/* * auth-manager.c - TpChannelManager implementation for auth channels * Copyright (C) 2010 Collabora Ltd. * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */ #include "config.h" #include "auth-manager.h" #include #include #include #include #define DEBUG_FLAG GABBLE_DEBUG_AUTH #include "gabble/caps-channel-manager.h" #include "server-sasl-channel.h" #include "connection.h" #include "debug.h" #include "util.h" static void channel_manager_iface_init (gpointer, gpointer); G_DEFINE_TYPE_WITH_CODE (GabbleAuthManager, gabble_auth_manager, WOCKY_TYPE_AUTH_REGISTRY, G_IMPLEMENT_INTERFACE (TP_TYPE_CHANNEL_MANAGER, channel_manager_iface_init); G_IMPLEMENT_INTERFACE (GABBLE_TYPE_CAPS_CHANNEL_MANAGER, NULL)); /* properties */ enum { PROP_CONNECTION = 1, LAST_PROPERTY }; typedef struct { gchar *name; GHashTable *details; TpConnectionStatusReason reason; } SavedError; struct _GabbleAuthManagerPrivate { GabbleConnection *conn; GabbleServerSaslChannel *channel; gulong closed_id; gboolean falling_back; GSList *mechanisms; gchar *server; gchar *session_id; gchar *username; gboolean allow_plain; gboolean is_secure_channel; SavedError *error; gboolean dispose_has_run; }; static void gabble_auth_manager_init (GabbleAuthManager *self) { self->priv = G_TYPE_INSTANCE_GET_PRIVATE (self, GABBLE_TYPE_AUTH_MANAGER, GabbleAuthManagerPrivate); } static void gabble_auth_manager_close_all (GabbleAuthManager *self) { DEBUG ("called"); if (self->priv->channel != NULL) tp_base_channel_close ((TpBaseChannel *) self->priv->channel); /* that results in the signal-driven-object-clearing dance */ g_assert (self->priv->channel == NULL); } static void connection_status_changed_cb (GabbleConnection *conn, guint status, guint reason, GabbleAuthManager *self) { if (status == TP_CONNECTION_STATUS_DISCONNECTED) gabble_auth_manager_close_all (self); } static void auth_channel_closed_cb (GabbleServerSaslChannel *channel, GabbleAuthManager *self) { SavedError tmp = { NULL, NULL, 0 }; tp_channel_manager_emit_channel_closed_for_object (self, TP_EXPORTABLE_CHANNEL (channel)); g_assert (self->priv->channel == channel); /* this is our last chance to find out why it failed */ if (gabble_server_sasl_channel_get_failure_details (channel, &tmp.name, &tmp.details, &tmp.reason)) self->priv->error = g_slice_dup (SavedError, &tmp); g_signal_handler_disconnect (self->priv->channel, self->priv->closed_id); tp_clear_object (&self->priv->channel); /* discard info we were holding in case we wanted to fall back */ g_slist_foreach (self->priv->mechanisms, (GFunc) g_free, NULL); tp_clear_pointer (&self->priv->mechanisms, g_slist_free); tp_clear_pointer (&self->priv->server, g_free); tp_clear_pointer (&self->priv->session_id, g_free); tp_clear_pointer (&self->priv->username, g_free); } static void gabble_auth_manager_constructed (GObject *object) { GabbleAuthManager *self = GABBLE_AUTH_MANAGER (object); if (G_OBJECT_CLASS (gabble_auth_manager_parent_class)->constructed != NULL) G_OBJECT_CLASS (gabble_auth_manager_parent_class)->constructed (object); self->priv->dispose_has_run = FALSE; gabble_signal_connect_weak (self->priv->conn, "status-changed", G_CALLBACK (connection_status_changed_cb), object); } static void gabble_auth_manager_dispose (GObject *object) { GabbleAuthManager *self = GABBLE_AUTH_MANAGER (object); GabbleAuthManagerPrivate *priv = self->priv; if (priv->dispose_has_run) return; DEBUG ("dispose called"); priv->dispose_has_run = TRUE; gabble_auth_manager_close_all (self); if (G_OBJECT_CLASS (gabble_auth_manager_parent_class)->dispose) G_OBJECT_CLASS ( gabble_auth_manager_parent_class)->dispose (object); } static void gabble_auth_manager_finalize (GObject *object) { GabbleAuthManager *self = GABBLE_AUTH_MANAGER (object); if (self->priv->error != NULL) { g_free (self->priv->error->name); g_hash_table_unref (self->priv->error->details); g_slice_free (SavedError, self->priv->error); } if (G_OBJECT_CLASS (gabble_auth_manager_parent_class)->finalize) G_OBJECT_CLASS (gabble_auth_manager_parent_class)->finalize (object); } static void gabble_auth_manager_get_property (GObject *object, guint property_id, GValue *value, GParamSpec *pspec) { GabbleAuthManager *self = GABBLE_AUTH_MANAGER (object); switch (property_id) { case PROP_CONNECTION: g_value_set_object (value, self->priv->conn); break; default: G_OBJECT_WARN_INVALID_PROPERTY_ID (object, property_id, pspec); break; } } static void gabble_auth_manager_set_property (GObject *object, guint property_id, const GValue *value, GParamSpec *pspec) { GabbleAuthManager *self = GABBLE_AUTH_MANAGER (object); switch (property_id) { case PROP_CONNECTION: self->priv->conn = g_value_get_object (value); break; default: G_OBJECT_WARN_INVALID_PROPERTY_ID (object, property_id, pspec); break; } } static void gabble_auth_manager_start_fallback_cb (GObject *self_object, GAsyncResult *result, gpointer user_data) { GabbleAuthManager *self = GABBLE_AUTH_MANAGER (self_object); WockyAuthRegistryStartData *start_data = NULL; GError *error = NULL; if (WOCKY_AUTH_REGISTRY_CLASS (gabble_auth_manager_parent_class)-> start_auth_finish_func (WOCKY_AUTH_REGISTRY (self), result, &start_data, &error)) { g_simple_async_result_set_op_res_gpointer (user_data, start_data, (GDestroyNotify) wocky_auth_registry_start_data_free); } else { g_simple_async_result_set_from_error (user_data, error); g_clear_error (&error); } g_simple_async_result_complete (user_data); g_object_unref (user_data); } static void gabble_auth_manager_start_auth_cb (GObject *channel, GAsyncResult *result, gpointer user_data) { GObject *self_object = g_async_result_get_source_object (user_data); GabbleAuthManager *self = GABBLE_AUTH_MANAGER (self_object); WockyAuthRegistryStartData *start_data = NULL; GError *error = NULL; if (gabble_server_sasl_channel_start_auth_finish ( GABBLE_SERVER_SASL_CHANNEL (channel), result, &start_data, &error)) { if (!tp_strdiff (start_data->mechanism, X_TELEPATHY_PASSWORD)) { /* restart authentication using our own base class */ g_assert (start_data->initial_response != NULL); self->priv->falling_back = TRUE; WOCKY_AUTH_REGISTRY_CLASS ( gabble_auth_manager_parent_class)->start_auth_async_func ( WOCKY_AUTH_REGISTRY (self), self->priv->mechanisms, self->priv->allow_plain, self->priv->is_secure_channel, self->priv->username, start_data->initial_response->str, self->priv->server, self->priv->session_id, gabble_auth_manager_start_fallback_cb, user_data); /* we've transferred ownership of the result */ goto finally; } else { g_simple_async_result_set_op_res_gpointer (user_data, start_data, (GDestroyNotify) wocky_auth_registry_start_data_free); } } else { g_simple_async_result_set_from_error (user_data, error); g_clear_error (&error); } g_simple_async_result_complete (user_data); g_object_unref (user_data); finally: g_object_unref (self_object); } static void gabble_auth_manager_start_auth_async (WockyAuthRegistry *registry, const GSList *mechanisms, gboolean allow_plain, gboolean is_secure_channel, const gchar *username, const gchar *password, const gchar *server, const gchar *session_id, GAsyncReadyCallback callback, gpointer user_data) { GabbleAuthManager *self = GABBLE_AUTH_MANAGER (registry); /* assumption: Wocky's API guarantees that we never have more than one * auth request outstanding */ g_assert (self->priv->channel == NULL); if (password == NULL || username == NULL) { GPtrArray *mech_array = g_ptr_array_new (); const GSList *iter; for (iter = mechanisms; iter != NULL; iter = iter->next) { self->priv->mechanisms = g_slist_prepend (self->priv->mechanisms, g_strdup (iter->data)); /* skip Wocky-specific pseudo-mechanisms for the D-Bus API */ if (!g_str_has_prefix (iter->data, "X-WOCKY-JABBER-")) g_ptr_array_add (mech_array, iter->data); } if (wocky_auth_registry_supports_one_of (registry, mechanisms, allow_plain)) g_ptr_array_add (mech_array, X_TELEPATHY_PASSWORD); g_ptr_array_add (mech_array, NULL); /* we'll use these if we fall back to the base class to use * X-TELEPATHY-PASSWORD */ self->priv->mechanisms = g_slist_reverse (self->priv->mechanisms); self->priv->allow_plain = allow_plain; self->priv->is_secure_channel = is_secure_channel; self->priv->server = g_strdup (server); self->priv->session_id = g_strdup (session_id); if (username == NULL) { g_object_get (self->priv->conn, "username", &self->priv->username, NULL); } else { self->priv->username = g_strdup (username); } self->priv->channel = gabble_server_sasl_channel_new (self->priv->conn, (GStrv) mech_array->pdata, is_secure_channel, session_id); g_ptr_array_unref (mech_array); self->priv->closed_id = tp_g_signal_connect_object (self->priv->channel, "closed", G_CALLBACK (auth_channel_closed_cb), self, 0); gabble_server_sasl_channel_start_auth_async (self->priv->channel, gabble_auth_manager_start_auth_cb, g_simple_async_result_new ((GObject *) self, callback, user_data, gabble_auth_manager_start_auth_async)); g_assert (!tp_base_channel_is_destroyed ( (TpBaseChannel *) self->priv->channel)); g_assert (tp_base_channel_is_registered ( (TpBaseChannel *) self->priv->channel)); tp_channel_manager_emit_new_channel (self, TP_EXPORTABLE_CHANNEL (self->priv->channel), NULL); } else { WOCKY_AUTH_REGISTRY_CLASS ( gabble_auth_manager_parent_class)->start_auth_async_func ( registry, mechanisms, allow_plain, is_secure_channel, username, password, server, session_id, callback, user_data); } } static gboolean gabble_auth_manager_start_auth_finish (WockyAuthRegistry *registry, GAsyncResult *result, WockyAuthRegistryStartData **start_data, GError **error) { GabbleAuthManager *self = GABBLE_AUTH_MANAGER (registry); if (self->priv->channel != NULL) { wocky_implement_finish_copy_pointer (self, gabble_auth_manager_start_auth_async, wocky_auth_registry_start_data_dup, start_data); } else { return WOCKY_AUTH_REGISTRY_CLASS (gabble_auth_manager_parent_class)->start_auth_finish_func ( registry, result, start_data, error); } } static void gabble_auth_manager_challenge_async (WockyAuthRegistry *registry, const GString *challenge_data, GAsyncReadyCallback callback, gpointer user_data) { GabbleAuthManager *self = GABBLE_AUTH_MANAGER (registry); if (self->priv->channel != NULL && !self->priv->falling_back) { gabble_server_sasl_channel_challenge_async (self->priv->channel, challenge_data, callback, user_data); } else { WOCKY_AUTH_REGISTRY_CLASS ( gabble_auth_manager_parent_class)->challenge_async_func ( registry, challenge_data, callback, user_data); } } static gboolean gabble_auth_manager_challenge_finish (WockyAuthRegistry *registry, GAsyncResult *result, GString **response, GError **error) { GabbleAuthManager *self = GABBLE_AUTH_MANAGER (registry); if (self->priv->channel != NULL && !self->priv->falling_back) { return gabble_server_sasl_channel_challenge_finish (self->priv->channel, result, response, error); } else { return WOCKY_AUTH_REGISTRY_CLASS (gabble_auth_manager_parent_class)->challenge_finish_func ( registry, result, response, error); } } static void gabble_auth_manager_success_async (WockyAuthRegistry *registry, GAsyncReadyCallback callback, gpointer user_data) { GabbleAuthManager *self = GABBLE_AUTH_MANAGER (registry); if (self->priv->channel != NULL) { gabble_server_sasl_channel_success_async (self->priv->channel, callback, user_data); } else { WOCKY_AUTH_REGISTRY_CLASS ( gabble_auth_manager_parent_class)->success_async_func ( registry, callback, user_data); } } static gboolean gabble_auth_manager_success_finish (WockyAuthRegistry *registry, GAsyncResult *result, GError **error) { GabbleAuthManager *self = GABBLE_AUTH_MANAGER (registry); if (self->priv->channel != NULL) { return gabble_server_sasl_channel_success_finish (self->priv->channel, result, error); } else { return WOCKY_AUTH_REGISTRY_CLASS (gabble_auth_manager_parent_class)->success_finish_func ( registry, result, error); } } static void gabble_auth_manager_failure (WockyAuthRegistry *registry, GError *error) { GabbleAuthManager *self = GABBLE_AUTH_MANAGER (registry); if (self->priv->channel != NULL) { gabble_server_sasl_channel_fail (self->priv->channel, error); } else { void (*chain_up)(WockyAuthRegistry *, GError *) = WOCKY_AUTH_REGISTRY_CLASS (gabble_auth_manager_parent_class)-> failure_func; if (chain_up != NULL) chain_up (registry, error); } } static void gabble_auth_manager_class_init (GabbleAuthManagerClass *klass) { GObjectClass *object_class = G_OBJECT_CLASS (klass); WockyAuthRegistryClass *registry_class = WOCKY_AUTH_REGISTRY_CLASS (klass); GParamSpec *param_spec; g_type_class_add_private (klass, sizeof (GabbleAuthManagerPrivate)); object_class->constructed = gabble_auth_manager_constructed; object_class->dispose = gabble_auth_manager_dispose; object_class->finalize = gabble_auth_manager_finalize; object_class->get_property = gabble_auth_manager_get_property; object_class->set_property = gabble_auth_manager_set_property; registry_class->start_auth_async_func = gabble_auth_manager_start_auth_async; registry_class->start_auth_finish_func = gabble_auth_manager_start_auth_finish; registry_class->challenge_async_func = gabble_auth_manager_challenge_async; registry_class->challenge_finish_func = gabble_auth_manager_challenge_finish; registry_class->success_async_func = gabble_auth_manager_success_async; registry_class->success_finish_func = gabble_auth_manager_success_finish; registry_class->failure_func = gabble_auth_manager_failure; param_spec = g_param_spec_object ("connection", "GabbleConnection object", "Gabble connection object that owns this manager.", GABBLE_TYPE_CONNECTION, G_PARAM_CONSTRUCT_ONLY | G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS); g_object_class_install_property (object_class, PROP_CONNECTION, param_spec); } static void gabble_auth_manager_foreach_channel (TpChannelManager *manager, TpExportableChannelFunc func, gpointer user_data) { GabbleAuthManager *self = GABBLE_AUTH_MANAGER (manager); if (self->priv->channel != NULL) func (TP_EXPORTABLE_CHANNEL (self->priv->channel), user_data); } static void channel_manager_iface_init (gpointer g_iface, gpointer iface_data) { TpChannelManagerIface *iface = g_iface; iface->foreach_channel = gabble_auth_manager_foreach_channel; /* These channels are not requestable. */ iface->ensure_channel = NULL; iface->create_channel = NULL; iface->request_channel = NULL; iface->foreach_channel_class = NULL; } gboolean gabble_auth_manager_get_failure_details (GabbleAuthManager *self, gchar **dbus_error, GHashTable **details, TpConnectionStatusReason *reason) { if (self->priv->channel != NULL) { return gabble_server_sasl_channel_get_failure_details ( self->priv->channel, dbus_error, details, reason); } else if (self->priv->error != NULL) { if (dbus_error != NULL) *dbus_error = g_strdup (self->priv->error->name); if (details != NULL) *details = g_hash_table_ref (self->priv->error->details); if (reason != NULL) *reason = self->priv->error->reason; return TRUE; } else { /* failure? what failure? I don't know anything about that :-( */ return FALSE; } }