MainApp.java 40 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964
  1. /*
  2. * Nextcloud - Android Client
  3. *
  4. * SPDX-FileCopyrightText: 2023 Alper Ozturk <alper.ozturk@nextcloud.com>
  5. * SPDX-FileCopyrightText: 2023 TSI-mc
  6. * SPDX-FileCopyrightText: 2022-2023 Álvaro Brey <alvaro@alvarobrey.com>
  7. * SPDX-FileCopyrightText: 2016-2020 Tobias Kaminsky <tobias@kaminsky.me>
  8. * SPDX-FileCopyrightText: 2019 Chris Narkiewicz <hello@ezaquarii.com>
  9. * SPDX-FileCopyrightText: 2019 Alice Gaudon <alice@gaudon.pro>
  10. * SPDX-FileCopyrightText: 2016 Andy Scherzinger <info@andy-scherzinger.de>
  11. * SPDX-FileCopyrightText: 2015 ownCloud Inc.
  12. * SPDX-FileCopyrightText: 2014 David A. Velasco <dvelasco@solidgear.es>
  13. * SPDX-FileCopyrightText: 2013 María Asensio Valverde <masensio@solidgear.es>
  14. * SPDX-License-Identifier: GPL-2.0-only AND (AGPL-3.0-or-later OR GPL-2.0-only)
  15. */
  16. package com.owncloud.android;
  17. import android.annotation.SuppressLint;
  18. import android.app.Activity;
  19. import android.app.ActivityManager;
  20. import android.app.Application;
  21. import android.app.NotificationChannel;
  22. import android.app.NotificationManager;
  23. import android.content.BroadcastReceiver;
  24. import android.content.ContentResolver;
  25. import android.content.Context;
  26. import android.content.Intent;
  27. import android.content.IntentFilter;
  28. import android.content.RestrictionsManager;
  29. import android.content.pm.ActivityInfo;
  30. import android.content.pm.PackageInfo;
  31. import android.content.pm.PackageManager;
  32. import android.content.res.Resources;
  33. import android.os.Build;
  34. import android.os.Bundle;
  35. import android.os.Environment;
  36. import android.os.StrictMode;
  37. import android.text.TextUtils;
  38. import android.view.WindowManager;
  39. import com.nextcloud.appReview.InAppReviewHelper;
  40. import com.nextcloud.client.account.User;
  41. import com.nextcloud.client.account.UserAccountManager;
  42. import com.nextcloud.client.appinfo.AppInfo;
  43. import com.nextcloud.client.core.Clock;
  44. import com.nextcloud.client.device.PowerManagementService;
  45. import com.nextcloud.client.di.ActivityInjector;
  46. import com.nextcloud.client.di.AppComponent;
  47. import com.nextcloud.client.di.DaggerAppComponent;
  48. import com.nextcloud.client.errorhandling.ExceptionHandler;
  49. import com.nextcloud.client.jobs.BackgroundJobManager;
  50. import com.nextcloud.client.logger.LegacyLoggerAdapter;
  51. import com.nextcloud.client.logger.Logger;
  52. import com.nextcloud.client.migrations.MigrationsManager;
  53. import com.nextcloud.client.network.ConnectivityService;
  54. import com.nextcloud.client.network.WalledCheckCache;
  55. import com.nextcloud.client.onboarding.OnboardingService;
  56. import com.nextcloud.client.preferences.AppPreferences;
  57. import com.nextcloud.client.preferences.AppPreferencesImpl;
  58. import com.nextcloud.client.preferences.DarkMode;
  59. import com.nextcloud.utils.extensions.ContextExtensionsKt;
  60. import com.nmc.android.ui.LauncherActivity;
  61. import com.owncloud.android.authentication.AuthenticatorActivity;
  62. import com.owncloud.android.authentication.PassCodeManager;
  63. import com.owncloud.android.datamodel.ArbitraryDataProvider;
  64. import com.owncloud.android.datamodel.ArbitraryDataProviderImpl;
  65. import com.owncloud.android.datamodel.MediaFolder;
  66. import com.owncloud.android.datamodel.MediaFolderType;
  67. import com.owncloud.android.datamodel.MediaProvider;
  68. import com.owncloud.android.datamodel.ReceiverFlag;
  69. import com.owncloud.android.datamodel.SyncedFolder;
  70. import com.owncloud.android.datamodel.SyncedFolderProvider;
  71. import com.owncloud.android.datamodel.ThumbnailsCacheManager;
  72. import com.owncloud.android.datamodel.UploadsStorageManager;
  73. import com.owncloud.android.datastorage.DataStorageProvider;
  74. import com.owncloud.android.datastorage.StoragePoint;
  75. import com.owncloud.android.lib.common.OwnCloudClientManagerFactory;
  76. import com.owncloud.android.lib.common.utils.Log_OC;
  77. import com.owncloud.android.lib.resources.status.NextcloudVersion;
  78. import com.owncloud.android.lib.resources.status.OwnCloudVersion;
  79. import com.owncloud.android.ui.activity.SyncedFoldersActivity;
  80. import com.owncloud.android.ui.notifications.NotificationUtils;
  81. import com.owncloud.android.utils.appConfig.AppConfigManager;
  82. import com.owncloud.android.utils.DisplayUtils;
  83. import com.owncloud.android.utils.FilesSyncHelper;
