X-Git-Url: http://www.project-moonshot.org/gitweb/?a=blobdiff_plain;f=src%2Fmoonshot-identities-manager.vala;h=6ef9de607ce5eaf64933fb24f4dc687f62feab5b;hb=8b84367198d6b30c9c24ce81cfad2e9ec7f48ecb;hp=90bbec981d1246a56f6defe7c53827b2efd506a1;hpb=63571c9e65b41cb3451bac24937d0f83ea76659f;p=moonshot-ui.git diff --git a/src/moonshot-identities-manager.vala b/src/moonshot-identities-manager.vala index 90bbec9..6ef9de6 100644 --- a/src/moonshot-identities-manager.vala +++ b/src/moonshot-identities-manager.vala @@ -1,131 +1,312 @@ -class IdentitiesManager : Object { +/* + * Copyright (c) 2011-2014, JANET(UK) + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * 3. Neither the name of JANET(UK) nor the names of its contributors + * may be used to endorse or promote products derived from this software + * without specific prior written permission. + * + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" + * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. +*/ +using Gee; - public SList id_card_list; +public class Password { +#if GNOME_KEYRING + private unowned string _password; + public string password { + get { + return _password; + } + set { + if (_password != null) { + GnomeKeyring.memory_free((void *)_password); + _password = null; + } + if (value != null) + _password = GnomeKeyring.memory_strdup(value); + } + } +#else + public string password { get; set; default = null; } +#endif - private const string FILE_NAME = "identities.txt"; + public Password(string in_password) { + password = in_password; + } - public IdentitiesManager () - { - id_card_list = new SList(); - var key_file = new KeyFile (); + ~Password() { + password = null; + } +} - var path = get_data_dir (); - var filename = Path.build_filename (path, FILE_NAME); +public class PasswordHashTable : Object { + private HashTable password_table; - try - { - key_file.load_from_file (filename, KeyFileFlags.NONE); + private static string ComputeHashKey(IdCard card, IIdentityCardStore store) { + return "%s_store_%d".printf( card.display_name, store.get_store_type() ); + } + + public void CachePassword(IdCard card, IIdentityCardStore store) { + password_table.replace(ComputeHashKey(card, store), new Password(card.password)); + } + + public void RemovePassword(IdCard card, IIdentityCardStore store) { + password_table.remove(ComputeHashKey(card, store)); + } + public void RetrievePassword(IdCard card, IIdentityCardStore store) { + weak Password password = password_table.lookup(ComputeHashKey(card, store)); + if (password != null) { + card.password = password.password; } - catch (Error e) - { - stdout.printf("Error: %s\n", e.message); - return; + } + public PasswordHashTable() { + password_table = new HashTable(GLib.str_hash, GLib.str_equal); + } +} + +public class IdentityManagerModel : Object { + static MoonshotLogger logger = get_logger("IdentityManagerModel"); + + private const string FILE_NAME = "identities.txt"; + private PasswordHashTable password_table; + private IIdentityCardStore store; + public LinkedList get_card_list() { + var identities = store.get_card_list(); + identities.sort((a, b) => { + IdCard id_a = (IdCard )a; + IdCard id_b = (IdCard )b; + if (id_a.is_no_identity() && !id_b.is_no_identity()) { + return -1; + } else if (id_b.is_no_identity() && !id_a.is_no_identity()) { + return 1; + } + return strcmp(id_a.display_name, id_b.display_name); + }); + if (identities.is_empty || !identities[0].is_no_identity()) + identities.insert(0, IdCard.NewNoIdentity()); + foreach (IdCard id_card in identities) { + if (!id_card.store_password) { + password_table.RetrievePassword(id_card, store); + } } + return identities; + } + public signal void card_list_changed(); - var identities_uris = key_file.get_groups (); - foreach (string identity in identities_uris) + /* This method finds a valid display name */ + public bool display_name_is_valid(string name, + out string? candidate) + { + if (&candidate != null) + candidate = null; + foreach (IdCard id_card in this.store.get_card_list()) { - try + if (id_card.display_name == name) { - IdCard id_card = new IdCard (); - - id_card.issuer = key_file.get_string (identity, "Issuer"); - id_card.username = key_file.get_string (identity, "Username"); - id_card.password = key_file.get_string (identity, "Password"); - id_card.services = key_file.get_string_list (identity, "Services"); - id_card.display_name = key_file.get_string (identity, "DisplayName"); - id_card.set_data ("pixbuf", find_icon ("avatar-default", 48)); - - - if (key_file.has_key (identity, "Rules-Patterns") && - key_file.has_key (identity, "Rules-AlwaysConfirm")) + if (&candidate != null) { - string [] rules_patterns = key_file.get_string_list (identity, "Rules-Patterns"); - string [] rules_always_conf = key_file.get_string_list (identity, "Rules-AlwaysConfirm"); - - if (rules_patterns.length == rules_always_conf.length) + for (int i = 0; i < 1000; i++) { - Rule[] rules = new Rule[rules_patterns.length]; - for (int i = 0; i < rules_patterns.length; i++) - { - rules[i] = {rules_patterns[i], rules_always_conf[i]}; - } - id_card.rules = rules; + string tmp = "%s %d".printf(name, i); + if (display_name_is_valid(tmp, null)) + { + candidate = tmp; + break; + } } } - // Trust anchor - id_card.trust_anchor.ca_cert = key_file.get_string (identity, "CA-Cert"); - id_card.trust_anchor.subject = key_file.get_string (identity, "Subject"); - id_card.trust_anchor.subject_alt = key_file.get_string (identity, "SubjectAlt"); - id_card.trust_anchor.server_cert = key_file.get_string (identity, "ServerCert"); - - id_card_list.prepend (id_card); - } - catch (Error e) - { - stdout.printf ("Error: %s\n", e.message); + return false; } } + return true; } - public void store_id_cards () + private bool remove_duplicates(IdCard new_card) { - var key_file = new KeyFile (); + bool duplicate_found = false; + bool found = false; + do { + var cards = this.store.get_card_list(); + found = false; + foreach (IdCard id_card in cards) { + if ((new_card != id_card) && (id_card.nai == new_card.nai)) { + stdout.printf("removing duplicate id for '%s'\n", new_card.nai); + logger.trace("removing duplicate id for '%s'\n".printf(new_card.nai)); + remove_card_internal(id_card); + found = duplicate_found = true; - foreach (IdCard id_card in this.id_card_list) - { - string[] rules_patterns = new string[id_card.rules.length]; - string[] rules_always_conf = new string[id_card.rules.length]; - - for (int i=0; i 0) - { - key_file.set_string_list (id_card.display_name, "Rules-Patterns", rules_patterns); - key_file.set_string_list (id_card.display_name, "Rules-AlwaysConfirm", rules_always_conf); + foreach (IdCard id in get_card_list()) { + if (id.nai == nai) { + retval = id; + break; } - // Trust anchor - key_file.set_string (id_card.display_name, "CA-Cert", id_card.trust_anchor.ca_cert ?? ""); - key_file.set_string (id_card.display_name, "Subject", id_card.trust_anchor.subject ?? ""); - key_file.set_string (id_card.display_name, "SubjectAlt", id_card.trust_anchor.subject_alt ?? ""); - key_file.set_string (id_card.display_name, "ServerCert", id_card.trust_anchor.server_cert ?? ""); + } + set_store_type(saved_store_type); + if (force_flat_file_store && + (saved_store_type != IIdentityCardStore.StoreType.FLAT_FILE)) + card_list_changed(); + return retval; + } + + public void add_card(IdCard card, bool force_flat_file_store) { + if (card.temporary) { + logger.trace("add_card: card is temporary; returning."); + return; } - var text = key_file.to_data (null); + string candidate; + IIdentityCardStore.StoreType saved_store_type = get_store_type(); - try + if (force_flat_file_store) + set_store_type(IIdentityCardStore.StoreType.FLAT_FILE); + + remove_duplicates(card); + + if (!display_name_is_valid(card.display_name, out candidate)) { - var path = get_data_dir (); - var filename = Path.build_filename (path, FILE_NAME); - FileUtils.set_contents (filename, text, -1); + card.display_name = candidate; } - catch (Error e) - { - stdout.printf ("Error: %s\n", e.message); + + if (!card.store_password) + password_table.CachePassword(card, store); + + logger.trace("add_card: Adding card '%s' with services: '%s'" + .printf(card.display_name, card.get_services_string("; "))); + + store.add_card(card); + set_store_type(saved_store_type); + card_list_changed(); + } + + public IdCard update_card(IdCard card) { + logger.trace("update_card"); + + IdCard retval; + if (card.temporary) { + retval = card; + return retval; } + + if (!card.store_password) + password_table.CachePassword(card, store); + else + password_table.RemovePassword(card, store); + retval = store.update_card(card); + card_list_changed(); + return retval; } - private string get_data_dir() - { - string path; + private bool remove_card_internal(IdCard card) { + if (card.temporary) + return false; + password_table.RemovePassword(card, store); + return store.remove_card(card); + } - path = Path.build_filename (Environment.get_user_data_dir (), - Config.PACKAGE_TARNAME); - if (!FileUtils.test (path, FileTest.EXISTS)) - { - DirUtils.create (path, 0700); + public bool remove_card(IdCard card) { + if (remove_card_internal(card)) { + card_list_changed(); + return true; } + return false; + } + + // The name is misleading: This not only sets the store type, + // it also creates a new store instance, which loads the card data. + public void set_store_type(IIdentityCardStore.StoreType type) { + if ((store != null) && (store.get_store_type() == type)) + return; + switch (type) { + #if GNOME_KEYRING + case IIdentityCardStore.StoreType.KEYRING: + store = new KeyringStore(); + break; + #endif + case IIdentityCardStore.StoreType.FLAT_FILE: + default: + store = new LocalFlatFileStore(); + break; + } + + // Loop through the loaded IDs. If any trust anchors are old enough that we didn't record + // the datetime_added, add it now. + string before_now = _("Before ") + TrustAnchor.format_datetime_now(); + bool save_needed = false; + foreach (IdCard id in this.store.get_card_list()) { + if (!id.trust_anchor.is_empty() && id.trust_anchor.datetime_added == "") { + logger.trace("set_store_type : Set ta_datetime_added for old trust anchor on '%s' to '%s'".printf(id.display_name, before_now)); + id.trust_anchor.set_datetime_added(before_now); + save_needed = true; + } + } + if (save_needed) { + this.store.store_id_cards(); + } + } + + public IIdentityCardStore.StoreType get_store_type() { + return store.get_store_type(); + } + + public bool HasNonTrivialIdentities() { + foreach (IdCard card in this.store.get_card_list()) { + // The 'NoIdentity' card is non-trivial if it has services or rules. + // All other cards are automatically non-trivial. + if ((!card.is_no_identity()) || + (card.services.size > 0) || + (card.rules.length > 0)) { + return true; + } + } + return false; + } + + + private IdentityManagerApp parent; - return path; + public IdentityManagerModel(IdentityManagerApp parent_app, IIdentityCardStore.StoreType store_type) { + logger.trace("IdentityManagerModel: store_type=" + store_type.to_string()); + parent = parent_app; + password_table = new PasswordHashTable(); + set_store_type(store_type); } }