case ACTION_CANCEL: {
|
|
mCancelled.set(true);
|
|
return START_NOT_STICKY;
|
|
}
|
|
// the reason for the separation betweyeen SYNC_NOW and UPDATE_ALL is so that starting
|
|
// the sync directly from the notification is possible while the screen is on with
|
|
// UPDATE_ALL, but a postponed sync is only started if screen is off
|
|
case ACTION_SYNC_NOW: {
|
|
// this checks for screen on/off before sync, and postpones the sync if on
|
|
ContentResolver.requestSync(
|
|
new Account(Constants.ACCOUNT_NAME, Constants.ACCOUNT_TYPE),
|
|
Constants.PROVIDER_AUTHORITY,
|
|
new Bundle()
|
|
);
|
|
return START_NOT_STICKY;
|
|
}
|
|
case ACTION_UPDATE_ALL: {
|
|
// does not check for screen on/off
|
|
asyncKeyUpdate(this, CryptoInputParcel.createCryptoInputParcel(), startId);
|
|
// we depend on handleUpdateResult to call stopSelf when it is no longer necessary
|
|
// for the intent to be redelivered
|
|
return START_REDELIVER_INTENT;
|
|
}
|
|
case ACTION_IGNORE_TOR: {
|
|
NotificationManager manager = (NotificationManager) getSystemService(NOTIFICATION_SERVICE);
|
|
manager.cancel(Constants.Notification.KEYSERVER_SYNC_FAIL_ORBOT);
|
|
asyncKeyUpdate(this, CryptoInputParcel.createCryptoInputParcel(ParcelableProxy.getForNoProxy()),
|
|
startId);
|
|
// we depend on handleUpdateResult to call stopSelf when it is no longer necessary
|
|
// for the intent to be redelivered
|
|
return START_REDELIVER_INTENT;
|
|
}
|
|
case ACTION_START_ORBOT: {
|
|
NotificationManager manager = (NotificationManager)
|
|
getSystemService(NOTIFICATION_SERVICE);
|
|
manager.cancel(Constants.Notification.KEYSERVER_SYNC_FAIL_ORBOT);
|
|
|
|
Intent startOrbot = new Intent(this, OrbotRequiredDialogActivity.class);
|
|
startOrbot.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK);
|
|
startOrbot.putExtra(OrbotRequiredDialogActivity.EXTRA_START_ORBOT, true);
|
|
|
|
Messenger messenger = new Messenger(
|
|
new Handler() {
|
|
@Override
|
|
public void handleMessage(Message msg) {
|
|
switch (msg.what) {
|
|
case OrbotRequiredDialogActivity.MESSAGE_ORBOT_STARTED: {
|
|
startServiceWithUpdateAll();
|
|
break;
|
|
}
|
|
case OrbotRequiredDialogActivity.MESSAGE_ORBOT_IGNORE:
|
|
case OrbotRequiredDialogActivity.MESSAGE_DIALOG_CANCEL: {
|
|
// not possible since we proceed to Orbot's Activity
|
|
// directly, by starting OrbotRequiredDialogActivity with
|
|
// EXTRA_START_ORBOT set to true
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
);
|
|
startOrbot.putExtra(OrbotRequiredDialogActivity.EXTRA_MESSENGER, messenger);
|
|
startActivity(startOrbot);
|
|
// since we return START_NOT_STICKY, we also postpone the sync as a backup in case
|
|
// the service is killed before OrbotRequiredDialogActivity can get back to us
|
|
postponeSync();
|
|
// if use START_REDELIVER_INTENT, we might annoy the user by repeatedly starting the
|
|
// Orbot Activity when our service is killed and restarted
|
|
return START_NOT_STICKY;
|
|
}
|
|
case ACTION_DISMISS_NOTIFICATION: {
|
|
NotificationManager manager = (NotificationManager) getSystemService(NOTIFICATION_SERVICE);
|
|
manager.cancel(Constants.Notification.KEYSERVER_SYNC_FAIL_ORBOT);
|
|
return START_NOT_STICKY;
|
|
}
|
|
}
|
|
return START_NOT_STICKY;
|
|
}
|
|
|
|
private class KeyserverSyncAdapter extends AbstractThreadedSyncAdapter {
|
|
|
|
public KeyserverSyncAdapter() {
|
|
super(KeyserverSyncAdapterService.this, true);
|
|
}
|
|
|
|
@Override
