1
0
mirror of https://github.com/moparisthebest/k-9 synced 2024-11-15 05:55:06 -05:00
Commit Graph

3119 Commits

Author SHA1 Message Date
Jan Berkel
b443af43ae Cleanup 2014-12-15 13:01:13 +01:00
Jan Berkel
2a2e18e8b6 WS / visibility 2014-12-15 12:45:04 +01:00
Jan Berkel
36ef6df018 Remove unused method 2014-12-15 12:42:05 +01:00
Jan Berkel
7d6e6b8abe MimeUtility / Message refactor
* break MimeUtility class into manageable pieces (MessageExtractor/CharsetSupport)
 * move HTML related code out of the mail package
2014-12-15 12:26:06 +01:00
Jan Berkel
476cb1d4ce Tidy responsibilities 2014-12-14 15:58:08 +00:00
Jan Berkel
238c1650c5 Remove URLEncodingHelper dependency 2014-12-14 15:54:27 +00:00
Jan Berkel
8ef9eae0d6 local -> mailstore 2014-12-14 15:28:42 +00:00
Jan Berkel
bd697bb56d getUuid() -> getAccountUuid() 2014-12-14 15:26:38 +00:00
Jan Berkel
54d62eb7b9 Naming 2014-12-12 15:19:13 +00:00
Jan Berkel
b644194a3d Fix LocalMessage equality/hash 2014-12-12 15:16:38 +00:00
Jan Berkel
40041ac0e0 Move local message code to local package
+ cut some helper dependencies
2014-12-12 15:02:59 +00:00
Jan Berkel
2e98ff56e5 Break dependencies 2014-12-12 13:35:36 +00:00
Jan Berkel
0024f39bc6 Local messages 2014-12-12 13:04:59 +00:00
Jan Berkel
708fb57c04 Move things into local 2014-12-12 12:49:26 +00:00
Jan Berkel
6264527abc Remove Preferences dependency 2014-12-12 12:42:48 +00:00
Jan Berkel
9f16b9f465 Move SSL code into package 2014-12-12 12:35:17 +00:00
Jan Berkel
2536719749 Naming 2014-12-12 07:03:14 +00:00
Jan Berkel
5af649c271 Avoid cast 2014-12-12 06:54:34 +00:00
Jan Berkel
9fd722d7cd Split message code into Local/Remote
The remote network code does not need to be aware of concepts like
Accounts etc.
2014-12-12 06:47:26 +00:00
Jan Berkel
6f4610dd5b Fix visibility 2014-12-12 00:30:41 +00:00
Jan Berkel
edfd20bf85 Fix visibility 2014-12-12 00:18:16 +00:00
Jan Berkel
e59adf46c0 Package visibility 2014-12-12 00:08:25 +00:00
Jan Berkel
12291bceb5 Move database code into correct package 2014-12-11 23:56:02 +00:00
Jan Berkel
ba4dd24bd5 Package visibility 2014-12-11 23:32:38 +00:00
Jan Berkel
ca10e4d94a Use TextUtils.isEmpty 2014-12-11 21:56:26 +00:00
Andrew Chen
105948d78c Oops, checking wrong platform capability. 2014-12-04 19:14:22 -08:00
Andrew Chen
1fa6e117e1 Add Lollipop lock screen notifications.
Add vector versions for some notification icons (yay Illustrator)
Add comments reminding people to add their settings to GlobalSettings.
<plurals> support for notification_new_messages_title
Not sure why #ffffffff is resulting in black with targetSdk 17.
2014-12-04 18:54:22 -08:00
Danny Baumann
aaf3963567 Don't throw CertificateValidationException for all SSLExceptions.
An interrupted connection attempt to the server yields an SSLException
as well, like this:

E/k9      ( 6937): Caused by: javax.net.ssl.SSLHandshakeException: Connection closed by peer
E/k9      ( 6937):      at com.android.org.conscrypt.NativeCrypto.SSL_do_handshake(Native Method)
E/k9      ( 6937):      at com.android.org.conscrypt.OpenSSLSocketImpl.startHandshake(OpenSSLSocketImpl.java:302)
E/k9      ( 6937):      at com.android.org.conscrypt.OpenSSLSocketImpl.waitForHandshake(OpenSSLSocketImpl.java:598)
E/k9      ( 6937):      at com.android.org.conscrypt.OpenSSLSocketImpl.getInputStream(OpenSSLSocketImpl.java:560)
E/k9      ( 6937):      at com.fsck.k9.mail.store.ImapStore$ImapConnection.open(ImapStore.java:2459)

