2011-11-14 09:56:55 +00:00
|
|
|
/******************************************************************************
|
2013-07-22 18:22:39 +00:00
|
|
|
* Copyright (C) 2011-2013 Frank Osterfeld <frank.osterfeld@gmail.com> *
|
2011-11-14 09:56:55 +00:00
|
|
|
* *
|
|
|
|
* This program is distributed in the hope that it will be useful, but *
|
|
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY *
|
|
|
|
* or FITNESS FOR A PARTICULAR PURPOSE. For licensing and distribution *
|
|
|
|
* details, check the accompanying file 'COPYING'. *
|
|
|
|
*****************************************************************************/
|
|
|
|
#include "keychain_p.h"
|
|
|
|
|
|
|
|
#include <QSettings>
|
|
|
|
|
2013-10-13 13:50:00 +00:00
|
|
|
#include <QScopedPointer>
|
2012-06-09 20:11:16 +00:00
|
|
|
|
2011-11-14 09:56:55 +00:00
|
|
|
using namespace QKeychain;
|
|
|
|
|
2013-10-12 18:24:49 +00:00
|
|
|
static QString typeKey( const QString& key )
|
|
|
|
{
|
|
|
|
return QString::fromLatin1( "%1/type" ).arg( key );
|
|
|
|
}
|
|
|
|
|
|
|
|
static QString dataKey( const QString& key )
|
|
|
|
{
|
|
|
|
return QString::fromLatin1( "%1/data" ).arg( key );
|
|
|
|
}
|
|
|
|
|
2013-07-22 17:41:45 +00:00
|
|
|
class GnomeKeyring : private QLibrary {
|
2013-03-19 11:24:15 +00:00
|
|
|
public:
|
2013-07-22 17:41:45 +00:00
|
|
|
enum Result {
|
2013-03-19 11:24:15 +00:00
|
|
|
RESULT_OK,
|
|
|
|
RESULT_DENIED,
|
|
|
|
RESULT_NO_KEYRING_DAEMON,
|
|
|
|
RESULT_ALREADY_UNLOCKED,
|
|
|
|
RESULT_NO_SUCH_KEYRING,
|
|
|
|
RESULT_BAD_ARGUMENTS,
|
|
|
|
RESULT_IO_ERROR,
|
|
|
|
RESULT_CANCELLED,
|
|
|
|
RESULT_KEYRING_ALREADY_EXISTS,
|
|
|
|
RESULT_NO_MATCH
|
2013-07-22 17:41:45 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
enum ItemType {
|
2013-03-19 11:24:15 +00:00
|
|
|
ITEM_GENERIC_SECRET = 0,
|
|
|
|
ITEM_NETWORK_PASSWORD,
|
|
|
|
ITEM_NOTE,
|
|
|
|
ITEM_CHAINED_KEYRING_PASSWORD,
|
|
|
|
ITEM_ENCRYPTION_KEY_PASSWORD,
|
|
|
|
ITEM_PK_STORAGE = 0x100
|
2013-07-22 17:41:45 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
enum AttributeType {
|
2013-03-19 11:24:15 +00:00
|
|
|
ATTRIBUTE_TYPE_STRING,
|
|
|
|
ATTRIBUTE_TYPE_UINT32
|
2013-07-22 17:41:45 +00:00
|
|
|
};
|
|
|
|
|
2013-03-19 11:24:15 +00:00
|
|
|
typedef char gchar;
|
|
|
|
typedef void* gpointer;
|
|
|
|
typedef struct {
|
|
|
|
ItemType item_type;
|
|
|
|
struct {
|
|
|
|
const gchar* name;
|
|
|
|
AttributeType type;
|
|
|
|
} attributes[32];
|
|
|
|
} PasswordSchema;
|
2013-07-22 17:41:45 +00:00
|
|
|
|
2013-03-19 11:24:15 +00:00
|
|
|
typedef void ( *OperationGetStringCallback )( Result result, const char* string, gpointer data );
|
|
|
|
typedef void ( *OperationDoneCallback )( Result result, gpointer data );
|
|
|
|
typedef void ( *GDestroyNotify )( gpointer data );
|
|
|
|
|
|
|
|
static const char* GNOME_KEYRING_DEFAULT;
|
|
|
|
|
|
|
|
static bool isSupported()
|
|
|
|
{
|
2013-07-22 17:41:45 +00:00
|
|
|
const GnomeKeyring& keyring = instance();
|
2013-03-19 11:24:15 +00:00
|
|
|
return keyring.isLoaded() &&
|
|
|
|
keyring.NETWORK_PASSWORD &&
|
|
|
|
keyring.find_password &&
|
|
|
|
keyring.store_password &&
|
|
|
|
keyring.delete_password;
|
|
|
|
}
|
|
|
|
|
|
|
|