|
|
public void onPerformSync(Account account, Bundle extras, String authority,
|
|
ContentProviderClient provider, SyncResult syncResult) {
|
|
|
|
Preferences prefs = Preferences.getPreferences(getContext());
|
|
|
|
// for a wifi-ONLY sync
|
|
if (prefs.getWifiOnlySync()) {
|
|
|
|
ConnectivityManager connMgr = (ConnectivityManager)
|
|
getSystemService(Context.CONNECTIVITY_SERVICE);
|
|
NetworkInfo networkInfo = connMgr.getNetworkInfo(ConnectivityManager.TYPE_WIFI);
|
|
boolean isNotOnWifi = !(networkInfo.getType() == ConnectivityManager.TYPE_WIFI);
|
|
boolean isNotConnected = !(networkInfo.isConnected());
|
|
|
|
// if Wi-Fi connection doesn't exist then receiver is enabled
|
|
if (isNotOnWifi && isNotConnected) {
|
|
new NetworkReceiver().setWifiReceiverComponent(true, getContext());
|
|
return;
|
|
}
|
|
}
|
|
Log.d(Constants.TAG, "Performing a keyserver sync!");
|
|
PowerManager pm = (PowerManager) KeyserverSyncAdapterService.this
|
|
.getSystemService(Context.POWER_SERVICE);
|
|
@SuppressWarnings("deprecation") // our min is API 15, deprecated only in 20
|
|
boolean isScreenOn = pm.isScreenOn();
|
|
|
|
if (!isScreenOn) {
|
|
startServiceWithUpdateAll();
|
|
} else {
|
|
postponeSync();
|
|
}
|
|
}
|
|
|
|
@Override
|
|
public void onSyncCanceled() {
|
|
super.onSyncCanceled();
|
|
cancelUpdates(KeyserverSyncAdapterService.this);
|
|
}
|
|
}
|
|
|
|
@Override
|
|
public IBinder onBind(Intent intent) {
|
|
return new KeyserverSyncAdapter().getSyncAdapterBinder();
|
|
}
|
|
|
|
/**
|
|
* Since we're returning START_REDELIVER_INTENT in onStartCommand, we need to remember to call
|
|
* stopSelf(int) to prevent the Intent from being redelivered if our work is already done
|
|
*
|
|
* @param result result of keyserver sync
|
|
* @param startId startId provided to the onStartCommand call which resulted in this sync
|
|
*/
|
|
private void handleUpdateResult(ImportKeyResult result, final int startId) {
|
|
if (result.isPending()) {
|
|
Log.d(Constants.TAG, "Orbot required for sync but not running, attempting to start");
|
|
// result is pending due to Orbot not being started
|
|
// try to start it silently, if disabled show notifications
|
|
new OrbotHelper.SilentStartManager() {
|
|
@Override
|
|
protected void onOrbotStarted() {
|
|
// retry the update
|
|
startServiceWithUpdateAll();
|
|
stopSelf(startId); // startServiceWithUpdateAll will deliver a new Intent
|
|
}
|
|
|
|
@Override
|
|
protected void onSilentStartDisabled() {
|
|
// show notification
|
|
NotificationManager manager =
|
|
(NotificationManager) getSystemService(NOTIFICATION_SERVICE);
|
|
manager.notify(Constants.Notification.KEYSERVER_SYNC_FAIL_ORBOT,
|
|
getOrbotNoification(KeyserverSyncAdapterService.this));
|
|
// further action on user interaction with notification, intent should not be
|
|
// redelivered, therefore:
|
|
stopSelf(startId);
|
|
}
|
|
}.startOrbotAndListen(this, false);
|
|
// if we're killed before we get a response from Orbot, we need the intent to be
|
|
// redelivered, so no stopSelf(int) here
|
|
} else if (isUpdateCancelled()) {
|
|
Log.d(Constants.TAG, "Keyserver sync cancelled, postponing by" + SYNC_POSTPONE_TIME
|
|
+ "ms");
|
|
postponeSync();
|
|
// postponeSync creates a new intent, so we don't need this to be redelivered
|
|
stopSelf(startId);
|
|
} else {
|
|
Log.d(Constants.TAG, "Keyserver sync completed: Updated: " + result.mUpdatedKeys
|
|