  84. import com.owncloud.android.utils.PermissionUtil;
  85. import com.owncloud.android.utils.ReceiversHelper;
  86. import com.owncloud.android.utils.SecurityUtils;
  87. import com.owncloud.android.utils.theme.ViewThemeUtils;
  88. import org.conscrypt.Conscrypt;
  89. import org.greenrobot.eventbus.EventBus;
  90. import java.lang.reflect.Method;
  91. import java.security.NoSuchAlgorithmException;
  92. import java.security.Security;
  93. import java.util.ArrayList;
  94. import java.util.Arrays;
  95. import java.util.HashMap;
  96. import java.util.List;
  97. import java.util.Locale;
  98. import java.util.Map;
  99. import javax.inject.Inject;
  100. import javax.inject.Provider;
  101. import javax.net.ssl.SSLContext;
  102. import javax.net.ssl.SSLEngine;
  103. import androidx.annotation.NonNull;
  104. import androidx.annotation.StringRes;
  105. import androidx.appcompat.app.AlertDialog;
  106. import androidx.appcompat.app.AppCompatDelegate;
  107. import androidx.core.util.Pair;
  108. import androidx.lifecycle.Lifecycle;
  109. import androidx.lifecycle.LifecycleEventObserver;
  110. import androidx.lifecycle.ProcessLifecycleOwner;
  111. import androidx.multidex.MultiDexApplication;
  112. import dagger.android.AndroidInjector;
  113. import dagger.android.DispatchingAndroidInjector;
  114. import dagger.android.HasAndroidInjector;
  115. import de.cotech.hw.SecurityKeyManager;
  116. import de.cotech.hw.SecurityKeyManagerConfig;
  117. import edu.umd.cs.findbugs.annotations.SuppressFBWarnings;
  118. import static com.owncloud.android.ui.activity.ContactsPreferenceActivity.PREFERENCE_CONTACTS_AUTOMATIC_BACKUP;
  119. /**
  120. * Main Application of the project.
  121. * Contains methods to build the "static" strings. These strings were before constants in different classes.
  122. */
  123. public class MainApp extends MultiDexApplication implements HasAndroidInjector {
  124. public static final OwnCloudVersion OUTDATED_SERVER_VERSION = NextcloudVersion.nextcloud_26;
  125. public static final OwnCloudVersion MINIMUM_SUPPORTED_SERVER_VERSION = OwnCloudVersion.nextcloud_16;
  126. private static final String TAG = MainApp.class.getSimpleName();
  127. public static final String DOT = ".";
  128. private static Context mContext;
  129. private static String storagePath;
  130. private static boolean mOnlyOnDevice;
  131. private static boolean mOnlyPersonalFiles;
  132. @Inject
  133. protected AppPreferences preferences;
  134. @Inject
  135. protected DispatchingAndroidInjector<Object> dispatchingAndroidInjector;
  136. @Inject
  137. protected UserAccountManager accountManager;
  138. @Inject
  139. protected UploadsStorageManager uploadsStorageManager;
  140. @Inject
  141. protected OnboardingService onboarding;
  142. @Inject
  143. ConnectivityService connectivityService;
  144. @Inject
  145. SyncedFolderProvider syncedFolderProvider;
  146. @Inject PowerManagementService powerManagementService;
  147. @Inject
  148. Logger logger;
  149. @Inject
  150. AppInfo appInfo;
  151. @Inject
  152. BackgroundJobManager backgroundJobManager;
  153. @Inject
  154. Clock clock;
  155. @Inject
  156. EventBus eventBus;
  157. @Inject
  158. MigrationsManager migrationsManager;
  159. @Inject
  160. InAppReviewHelper inAppReviewHelper;
  161. @Inject
  162. PassCodeManager passCodeManager;
  163. @Inject WalledCheckCache walledCheckCache;
  164. // workaround because injection is initialized on onAttachBaseContext
  165. // and getApplicationContext is null at that point, which crashes when getting current user
  166. @Inject Provider<ViewThemeUtils> viewThemeUtilsProvider;
  167. private ViewThemeUtils viewThemeUtils;
  168. @SuppressWarnings("unused")
  169. private boolean mBound;
  170. private AppConfigManager appConfigManager;
  171. private static AppComponent appComponent;
  172. /**
  173. * Temporary hack
  174. */
  175. private static void initGlobalContext(Context context) {
  176. mContext = context;
  177. }
  178. /**
  179. * Temporary getter replacing Dagger DI
  180. * TODO: remove when cleaning DI in NContentObserverJob
  181. */
  182. public AppPreferences getPreferences() {
  183. return preferences;
  184. }
  185. /**
  186. * Temporary getter replacing Dagger DI
  187. * TODO: remove when cleaning DI in NContentObserverJob
  188. */
  189. public PowerManagementService getPowerManagementService() {
  190. return powerManagementService;
  191. }
  192. private String getAppProcessName() {
  193. String processName = "";
  194. if(Build.VERSION.SDK_INT < Build.VERSION_CODES.P) {
