X-Git-Url: http://www.project-moonshot.org/gitweb/?a=blobdiff_plain;f=src%2Fmoonshot-identities-manager.vala;h=43c549d41a37cb45eb0ec748dbd060e6540c4cfb;hb=e2f8a250279d9a79a03d82995ef191d773627bfa;hp=e434503e54fbf5979ece6d5d99210fd4d8367249;hpb=7297b4e1e4ebbac6f36ce312f005a3f306f78cf9;p=moonshot-ui.git diff --git a/src/moonshot-identities-manager.vala b/src/moonshot-identities-manager.vala index e434503..43c549d 100644 --- a/src/moonshot-identities-manager.vala +++ b/src/moonshot-identities-manager.vala @@ -1,119 +1,316 @@ +/* + * Copyright (c) 2011-2014, JANET(UK) + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * 3. Neither the name of JANET(UK) nor the names of its contributors + * may be used to endorse or promote products derived from this software + * without specific prior written permission. + * + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" + * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. +*/ using Gee; +public class Password { +#if GNOME_KEYRING + private unowned string _password; + public string password { + get { + return _password; + } + set { + if (_password != null) { + GnomeKeyring.memory_free((void *)_password); + _password = null; + } + if (value != null) + _password = GnomeKeyring.memory_strdup(value); + } + } +#else + public string password { get; set; default = null; } +#endif + + public Password(string in_password) { + password = in_password; + } + + ~Password() { + password = null; + } +} + +public class PasswordHashTable : Object { + private HashTable password_table; + + private static string ComputeHashKey(IdCard card, IIdentityCardStore store) { + return "%s_store_%d".printf( card.display_name, store.get_store_type() ); + } + + public void CachePassword(IdCard card, IIdentityCardStore store) { + password_table.replace(ComputeHashKey(card, store), new Password(card.password)); + } + + public void RemovePassword(IdCard card, IIdentityCardStore store) { + password_table.remove(ComputeHashKey(card, store)); + } + public void RetrievePassword(IdCard card, IIdentityCardStore store) { + weak Password password = password_table.lookup(ComputeHashKey(card, store)); + if (password != null) { + card.password = password.password; + } + } + public PasswordHashTable() { + password_table = new HashTable(GLib.str_hash, GLib.str_equal); + } +} + public class IdentityManagerModel : Object { - private const string FILE_NAME = "identities.txt"; + static MoonshotLogger logger = get_logger("IdentityManagerModel"); + private const string FILE_NAME = "identities.txt"; + private PasswordHashTable password_table; private IIdentityCardStore store; public LinkedList get_card_list() { - var identities = store.get_card_list(); - identities.sort( (a, b) => { - IdCard id_a = (IdCard )a; - IdCard id_b = (IdCard )b; - if (id_a.IsNoIdentity() && !id_b.IsNoIdentity()) { - return -1; - } else if (id_b.IsNoIdentity() && !id_a.IsNoIdentity()) { - return 1; - } - return strcmp(id_a.display_name, id_b.display_name); - }); - if (identities.is_empty || !identities[0].IsNoIdentity()) - identities.insert(0, IdCard.NewNoIdentity()); - return identities; + var identities = store.get_card_list(); + identities.sort((a, b) => { + IdCard id_a = (IdCard )a; + IdCard id_b = (IdCard )b; + if (id_a.is_no_identity() && !id_b.is_no_identity()) { + return -1; + } else if (id_b.is_no_identity() && !id_a.is_no_identity()) { + return 1; + } + return strcmp(id_a.display_name, id_b.display_name); + }); + if (identities.is_empty || !identities[0].is_no_identity()) + identities.insert(0, IdCard.NewNoIdentity()); + foreach (IdCard id_card in identities) { + if (!id_card.store_password) { + password_table.RetrievePassword(id_card, store); + } + } + return identities; } public signal void card_list_changed(); /* This method finds a valid display name */ - public bool display_name_is_valid (string name, - out string? candidate) + public bool display_name_is_valid(string name, + out string? candidate) { - candidate = null; - foreach (IdCard id_card in this.get_card_list()) + if (&candidate != null) + candidate = null; + foreach (IdCard id_card in this.store.get_card_list()) { - if (id_card.display_name == name) - { - if (&candidate != null) + if (id_card.display_name == name) { - for (int i=0; i<1000; i++) - { - string tmp = "%s %d".printf (name, i); - if (display_name_is_valid (tmp, null)) + if (&candidate != null) { - candidate = tmp; - break; + for (int i = 0; i < 1000; i++) + { + string tmp = "%s %d".printf(name, i); + if (display_name_is_valid(tmp, null)) + { + candidate = tmp; + break; + } + } } - } + return false; } - return false; - } } return true; } - public void add_card(IdCard card, bool force_flat_file_store) { + private bool remove_duplicates(IdCard new_card, out ArrayList? old_duplicates) + { + ArrayList dups = new ArrayList(); + var cards = this.store.get_card_list(); + foreach (IdCard id_card in cards) { + if ((new_card != id_card) && (id_card.nai == new_card.nai)) { + dups.add(id_card); + } + } + + foreach (IdCard id_card in dups) { + logger.trace("removing duplicate id for '%s'\n".printf(new_card.nai)); + remove_card_internal(id_card); + + if (new_card.trust_anchor.Compare(id_card.trust_anchor) == 0) { + logger.trace("Old and new cards have same trust anchor. Re-using the datetime_added and user_verified fields from the old