+ " Failed: " + result.mBadKeys);
|
|
// key sync completed successfully, we can stop
|
|
stopSelf(startId);
|
|
}
|
|
}
|
|
|
|
private void postponeSync() {
|
|
AlarmManager alarmManager = (AlarmManager) getSystemService(Context.ALARM_SERVICE);
|
|
Intent serviceIntent = new Intent(this, KeyserverSyncAdapterService.class);
|
|
serviceIntent.setAction(ACTION_SYNC_NOW);
|
|
PendingIntent pi = PendingIntent.getService(this, 0, serviceIntent,
|
|
PendingIntent.FLAG_UPDATE_CURRENT);
|
|
alarmManager.set(
|
|
AlarmManager.ELAPSED_REALTIME_WAKEUP,
|
|
SystemClock.elapsedRealtime() + SYNC_POSTPONE_TIME,
|
|
pi
|
|
);
|
|
}
|
|
|
|
private void asyncKeyUpdate(final Context context,
|
|
final CryptoInputParcel cryptoInputParcel, final int startId) {
|
|
new Thread(new Runnable() {
|
|
@Override
|
|
public void run() {
|
|
ImportKeyResult result = updateKeysFromKeyserver(context, cryptoInputParcel);
|
|
handleUpdateResult(result, startId);
|
|
}
|
|
}).start();
|
|
}
|
|
|
|
private synchronized ImportKeyResult updateKeysFromKeyserver(final Context context,
|
|
final CryptoInputParcel cryptoInputParcel) {
|
|
mCancelled.set(false);
|
|
|
|
ArrayList<ParcelableKeyRing> keyList = getKeysToUpdate(context);
|
|
|
|
if (isUpdateCancelled()) { // if we've already been cancelled
|
|
return new ImportKeyResult(OperationResult.RESULT_CANCELLED,
|
|
new OperationResult.OperationLog());
|
|
}
|
|
|
|
if (cryptoInputParcel.getParcelableProxy() == null) {
|
|
// no explicit proxy, retrieve from preferences. Check if we should do a staggered sync
|
|
if (Preferences.getPreferences(context).getParcelableProxy().isTorEnabled()) {
|
|
return staggeredUpdate(context, keyList, cryptoInputParcel);
|
|
} else {
|
|
return directUpdate(context, keyList, cryptoInputParcel);
|
|
}
|
|
} else {
|
|
return directUpdate(context, keyList, cryptoInputParcel);
|
|
}
|
|
}
|
|
|
|
private ImportKeyResult directUpdate(Context context, ArrayList<ParcelableKeyRing> keyList,
|
|
CryptoInputParcel cryptoInputParcel) {
|
|
Log.d(Constants.TAG, "Starting normal update");
|
|
ImportOperation importOp = new ImportOperation(context,
|
|
KeyWritableRepository.create(context), null);
|
|
return importOp.execute(
|
|
ImportKeyringParcel.createImportKeyringParcel(keyList,
|
|
Preferences.getPreferences(context).getPreferredKeyserver()),
|
|
cryptoInputParcel
|
|
);
|
|
}
|
|
|
|
/**
|
|
* will perform a staggered update of user's keys using delays to ensure new Tor circuits, as
|
|
* performed by parcimonie. Relevant issue and method at:
|
|
* https://github.com/open-keychain/open-keychain/issues/1337
|
|
*
|
|
* @return result of the sync
|
|
*/
|
|
private ImportKeyResult staggeredUpdate(Context context, ArrayList<ParcelableKeyRing> keyList,
|
|
CryptoInputParcel cryptoInputParcel) {
|
|
Log.d(Constants.TAG, "Starting staggered update");
|
|
// final int WEEK_IN_SECONDS = (int) TimeUnit.DAYS.toSeconds(7);
|
|
// we are limiting our randomness to ORBOT_CIRCUIT_TIMEOUT_SECONDS for now
|
|
final int WEEK_IN_SECONDS = 0;
|
|
|
|
ImportOperation.KeyImportAccumulator accumulator
|
|
= new ImportOperation.KeyImportAccumulator(keyList.size(), null);
|
|
|
|
// so that the first key can be updated without waiting. This is so that there isn't a
|
|
// large gap between a "Start Orbot" notification and the next key update
|
|
boolean first = true;
|
|
|
|
for (ParcelableKeyRing keyRing : keyList) {
|
|
int waitTime;
|
|