static gpointer store_network_password( const gchar* keyring, const gchar* display_name,
|
|
|
|
const gchar* user, const gchar* server, const gchar* password,
|
|
|
|
OperationDoneCallback callback, gpointer data, GDestroyNotify destroy_data )
|
|
|
|
{
|
|
|
|
if ( !isSupported() )
|
2013-07-22 17:41:45 +00:00
|
|
|
return 0;
|
2013-03-19 11:24:15 +00:00
|
|
|
return instance().store_password( instance().NETWORK_PASSWORD,
|
|
|
|
keyring, display_name, password, callback, data, destroy_data,
|
2013-07-30 14:32:02 +00:00
|
|
|
"user", user, "server", server, static_cast<char*>(0) );
|
2013-03-19 11:24:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static gpointer find_network_password( const gchar* user, const gchar* server,
|
|
|
|
OperationGetStringCallback callback, gpointer data, GDestroyNotify destroy_data )
|
2013-06-06 12:25:07 +00:00
|
|
|
{
|
2013-03-19 11:24:15 +00:00
|
|
|
if ( !isSupported() )
|
2013-07-22 17:41:45 +00:00
|
|
|
return 0;
|
2013-03-19 11:24:15 +00:00
|
|
|
return instance().find_password( instance().NETWORK_PASSWORD,
|
|
|
|
callback, data, destroy_data,
|
2013-07-30 14:32:02 +00:00
|
|
|
"user", user, "server", server, static_cast<char*>(0) );
|
2013-06-06 12:25:07 +00:00
|
|
|
}
|
2013-03-19 11:24:15 +00:00
|
|
|
|
|
|
|
static gpointer delete_network_password( const gchar* user, const gchar* server,
|
|
|
|
OperationDoneCallback callback, gpointer data, GDestroyNotify destroy_data )
|
2013-06-06 12:25:07 +00:00
|
|
|
{
|
2013-03-19 11:24:15 +00:00
|
|
|
if ( !isSupported() )
|
2013-07-22 17:41:45 +00:00
|
|
|
return 0;
|
2013-03-19 11:24:15 +00:00
|
|
|
return instance().delete_password( instance().NETWORK_PASSWORD,
|
|
|
|
callback, data, destroy_data,
|
2013-07-30 14:32:02 +00:00
|
|
|
"user", user, "server", server, static_cast<char*>(0) );
|
2013-03-19 11:24:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
GnomeKeyring(): QLibrary("gnome-keyring", 0) {
|
|
|
|
static const PasswordSchema schema = {
|
|
|
|
ITEM_NETWORK_PASSWORD,
|
|
|
|
{{ "user", ATTRIBUTE_TYPE_STRING },
|
|
|
|
{ "server", ATTRIBUTE_TYPE_STRING },
|
2013-07-22 17:41:45 +00:00
|
|
|
{ 0, static_cast<AttributeType>( 0 ) }}
|
2013-03-19 11:24:15 +00:00
|
|
|
};
|
2013-07-22 17:41:45 +00:00
|
|
|
|
2013-03-19 11:24:15 +00:00
|
|
|
NETWORK_PASSWORD = &schema;
|
|
|
|
find_password = reinterpret_cast<find_password_fn*>( resolve( "gnome_keyring_find_password" ) );
|
2013-10-12 18:24:49 +00:00
|
|
|
store_password = reinterpret_cast<store_password_fn*>( resolve( "gnome_keyring_store_password" ) );
|
2013-03-19 11:24:15 +00:00
|
|
|
delete_password = reinterpret_cast<delete_password_fn*>( resolve( "gnome_keyring_delete_password" ) );
|
|
|
|
}
|
|
|
|
|
|
|
|
static GnomeKeyring& instance() {
|
|
|
|
static GnomeKeyring keyring;
|
|
|
|
return keyring;
|
|
|
|
}
|
|
|
|
|
|
|
|
const PasswordSchema* NETWORK_PASSWORD;
|
|
|
|
typedef gpointer ( store_password_fn )( const PasswordSchema* schema, const gchar* keyring,
|
|
|
|
const gchar* display_name, const gchar* password,
|
|
|
|
OperationDoneCallback callback, gpointer data, GDestroyNotify destroy_data,
|
|
|
|
... );
|
|
|
|
typedef gpointer ( find_password_fn )( const PasswordSchema* schema,
|
|
|
|