  195. ActivityManager manager = (ActivityManager) this.getSystemService(Context.ACTIVITY_SERVICE);
  196. final int ownPid = android.os.Process.myPid();
  197. final List<ActivityManager.RunningAppProcessInfo> processes = manager.getRunningAppProcesses();
  198. if (processes != null) {
  199. for (ActivityManager.RunningAppProcessInfo info : processes) {
  200. if (info.pid == ownPid) {
  201. processName = info.processName;
  202. break;
  203. }
  204. }
  205. }
  206. } else {
  207. processName = Application.getProcessName();
  208. }
  209. return processName;
  210. }
  211. @Override
  212. protected void attachBaseContext(Context base) {
  213. super.attachBaseContext(base);
  214. initGlobalContext(this);
  215. initDagger();
  216. // we don't want to handle crashes occurring inside crash reporter activity/process;
  217. // let the platform deal with those
  218. final boolean isCrashReportingProcess = getAppProcessName().endsWith(":crash");
  219. if (!isCrashReportingProcess && !appInfo.isDebugBuild()) {
  220. Thread.UncaughtExceptionHandler defaultPlatformHandler = Thread.getDefaultUncaughtExceptionHandler();
  221. if (defaultPlatformHandler != null) {
  222. final ExceptionHandler crashReporter = new ExceptionHandler(this,
  223. defaultPlatformHandler);
  224. Thread.setDefaultUncaughtExceptionHandler(crashReporter);
  225. }
  226. }
  227. }
  228. private void initDagger() {
  229. appComponent = DaggerAppComponent.builder()
  230. .application(this)
  231. .build();
  232. appComponent.inject(this);
  233. }
  234. /**
  235. * <b>USE SPARINGLY!</b> This should only be used for injection of Theme classes in custom Views, and they need to
  236. * be added as methods in the {@link AppComponent} itself.
  237. * <p>
  238. * Once we adopt Hilt this won't be necessary either, as View is a supported target in Hilt.
  239. *
  240. * @return the {@link AppComponent} for this app
  241. */
  242. public static AppComponent getAppComponent() {
  243. if (appComponent == null) {
  244. throw new IllegalStateException("Dagger not initialized!");
  245. }
  246. return appComponent;
  247. }
  248. @SuppressFBWarnings("ST")
  249. @Override
  250. public void onCreate() {
  251. enableStrictMode();
  252. viewThemeUtils = viewThemeUtilsProvider.get();
  253. setAppTheme(preferences.getDarkThemeMode());
  254. super.onCreate();
  255. ProcessLifecycleOwner.get().getLifecycle().addObserver(lifecycleEventObserver);
  256. insertConscrypt();
  257. initSecurityKeyManager();
  258. registerActivityLifecycleCallbacks(new ActivityInjector());
  259. //update the app restart count when app is launched by the user
  260. inAppReviewHelper.resetAndIncrementAppRestartCounter();
  261. int startedMigrationsCount = migrationsManager.startMigration();
  262. logger.i(TAG, String.format(Locale.US, "Started %d migrations", startedMigrationsCount));
  263. new SecurityUtils();
  264. DisplayUtils.useCompatVectorIfNeeded();
  265. fixStoragePath();
  266. MainApp.storagePath = preferences.getStoragePath(getApplicationContext().getFilesDir().getAbsolutePath());
  267. OwnCloudClientManagerFactory.setUserAgent(getUserAgent());
  268. if (isClientBrandedPlus()) {
  269. RestrictionsManager restrictionsManager = (RestrictionsManager) getSystemService(Context.RESTRICTIONS_SERVICE);
  270. appConfigManager = new AppConfigManager(this, restrictionsManager.getApplicationRestrictions());
  271. appConfigManager.setProxyConfig(isClientBrandedPlus());
  272. // Listen app config changes
  273. ContextExtensionsKt.registerBroadcastReceiver(this, restrictionsReceiver, restrictionsFilter, ReceiverFlag.NotExported);
  274. } else {
  275. setProxyForNonBrandedPlusClients();
  276. }
  277. // initialise thumbnails cache on background thread
  278. new ThumbnailsCacheManager.InitDiskCacheTask().execute();
  279. if (BuildConfig.DEBUG || getApplicationContext().getResources().getBoolean(R.bool.logger_enabled)) {
  280. // use app writable dir, no permissions needed
  281. Log_OC.setLoggerImplementation(new LegacyLoggerAdapter(logger));
  282. Log_OC.d("Debug", "start logging");
  283. }
  284. try {
  285. Method m = StrictMode.class.getMethod("disableDeathOnFileUriExposure");
  286. m.invoke(null);
  287. } catch (Exception e) {
  288. Log_OC.d("Debug", "Failed to disable uri exposure");
  289. }
  290. initSyncOperations(preferences,
  291. uploadsStorageManager,
  292. accountManager,
  293. connectivityService,
  294. powerManagementService,
  295. backgroundJobManager,
  296. clock,
  297. viewThemeUtils,
  298. walledCheckCache,
  299. syncedFolderProvider);