int staggeredTime = new Random().nextInt(1 + 2 * (WEEK_IN_SECONDS / keyList.size()));
|
|
if (staggeredTime >= ORBOT_CIRCUIT_TIMEOUT_SECONDS) {
|
|
waitTime = staggeredTime;
|
|
} else {
|
|
waitTime = ORBOT_CIRCUIT_TIMEOUT_SECONDS
|
|
+ new Random().nextInt(1 + ORBOT_CIRCUIT_TIMEOUT_SECONDS);
|
|
}
|
|
|
|
if (first) {
|
|
waitTime = 0;
|
|
first = false;
|
|
}
|
|
|
|
Log.d(Constants.TAG, "Updating key with a wait time of " + waitTime + "s");
|
|
try {
|
|
Thread.sleep(waitTime * 1000);
|
|
} catch (InterruptedException e) {
|
|
Log.e(Constants.TAG, "Exception during sleep between key updates", e);
|
|
// skip this one
|
|
continue;
|
|
}
|
|
ArrayList<ParcelableKeyRing> keyWrapper = new ArrayList<>();
|
|
keyWrapper.add(keyRing);
|
|
if (isUpdateCancelled()) {
|
|
return new ImportKeyResult(ImportKeyResult.RESULT_CANCELLED,
|
|
new OperationResult.OperationLog());
|
|
}
|
|
ImportKeyResult result =
|
|
new ImportOperation(context, KeyWritableRepository.create(context), null, mCancelled)
|
|
.execute(
|
|
ImportKeyringParcel.createImportKeyringParcel(
|
|
keyWrapper,
|
|
Preferences.getPreferences(context)
|
|
.getPreferredKeyserver()
|
|
),
|
|
cryptoInputParcel
|
|
);
|
|
if (result.isPending()) {
|
|
return result;
|
|
}
|
|
accumulator.accumulateKeyImport(result);
|
|
}
|
|
return accumulator.getConsolidatedResult();
|
|
}
|
|
|
|
/**
|
|
* 1. Get keys which have been updated recently and therefore do not need to
|
|
* be updated now
|
|
* 2. Get list of all keys and filter out ones that don't need to be updated
|
|
* 3. Return keys to be updated
|
|
*
|
|
* @return list of keys that require update
|
|
*/
|
|
private ArrayList<ParcelableKeyRing> getKeysToUpdate(Context context) {
|
|
|
|
// 1. Get keys which have been updated recently and don't need to updated now
|
|
final int INDEX_UPDATED_KEYS_MASTER_KEY_ID = 0;
|
|
final int INDEX_LAST_UPDATED = 1;
|
|
|
|
// all time in seconds not milliseconds
|
|
final long CURRENT_TIME = GregorianCalendar.getInstance().getTimeInMillis() / 1000;
|
|
Cursor updatedKeysCursor = context.getContentResolver().query(
|
|
KeychainContract.UpdatedKeys.CONTENT_URI,
|
|
new String[]{
|
|
KeychainContract.UpdatedKeys.MASTER_KEY_ID,
|
|
KeychainContract.UpdatedKeys.LAST_UPDATED
|
|
},
|
|
"? - " + KeychainContract.UpdatedKeys.LAST_UPDATED + " < " + KEY_UPDATE_LIMIT,
|
|
new String[]{"" + CURRENT_TIME},
|
|
null
|
|
);
|
|
|
|
ArrayList<Long> ignoreMasterKeyIds = new ArrayList<>();
|
|
while (updatedKeysCursor != null && updatedKeysCursor.moveToNext()) {
|
|
long masterKeyId = updatedKeysCursor.getLong(INDEX_UPDATED_KEYS_MASTER_KEY_ID);
|
|
Log.d(Constants.TAG, "Keyserver sync: Ignoring {" + masterKeyId + "} last updated at {"
|
|
+ updatedKeysCursor.getLong(INDEX_LAST_UPDATED) + "}s");
|
|
ignoreMasterKeyIds.add(masterKeyId);
|
|
}
|
|
if (updatedKeysCursor != null) {
|
|
updatedKeysCursor.close();
|
|
}
|
|
|
|
// 2. Make a list of public keys which should be updated
|
|
final int INDEX_MASTER_KEY_ID = 0;
|
|
final int INDEX_FINGERPRINT = 1;
|
|
Cursor keyCursor = context.getContentResolver().query(
|
|
KeychainContract.KeyRings.buildUnifiedKeyRingsUri(),
|
|
new String[]{
|
|
KeychainContract.KeyRings.MASTER_KEY_ID,
|
|
KeychainContract.KeyRings.FINGERPRINT
|
|
},
|
|
null,
|
|
null,
|
|
null
|
|
);
|
|
|
|
if (keyCursor == null) {
|
|
return new ArrayList<>();
|
|
}
|
|
|
|
ArrayList<ParcelableKeyRing> keyList = new ArrayList<>();
|
|