OperationGetStringCallback callback, gpointer data, GDestroyNotify destroy_data,
|
|
|
|
... );
|
|
|
|
typedef gpointer ( delete_password_fn )( const PasswordSchema* schema,
|
|
|
|
OperationDoneCallback callback, gpointer data, GDestroyNotify destroy_data,
|
|
|
|
... );
|
|
|
|
find_password_fn* find_password;
|
|
|
|
store_password_fn* store_password;
|
|
|
|
delete_password_fn* delete_password;
|
|
|
|
};
|
2013-07-22 17:41:45 +00:00
|
|
|
|
2013-03-19 11:24:15 +00:00
|
|
|
const char* GnomeKeyring::GNOME_KEYRING_DEFAULT = NULL;
|
|
|
|
|
|
|
|
enum KeyringBackend {
|
|
|
|
Backend_GnomeKeyring,
|
|
|
|
Backend_Kwallet
|
|
|
|
};
|
2013-07-22 17:41:45 +00:00
|
|
|
|
2013-03-19 11:24:15 +00:00
|
|
|
static KeyringBackend detectKeyringBackend()
|
|
|
|
{
|
2013-10-12 18:24:49 +00:00
|
|
|
if ( !qgetenv( "GNOME_KEYRING_CONTROL" ).isNull() && GnomeKeyring::isSupported() )
|
2013-03-19 11:24:15 +00:00
|
|
|
return Backend_GnomeKeyring;
|
2013-07-22 17:41:45 +00:00
|
|
|
else
|
|
|
|
return Backend_Kwallet;
|
2013-03-19 11:24:15 +00:00
|
|
|
}
|
2013-07-22 17:41:45 +00:00
|
|
|
|
2013-03-19 11:24:15 +00:00
|
|
|
static KeyringBackend getKeyringBackend()
|
|
|
|
{
|
|
|
|
static KeyringBackend backend = detectKeyringBackend();
|
|
|
|
return backend;
|
|
|
|
}
|
|
|
|
|
2012-07-27 21:10:47 +00:00
|
|
|
void ReadPasswordJobPrivate::scheduledStart() {
|
2013-03-19 11:24:15 +00:00
|
|
|
switch ( getKeyringBackend() ) {
|
|
|
|
case Backend_GnomeKeyring:
|
|
|
|
if ( !GnomeKeyring::find_network_password( key.toUtf8().constData(), q->service().toUtf8().constData(),
|
|
|
|
reinterpret_cast<GnomeKeyring::OperationGetStringCallback>( &ReadPasswordJobPrivate::gnomeKeyring_cb ),
|
2013-07-22 17:41:45 +00:00
|
|
|
this, 0 ) )
|
2013-03-19 11:24:15 +00:00
|
|
|
q->emitFinishedWithError( OtherError, tr("Unknown error") );
|
|
|
|
break;
|
|
|
|
|
|
|
|
case Backend_Kwallet:
|
2013-07-22 15:52:07 +00:00
|
|
|
if ( QDBusConnection::sessionBus().isConnected() )
|
|
|
|
{
|
|
|
|
iface = new org::kde::KWallet( QLatin1String("org.kde.kwalletd"), QLatin1String("/modules/kwalletd"), QDBusConnection::sessionBus(), this );
|
2013-08-22 08:58:46 +00:00
|
|
|
const QDBusPendingReply<QString> reply = iface->networkWallet();
|
2013-07-22 15:52:07 +00:00
|
|
|
QDBusPendingCallWatcher* watcher = new QDBusPendingCallWatcher( reply, this );
|
2013-08-22 08:58:46 +00:00
|
|
|
connect( watcher, SIGNAL(finished(QDBusPendingCallWatcher*)), this, SLOT(kwalletWalletFound(QDBusPendingCallWatcher*)) );
|
2013-07-22 15:52:07 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2013-06-06 12:25:07 +00:00
|
|
|
// D-Bus is not reachable so none can tell us something about KWalletd
|
2013-10-12 18:24:49 +00:00
|
|
|
QDBusError err( QDBusError::NoServer, tr("D-Bus is not running") );
|
2013-07-22 15:52:07 +00:00
|
|
|
fallbackOnError( err );
|
|
|
|
}
|
2013-03-19 11:24:15 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-08-22 08:58:46 +00:00
|
|
|
void ReadPasswordJobPrivate::kwalletWalletFound(QDBusPendingCallWatcher *watcher)
|
|
|
|
{
|
|
|
|
watcher->deleteLater();
|
|
|
|
const QDBusPendingReply<QString> reply = *watcher;
|
|
|
|
const QDBusPendingReply<int> pendingReply = iface->open( reply.value(), 0, q->service() );
