session-android/src/org/thoughtcrime/securesms/ApplicationContext.java

642 lines
26 KiB
Java
Raw Normal View History

/*
* Copyright (C) 2013 Open Whisper Systems
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
package org.thoughtcrime.securesms;
import android.arch.lifecycle.DefaultLifecycleObserver;
import android.arch.lifecycle.LifecycleOwner;
import android.arch.lifecycle.ProcessLifecycleOwner;
2019-11-21 05:31:01 +00:00
import android.content.ComponentName;
import android.content.Context;
2019-11-21 05:31:01 +00:00
import android.content.Intent;
2019-09-10 06:49:17 +00:00
import android.database.ContentObserver;
import android.os.AsyncTask;
import android.os.Build;
2019-11-21 05:31:01 +00:00
import android.os.Handler;
import android.support.annotation.NonNull;
import android.support.annotation.Nullable;
2017-01-08 17:43:43 +00:00
import android.support.multidex.MultiDexApplication;
import org.conscrypt.Conscrypt;
2019-06-07 05:21:25 +00:00
import org.jetbrains.annotations.NotNull;
import org.signal.aesgcmprovider.AesGcmProvider;
2018-10-29 22:14:31 +00:00
import org.thoughtcrime.securesms.components.TypingStatusRepository;
import org.thoughtcrime.securesms.components.TypingStatusSender;
import org.thoughtcrime.securesms.crypto.IdentityKeyUtil;
2019-11-21 05:31:01 +00:00
import org.thoughtcrime.securesms.crypto.MasterSecretUtil;
import org.thoughtcrime.securesms.crypto.ProfileKeyUtil;
import org.thoughtcrime.securesms.database.Address;
2019-09-10 06:49:17 +00:00
import org.thoughtcrime.securesms.database.DatabaseContentProviders;
import org.thoughtcrime.securesms.database.DatabaseFactory;
import org.thoughtcrime.securesms.dependencies.AxolotlStorageModule;
import org.thoughtcrime.securesms.dependencies.InjectableType;
import org.thoughtcrime.securesms.dependencies.SignalCommunicationModule;
2019-08-19 00:37:17 +00:00
import org.thoughtcrime.securesms.groups.GroupManager;
2019-03-28 15:56:35 +00:00
import org.thoughtcrime.securesms.jobmanager.DependencyInjector;
import org.thoughtcrime.securesms.jobmanager.JobManager;
2019-03-28 15:56:35 +00:00
import org.thoughtcrime.securesms.jobmanager.impl.JsonDataSerializer;
import org.thoughtcrime.securesms.jobs.CreateSignedPreKeyJob;
import org.thoughtcrime.securesms.jobs.FastJobStorage;
import org.thoughtcrime.securesms.jobs.JobManagerFactories;
import org.thoughtcrime.securesms.jobs.MultiDeviceContactUpdateJob;
2019-07-01 06:49:42 +00:00
import org.thoughtcrime.securesms.jobs.PushContentReceiveJob;
import org.thoughtcrime.securesms.jobs.PushNotificationReceiveJob;
2018-10-11 23:45:22 +00:00
import org.thoughtcrime.securesms.jobs.RefreshUnidentifiedDeliveryAbilityJob;
import org.thoughtcrime.securesms.logging.AndroidLogger;
import org.thoughtcrime.securesms.logging.CustomSignalProtocolLogger;
2018-08-01 15:09:24 +00:00
import org.thoughtcrime.securesms.logging.Log;
import org.thoughtcrime.securesms.logging.PersistentLogger;
import org.thoughtcrime.securesms.logging.UncaughtExceptionLogger;
import org.thoughtcrime.securesms.loki.LokiPublicChatManager;
2019-11-21 22:35:15 +00:00
import org.thoughtcrime.securesms.loki.MultiDeviceUtilities;
2019-12-17 13:27:59 +00:00
import org.thoughtcrime.securesms.loki.redesign.activities.HomeActivity;
2020-03-24 00:31:01 +00:00
import org.thoughtcrime.securesms.loki.redesign.messaging.BackgroundOpenGroupPollWorker;
2020-03-24 02:48:23 +00:00
import org.thoughtcrime.securesms.loki.redesign.messaging.BackgroundPollWorker;
2020-02-04 23:39:35 +00:00