while (keyCursor.moveToNext()) {
|
|
long keyId = keyCursor.getLong(INDEX_MASTER_KEY_ID);
|
|
if (ignoreMasterKeyIds.contains(keyId)) {
|
|
continue;
|
|
}
|
|
Log.d(Constants.TAG, "Keyserver sync: Updating {" + keyId + "}");
|
|
byte[] fingerprint = keyCursor.getBlob(INDEX_FINGERPRINT);
|
|
String hexKeyId = KeyFormattingUtils.convertKeyIdToHex(keyId);
|
|
// we aren't updating from keybase as of now
|
|
keyList.add(ParcelableKeyRing.createFromReference(fingerprint, hexKeyId, null, null));
|
|
}
|
|
keyCursor.close();
|
|
|
|
return keyList;
|
|
}
|
|
|
|
private boolean isUpdateCancelled() {
|
|
return mCancelled.get();
|
|
}
|
|
|
|
/**
|
|
* will cancel an update already in progress. We send an Intent to cancel it instead of simply
|
|
* modifying a static variable since the service is running in a process that is different from
|
|
* the default application process where the UI code runs.
|
|
*
|
|
* @param context used to send an Intent to the service requesting cancellation.
|
|
*/
|
|
public static void cancelUpdates(Context context) {
|
|
Intent intent = new Intent(context, KeyserverSyncAdapterService.class);
|
|
intent.setAction(ACTION_CANCEL);
|
|
context.startService(intent);
|
|
}
|
|
|
|
private Notification getOrbotNoification(Context context) {
|
|
NotificationCompat.Builder builder = new NotificationCompat.Builder(context);
|
|
builder.setSmallIcon(R.drawable.ic_stat_notify_24dp)
|
|
.setLargeIcon(getBitmap(R.mipmap.ic_launcher, context))
|
|
.setContentTitle(context.getString(R.string.keyserver_sync_orbot_notif_title))
|
|
.setContentText(context.getString(R.string.keyserver_sync_orbot_notif_msg))
|
|
.setAutoCancel(true);
|
|
|
|
// In case the user decides to not use tor
|
|
Intent ignoreTorIntent = new Intent(context, KeyserverSyncAdapterService.class);
|
|
ignoreTorIntent.setAction(ACTION_IGNORE_TOR);
|
|
PendingIntent ignoreTorPi = PendingIntent.getService(
|
|
context,
|
|
0, // security not issue since we're giving this pending intent to Notification Manager
|
|
ignoreTorIntent,
|
|
PendingIntent.FLAG_CANCEL_CURRENT
|
|
);
|
|
|
|
builder.addAction(R.drawable.ic_stat_tor_off,
|
|
context.getString(R.string.keyserver_sync_orbot_notif_ignore),
|
|
ignoreTorPi);
|
|
|
|
Intent startOrbotIntent = new Intent(context, KeyserverSyncAdapterService.class);
|
|
startOrbotIntent.setAction(ACTION_START_ORBOT);
|
|
PendingIntent startOrbotPi = PendingIntent.getService(
|
|
context,
|
|
0, // security not issue since we're giving this pending intent to Notification Manager
|
|
startOrbotIntent,
|
|
PendingIntent.FLAG_CANCEL_CURRENT
|
|
);
|
|
|
|
builder.addAction(R.drawable.ic_stat_tor,
|
|
context.getString(R.string.keyserver_sync_orbot_notif_start),
|
|
startOrbotPi
|
|
);
|
|
builder.setContentIntent(startOrbotPi);
|
|
|
|
return builder.build();
|
|
}
|
|
|
|
public static void enableKeyserverSync(Context context) {
|
|
Account account = KeychainApplication.createAccountIfNecessary(context);
|
|
|
|
if (account == null) {
|
|
// account failed to be created for some reason, nothing we can do here
|
|
return;
|
|
}
|
|
|
|
ContentResolver.setIsSyncable(account, Constants.PROVIDER_AUTHORITY, 1);
|
|
ContentResolver.setSyncAutomatically(account, Constants.PROVIDER_AUTHORITY, true);
|
|
|
|
updateInterval(context);
|
|
}
|
|
|
|
/**
|
|
* creates a new sync if one does not exist, or updates an existing sync if the sync interval
|
|
* has changed.