  300. initContactsBackup(accountManager, backgroundJobManager);
  301. notificationChannels();
  302. backgroundJobManager.scheduleMediaFoldersDetectionJob();
  303. backgroundJobManager.startMediaFoldersDetectionJob();
  304. backgroundJobManager.schedulePeriodicHealthStatus();
  305. registerGlobalPassCodeProtection();
  306. }
  307. private final LifecycleEventObserver lifecycleEventObserver = ((lifecycleOwner, event) -> {
  308. if (event == Lifecycle.Event.ON_START) {
  309. Log_OC.d(TAG, "APP IN FOREGROUND");
  310. } else if (event == Lifecycle.Event.ON_STOP) {
  311. passCodeManager.setCanAskPin(true);
  312. Log_OC.d(TAG, "APP IN BACKGROUND");
  313. } else if (event == Lifecycle.Event.ON_RESUME) {
  314. if (appConfigManager == null) return;
  315. appConfigManager.setProxyConfig(isClientBrandedPlus());
  316. Log_OC.d(TAG, "APP ON RESUME");
  317. }
  318. });
  319. private void setProxyForNonBrandedPlusClients() {
  320. try {
  321. OwnCloudClientManagerFactory.setProxyHost(getResources().getString(R.string.proxy_host));
  322. OwnCloudClientManagerFactory.setProxyPort(getResources().getInteger(R.integer.proxy_port));
  323. } catch (Resources.NotFoundException e) {
  324. Log_OC.d(TAG, "Error caught at setProxyForNonBrandedPlusClients: " + e);
  325. }
  326. }
  327. public static boolean isClientBrandedPlus() {
  328. return (getAppContext().getResources().getBoolean(R.bool.is_branded_plus_client));
  329. }
  330. private final IntentFilter restrictionsFilter = new IntentFilter(Intent.ACTION_APPLICATION_RESTRICTIONS_CHANGED);
  331. private final BroadcastReceiver restrictionsReceiver = new BroadcastReceiver() {
  332. @Override public void onReceive(Context context, Intent intent) {
  333. if (appConfigManager == null) return;
  334. appConfigManager.setProxyConfig(isClientBrandedPlus());
  335. }
  336. };
  337. private void registerGlobalPassCodeProtection() {
  338. registerActivityLifecycleCallbacks(new ActivityLifecycleCallbacks() {
  339. @Override
  340. public void onActivityCreated(@NonNull Activity activity, Bundle savedInstanceState) {
  341. Log_OC.d(activity.getClass().getSimpleName(), "onCreate(Bundle) starting");
  342. onboarding.launchActivityIfNeeded(activity);
  343. }
  344. @Override
  345. public void onActivityStarted(@NonNull Activity activity) {
  346. Log_OC.d(activity.getClass().getSimpleName(), "onStart() starting");
  347. }
  348. @Override
  349. public void onActivityResumed(@NonNull Activity activity) {
  350. Log_OC.d(activity.getClass().getSimpleName(), "onResume() starting");
  351. // we are checking activity is not launcher activity because there is timer in launcher
  352. // which will reopen the passcode screen
  353. if (!(activity instanceof LauncherActivity)) {
  354. passCodeManager.onActivityResumed(activity);
  355. }
  356. }
  357. @Override
  358. public void onActivityPaused(@NonNull Activity activity) {
  359. Log_OC.d(activity.getClass().getSimpleName(), "onPause() ending");
  360. }
  361. @Override
  362. public void onActivityStopped(@NonNull Activity activity) {
  363. Log_OC.d(activity.getClass().getSimpleName(), "onStop() ending");
  364. // since we are not showing passcode on launch activity
  365. // so we don't need to call the stopped method as well
  366. if (!(activity instanceof LauncherActivity)) {
  367. passCodeManager.onActivityStopped(activity);
  368. }
  369. }
  370. @Override
  371. public void onActivitySaveInstanceState(@NonNull Activity activity, @NonNull Bundle outState) {
  372. Log_OC.d(activity.getClass().getSimpleName(), "onSaveInstanceState(Bundle) starting");
  373. }
  374. @Override
  375. public void onActivityDestroyed(@NonNull Activity activity) {
  376. Log_OC.d(activity.getClass().getSimpleName(), "onDestroy() ending");
  377. }
  378. });
  379. }
  380. @SuppressWarnings("unchecked")
  381. private void initSecurityKeyManager() {
  382. SecurityKeyManager securityKeyManager = SecurityKeyManager.getInstance();
  383. final SecurityKeyManagerConfig.Builder configBuilder = new SecurityKeyManagerConfig.Builder()
  384. .setEnableDebugLogging(BuildConfig.DEBUG);
  385. try {
  386. // exclude all activities except AuthenticatorActivity
  387. final PackageManager pm = this.getPackageManager();
  388. final PackageInfo info = pm.getPackageInfo(this.getPackageName(), PackageManager.GET_ACTIVITIES);
  389. final ActivityInfo[] activities = info.activities;
  390. for (ActivityInfo activityInfo : activities) {
  391. try {
  392. final Class<? extends Activity> aClass = (Class<? extends Activity>) Class.forName(activityInfo.name);
  393. if (aClass != AuthenticatorActivity.class) {