card."); + new_card.trust_anchor.set_datetime_added(id_card.trust_anchor.datetime_added); + new_card.trust_anchor.user_verified = id_card.trust_anchor.user_verified; + } + } + + if (&old_duplicates != null) { + old_duplicates = dups; + } + + return (dups.size > 0); + } + + public IdCard? find_id_card(string nai, bool force_flat_file_store) { + IdCard? retval = null; + IIdentityCardStore.StoreType saved_store_type = get_store_type(); + if (force_flat_file_store) + set_store_type(IIdentityCardStore.StoreType.FLAT_FILE); + + foreach (IdCard id in get_card_list()) { + if (id.nai == nai) { + retval = id; + break; + } + } + set_store_type(saved_store_type); + if (force_flat_file_store && + (saved_store_type != IIdentityCardStore.StoreType.FLAT_FILE)) + card_list_changed(); + return retval; + } + + public void add_card(IdCard card, bool force_flat_file_store, out ArrayList? old_duplicates=null) { + if (card.temporary) { + logger.trace("add_card: card is temporary; returning."); + return; + } + string candidate; IIdentityCardStore.StoreType saved_store_type = get_store_type(); if (force_flat_file_store) set_store_type(IIdentityCardStore.StoreType.FLAT_FILE); - if (!display_name_is_valid (card.display_name, out candidate)) + remove_duplicates(card, out old_duplicates); + + if (!display_name_is_valid(card.display_name, out candidate)) { - card.display_name = candidate; + card.display_name = candidate; } + if (!card.store_password) + password_table.CachePassword(card, store); + + logger.trace("add_card: Adding card '%s' with services: '%s'" + .printf(card.display_name, card.get_services_string("; "))); + store.add_card(card); set_store_type(saved_store_type); card_list_changed(); - } + } - public void update_card(IdCard card) { - store.update_card(card); - card_list_changed(); - } + public IdCard update_card(IdCard card) { + logger.trace("update_card"); - public void remove_card(IdCard card) { - store.remove_card(card); + IdCard retval; + if (card.temporary) { + retval = card; + return retval; + } + + if (!card.store_password) + password_table.CachePassword(card, store); + else + password_table.RemovePassword(card, store); + retval = store.update_card(card); card_list_changed(); - } + return retval; + } - public void set_store_type(IIdentityCardStore.StoreType type) { - if ((store != null) && (store.get_store_type() == type)) - return; - switch (type) { -#if GNOME_KEYRING - case IIdentityCardStore.StoreType.KEYRING: - store = new KeyringStore(); - break; -#endif - case IIdentityCardStore.StoreType.FLAT_FILE: - default: - store = new LocalFlatFileStore(); - break; - } - } - - public IIdentityCardStore.StoreType get_store_type() { - return store.get_store_type(); - } - - public bool HasNonTrivialIdentities() { - foreach (IdCard card in this.store.get_card_list()) { - // The 'NoIdentity' card is non-trivial if it has services or rules. - // All other cards are automatically non-trivial. - if ((!card.IsNoIdentity()) || - (card.services.length > 0) || - (card.rules.length > 0)) { - return true; - } - } - return false; - } + private bool remove_card_internal(IdCard card) { + if (card.temporary) + return false; + password_table.RemovePassword(card, store); + return store.remove_card(card); + } + + public bool remove_card(IdCard card) { + if (remove_card_internal(card)) { + logger.trace(@"remove_card: Removed '$(card.display_name)'"); + card_list_changed(); + return true; + } + logger.warn(@"remove_card: Couldn't remove '$(card.display_name)'"); + return false; + } + + // The name is misleading: This not only sets the store type, + // it also creates a new store instance, which loads the card data. + public void set_store_type(IIdentityCardStore.StoreType type) { + if ((store != null) && (store.get_store_type() == type)) + return; + switch (type) { + #if GNOME_KEYRING + case IIdentityCardStore.StoreType.KEYRING: + store = new KeyringStore(); + break; + #endif + case IIdentityCardStore.StoreType.FLAT_FILE: + default: + store = new LocalFlatFileStore(); + break; + } + + // Loop through the loaded IDs. If any trust anchors are old enough that we didn't record + // the datetime_added, add it now. + string before_now = _("Before ") + TrustAnchor.format_datetime_now(); + bool save_needed = false; + foreach (IdCard id in this.store.get_card_list()) { + if (!id.trust_anchor.is_empty() && id.trust_anchor.datetime_added == "") { + logger.trace("set_store_type : Set ta_datetime_added for old trust anchor on '%s' to '%s'".printf(id.display_name, before_now)); + id.trust_anchor.set_datetime_added(before_now); + save_needed = true; + } + } + if (save_needed) { + this.store.store_id_cards(); + } + } + + public IIdentityCardStore.StoreType get_store_type() { + return store.get_store_type(); + } + + public bool HasNonTrivialIdentities() { + foreach (IdCard card in this.store.get_card_list()) { + // The 'NoIdentity' card is non-trivial if it has services or rules. + // All other cards are automatically non-trivial. + if ((!card.is_no_identity()) || + (card.services.size > 0) || + (card.rules.length > 0)) { + return true; + } + } + return false; + } private IdentityManagerApp parent; public IdentityManagerModel(IdentityManagerApp parent_app, IIdentityCardStore.StoreType store_type) { + logger.trace("IdentityManagerModel: store_type=" + store_type.to_string()); parent = parent_app; + password_table = new PasswordHashTable(); set_store_type(store_type); } }