|
|
*/
|
|
public static void updateInterval(Context context) {
|
|
Account account = KeychainApplication.createAccountIfNecessary(context);
|
|
|
|
if (account == null) {
|
|
// account failed to be created for some reason, nothing we can do here
|
|
return;
|
|
}
|
|
|
|
boolean intervalChanged = false;
|
|
boolean syncExists = Preferences.getKeyserverSyncEnabled(context);
|
|
|
|
if (syncExists) {
|
|
long oldInterval = ContentResolver.getPeriodicSyncs(
|
|
account, Constants.PROVIDER_AUTHORITY).get(0).period;
|
|
if (oldInterval != SYNC_INTERVAL) {
|
|
intervalChanged = true;
|
|
}
|
|
}
|
|
|
|
if (!syncExists || intervalChanged) {
|
|
ContentResolver.addPeriodicSync(
|
|
account,
|
|
Constants.PROVIDER_AUTHORITY,
|
|
new Bundle(),
|
|
SYNC_INTERVAL
|
|
);
|
|
}
|
|
}
|
|
|
|
private boolean isSyncEnabled() {
|
|
Account account = KeychainApplication.createAccountIfNecessary(this);
|
|
|
|
// if account is null, it could not be created for some reason, so sync cannot exist
|
|
return account != null
|
|
&& ContentResolver.getSyncAutomatically(account, Constants.PROVIDER_AUTHORITY);
|
|
}
|
|
|
|
private void startServiceWithUpdateAll() {
|
|
Intent serviceIntent = new Intent(this, KeyserverSyncAdapterService.class);
|
|
serviceIntent.setAction(ACTION_UPDATE_ALL);
|
|
this.startService(serviceIntent);
|
|
}
|
|
|
|
// from de.azapps.mirakel.helper.Helpers from https://github.com/MirakelX/mirakel-android
|
|
private Bitmap getBitmap(int resId, Context context) {
|
|
int mLargeIconWidth = (int) context.getResources().getDimension(
|
|
android.R.dimen.notification_large_icon_width);
|
|
int mLargeIconHeight = (int) context.getResources().getDimension(
|
|
android.R.dimen.notification_large_icon_height);
|
|
Drawable d;
|
|
if (Build.VERSION.SDK_INT < Build.VERSION_CODES.LOLLIPOP) {
|
|
// noinspection deprecation (can't help it at this api level)
|
|
d = context.getResources().getDrawable(resId);
|
|
} else {
|
|
d = context.getDrawable(resId);
|
|
}
|
|
if (d == null) {
|
|
return null;
|
|
}
|
|
Bitmap b = Bitmap.createBitmap(mLargeIconWidth, mLargeIconHeight, Bitmap.Config.ARGB_8888);
|
|
Canvas c = new Canvas(b);
|
|
d.setBounds(0, 0, mLargeIconWidth, mLargeIconHeight);
|
|
d.draw(c);
|
|
return b;
|
|
}
|
|
}
|