  394. configBuilder.addExcludedActivityClass(aClass);
  395. }
  396. } catch (ClassNotFoundException | ClassCastException e) {
  397. Log_OC.e(TAG, "Couldn't disable activity for security key listener", e);
  398. }
  399. }
  400. } catch (PackageManager.NameNotFoundException e) {
  401. Log_OC.e(TAG, "Couldn't disable activities for security key listener", e);
  402. }
  403. securityKeyManager.init(this, configBuilder.build());
  404. }
  405. public static void initContactsBackup(UserAccountManager accountManager, BackgroundJobManager backgroundJobManager) {
  406. ArbitraryDataProvider arbitraryDataProvider = new ArbitraryDataProviderImpl(mContext);
  407. List<User> users = accountManager.getAllUsers();
  408. for (User user : users) {
  409. if (arbitraryDataProvider.getBooleanValue(user, PREFERENCE_CONTACTS_AUTOMATIC_BACKUP)) {
  410. backgroundJobManager.schedulePeriodicContactsBackup(user);
  411. }
  412. }
  413. }
  414. private void insertConscrypt() {
  415. Security.insertProviderAt(Conscrypt.newProvider(), 1);
  416. try {
  417. Conscrypt.Version version = Conscrypt.version();
  418. Log_OC.i(TAG, "Using Conscrypt/"
  419. + version.major()
  420. + DOT
  421. + version.minor()
  422. + DOT + version.patch()
  423. + " for TLS");
  424. SSLEngine engine = SSLContext.getDefault().createSSLEngine();
  425. Log_OC.i(TAG, "Enabled protocols: " + Arrays.toString(engine.getEnabledProtocols()) + " }");
  426. Log_OC.i(TAG, "Enabled ciphers: " + Arrays.toString(engine.getEnabledCipherSuites()) + " }");
  427. } catch (NoSuchAlgorithmException e) {
  428. Log_OC.e(TAG, e.getMessage());
  429. }
  430. }
  431. @SuppressLint("ApplySharedPref") // commit is done on purpose to write immediately
  432. private void fixStoragePath() {
  433. if (!preferences.isStoragePathFixEnabled()) {
  434. StoragePoint[] storagePoints = DataStorageProvider.getInstance().getAvailableStoragePoints();
  435. String storagePath = preferences.getStoragePath("");
  436. if (TextUtils.isEmpty(storagePath)) {
  437. if (preferences.getLastSeenVersionCode() != 0) {
  438. // We already used the app, but no storage is set - fix that!
  439. preferences.setStoragePath(Environment.getExternalStorageDirectory().getAbsolutePath());
  440. preferences.removeKeysMigrationPreference();
  441. } else {
  442. // find internal storage path that's indexable
  443. boolean set = false;
  444. for (StoragePoint storagePoint : storagePoints) {
  445. if (storagePoint.getStorageType() == StoragePoint.StorageType.INTERNAL &&
  446. storagePoint.getPrivacyType() == StoragePoint.PrivacyType.PUBLIC) {
  447. preferences.setStoragePath(storagePoint.getPath());
  448. preferences.removeKeysMigrationPreference();
  449. set = true;
  450. break;
  451. }
  452. }
  453. if (!set) {
  454. for (StoragePoint storagePoint : storagePoints) {
  455. if (storagePoint.getPrivacyType() == StoragePoint.PrivacyType.PUBLIC) {
  456. preferences.setStoragePath(storagePoint.getPath());
  457. preferences.removeKeysMigrationPreference();
  458. set = true;
  459. break;
  460. }
  461. }
  462. }
  463. }
  464. preferences.setStoragePathFixEnabled(true);
  465. } else {
  466. preferences.removeKeysMigrationPreference();
  467. preferences.setStoragePathFixEnabled(true);
  468. }
  469. }
  470. }
  471. private void enableStrictMode() {
  472. if (BuildConfig.DEBUG && BuildConfig.RUNTIME_PERF_ANALYSIS) {
  473. Log_OC.d(TAG, "Enabling StrictMode");
  474. StrictMode.setThreadPolicy(new StrictMode.ThreadPolicy.Builder()
  475. .detectDiskReads()
  476. .detectDiskWrites()
  477. .detectAll()
  478. .penaltyLog()
  479. .build());
  480. StrictMode.setVmPolicy(new StrictMode.VmPolicy.Builder()
  481. .detectLeakedSqlLiteObjects()
  482. .detectLeakedClosableObjects()
  483. .penaltyLog()
  484. .build());
  485. }
  486. }
  487. public static void initSyncOperations(
  488. final AppPreferences preferences,
  489. final UploadsStorageManager uploadsStorageManager,
  490. final UserAccountManager accountManager,
  491. final ConnectivityService connectivityService,
  492. final PowerManagementService powerManagementService,
  493. final BackgroundJobManager backgroundJobManager,
  494. final Clock clock,
  495. final ViewThemeUtils viewThemeUtils,
  496. final WalledCheckCache walledCheckCache,
  497. final SyncedFolderProvider syncedFolderProvider) {
  498. updateToAutoUpload();
  499. cleanOldEntries(clock);
  500. updateAutoUploadEntries(clock);
  501. if (getAppContext() != null) {
  502. if (PermissionUtil.checkExternalStoragePermission(getAppContext())) {
