X-Git-Url: http://www.project-moonshot.org/gitweb/?a=blobdiff_plain;f=src%2Fmoonshot-identities-manager.vala;h=1f390ccc0c6c09463c840cb7e8b400acd7edbe71;hb=a6135216493f33da3458e6befd221e41a1e3a054;hp=124f25b5417cbc5360ef153f346fa3434eb6baa2;hpb=511bd16ff7bf9f3a205cd9b3ba3e7963dc9819dd;p=moonshot-ui.git diff --git a/src/moonshot-identities-manager.vala b/src/moonshot-identities-manager.vala index 124f25b..1f390cc 100644 --- a/src/moonshot-identities-manager.vala +++ b/src/moonshot-identities-manager.vala @@ -1,108 +1,281 @@ -class IdentitiesManager : Object { +/* + * Copyright (c) 2011-2014, JANET(UK) + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * 3. Neither the name of JANET(UK) nor the names of its contributors + * may be used to endorse or promote products derived from this software + * without specific prior written permission. + * + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" + * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. +*/ +using Gee; - public SList id_card_list; +public class Password { +#if GNOME_KEYRING + private unowned string _password; + public string password { + get { + return _password; + } + set { + if (_password != null) { + GnomeKeyring.memory_free((void *)_password); + _password = null; + } + if (value != null) + _password = GnomeKeyring.memory_strdup(value); + } + } +#else + public string password { get; set; default = null; } +#endif - private const string FILE_NAME = "identities.txt"; + public Password(string in_password) { + password = in_password; + } - public IdentitiesManager () - { - id_card_list = new SList(); - var key_file = new KeyFile (); + ~Password() { + password = null; + } +} - var path = get_data_dir (); - var filename = Path.build_filename (path, FILE_NAME); +public class PasswordHashTable : Object { + private HashTable password_table; - try - { - key_file.load_from_file (filename, KeyFileFlags.NONE); - } - catch (Error e) - { - stdout.printf("Error: %s\n", e.message); - return; - } + private static string ComputeHashKey(IdCard card, IIdentityCardStore store) { + return "%s_store_%d".printf( card.display_name, store.get_store_type() ); + } - var identities_uris = key_file.get_groups (); - foreach (string identity in identities_uris) - { - try - { - IdCard id_card = new IdCard (); + public void CachePassword(IdCard card, IIdentityCardStore store) { + password_table.replace(ComputeHashKey(card, store), new Password(card.password)); + } - id_card.issuer = key_file.get_string (identity, "Issuer"); - id_card.username = key_file.get_string (identity, "Username"); - id_card.password = key_file.get_string (identity, "Password"); - id_card.services = key_file.get_string_list (identity, "Services"); - id_card.display_name = key_file.get_string (identity, "DisplayName"); - id_card.set_data ("pixbuf", find_icon ("avatar-default", 48)); + public void RemovePassword(IdCard card, IIdentityCardStore store) { + password_table.remove(ComputeHashKey(card, store)); + } + public void RetrievePassword(IdCard card, IIdentityCardStore store) { + weak Password password = password_table.lookup(ComputeHashKey(card, store)); + if (password != null) { + card.password = password.password; + } + } + public PasswordHashTable() { + password_table = new HashTable(GLib.str_hash, GLib.str_equal); + } +} - id_card_list.prepend (id_card); - } - catch (Error e) - { - stdout.printf ("Error: %s\n", e.message); +public class IdentityManagerModel : Object { + static MoonshotLogger logger = get_logger("IdentityManagerModel"); + + private const string FILE_NAME = "identities.txt"; + private PasswordHashTable password_table; + private IIdentityCardStore store; + public LinkedList get_card_list() { + var identities = store.get_card_list(); + identities.sort((a, b) => { + IdCard id_a = (IdCard )a; + IdCard id_b = (IdCard )b; + if (id_a.is_no_identity() && !id_b.is_no_identity()) { + return -1; + } else if (id_b.is_no_identity() && !id_a.is_no_identity()) { + return 1; + } + return strcmp(id_a.display_name, id_b.display_name); + }); + if (identities.is_empty || !identities[0].is_no_identity()) + identities.insert(0, IdCard.NewNoIdentity()); + foreach (IdCard id_card in identities) { + if (!id_card.store_password) { + password_table.RetrievePassword(id_card, store); } } + return