We don't want the user to notify of 'certificate problems' in that case.
Fix it by checking whether the SSLException was actually triggered by a
CertificateException.
2014-12-04 13:16:33 +01:00
cketti
98b5d63909 Merge branch 'open_attachment_improvements'
Conflicts:
	src/com/fsck/k9/helper/Utility.java
2014-11-27 21:03:15 +01:00
Art O Cathain
552e552e88 Add unit tests for FileHelper.sanitizeFilename() 2014-11-18 23:50:14 +01:00
cketti
56c30095e2 Don't use dummy file path when resolving intents 2014-11-18 23:02:20 +01:00
cketti
d9b6e10cbe Change the way the best view intent is determined
First we try the original MIME type unless it's application/octet-stream.
Then we try the MIME type inferred from the attachment's file extension.
Then we fall back to application/octet-stream.

In all cases we first try the content:// URI, then a file:// URI.
2014-11-18 22:55:51 +01:00
cketti
a725099693 Merge pull request #499 from k9mail/remove_apg_interface
Remove APG legacy interface
2014-11-12 21:08:46 +01:00
cketti
9b61fe0f0e Merge remote-tracking branch 'k9mail_pgp_mime/master'
Conflicts:
	src/com/fsck/k9/activity/AccessibleEmailContentActivity.java
2014-11-12 19:22:53 +01:00
cketti
9e6fc7c7d1 Merge pull request #13 from k9mail/art/update-certificates-in-tests
Update certificates in tests
2014-11-12 16:30:53 +01:00
cketti
0f70d5db40 Merge pull request #12 from k9mail/art/warn-if-not-serializable
Art/warn if not serializable
2014-11-11 19:52:31 +01:00
cketti
bd4a236525 Merge pull request #11 from k9mail/art/fix-tests-on-jvm
fix tests on JVM
2014-11-11 19:46:58 +01:00
cketti
7211080415 Merge pull request #10 from k9mail/art/more-tidying-arrays
Replace many arrays with collections
2014-11-11 19:45:35 +01:00
cketti
87ca0d3d2a Use TemporaryAttachmentStore when viewing attachments using file:// URI 2014-11-11 02:11:51 +01:00
cketti
34cfd8e5b4 Extract file related helper functions into separate class 2014-11-11 01:04:39 +01:00
cketti
e64ca84f1b Simplify MediaScannerNotifier 2014-11-10 06:43:26 +01:00
cketti
c3f1420ef6 Don't open the file after the media scanner added it to the media content provider 2014-11-10 06:43:00 +01:00
cketti
dfd40659d1 Append file name to content:// URI
This allows intent filters with patterns for file extensions to match.
2014-11-10 05:46:38 +01:00
cketti
6a1905b7b7 If we can't find an app to view an attachment try again with a file:// URI
Sadly, some apps only support the 'file' scheme in their intent filters. Among
them is Android's own package installer.
2014-11-10 05:37:22 +01:00
cketti
44ecf5d588 Use MIME type used for intent resolution in content provider 2014-11-10 03:12:28 +01:00
cketti
f87ab53b9b Try original and inferred MIME type to find best viewer for attachment
In order for Android to find apps that are capable of opening an attachment for
viewing the ACTION_VIEW Intent needs to contain an appropriate MIME type.
Ideally, we'd use the MIME type specified for the attachment in the message.
But often the supplied MIME type is wrong/useless. So we look at the file
extension to try to come up with a sensible MIME type on our own. We then go
on to ask Android which of the two MIME types leads to more apps claiming to
be able to open our attachment for viewing and use that one.
2014-11-10 03:10:09 +01:00
cketti
11a9eff109 Extract intent creation code to method 2014-11-09 20:46:46 +01:00
cketti
6cb3c991db No longer pretend there are attachment types we don't care about 2014-10-20 21:26:18 -04:00
cketti
3c4ad91614 Fix method names/visibility 2014-10-20 21:24:18 -04:00
cketti
d3073be89a Rearrange fields/methods 2014-10-20 21:21:09 -04:00