| Commit message (Collapse) | Author | Age |
| |
|
|
|
|
| |
Signed-off-by: Sébastien Delord <57289288+sebastien46@users.noreply.github.com>
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
| |
Moving back the configuration files and logs to the user-accessible
storage. Everything should be accessible through a file manager using
the "USB storage" mode. The embedded FTP server is no longer
necessary.
|
|
|
|
|
|
|
|
| |
Backup was disabled altogether to avoid leaking the private keys in
clear.
This relaxes this restriction only for client-side encrypted online
backups or local device-to-device transfers.
|
|
|
|
|
|
|
|
|
|
|
| |
* Automatic commit of updated project files
* Machine translation formatting fixed
* Update strings.xml
Copyright years fixed.
Co-authored-by: L10N Robot <l10n@mycompany.com>
|
| |
|
|
|
|
|
| |
The "prominent disclosure" is a new requirement for Google Play:
https://support.google.com/googleplay/android-developer/answer/12564964?hl=en
|
| |
|
|
|
|
|
|
|
|
|
| |
loses focus
This makes the ConfigurationAccessService (formerly ConfigurationFtpService) start in foreground
through the use of a persistent notification so that it isn't stopped by the system after the app
loses the focus on the user's screen, which happens when the user switches to an FTP client
application on the same device.
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This is a ridiculous workaround to make the configuration (and other files) accessible to the user
necessary after the new storage access restriction enforced in Android 11 which prevent other
applications from accessing the supposedly public application's directory.
The app's internal private storage directory is now exposed to the user through an embedded FTP
server that the user can turn on and off from the configuration activity. The user can then play
with the configuration and retrieve logs through a remote or local FTP client application of their
choice.
GitHub: closes #103
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
app storage
The external app public storage directory is no longer reliably accessible on Android 11 and above.
This makes editing the configuration and accessing the log files impossible in some cases.
Let's move to the app private storage, to be made accessible to the user by some other mean.
This has the benefit of also protecting the private keys that need to be stored encrypted otherwise.
We also split the configuration and cache directory into specialised sub-directories.
GitHub: related to #103
|
| |
|
| |
|
|
|
|
| |
switching from android.support to androidx
|
| |
|
| |
|
|
|
|
| |
github ref: closes #81
|
|
|
|
| |
The previous gradient was ugly on most non-calibrated screens.
|
|
|
|
| |
sed -i '/translatable/d' values-nb-*/strings.xml
|
| |
|
|
|
|
|
| |
Those can only be present in the default file.
sed -i '/translatable/d' values-zh-*/strings.xml
|
| |
|
|
|
| |
"tinc" should indeed not be capitalized when referring to the underlying daemon software, but the name of the Android app should nevertheless be according to the guidelines for store presence and launcher entries
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
Refactoring the underlying code to use lifecycle-aware classes
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|