|
|
|
|
QDBusPendingCallWatcher* pendingWatcher = new QDBusPendingCallWatcher( pendingReply, this );
|
|
|
|
connect( pendingWatcher, SIGNAL(finished(QDBusPendingCallWatcher*)), this, SLOT(kwalletOpenFinished(QDBusPendingCallWatcher*)) );
|
|
|
|
}
|
|
|
|
|
2013-07-22 18:16:26 +00:00
|
|
|
static QPair<Error, QString> mapGnomeKeyringError( int result )
|
2013-03-19 11:24:15 +00:00
|
|
|
{
|
2013-07-22 18:16:26 +00:00
|
|
|
Q_ASSERT( result != GnomeKeyring::RESULT_OK );
|
2013-03-19 11:24:15 +00:00
|
|
|
|
2013-07-22 18:16:26 +00:00
|
|
|
switch ( result ) {
|
2013-07-22 15:52:07 +00:00
|
|
|
case GnomeKeyring::RESULT_DENIED:
|
2013-07-22 18:16:26 +00:00
|
|
|
return qMakePair( AccessDenied, QObject::tr("Access to keychain denied") );
|
2013-07-22 15:52:07 +00:00
|
|
|
case GnomeKeyring::RESULT_NO_KEYRING_DAEMON:
|
2013-07-22 18:16:26 +00:00
|
|
|
return qMakePair( NoBackendAvailable, QObject::tr("No keyring daemon") );
|
2013-07-22 15:52:07 +00:00
|
|
|
case GnomeKeyring::RESULT_ALREADY_UNLOCKED:
|
2013-07-22 18:16:26 +00:00
|
|
|
return qMakePair( OtherError, QObject::tr("Already unlocked") );
|
2013-07-22 15:52:07 +00:00
|
|
|
case GnomeKeyring::RESULT_NO_SUCH_KEYRING:
|
2013-07-22 18:16:26 +00:00
|
|
|
return qMakePair( OtherError, QObject::tr("No such keyring") );
|
2013-07-22 15:52:07 +00:00
|
|
|
case GnomeKeyring::RESULT_BAD_ARGUMENTS:
|
2013-07-22 18:16:26 +00:00
|
|
|
return qMakePair( OtherError, QObject::tr("Bad arguments") );
|
2013-07-22 15:52:07 +00:00
|
|
|
case GnomeKeyring::RESULT_IO_ERROR:
|
2013-07-22 18:16:26 +00:00
|
|
|
return qMakePair( OtherError, QObject::tr("I/O error") );
|
2013-07-22 15:52:07 +00:00
|
|
|
case GnomeKeyring::RESULT_CANCELLED:
|
2013-07-22 18:16:26 +00:00
|
|
|
return qMakePair( OtherError, QObject::tr("Cancelled") );
|
2013-07-22 15:52:07 +00:00
|
|
|
case GnomeKeyring::RESULT_KEYRING_ALREADY_EXISTS:
|
2013-07-22 18:16:26 +00:00
|
|
|
return qMakePair( OtherError, QObject::tr("Keyring already exists") );
|
2013-07-22 15:52:07 +00:00
|
|
|
case GnomeKeyring::RESULT_NO_MATCH:
|
2013-07-22 18:16:26 +00:00
|
|
|
return qMakePair( EntryNotFound, QObject::tr("No match") );
|
2013-07-22 15:52:07 +00:00
|
|
|
default:
|
|
|
|
break;
|
2013-06-06 12:25:07 +00:00
|
|
|
}
|
2013-07-22 18:16:26 +00:00
|
|
|
|
|
|
|
return qMakePair( OtherError, QObject::tr("Unknown error") );
|
|
|
|
}
|
|
|
|
|
|
|
|
void ReadPasswordJobPrivate::gnomeKeyring_cb( int result, const char* string, ReadPasswordJobPrivate* self )
|
|
|
|
{
|
|
|
|
if ( result == GnomeKeyring::RESULT_OK ) {
|
|
|
|
if ( self->dataType == ReadPasswordJobPrivate::Text )
|
|
|
|
self->data = string;
|
|
|
|
else
|
|
|
|
self->data = QByteArray::fromBase64( string );
|
|
|
|
self->q->emitFinished();
|
|
|
|
} else {
|
|
|
|
const QPair<Error, QString> errorResult = mapGnomeKeyringError( result );
|
|
|
|
self->q->emitFinishedWithError( errorResult.first, errorResult.second );
|
|
|
|
}
|
2012-05-08 08:47:38 +00:00
|
|
|
}
|
|
|
|
|
2013-06-06 12:25:07 +00:00
|
|
|
void ReadPasswordJobPrivate::fallbackOnError(const QDBusError& err )
|
|
|
|
{
|
2013-10-13 13:50:00 +00:00
|
|
|
QScopedPointer<QSettings> local( !q->settings() ? new QSettings( q->service() ) : 0 );