import org.thoughtcrime.securesms.loki.redesign.messaging.LokiAPIDatabase;
import org.thoughtcrime.securesms.loki.redesign.messaging.LokiRSSFeedPoller;
import org.thoughtcrime.securesms.loki.redesign.messaging.LokiUserDatabase;
2020-01-16 03:35:51 +00:00
import org.thoughtcrime.securesms.loki.redesign.utilities.Broadcaster;
import org.thoughtcrime.securesms.notifications.MessageNotifier;
import org.thoughtcrime.securesms.notifications.NotificationChannels;
2020-02-24 03:57:51 +00:00
import org.thoughtcrime.securesms.profiles.AvatarHelper;
import org.thoughtcrime.securesms.providers.BlobProvider;
import org.thoughtcrime.securesms.push.SignalServiceNetworkAccess;
import org.thoughtcrime.securesms.recipients.Recipient;
import org.thoughtcrime.securesms.service.ExpiringMessageManager;
import org.thoughtcrime.securesms.service.IncomingMessageObserver;
import org.thoughtcrime.securesms.service.KeyCachingService;
import org.thoughtcrime.securesms.service.LocalBackupListener;
2018-05-22 09:13:10 +00:00
import org.thoughtcrime.securesms.service.RotateSenderCertificateListener;
import org.thoughtcrime.securesms.service.RotateSignedPreKeyListener;
import org.thoughtcrime.securesms.service.UpdateApkRefreshListener;
import org.thoughtcrime.securesms.util.TextSecurePreferences;
import org.thoughtcrime.securesms.util.dynamiclanguage.DynamicLanguageContextWrapper;
import org.webrtc.PeerConnectionFactory;
2017-12-22 00:37:07 +00:00
import org.webrtc.PeerConnectionFactory.InitializationOptions;
import org.webrtc.voiceengine.WebRtcAudioManager;
import org.webrtc.voiceengine.WebRtcAudioUtils;
import org.whispersystems.libsignal.logging.SignalProtocolLoggerProvider;
2019-06-25 03:51:24 +00:00
import org.whispersystems.signalservice.api.messages.SignalServiceEnvelope;
2020-02-24 03:57:51 +00:00
import org.whispersystems.signalservice.api.util.StreamDetails;
2019-06-25 03:51:24 +00:00
import org.whispersystems.signalservice.internal.push.SignalServiceProtos;
2019-10-07 04:30:20 +00:00
import org.whispersystems.signalservice.loki.api.LokiAPIDatabaseProtocol;
2020-02-12 01:26:27 +00:00
import org.whispersystems.signalservice.loki.api.LokiFileServerAPI;
2019-10-07 04:30:20 +00:00
import org.whispersystems.signalservice.loki.api.LokiP2PAPI;
import org.whispersystems.signalservice.loki.api.LokiP2PAPIDelegate;
2020-03-24 02:48:23 +00:00
import org.whispersystems.signalservice.loki.api.LokiPoller;
2019-12-02 04:03:12 +00:00
import org.whispersystems.signalservice.loki.api.LokiPublicChat;
import org.whispersystems.signalservice.loki.api.LokiPublicChatAPI;
2019-10-07 04:30:20 +00:00
import org.whispersystems.signalservice.loki.api.LokiRSSFeed;
2020-02-24 03:57:51 +00:00
import java.io.File;
import java.io.FileInputStream;
import java.security.SecureRandom;
import java.security.Security;
2019-08-28 04:19:08 +00:00
import java.util.ArrayList;
2020-02-24 03:57:51 +00:00
import java.util.Date;
import java.util.HashSet;
import java.util.List;
import java.util.Set;
import dagger.ObjectGraph;
2019-06-25 03:51:24 +00:00
import kotlin.Unit;
2019-07-24 02:30:23 +00:00
import network.loki.messenger.BuildConfig;
2019-09-19 05:00:52 +00:00
import static nl.komponents.kovenant.android.KovenantAndroid.startKovenant;
import static nl.komponents.kovenant.android.KovenantAndroid.stopKovenant;
/**
* Will be called once when the TextSecure process is created.
*
* We're using this as an insertion point to patch up the Android PRNG disaster,
* to initialize the job manager, and to check for GCM registration freshness.