  503. splitOutAutoUploadEntries(clock, viewThemeUtils);
  504. } else {
  505. preferences.setAutoUploadSplitEntriesEnabled(true);
  506. }
  507. }
  508. if (!preferences.isAutoUploadInitialized()) {
  509. FilesSyncHelper.startFilesSyncForAllFolders(syncedFolderProvider, backgroundJobManager,false, new String[]{});
  510. preferences.setAutoUploadInit(true);
  511. }
  512. FilesSyncHelper.scheduleFilesSyncForAllFoldersIfNeeded(mContext, syncedFolderProvider, backgroundJobManager);
  513. FilesSyncHelper.restartUploadsIfNeeded(
  514. uploadsStorageManager,
  515. accountManager,
  516. connectivityService,
  517. powerManagementService);
  518. backgroundJobManager.scheduleOfflineSync();
  519. ReceiversHelper.registerNetworkChangeReceiver(uploadsStorageManager,
  520. accountManager,
  521. connectivityService,
  522. powerManagementService,
  523. walledCheckCache);
  524. ReceiversHelper.registerPowerChangeReceiver(uploadsStorageManager,
  525. accountManager,
  526. connectivityService,
  527. powerManagementService);
  528. ReceiversHelper.registerPowerSaveReceiver(uploadsStorageManager,
  529. accountManager,
  530. connectivityService,
  531. powerManagementService);
  532. }
  533. public static void notificationChannels() {
  534. if (android.os.Build.VERSION.SDK_INT >= android.os.Build.VERSION_CODES.O && getAppContext() != null) {
  535. Context context = getAppContext();
  536. NotificationManager notificationManager = (NotificationManager)
  537. context.getSystemService(Context.NOTIFICATION_SERVICE);
  538. if (notificationManager != null) {
  539. createChannel(notificationManager, NotificationUtils.NOTIFICATION_CHANNEL_DOWNLOAD,
  540. R.string.notification_channel_download_name_short,
  541. R.string.notification_channel_download_description, context);
  542. createChannel(notificationManager, NotificationUtils.NOTIFICATION_CHANNEL_UPLOAD,
  543. R.string.notification_channel_upload_name_short,
  544. R.string.notification_channel_upload_description, context);
  545. createChannel(notificationManager, NotificationUtils.NOTIFICATION_CHANNEL_MEDIA,
  546. R.string.notification_channel_media_name,
  547. R.string.notification_channel_media_description, context);
  548. createChannel(notificationManager, NotificationUtils.NOTIFICATION_CHANNEL_FILE_SYNC,
  549. R.string.notification_channel_file_sync_name,
  550. R.string.notification_channel_file_sync_description, context);
  551. notificationManager.deleteNotificationChannel(NotificationUtils.NOTIFICATION_CHANNEL_FILE_OBSERVER);
  552. createChannel(notificationManager, NotificationUtils.NOTIFICATION_CHANNEL_PUSH,
  553. R.string.notification_channel_push_name, R.string
  554. .notification_channel_push_description, context, NotificationManager.IMPORTANCE_DEFAULT);
  555. createChannel(notificationManager, NotificationUtils.NOTIFICATION_CHANNEL_GENERAL, R.string
  556. .notification_channel_general_name, R.string.notification_channel_general_description,
  557. context, NotificationManager.IMPORTANCE_DEFAULT);
  558. } else {
  559. Log_OC.e(TAG, "Notification manager is null");
  560. }
  561. }
  562. }
  563. private static void createChannel(NotificationManager notificationManager,
  564. String channelId, int channelName,
  565. int channelDescription, Context context) {
  566. createChannel(notificationManager, channelId, channelName, channelDescription, context,
  567. NotificationManager.IMPORTANCE_LOW);
  568. }
  569. private static void createChannel(NotificationManager notificationManager,
  570. String channelId, int channelName,
  571. int channelDescription, Context context, int importance) {
  572. if (android.os.Build.VERSION.SDK_INT >= android.os.Build.VERSION_CODES.O
  573. && getAppContext() != null) {
  574. CharSequence name = context.getString(channelName);
  575. String description = context.getString(channelDescription);
  576. NotificationChannel channel = new NotificationChannel(channelId, name, importance);
  577. channel.setDescription(description);
  578. channel.enableLights(false);
  579. channel.enableVibration(false);
  580. notificationManager.createNotificationChannel(channel);
  581. }
  582. }
  583. public static String string(int id) {
  584. return getAppContext().getString(id);
  585. }
  586. public static String string(int id, Object args) {
  587. return getAppContext().getString(id, args);
  588. }
  589. public static Context getAppContext() {
  590. return MainApp.mContext;
  591. }
  592. public static void setAppContext(Context context) {
  593. MainApp.mContext = context;
  594. }
  595. public static String getStoragePath() {
  596. return MainApp.storagePath;