|
|
|
|
QSettings* actual = q->settings() ? q->settings() : local.data();
|
2012-06-09 20:11:16 +00:00
|
|
|
WritePasswordJobPrivate::Mode mode;
|
|
|
|
|
2013-10-12 18:24:49 +00:00
|
|
|
if ( q->insecureFallback() && actual->contains( dataKey( key ) ) ) {
|
2012-06-09 20:11:16 +00:00
|
|
|
|
2013-10-12 18:24:49 +00:00
|
|
|
mode = (WritePasswordJobPrivate::Mode)actual->value( typeKey( key ) ).toInt();
|
|
|
|
data = actual->value( dataKey( key ) ).toByteArray();
|
2013-06-06 12:25:07 +00:00
|
|
|
|
|
|
|
q->emitFinished();
|
|
|
|
} else {
|
|
|
|
if ( err.type() == QDBusError::ServiceUnknown ) //KWalletd not running
|
|
|
|
q->emitFinishedWithError( NoBackendAvailable, tr("No keychain service available") );
|
|
|
|
else
|
|
|
|
q->emitFinishedWithError( OtherError, tr("Could not open wallet: %1; %2").arg( QDBusError::errorString( err.type() ), err.message() ) );
|
|
|
|
}
|
|
|
|
}
|
2012-06-09 20:11:16 +00:00
|
|
|
|
2013-06-06 12:25:07 +00:00
|
|
|
void ReadPasswordJobPrivate::kwalletOpenFinished( QDBusPendingCallWatcher* watcher ) {
|
|
|
|
watcher->deleteLater();
|
|
|
|
const QDBusPendingReply<int> reply = *watcher;
|
2012-06-09 20:11:16 +00:00
|
|
|
|
2013-10-13 13:50:00 +00:00
|
|
|
QScopedPointer<QSettings> local( !q->settings() ? new QSettings( q->service() ) : 0 );
|
|
|
|
QSettings* actual = q->settings() ? q->settings() : local.data();
|
2013-06-06 12:25:07 +00:00
|
|
|
WritePasswordJobPrivate::Mode mode;
|
|
|
|
|
|
|
|
if ( reply.isError() ) {
|
|
|
|
fallbackOnError( reply.error() );
|
|
|
|
return;
|
2012-06-09 20:11:16 +00:00
|
|
|
}
|
|
|
|
|
2013-10-12 18:24:49 +00:00
|
|
|
if ( actual->contains( dataKey( key ) ) ) {
|
2012-06-09 20:11:16 +00:00
|
|
|
// We previously stored data in the insecure QSettings, but now have KWallet available.
|
|
|
|
// Do the migration
|
|
|
|
|
2013-10-12 18:24:49 +00:00
|
|
|
data = actual->value( dataKey( key ) ).toByteArray();
|
|
|
|
mode = (WritePasswordJobPrivate::Mode)actual->value( typeKey( key ) ).toInt();
|
2012-06-09 20:11:16 +00:00
|
|
|
actual->remove( key );
|
|
|
|
|
|
|
|
q->emitFinished();
|
|
|
|
|
|
|
|
|
|
|
|
WritePasswordJob* j = new WritePasswordJob( q->service(), 0 );
|
|
|
|
j->setSettings( q->settings() );
|
|
|
|
j->setKey( key );
|
|
|
|
j->setAutoDelete( true );
|
|
|
|
if ( mode == WritePasswordJobPrivate::Binary )
|
|
|
|
j->setBinaryData( data );
|
|
|
|
else if ( mode == WritePasswordJobPrivate::Text )
|
|
|
|
j->setTextData( QString::fromUtf8( data ) );
|
2012-05-08 15:23:26 +00:00
|
|
|
else
|
2012-06-09 20:11:16 +00:00
|
|
|
Q_ASSERT( false );
|
|
|
|
|
|
|
|
j->start();
|
|
|
|
|
2012-05-08 08:47:38 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
walletHandle = reply.value();
|
|
|
|
|
2012-05-08 15:38:14 +00:00
|
|
|
if ( walletHandle < 0 ) {
|
|
|
|
q->emitFinishedWithError( AccessDenied, tr("Access to keychain denied") );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-05-08 08:47:38 +00:00
|
|
|
const QDBusPendingReply<int> nextReply = iface->entryType( walletHandle, q->service(), key, q->service() );
|
|
|
|
QDBusPendingCallWatcher* nextWatcher = new QDBusPendingCallWatcher( nextReply, this );
|
|
|