*
* @author Moxie Marlinspike
*/
2019-06-07 05:21:25 +00:00
public class ApplicationContext extends MultiDexApplication implements DependencyInjector, DefaultLifecycleObserver, LokiP2PAPIDelegate {
private static final String TAG = ApplicationContext.class.getSimpleName();
2019-11-15 05:24:58 +00:00
private final static int OK_HTTP_CACHE_SIZE = 10 * 1024 * 1024; // 10 MB
private ExpiringMessageManager expiringMessageManager;
2018-10-29 22:14:31 +00:00
private TypingStatusRepository typingStatusRepository;
private TypingStatusSender typingStatusSender;
private JobManager jobManager;
private IncomingMessageObserver incomingMessageObserver;
private ObjectGraph objectGraph;
private PersistentLogger persistentLogger;
2019-06-28 06:08:27 +00:00
// Loki
2020-03-24 02:48:23 +00:00
private LokiPoller lokiPoller = null;
2019-08-28 04:19:08 +00:00
private LokiRSSFeedPoller lokiNewsFeedPoller = null;
private LokiRSSFeedPoller lokiMessengerUpdatesFeedPoller = null;
private LokiPublicChatManager lokiPublicChatManager = null;
2019-10-15 02:39:17 +00:00
private LokiPublicChatAPI lokiPublicChatAPI = null;
2020-01-16 03:35:51 +00:00
public Broadcaster broadcaster = null;
2019-06-28 06:08:27 +00:00
public SignalCommunicationModule communicationModule;
2019-06-18 02:49:21 +00:00
private volatile boolean isAppVisible;
public static ApplicationContext getInstance(Context context) {
return (ApplicationContext)context.getApplicationContext();
}
@Override
public void onCreate() {
super.onCreate();
Log.i(TAG, "onCreate()");
2020-01-16 03:35:51 +00:00
broadcaster = new Broadcaster(this);
2019-11-21 05:31:01 +00:00
checkNeedsDatabaseReset();
startKovenant();
initializeSecurityProvider();
initializeLogging();
initializeCrashHandling();
initializeDependencyInjection();
initializeJobManager();
initializeMessageRetrieval();
initializeExpiringMessageManager();
2018-10-29 22:14:31 +00:00
initializeTypingStatusRepository();
initializeTypingStatusSender();
initializeSignedPreKeyCheck();
initializePeriodicTasks();
initializeWebRtc();
initializePendingMessages();
2018-10-11 23:45:22 +00:00
initializeUnidentifiedDeliveryAbilityRefresh();
initializeBlobProvider();
NotificationChannels.create(this);
ProcessLifecycleOwner.get().getLifecycle().addObserver(this);
// Loki - Set up P2P API if needed
setUpP2PAPI();
// Loki - Update device mappings
2019-10-24 02:35:14 +00:00
if (setUpStorageAPIIfNeeded()) {
2020-02-13 03:39:29 +00:00
String userHexEncodedPublicKey = TextSecurePreferences.getLocalNumber(this);
if (userHexEncodedPublicKey != null) {
if (TextSecurePreferences.getNeedsIsRevokedSlaveDeviceCheck(this)) {
MultiDeviceUtilities.checkIsRevokedSlaveDevice(this);
} else {
// We always update our current device links onto the server in case we failed to do so upon linking
MultiDeviceUtilities.updateDeviceLinksOnServer(this);
2020-02-13 03:39:29 +00:00
}
2019-11-21 22:35:15 +00:00
}
}
2020-02-24 03:57:51 +00:00
// Loki - Resubmit profile picture if needed
resubmitProfilePictureIfNeeded();
2020-01-16 22:33:31 +00:00
// Loki - Set up public chat manager
lokiPublicChatManager = new LokiPublicChatManager(this);
2020-02-12 22:28:00 +00:00
updatePublicChatProfilePictureIfNeeded();
}
@Override
public void onStart(@NonNull LifecycleOwner owner) {
isAppVisible = true;
Log.i(TAG, "App is now visible.");
executePendingContactSync();
KeyCachingService.onAppForegrounded(this);
2020-03-24 02:48:23 +00:00