  597. }
  598. public static void setStoragePath(String path) {
  599. MainApp.storagePath = path;
  600. }
  601. // Methods to obtain Strings referring app_name
  602. // From AccountAuthenticator
  603. // public static final String ACCOUNT_TYPE = "owncloud";
  604. public static String getAccountType(Context context) {
  605. return context.getResources().getString(R.string.account_type);
  606. }
  607. // From AccountAuthenticator
  608. // public static final String AUTHORITY = "org.owncloud";
  609. public static String getAuthority() {
  610. return string(R.string.authority);
  611. }
  612. // From AccountAuthenticator
  613. // public static final String AUTH_TOKEN_TYPE = "org.owncloud";
  614. public static String getAuthTokenType() {
  615. return string(R.string.authority);
  616. }
  617. // From ProviderMeta
  618. // public static final String DB_FILE = "owncloud.db";
  619. public static String getDBFile() {
  620. return string(R.string.db_file);
  621. }
  622. // From ProviderMeta
  623. // private final String mDatabaseName = "ownCloud";
  624. public static String getDBName() {
  625. return string(R.string.db_name);
  626. }
  627. /**
  628. * name of data_folder, e.g., "owncloud"
  629. */
  630. public static String getDataFolder() {
  631. return string(R.string.data_folder);
  632. }
  633. public static void showOnlyFilesOnDevice(boolean state) {
  634. mOnlyOnDevice = state;
  635. }
  636. public static void showOnlyPersonalFiles(boolean state) {
  637. mOnlyPersonalFiles = state;
  638. }
  639. public static boolean isOnlyOnDevice() {
  640. return mOnlyOnDevice;
  641. }
  642. public static boolean isOnlyPersonFiles() {
  643. return mOnlyPersonalFiles;
  644. }
  645. public static String getUserAgent() {
  646. // Mozilla/5.0 (Android) Nextcloud-android/2.1.0
  647. return getUserAgent(R.string.nextcloud_user_agent);
  648. }
  649. // user agent
  650. private static String getUserAgent(@StringRes int agent) {
  651. String appString = string(agent);
  652. String brandedName = string(R.string.name_for_branded_user_agent);
  653. String packageName = getAppContext().getPackageName();
  654. String version = "";
  655. try {
  656. PackageInfo pInfo = getAppContext().getPackageManager().getPackageInfo(packageName, 0);
  657. if (pInfo != null) {
  658. version = pInfo.versionName;
  659. }
  660. } catch (PackageManager.NameNotFoundException e) {
  661. Log_OC.e(TAG, "Trying to get packageName", e.getCause());
  662. }
  663. return String.format(appString, version, brandedName);
  664. }
  665. private static void updateToAutoUpload() {
  666. Context context = getAppContext();
  667. AppPreferences preferences = AppPreferencesImpl.fromContext(context);
  668. if (preferences.instantPictureUploadEnabled() || preferences.instantVideoUploadEnabled()) {
  669. preferences.removeLegacyPreferences();
  670. // show info pop-up
  671. try {
  672. new AlertDialog.Builder(context, R.style.Theme_ownCloud_Dialog)
  673. .setTitle(R.string.drawer_synced_folders)
  674. .setMessage(R.string.synced_folders_new_info)
  675. .setPositiveButton(R.string.drawer_open, (dialog, which) -> {
  676. // show Auto Upload
  677. Intent folderSyncIntent = new Intent(context, SyncedFoldersActivity.class);
  678. dialog.dismiss();
  679. context.startActivity(folderSyncIntent);
  680. })
  681. .setNegativeButton(R.string.drawer_close, (dialog, which) -> dialog.dismiss())
  682. .setIcon(R.drawable.nav_synced_folders)
  683. .show();
  684. } catch (WindowManager.BadTokenException e) {
  685. Log_OC.i(TAG, "Error showing Auto Upload Update dialog, so skipping it: " + e.getMessage());
  686. }
  687. }
  688. }
  689. private static void updateAutoUploadEntries(Clock clock) {
  690. // updates entries to reflect their true paths
  691. Context context = getAppContext();
  692. AppPreferences preferences = AppPreferencesImpl.fromContext(context);
  693. if (!preferences.isAutoUploadPathsUpdateEnabled()) {
  694. SyncedFolderProvider syncedFolderProvider =
  695. new SyncedFolderProvider(MainApp.getAppContext().getContentResolver(), preferences, clock);
  696. syncedFolderProvider.updateAutoUploadPaths(mContext);
  697. }
  698. }
  699. private static void splitOutAutoUploadEntries(Clock clock,
  700. final ViewThemeUtils viewThemeUtils) {
  701. Context context = getAppContext();
  702. AppPreferences preferences = AppPreferencesImpl.fromContext(context);
  703. if (!preferences.isAutoUploadSplitEntriesEnabled()) {
  704. // magic to split out existing synced folders in two when needed
  705. // otherwise, we migrate them to their proper type (image or video)