|
connect( nextWatcher, SIGNAL(finished(QDBusPendingCallWatcher*)), this, SLOT(kwalletEntryTypeFinished(QDBusPendingCallWatcher*)) );
|
|
|
|
}
|
|
|
|
|
2013-10-12 17:57:48 +00:00
|
|
|
//Must be in sync with KWallet::EntryType (kwallet.h)
|
|
|
|
enum KWalletEntryType {
|
|
|
|
Unknown=0,
|
|
|
|
Password,
|
|
|
|
Stream,
|
|
|
|
Map
|
|
|
|
};
|
|
|
|
|
2012-07-27 21:10:47 +00:00
|
|
|
void ReadPasswordJobPrivate::kwalletEntryTypeFinished( QDBusPendingCallWatcher* watcher ) {
|
2012-05-08 08:47:38 +00:00
|
|
|
watcher->deleteLater();
|
|
|
|
if ( watcher->isError() ) {
|
|
|
|
const QDBusError err = watcher->error();
|
|
|
|
q->emitFinishedWithError( OtherError, tr("Could not determine data type: %1; %2").arg( QDBusError::errorString( err.type() ), err.message() ) );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
const QDBusPendingReply<int> reply = *watcher;
|
2013-10-12 17:57:48 +00:00
|
|
|
const int value = reply.value();
|
2012-05-08 08:47:38 +00:00
|
|
|
|
2013-10-12 17:57:48 +00:00
|
|
|
switch ( value ) {
|
|
|
|
case Unknown:
|
|
|
|
q->emitFinishedWithError( EntryNotFound, tr("Entry not found") );
|
|
|
|
return;
|
|
|
|
case Password:
|
|
|
|
dataType = Text;
|
|
|
|
break;
|
|
|
|
case Stream:
|
|
|
|
dataType = Binary;
|
|
|
|
break;
|
|
|
|
case Map:
|
|
|
|
q->emitFinishedWithError( EntryNotFound, tr("Unsupported entry type 'Map'") );
|
|
|
|
return;
|
|
|
|
default:
|
|
|
|
q->emitFinishedWithError( OtherError, tr("Unknown kwallet entry type '%1'").arg( value ) );
|
|
|
|
return;
|
|
|
|
}
|
2012-05-08 08:47:38 +00:00
|
|
|
|
|
|
|
const QDBusPendingCall nextReply = dataType == Text
|
|
|
|
? QDBusPendingCall( iface->readPassword( walletHandle, q->service(), key, q->service() ) )
|
|
|
|
: QDBusPendingCall( iface->readEntry( walletHandle, q->service(), key, q->service() ) );
|
|
|
|
QDBusPendingCallWatcher* nextWatcher = new QDBusPendingCallWatcher( nextReply, this );
|
|
|
|
connect( nextWatcher, SIGNAL(finished(QDBusPendingCallWatcher*)), this, SLOT(kwalletReadFinished(QDBusPendingCallWatcher*)) );
|
|
|
|
}
|
|
|
|
|
2012-07-27 21:10:47 +00:00
|
|
|
void ReadPasswordJobPrivate::kwalletReadFinished( QDBusPendingCallWatcher* watcher ) {
|
2012-05-08 08:47:38 +00:00
|
|
|
watcher->deleteLater();
|
|
|
|
if ( watcher->isError() ) {
|
|
|
|
const QDBusError err = watcher->error();
|
|
|
|
q->emitFinishedWithError( OtherError, tr("Could not read password: %1; %2").arg( QDBusError::errorString( err.type() ), err.message() ) );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( dataType == Binary ) {
|
|
|
|
QDBusPendingReply<QByteArray> reply = *watcher;
|
|
|
|
data = reply.value();
|
|
|
|
} else {
|
|
|
|
QDBusPendingReply<QString> reply = *watcher;
|
|
|
|
data = reply.value().toUtf8();
|
|
|
|
}
|
|
|
|
q->emitFinished();
|
2011-11-14 09:56:55 +00:00
|
|
|
}
|
|
|
|
|
2012-07-27 21:10:47 +00:00
|
|
|
void WritePasswordJobPrivate::scheduledStart() {
|
2013-03-19 11:24:15 +00:00
|
|
|
switch ( getKeyringBackend() ) {
|
|
|
|
case Backend_GnomeKeyring:
|
|
|
|
if ( mode == WritePasswordJobPrivate::Delete ) {
|
|
|
|
if ( !GnomeKeyring::delete_network_password( key.toUtf8().constData(), q->service().toUtf8().constData(),