// Loki - Start polling if needed
startPollingIfNeeded();
2020-02-12 22:28:00 +00:00
// Loki - Start open group polling if needed
lokiPublicChatManager.startPollersIfNeeded();
}
@Override
public void onStop(@NonNull LifecycleOwner owner) {
isAppVisible = false;
Log.i(TAG, "App is no longer visible.");
KeyCachingService.onAppBackgrounded(this);
MessageNotifier.setVisibleThread(-1);
2020-03-24 02:48:23 +00:00
// Loki - Stop polling if needed
if (lokiPoller != null) { lokiPoller.stopIfNeeded(); }
if (lokiPublicChatManager != null) { lokiPublicChatManager.stopPollers(); }
}
2019-09-19 05:00:52 +00:00
@Override
public void onTerminate() {
stopKovenant();
super.onTerminate();
}
@Override
public void injectDependencies(Object object) {
if (object instanceof InjectableType) {
objectGraph.inject(object);
}
}
public JobManager getJobManager() {
return jobManager;
}
public ExpiringMessageManager getExpiringMessageManager() {
return expiringMessageManager;
}
2018-10-29 22:14:31 +00:00
public TypingStatusRepository getTypingStatusRepository() {
return typingStatusRepository;
}
public TypingStatusSender getTypingStatusSender() {
return typingStatusSender;
}
public boolean isAppVisible() {
return isAppVisible;
}
public PersistentLogger getPersistentLogger() {
return persistentLogger;
}
public LokiPublicChatManager getLokiPublicChatManager() {
return lokiPublicChatManager;
}
2019-10-15 02:39:17 +00:00
public @Nullable LokiPublicChatAPI getLokiPublicChatAPI() {
if (lokiPublicChatAPI == null && IdentityKeyUtil.hasIdentityKey(this)) {
String userHexEncodedPublicKey = TextSecurePreferences.getLocalNumber(this);
2019-12-04 02:33:05 +00:00
if (userHexEncodedPublicKey != null) {
byte[] userPrivateKey = IdentityKeyUtil.getIdentityKeyPair(this).getPrivateKey().serialize();
LokiAPIDatabase apiDatabase = DatabaseFactory.getLokiAPIDatabase(this);
LokiUserDatabase userDatabase = DatabaseFactory.getLokiUserDatabase(this);
lokiPublicChatAPI = new LokiPublicChatAPI(userHexEncodedPublicKey, userPrivateKey, apiDatabase, userDatabase);
}
}
2019-10-15 02:39:17 +00:00
return lokiPublicChatAPI;
}
private void initializeSecurityProvider() {
try {
Class.forName("org.signal.aesgcmprovider.AesGcmCipher");
} catch (ClassNotFoundException e) {
Log.e(TAG, "Failed to find AesGcmCipher class");
throw new ProviderInitializationException();
}
int aesPosition = Security.insertProviderAt(new AesGcmProvider(), 1);
Log.i(TAG, "Installed AesGcmProvider: " + aesPosition);
if (aesPosition < 0) {
Log.e(TAG, "Failed to install AesGcmProvider()");
throw new ProviderInitializationException();
}
int conscryptPosition = Security.insertProviderAt(Conscrypt.newProvider(), 2);
Log.i(TAG, "Installed Conscrypt provider: " + conscryptPosition);
if (conscryptPosition < 0) {
Log.w(TAG, "Did not install Conscrypt provider. May already be present.");
}
}
private void initializeLogging() {
persistentLogger = new PersistentLogger(this);
org.thoughtcrime.securesms.logging.Log.initialize(new AndroidLogger(), persistentLogger);
SignalProtocolLoggerProvider.setProvider(new CustomSignalProtocolLogger());
}
private void initializeCrashHandling() {
final Thread.UncaughtExceptionHandler originalHandler = Thread.getDefaultUncaughtExceptionHandler();
Thread.setDefaultUncaughtExceptionHandler(new UncaughtExceptionLogger(originalHandler));
}
private void initializeJobManager() {
2019-03-28 15:56:35 +00:00