identities; } + public signal void card_list_changed(); - public void store_id_cards () + /* This method finds a valid display name */ + public bool display_name_is_valid(string name, + out string? candidate) { - var key_file = new KeyFile (); - - foreach (IdCard id_card in this.id_card_list) + if (&candidate != null) + candidate = null; + foreach (IdCard id_card in this.store.get_card_list()) { - string[] rules_patterns = new string[id_card.rules.length]; - string[] rules_always_conf = new string[id_card.rules.length]; - - for (int i=0; i 0) - { - key_file.set_string_list (id_card.display_name, "Rules-Patterns", rules_patterns); - key_file.set_string_list (id_card.display_name, "Rules-AlwaysConfirm", rules_always_conf); + foreach (IdCard id in get_card_list()) { + if (id.nai == nai) { + retval = id; + break; } - // Trust anchor - key_file.set_string (id_card.display_name, "CA-Cert", id_card.trust_anchor.ca_cert ?? ""); - key_file.set_string (id_card.display_name, "Subject", id_card.trust_anchor.subject ?? ""); - key_file.set_string (id_card.display_name, "SubjectAlt", id_card.trust_anchor.subject_alt ?? ""); - key_file.set_string (id_card.display_name, "ServerCert", id_card.trust_anchor.server_cert ?? ""); } + set_store_type(saved_store_type); + if (force_flat_file_store && + (saved_store_type != IIdentityCardStore.StoreType.FLAT_FILE)) + card_list_changed(); + return retval; + } + + public void add_card(IdCard card, bool force_flat_file_store) { + if (card.temporary) + return; - var text = key_file.to_data (null); + string candidate; + IIdentityCardStore.StoreType saved_store_type = get_store_type(); - try + if (force_flat_file_store) + set_store_type(IIdentityCardStore.StoreType.FLAT_FILE); + + remove_duplicates(card); + + if (!display_name_is_valid(card.display_name, out candidate)) { - var path = get_data_dir (); - var filename = Path.build_filename (path, FILE_NAME); - FileUtils.set_contents (filename, text, -1); + card.display_name = candidate; } - catch (Error e) - { - stdout.printf ("Error: %s\n", e.message); + + if (!card.store_password) + password_table.CachePassword(card, store); + store.add_card(card); + set_store_type(saved_store_type); + card_list_changed(); + } + + public IdCard update_card(IdCard card) { + IdCard retval; + if (card.temporary) { + retval = card; + return retval; } + + if (!card.store_password) + password_table.CachePassword(card, store); + else + password_table.RemovePassword(card, store); + retval = store.update_card(card); + card_list_changed(); + return retval; } - private string get_data_dir() - { - string path; + private bool remove_card_internal(IdCard card) { + if (card.temporary) + return false; + password_table.RemovePassword(card, store); + return store.remove_card(card); + } - path = Path.build_filename (Environment.get_user_data_dir (), - Config.PACKAGE_TARNAME); - if (!FileUtils.test (path, FileTest.EXISTS)) - { - DirUtils.create (path, 0700); + public bool remove_card(IdCard card) { + if (remove_card_internal(card)) { + card_list_changed(); + return true; + } + return false; + } + + public void set_store_type(IIdentityCardStore.StoreType type) { + if ((store != null) && (store.get_store_type() == type)) + return; + switch (type) { + #if GNOME_KEYRING + case IIdentityCardStore.StoreType.KEYRING: + store = new KeyringStore(); + break; + #endif + case IIdentityCardStore.StoreType.FLAT_FILE: + default: + store = new LocalFlatFileStore(); + break; } + } + + public IIdentityCardStore.StoreType get_store_type() { + return store.get_store_type(); + } + + public bool HasNonTrivialIdentities() { + foreach (IdCard card in this.store.get_card_list()) { + // The 'NoIdentity' card is non-trivial if it has services or rules. + // All other cards are automatically non-trivial. + if ((!card.is_no_identity()) || + (card.services.length > 0) || + (card.rules.length > 0)) { + return true; + } + } + return false; + } + + + private IdentityManagerApp parent; - return path; + public IdentityManagerModel(IdentityManagerApp parent_app, IIdentityCardStore.StoreType store_type) { + logger.trace("IdentityManagerModel: store_type=" + store_type.to_string()); + parent = parent_app; + password_table = new PasswordHashTable(); + set_store_type(store_type); } }