|
|
|
|
reinterpret_cast<GnomeKeyring::OperationDoneCallback>( &WritePasswordJobPrivate::gnomeKeyring_cb ),
|
2013-07-22 17:41:45 +00:00
|
|
|
this, 0 ) )
|
2013-03-19 11:24:15 +00:00
|
|
|
q->emitFinishedWithError( OtherError, tr("Unknown error") );
|
|
|
|
} else {
|
|
|
|
QByteArray password = mode == WritePasswordJobPrivate::Text ? textData.toUtf8() : binaryData.toBase64();
|
|
|
|
QByteArray service = q->service().toUtf8();
|
|
|
|
if ( !GnomeKeyring::store_network_password( GnomeKeyring::GNOME_KEYRING_DEFAULT, service.constData(),
|
|
|
|
key.toUtf8().constData(), service.constData(), password.constData(),
|
|
|
|
reinterpret_cast<GnomeKeyring::OperationDoneCallback>( &WritePasswordJobPrivate::gnomeKeyring_cb ),
|
2013-07-22 17:41:45 +00:00
|
|
|
this, 0 ) )
|
2013-03-19 11:24:15 +00:00
|
|
|
q->emitFinishedWithError( OtherError, tr("Unknown error") );
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case Backend_Kwallet:
|
2013-07-22 15:52:07 +00:00
|
|
|
if ( QDBusConnection::sessionBus().isConnected() )
|
|
|
|
{
|
|
|
|
iface = new org::kde::KWallet( QLatin1String("org.kde.kwalletd"), QLatin1String("/modules/kwalletd"), QDBusConnection::sessionBus(), this );
|
|
|
|
const QDBusPendingReply<int> reply = iface->open( QLatin1String("kdewallet"), 0, q->service() );
|
|
|
|
QDBusPendingCallWatcher* watcher = new QDBusPendingCallWatcher( reply, this );
|
|
|
|
connect( watcher, SIGNAL(finished(QDBusPendingCallWatcher*)), this, SLOT(kwalletOpenFinished(QDBusPendingCallWatcher*)) );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
// D-Bus is not reachable so none can tell us something about KWalletd
|
2013-10-12 18:24:49 +00:00
|
|
|
QDBusError err( QDBusError::NoServer, tr("D-Bus is not running") );
|
2013-07-22 15:52:07 +00:00
|
|
|
fallbackOnError( err );
|
|
|
|
}
|
2013-06-06 12:25:07 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void WritePasswordJobPrivate::fallbackOnError(const QDBusError &err)
|
|
|
|
{
|
2013-10-13 13:50:00 +00:00
|
|
|
QScopedPointer<QSettings> local( !q->settings() ? new QSettings( q->service() ) : 0 );
|
|
|
|
QSettings* actual = q->settings() ? q->settings() : local.data();
|
2013-06-06 12:25:07 +00:00
|
|
|
|
2013-07-22 18:01:37 +00:00
|
|
|
if ( !q->insecureFallback() ) {
|
|
|
|
q->emitFinishedWithError( OtherError, tr("Could not open wallet: %1; %2").arg( QDBusError::errorString( err.type() ), err.message() ) );
|
|
|
|
return;
|
|
|
|
}
|
2013-06-06 12:25:07 +00:00
|
|
|
|
2013-07-22 18:01:37 +00:00
|
|
|
if ( mode == Delete ) {
|
|
|
|
actual->remove( key );
|
2013-06-06 12:25:07 +00:00
|
|
|
actual->sync();
|
|
|
|
|
|
|
|
q->emitFinished();
|
2013-07-22 18:01:37 +00:00
|
|
|
return;
|
2013-07-22 18:16:26 +00:00
|
|
|
}
|
2013-07-22 18:01:37 +00:00
|
|
|
|
2013-10-12 18:24:49 +00:00
|
|
|
actual->setValue( QString::fromLatin1( "%1/type" ).arg( key ), (int)mode );
|
2013-07-22 18:01:37 +00:00
|
|
|
if ( mode == Text )
|
2013-10-12 18:24:49 +00:00
|
|
|
actual->setValue( QString::fromLatin1( "%1/data" ).arg( key ), textData.toUtf8() );
|
2013-07-22 18:01:37 +00:00
|
|
|
else if ( mode == Binary )
|
2013-10-12 18:24:49 +00:00
|
|
|
actual->setValue( QString::fromLatin1( "%1/data" ).arg( key ), binaryData );