this.jobManager = new JobManager(this, new JobManager.Configuration.Builder()
.setDataSerializer(new JsonDataSerializer())
.setJobFactories(JobManagerFactories.getJobFactories(this))
.setConstraintFactories(JobManagerFactories.getConstraintFactories(this))
.setConstraintObservers(JobManagerFactories.getConstraintObservers(this))
.setJobStorage(new FastJobStorage(DatabaseFactory.getJobDatabase(this)))
.setDependencyInjector(this)
.build());
}
public void initializeMessageRetrieval() {
this.incomingMessageObserver = new IncomingMessageObserver(this);
}
private void initializeDependencyInjection() {
2019-06-28 06:08:27 +00:00
communicationModule = new SignalCommunicationModule(this, new SignalServiceNetworkAccess(this));
this.objectGraph = ObjectGraph.create(communicationModule, new AxolotlStorageModule(this));
}
private void initializeSignedPreKeyCheck() {
if (!TextSecurePreferences.isSignedPreKeyRegistered(this)) {
jobManager.add(new CreateSignedPreKeyJob(this));
}
}
private void initializeExpiringMessageManager() {
this.expiringMessageManager = new ExpiringMessageManager(this);
}
2018-10-29 22:14:31 +00:00
private void initializeTypingStatusRepository() {
this.typingStatusRepository = new TypingStatusRepository();
}
private void initializeTypingStatusSender() {
this.typingStatusSender = new TypingStatusSender(this);
}
private void initializePeriodicTasks() {
RotateSignedPreKeyListener.schedule(this);
LocalBackupListener.schedule(this);
2018-05-22 09:13:10 +00:00
RotateSenderCertificateListener.schedule(this);
2020-01-22 00:57:16 +00:00
BackgroundPollWorker.schedule(this); // Session
2020-03-24 00:31:01 +00:00
BackgroundOpenGroupPollWorker.schedule(this); // Session
if (BuildConfig.PLAY_STORE_DISABLED) {
UpdateApkRefreshListener.schedule(this);
}
}
private void initializeWebRtc() {
try {
Set<String> HARDWARE_AEC_BLACKLIST = new HashSet<String>() {{
add("Pixel");
add("Pixel XL");
add("Moto G5");
add("Moto G (5S) Plus");
add("Moto G4");
add("TA-1053");
add("Mi A1");
add("E5823"); // Sony z5 compact
add("Redmi Note 5");
add("FP2"); // Fairphone FP2
2019-03-10 13:29:02 +00:00
add("MI 5");
}};
Set<String> OPEN_SL_ES_WHITELIST = new HashSet<String>() {{
add("Pixel");
add("Pixel XL");
}};
2017-12-22 00:37:07 +00:00
if (HARDWARE_AEC_BLACKLIST.contains(Build.MODEL)) {
WebRtcAudioUtils.setWebRtcBasedAcousticEchoCanceler(true);
}
2017-12-22 00:37:07 +00:00
if (!OPEN_SL_ES_WHITELIST.contains(Build.MODEL)) {
WebRtcAudioManager.setBlacklistDeviceForOpenSLESUsage(true);
}
2017-12-22 00:37:07 +00:00
2019-01-29 22:25:49 +00:00
PeerConnectionFactory.initialize(InitializationOptions.builder(this).createInitializationOptions());
} catch (UnsatisfiedLinkError e) {
Log.w(TAG, e);
}
}
private void executePendingContactSync() {
if (TextSecurePreferences.needsFullContactSync(this)) {
ApplicationContext.getInstance(this).getJobManager().add(new MultiDeviceContactUpdateJob(this, true));
}
}
private void initializePendingMessages() {
if (TextSecurePreferences.getNeedsMessagePull(this)) {
Log.i(TAG, "Scheduling a message fetch.");
ApplicationContext.getInstance(this).getJobManager().add(new PushNotificationReceiveJob(this));
TextSecurePreferences.setNeedsMessagePull(this, false);
}
}
2018-10-11 23:45:22 +00:00
private void initializeUnidentifiedDeliveryAbilityRefresh() {
if (TextSecurePreferences.isMultiDevice(this) && !TextSecurePreferences.isUnidentifiedDeliveryEnabled(this)) {
2019-03-28 15:56:35 +00:00
