From 359dbd20ff19f8c486f380217e122a0cd825f321 Mon Sep 17 00:00:00 2001 From: M66B Date: Thu, 18 Sep 2025 14:38:30 +0200 Subject: [PATCH] Revert "Default skip updating SSL provider" This reverts commit 034b0de0498f51ac99002fdc508ce8065a74f39d. --- app/src/github/java/eu/faircode/email/ApplicationSecure.java | 3 +-- .../main/java/eu/faircode/email/FragmentOptionsConnection.java | 2 +- app/src/play/java/eu/faircode/email/ApplicationSecure.java | 3 +-- 3 files changed, 3 insertions(+), 5 deletions(-) diff --git a/app/src/github/java/eu/faircode/email/ApplicationSecure.java b/app/src/github/java/eu/faircode/email/ApplicationSecure.java index 4b3cbf8eed..82c3dcfe14 100644 --- a/app/src/github/java/eu/faircode/email/ApplicationSecure.java +++ b/app/src/github/java/eu/faircode/email/ApplicationSecure.java @@ -38,10 +38,9 @@ public class ApplicationSecure extends ApplicationEx implements ProviderInstalle public void onCreate() { super.onCreate(); SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(this); - boolean ssl_update = prefs.getBoolean("ssl_update", false); + boolean ssl_update = prefs.getBoolean("ssl_update", Helper.isPlayStoreInstall()); if (ssl_update) { Log.i("Security provider check"); - // https://developer.android.com/privacy-and-security/security-gms-provider ProviderInstaller.installIfNeededAsync(this, this); } else lock.countDown(); diff --git a/app/src/main/java/eu/faircode/email/FragmentOptionsConnection.java b/app/src/main/java/eu/faircode/email/FragmentOptionsConnection.java index 486b2cdfd6..9450a942b2 100644 --- a/app/src/main/java/eu/faircode/email/FragmentOptionsConnection.java +++ b/app/src/main/java/eu/faircode/email/FragmentOptionsConnection.java @@ -789,7 +789,7 @@ public class FragmentOptionsConnection extends FragmentBase implements SharedPre etDnsExtra.setEnabled(swDnsCustom.isChecked() || Build.VERSION.SDK_INT < Build.VERSION_CODES.Q); swDnsClear.setChecked(prefs.getBoolean("dns_clear", false)); swTcpKeepAlive.setChecked(prefs.getBoolean("tcp_keep_alive", false)); - swSslUpdate.setChecked(prefs.getBoolean("ssl_update", false)); + swSslUpdate.setChecked(prefs.getBoolean("ssl_update", Helper.isPlayStoreInstall())); swSslHarden.setChecked(prefs.getBoolean("ssl_harden", false)); swSslHardenStrict.setChecked(prefs.getBoolean("ssl_harden_strict", false)); swSslHardenStrict.setEnabled(swSslHarden.isChecked()); diff --git a/app/src/play/java/eu/faircode/email/ApplicationSecure.java b/app/src/play/java/eu/faircode/email/ApplicationSecure.java index 4b3cbf8eed..82c3dcfe14 100644 --- a/app/src/play/java/eu/faircode/email/ApplicationSecure.java +++ b/app/src/play/java/eu/faircode/email/ApplicationSecure.java @@ -38,10 +38,9 @@ public class ApplicationSecure extends ApplicationEx implements ProviderInstalle public void onCreate() { super.onCreate(); SharedPreferences prefs = PreferenceManager.getDefaultSharedPreferences(this); - boolean ssl_update = prefs.getBoolean("ssl_update", false); + boolean ssl_update = prefs.getBoolean("ssl_update", Helper.isPlayStoreInstall()); if (ssl_update) { Log.i("Security provider check"); - // https://developer.android.com/privacy-and-security/security-gms-provider ProviderInstaller.installIfNeededAsync(this, this); } else lock.countDown();