|
2013-07-22 18:01:37 +00:00
|
|
|
actual->sync();
|
|
|
|
|
|
|
|
q->emitFinished();
|
2013-07-22 15:52:07 +00:00
|
|
|
}
|
|
|
|
|
2013-03-19 11:24:15 +00:00
|
|
|
void WritePasswordJobPrivate::gnomeKeyring_cb( int result, WritePasswordJobPrivate* self )
|
|
|
|
{
|
2013-07-22 18:16:26 +00:00
|
|
|
if ( result == GnomeKeyring::RESULT_OK ) {
|
2013-07-22 15:52:07 +00:00
|
|
|
self->q->emitFinished();
|
2013-07-22 18:16:26 +00:00
|
|
|
} else {
|
|
|
|
const QPair<Error, QString> errorResult = mapGnomeKeyringError( result );
|
|
|
|
self->q->emitFinishedWithError( errorResult.first, errorResult.second );
|
2013-06-06 12:25:07 +00:00
|
|
|
}
|
2012-05-07 16:21:22 +00:00
|
|
|
}
|
|
|
|
|
2012-07-27 21:10:47 +00:00
|
|
|
void WritePasswordJobPrivate::kwalletOpenFinished( QDBusPendingCallWatcher* watcher ) {
|
2012-05-07 16:21:22 +00:00
|
|
|
watcher->deleteLater();
|
|
|
|
QDBusPendingReply<int> reply = *watcher;
|
2012-06-09 20:11:16 +00:00
|
|
|
|
2013-10-13 13:50:00 +00:00
|
|
|
QScopedPointer<QSettings> local( !q->settings() ? new QSettings( q->service() ) : 0 );
|
|
|
|
QSettings* actual = q->settings() ? q->settings() : local.data();
|
2012-06-09 20:11:16 +00:00
|
|
|
|
2012-05-07 16:21:22 +00:00
|
|
|
if ( reply.isError() ) {
|
2013-06-06 12:25:07 +00:00
|
|
|
fallbackOnError( reply.error() );
|
2012-05-07 16:21:22 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-06-09 20:11:16 +00:00
|
|
|
if ( actual->contains( key ) )
|
|
|
|
{
|
|
|
|
// If we had previously written to QSettings, but we now have a kwallet available, migrate and delete old insecure data
|
|
|
|
actual->remove( key );
|
|
|
|
actual->sync();
|
|
|
|
}
|
|
|
|
|
2012-05-07 16:21:22 +00:00
|
|
|
const int handle = reply.value();
|
|
|
|
|
2012-05-08 15:38:14 +00:00
|
|
|
if ( handle < 0 ) {
|
|
|
|
q->emitFinishedWithError( AccessDenied, tr("Access to keychain denied") );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-05-07 16:21:22 +00:00
|
|
|
QDBusPendingReply<int> nextReply;
|
|
|
|
|
|
|
|
if ( !textData.isEmpty() )
|
|
|
|
nextReply = iface->writePassword( handle, q->service(), key, textData, q->service() );
|
|
|
|
else if ( !binaryData.isEmpty() )
|
|
|
|
nextReply = iface->writeEntry( handle, q->service(), key, binaryData, q->service() );
|
|
|
|
else
|
|
|
|
nextReply = iface->removeEntry( handle, q->service(), key, q->service() );
|
|
|
|
|
|
|
|
QDBusPendingCallWatcher* nextWatcher = new QDBusPendingCallWatcher( nextReply, this );
|
|
|
|
connect( nextWatcher, SIGNAL(finished(QDBusPendingCallWatcher*)), this, SLOT(kwalletWriteFinished(QDBusPendingCallWatcher*)) );
|
|
|
|
}
|
|
|
|
|
2012-07-27 21:10:47 +00:00
|
|
|
void WritePasswordJobPrivate::kwalletWriteFinished( QDBusPendingCallWatcher* watcher ) {
|
2012-05-07 16:21:22 +00:00
|
|
|
watcher->deleteLater();
|
|
|
|
QDBusPendingReply<int> reply = *watcher;
|
|
|
|
if ( reply.isError() ) {
|
|
|
|
const QDBusError err = reply.error();
|
|
|
|
q->emitFinishedWithError( OtherError, tr("Could not open wallet: %1; %2").arg( QDBusError::errorString( err.type() ), err.message() ) );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
q->emitFinished();
|
2011-11-14 09:56:55 +00:00
|
|
|
}
|