jobManager.add(new RefreshUnidentifiedDeliveryAbilityJob());
2018-10-11 23:45:22 +00:00
}
}
private void initializeBlobProvider() {
AsyncTask.THREAD_POOL_EXECUTOR.execute(() -> {
BlobProvider.getInstance().onSessionStart(this);
});
}
@Override
protected void attachBaseContext(Context base) {
super.attachBaseContext(DynamicLanguageContextWrapper.updateContext(base, TextSecurePreferences.getLanguage(base)));
}
private static class ProviderInitializationException extends RuntimeException {
}
2019-06-07 05:21:25 +00:00
// region Loki
2019-10-24 02:35:14 +00:00
public boolean setUpStorageAPIIfNeeded() {
String userHexEncodedPublicKey = TextSecurePreferences.getLocalNumber(this);
2019-09-25 04:04:25 +00:00
if (userHexEncodedPublicKey != null && IdentityKeyUtil.hasIdentityKey(this)) {
2019-10-07 05:15:06 +00:00
boolean isDebugMode = BuildConfig.DEBUG;
2019-09-25 04:04:25 +00:00
byte[] userPrivateKey = IdentityKeyUtil.getIdentityKeyPair(this).getPrivateKey().serialize();
LokiAPIDatabaseProtocol database = DatabaseFactory.getLokiAPIDatabase(this);
2020-02-10 22:38:05 +00:00
LokiFileServerAPI.Companion.configure(isDebugMode, userHexEncodedPublicKey, userPrivateKey, database);
2019-10-24 02:35:14 +00:00
return true;
2019-09-25 04:04:25 +00:00
}
2019-10-24 02:35:14 +00:00
return false;
2019-09-23 01:28:17 +00:00
}
public void setUpP2PAPI() {
String hexEncodedPublicKey = TextSecurePreferences.getLocalNumber(this);
if (hexEncodedPublicKey == null) { return; }
LokiP2PAPI.Companion.configure(hexEncodedPublicKey, (isOnline, contactPublicKey) -> {
// TODO: Implement
return null;
}, this);
}
2019-06-07 05:21:25 +00:00
@Override
public void ping(@NotNull String s) {
// TODO: Implement
}
2020-03-24 02:48:23 +00:00
private void setUpPollingIfNeeded() {
if (lokiPoller != null) return;
String userHexEncodedPublicKey = TextSecurePreferences.getLocalNumber(this);
if (userHexEncodedPublicKey == null) return;
LokiAPIDatabase lokiAPIDatabase = DatabaseFactory.getLokiAPIDatabase(this);
2019-06-25 03:51:24 +00:00
Context context = this;
2020-03-24 02:48:23 +00:00
lokiPoller = new LokiPoller(userHexEncodedPublicKey, lokiAPIDatabase, broadcaster, protos -> {
2019-08-28 04:19:08 +00:00
for (SignalServiceProtos.Envelope proto : protos) {
new PushContentReceiveJob(context).processEnvelope(new SignalServiceEnvelope(proto));
2019-06-25 03:51:24 +00:00
}
2019-08-28 04:19:08 +00:00
return Unit.INSTANCE;
2019-06-25 03:51:24 +00:00
});
}
2019-08-05 02:08:23 +00:00
2020-03-24 02:48:23 +00:00
public void startPollingIfNeeded() {
setUpPollingIfNeeded();
if (lokiPoller != null) { lokiPoller.startIfNeeded(); }
2019-08-05 02:08:23 +00:00
}
2019-08-28 04:19:08 +00:00
private LokiRSSFeed lokiNewsFeed() {
return new LokiRSSFeed("loki.network.feed", "https://loki.network/feed/", "Loki News", true);
}
private LokiRSSFeed lokiMessengerUpdatesFeed() {
return new LokiRSSFeed("loki.network.messenger-updates.feed", "https://loki.network/category/messenger-updates/feed", "Session Updates", false);
2019-08-28 04:19:08 +00:00
}
public void createDefaultPublicChatsIfNeeded() {
List<LokiPublicChat> defaultPublicChats = LokiPublicChatAPI.Companion.getDefaultChats(BuildConfig.DEBUG);
2020-02-03 10:08:09 +00:00
for (LokiPublicChat publicChat : defaultPublicChats) {
long threadID = GroupManager.getPublicChatThreadId(publicChat.getId(), this);
String migrationKey = publicChat.getId() + "_migrated";