  706. Log_OC.i(TAG, "Migrate synced_folders records for image/video split");
  707. ContentResolver contentResolver = context.getContentResolver();
  708. SyncedFolderProvider syncedFolderProvider = new SyncedFolderProvider(contentResolver, preferences, clock);
  709. final List<MediaFolder> imageMediaFolders = MediaProvider.getImageFolders(contentResolver,
  710. 1,
  711. null,
  712. true,
  713. viewThemeUtils);
  714. final List<MediaFolder> videoMediaFolders = MediaProvider.getVideoFolders(contentResolver,
  715. 1,
  716. null,
  717. true,
  718. viewThemeUtils);
  719. ArrayList<Long> idsToDelete = new ArrayList<>();
  720. List<SyncedFolder> syncedFolders = syncedFolderProvider.getSyncedFolders();
  721. long primaryKey;
  722. SyncedFolder newSyncedFolder;
  723. for (SyncedFolder syncedFolder : syncedFolders) {
  724. idsToDelete.add(syncedFolder.getId());
  725. Log_OC.i(TAG, "Migration check for synced_folders record: "
  726. + syncedFolder.getId() + " - " + syncedFolder.getLocalPath());
  727. for (MediaFolder imageMediaFolder : imageMediaFolders) {
  728. String absolutePathOfImageFolder = imageMediaFolder.absolutePath;
  729. if (absolutePathOfImageFolder != null) {
  730. if (absolutePathOfImageFolder.equals(syncedFolder.getLocalPath())) {
  731. newSyncedFolder = (SyncedFolder) syncedFolder.clone();
  732. newSyncedFolder.setType(MediaFolderType.IMAGE);
  733. primaryKey = syncedFolderProvider.storeSyncedFolder(newSyncedFolder);
  734. Log_OC.i(TAG, "Migrated image synced_folders record: "
  735. + primaryKey + " - " + newSyncedFolder.getLocalPath());
  736. break;
  737. }
  738. }
  739. }
  740. for (MediaFolder videoMediaFolder : videoMediaFolders) {
  741. String absolutePathOfVideoFolder = videoMediaFolder.absolutePath;
  742. if (absolutePathOfVideoFolder != null) {
  743. if (absolutePathOfVideoFolder.equals(syncedFolder.getLocalPath())) {
  744. newSyncedFolder = (SyncedFolder) syncedFolder.clone();
  745. newSyncedFolder.setType(MediaFolderType.VIDEO);
  746. primaryKey = syncedFolderProvider.storeSyncedFolder(newSyncedFolder);
  747. Log_OC.i(TAG, "Migrated video synced_folders record: "
  748. + primaryKey + " - " + newSyncedFolder.getLocalPath());
  749. break;
  750. }
  751. }
  752. }
  753. }
  754. for (long id : idsToDelete) {
  755. Log_OC.i(TAG, "Removing legacy synced_folders record: " + id);
  756. syncedFolderProvider.deleteSyncedFolder(id);
  757. }
  758. preferences.setAutoUploadSplitEntriesEnabled(true);
  759. }
  760. }
  761. private static void cleanOldEntries(Clock clock) {
  762. // previous versions of application created broken entries in the SyncedFolderProvider
  763. // database, and this cleans all that and leaves 1 (newest) entry per synced folder
  764. Context context = getAppContext();
  765. AppPreferences preferences = AppPreferencesImpl.fromContext(context);
  766. if (!preferences.isLegacyClean()) {
  767. SyncedFolderProvider syncedFolderProvider =
  768. new SyncedFolderProvider(context.getContentResolver(), preferences, clock);
  769. List<SyncedFolder> syncedFolderList = syncedFolderProvider.getSyncedFolders();
  770. Map<Pair<String, String>, Long> syncedFolders = new HashMap<>();
  771. for (SyncedFolder syncedFolder : syncedFolderList) {
  772. Pair<String, String> checkPair = new Pair<>(syncedFolder.getAccount(), syncedFolder.getLocalPath());
  773. if (syncedFolders.containsKey(checkPair)) {
  774. Long folderId = syncedFolders.get(checkPair);
  775. if (folderId != null) {
  776. if (syncedFolder.getId() > folderId) {
  777. syncedFolders.put(checkPair, syncedFolder.getId());
  778. }
  779. }
  780. } else {
  781. syncedFolders.put(checkPair, syncedFolder.getId());
  782. }
  783. }
  784. ArrayList<Long> ids = new ArrayList<>(syncedFolders.values());
  785. if (ids.size() > 0) {
  786. int deletedCount = syncedFolderProvider.deleteSyncedFoldersNotInList(ids);
  787. if (deletedCount > 0) {
  788. preferences.setLegacyClean(true);
  789. }
  790. } else {
  791. preferences.setLegacyClean(true);
  792. }
  793. }
  794. }
  795. @Override
  796. public AndroidInjector<Object> androidInjector() {
  797. return dispatchingAndroidInjector;
  798. }
  799. public static void setAppTheme(DarkMode mode) {
  800. switch (mode) {
  801. case LIGHT -> AppCompatDelegate.setDefaultNightMode(AppCompatDelegate.MODE_NIGHT_NO);
  802. case DARK -> AppCompatDelegate.setDefaultNightMode(AppCompatDelegate.MODE_NIGHT_YES);
  803. case SYSTEM -> AppCompatDelegate.setDefaultNightMode(AppCompatDelegate.MODE_NIGHT_FOLLOW_SYSTEM);
  804. }
  805. }
  806. }