boolean isChatMigrated = TextSecurePreferences.getBooleanPreference(this, migrationKey, false);
2020-02-03 10:08:09 +00:00
boolean isChatSetUp = TextSecurePreferences.isChatSetUp(this, publicChat.getId());
if (!isChatSetUp || !publicChat.isDeletable()) {
lokiPublicChatManager.addChat(publicChat.getServer(), publicChat.getChannel(), publicChat.getDisplayName());
TextSecurePreferences.markChatSetUp(this, publicChat.getId());
TextSecurePreferences.setBooleanPreference(this, migrationKey, true);
} else if (threadID > -1 && !isChatMigrated) {
// Migrate the old public chats
2020-02-03 10:08:09 +00:00
DatabaseFactory.getLokiThreadDatabase(this).setPublicChat(publicChat, threadID);
TextSecurePreferences.setBooleanPreference(this, migrationKey, true);
}
2019-08-28 04:19:08 +00:00
}
}
public void createRSSFeedsIfNeeded() {
ArrayList<LokiRSSFeed> feeds = new ArrayList<>();
2020-02-12 22:28:00 +00:00
// feeds.add(lokiNewsFeed());
2019-08-28 04:19:08 +00:00
feeds.add(lokiMessengerUpdatesFeed());
for (LokiRSSFeed feed : feeds) {
boolean isFeedSetUp = TextSecurePreferences.isChatSetUp(this, feed.getId());
if (!isFeedSetUp || !feed.isDeletable()) {
GroupManager.createRSSFeedGroup(feed.getId(), this, null, feed.getDisplayName());
2019-08-28 04:19:08 +00:00
TextSecurePreferences.markChatSetUp(this, feed.getId());
}
}
}
private void createRSSFeedPollersIfNeeded() {
2019-09-11 23:59:15 +00:00
// Only create the RSS feed pollers if their threads aren't deleted
2019-09-10 06:49:17 +00:00
LokiRSSFeed lokiNewsFeed = lokiNewsFeed();
long lokiNewsFeedThreadID = GroupManager.getRSSFeedThreadId(lokiNewsFeed.getId(), this);
2019-09-11 23:59:15 +00:00
if (lokiNewsFeedThreadID >= 0 && lokiNewsFeedPoller == null) {
2019-09-10 06:49:17 +00:00
lokiNewsFeedPoller = new LokiRSSFeedPoller(this, lokiNewsFeed);
2019-09-11 23:59:15 +00:00
// Set up deletion listeners if needed
setUpThreadDeletionListeners(lokiNewsFeedThreadID, () -> {
2019-09-10 06:49:17 +00:00
if (lokiNewsFeedPoller != null) lokiNewsFeedPoller.stop();
lokiNewsFeedPoller = null;
});
}
// The user can't delete the Session Updates RSS feed
2019-09-11 23:59:15 +00:00
if (lokiMessengerUpdatesFeedPoller == null) {
lokiMessengerUpdatesFeedPoller = new LokiRSSFeedPoller(this, lokiMessengerUpdatesFeed());
}
2019-09-10 06:49:17 +00:00
}
2019-09-11 23:59:15 +00:00
private void setUpThreadDeletionListeners(long threadID, Runnable onDelete) {
if (threadID < 0) { return; }
2019-09-10 06:49:17 +00:00
ContentObserver observer = new ContentObserver(null) {
2019-09-11 23:59:15 +00:00
2019-09-10 06:49:17 +00:00
@Override
public void onChange(boolean selfChange) {
super.onChange(selfChange);
2019-09-11 23:59:15 +00:00
// Stop the poller if thread is deleted
2019-09-10 06:49:17 +00:00
try {
2019-09-11 23:59:15 +00:00
if (!DatabaseFactory.getThreadDatabase(getApplicationContext()).hasThread(threadID)) {
2019-09-10 06:49:17 +00:00
onDelete.run();
getContentResolver().unregisterContentObserver(this);
}
} catch (Exception e) {
2019-09-11 23:59:15 +00:00
// TODO: Handle
2019-09-10 06:49:17 +00:00
}
}
};
2019-09-11 23:59:15 +00:00
this.getContentResolver().registerContentObserver(DatabaseContentProviders.Conversation.getUriForThread(threadID), true, observer);
2019-08-28 04:19:08 +00:00
}
public void startRSSFeedPollersIfNeeded() {
createRSSFeedPollersIfNeeded();
2019-09-10 06:49:17 +00:00
if (lokiNewsFeedPoller != null) lokiNewsFeedPoller.startIfNeeded();
if (lokiMessengerUpdatesFeedPoller != null) lokiMessengerUpdatesFeedPoller.startIfNeeded();
2019-08-28 04:19:08 +00:00
}
2020-02-24 03:57:51 +00:00
private void resubmitProfilePictureIfNeeded() {
String userHexEncodedPublicKey = TextSecurePreferences.getLocalNumber(this);
if (userHexEncodedPublicKey == null) return;
long now = new Date().getTime();
long lastProfilePictureUpload = TextSecurePreferences.getLastProfilePictureUpload(this);
if (now - lastProfilePictureUpload <= 14 * 24 * 60 * 60 * 1000) return;
AsyncTask.execute(() -> {
String encodedProfileKey = ProfileKeyUtil.generateEncodedProfileKey(this);
byte[] profileKey = ProfileKeyUtil.getProfileKeyFromEncodedString(encodedProfileKey);
try {
File profilePicture = AvatarHelper.getAvatarFile(this, Address.fromSerialized(userHexEncodedPublicKey));
StreamDetails stream = new StreamDetails(new FileInputStream(profilePicture), "image/jpeg", profilePicture.length());
LokiFileServerAPI.shared.uploadProfilePicture(LokiFileServerAPI.shared.getServer(), profileKey, stream, () -> {
TextSecurePreferences.setLastProfilePictureUpload(this, new Date().getTime());
TextSecurePreferences.setProfileAvatarId(this, new SecureRandom().nextInt());
ProfileKeyUtil.setEncodedProfileKey(this, encodedProfileKey);
return Unit.INSTANCE;
});
} catch (Exception exception) {
// Do nothing
}
});
}
2020-02-12 22:28:00 +00:00
public void updatePublicChatProfilePictureIfNeeded() {
AsyncTask.execute(() -> {
2019-12-16 10:43:08 +00:00
LokiPublicChatAPI publicChatAPI = null;
try {
publicChatAPI = getLokiPublicChatAPI();
} catch (Exception e) {
// Do nothing
}
if (publicChatAPI != null) {
byte[] profileKey = ProfileKeyUtil.getProfileKey(this);
String url = TextSecurePreferences.getProfileAvatarUrl(this);
String ourMasterDevice = TextSecurePreferences.getMasterHexEncodedPublicKey(this);
if (ourMasterDevice != null) {
Recipient masterDevice = Recipient.from(this, Address.fromSerialized(ourMasterDevice), false).resolve();
profileKey = masterDevice.getProfileKey();
url = masterDevice.getProfileAvatar();
}
Set<String> servers = DatabaseFactory.getLokiThreadDatabase(this).getAllPublicChatServers();
for (String server : servers) {
2019-12-03 04:03:13 +00:00
if (profileKey != null) {
publicChatAPI.setProfilePicture(server, profileKey, url);
}
}
}
});
}
2019-11-21 22:35:15 +00:00
2019-11-21 05:31:01 +00:00
public void checkNeedsDatabaseReset() {
if (TextSecurePreferences.resetDatabase(this)) {
2019-11-21 22:35:15 +00:00
boolean wasUnlinked = TextSecurePreferences.databaseResetFromUnpair(this);
TextSecurePreferences.clearAll(this);
2019-11-21 23:43:22 +00:00
TextSecurePreferences.setDatabaseResetFromUnpair(this, wasUnlinked); // Loki - Re-set the preference so we can use it in the starting screen to determine whether device was unlinked or not
2019-11-21 05:31:01 +00:00
MasterSecretUtil.clear(this);
if (this.deleteDatabase("signal.db")) {
Log.d("Loki", "Deleted database");
}
}
}
public void clearData() {
TextSecurePreferences.setResetDatabase(this, true);
new Handler().postDelayed(this::restartApplication, 200);
}
public void restartApplication() {
2019-12-17 13:27:59 +00:00
Intent intent = new Intent(this, HomeActivity.class);
2019-11-21 05:31:01 +00:00
ComponentName componentName = intent.getComponent();
Intent mainIntent = Intent.makeRestartActivityTask(componentName);
this.startActivity(mainIntent);
Runtime.getRuntime().exit(0);
}
2020-02-13 03:39:29 +00:00
// endregion
}