/* * Copyright © 2009 Rob Scheepmaker * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU Library General Public License version 2 as * published by the Free Software Foundation * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details * * You should have received a copy of the GNU Library General Public * License along with this program; if not, write to the * Free Software Foundation, Inc., * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. */ #include "serviceprovider_p.h" #include #include #include #include "authorizationrule_p.h" #include "authorizationmanager_p.h" #include "joliemessagehelper_p.h" #include "config-plasma.h" #include #include #include #include #include #include #include #include #if ENABLE_REMOTE_WIDGETS #include #endif #include #include namespace Plasma { ServiceProvider::ServiceProvider(const QString &name, Service *service) : Jolie::AbstractAdaptor(service), m_service(service) { connect(service, SIGNAL(finished(Plasma::ServiceJob*)), this, SLOT(operationCompleted(Plasma::ServiceJob*))); m_providerName = name; AuthorizationManager::self()->d->server->registerAdaptor(m_providerName.toUtf8(), this); #ifndef NDEBUG kDebug() << "registered service provider " << m_providerName; #endif } ServiceProvider::~ServiceProvider() { AuthorizationManager::self()->d->server->unregisterAdaptor(m_providerName.toUtf8()); } void ServiceProvider::startOperationCall(Jolie::Message message) { #ifndef NDEBUG kDebug() << "starting operation call"; #endif KConfigGroup description = m_service->operationDescription(QString(JolieMessage::field(JolieMessage::Field::OPERATION, message))); //deserialize the parameters QByteArray parametersByteArray; parametersByteArray = JolieMessage::field(JolieMessage::Field::PARAMETERS, message); #ifndef NDEBUG kDebug() << "parameters byte array: " << parametersByteArray.toBase64(); #endif QBuffer buffer(¶metersByteArray); buffer.open(QIODevice::ReadOnly); QDataStream in(&buffer); QMap parameters; in >> parameters; if (!description.isValid()) { #ifndef NDEBUG kDebug() << "invalid description."; #endif } #ifndef NDEBUG kDebug() << "====PARAMETERS===="; #endif //write the parameters into the operation description QMap::const_iterator it = parameters.constBegin(); QMap::const_iterator itEnd = parameters.constEnd(); for ( ; it != itEnd; ++it) { const QString key = it.key(); const QVariant value = it.value(); #ifndef NDEBUG kDebug() << "key = " << key << ", value = " << value; #endif description.writeEntry(key, value); } m_service->setDestination(JolieMessage::field(JolieMessage::Field::DESTINATION, message)); ServiceJob *job = m_service->startOperationCall(description); QString identityID = JolieMessage::field(JolieMessage::Field::IDENTITYID, message); job->d->identity = AuthorizationManager::self()->d->getCredentials(identityID); #ifndef NDEBUG kDebug() << "adding into messagemap:" << ((QObject*)job); #endif m_messageMap[job] = message; } void ServiceProvider::sendOperations(Jolie::Message message) { #ifndef NDEBUG kDebug() << "send operations."; #endif //kDebug() << printJolieMessage(message); Jolie::Message response(message.resourcePath(), message.operationName(), message.id()); //FIXME: this is duplicated from Plasma::Service QString path = QStandardPaths::locate(QStandardPaths::GenericDataLocation, "plasma/services/" + m_service->name() + ".operations"); if (path.isEmpty()) { #ifndef NDEBUG kDebug() << "Cannot find operations description:" << m_service->name() << ".operations"; #endif response.setFault(Jolie::Fault("NoOperationsDescription")); } else { #ifndef NDEBUG kDebug() << "file = " << path; #endif QFile file(path); file.open(QIODevice::ReadOnly); Jolie::Value value; value.children(JolieMessage::Field::OPERATIONSDESCRIPTION) << Jolie::Value(file.readAll()); file.close(); response.setData(value); } QByteArray id = JolieMessage::field(JolieMessage::Field::IDENTITYID, message); QByteArray uuid = JolieMessage::field(JolieMessage::Field::UUID, message); response = appendToken(response, id, uuid); #ifndef NDEBUG kDebug() << "caller = " << id.toBase64(); #endif //hack around the not yet async service adaptor api in qtjolie if (m_descriptorMap.contains(id + uuid)) { #ifndef NDEBUG kDebug() << "descriptor found, sending message"; #endif AuthorizationManager::self()->d->server->sendReply( m_descriptorMap.value(id + uuid), response); } else { #ifndef NDEBUG kDebug() << "no valid entry in descriptormap."; #endif } } void ServiceProvider::sendEnabledOperations(Jolie::Message message) { #ifndef NDEBUG kDebug() << "send enabled operations."; #endif Jolie::Message response(message.resourcePath(), message.operationName(), message.id()); QStringList enabledOperationsList; foreach (const QString &operation, m_service->operationNames()) { if (m_service->isOperationEnabled(operation)) { enabledOperationsList << operation; } } #ifndef NDEBUG kDebug() << "enabled operations: " << enabledOperationsList; #endif QByteArray enabledOperationsArray; QDataStream out(&enabledOperationsArray, QIODevice::WriteOnly); out << enabledOperationsList; Jolie::Value value; value.children(JolieMessage::Field::ENABLEDOPERATIONS) << Jolie::Value(enabledOperationsArray); response.setData(value); QByteArray id = JolieMessage::field(JolieMessage::Field::IDENTITYID, message); QByteArray uuid = JolieMessage::field(JolieMessage::Field::UUID, message); response = appendToken(response, id, uuid); #ifndef NDEBUG kDebug() << "caller = " << id.toBase64(); #endif //hack around the not yet async service adaptor api in qtjolie if (m_descriptorMap.contains(id + uuid)) { #ifndef NDEBUG kDebug() << "descriptor found, sending message"; #endif AuthorizationManager::self()->d->server->sendReply( m_descriptorMap.value(id + uuid), response); } else { #ifndef NDEBUG kDebug() << "no valid entry in descriptormap."; #endif } } QString ServiceProvider::resourceName() const { return m_providerName; } void ServiceProvider::relay(Jolie::Server *server, int descriptor, const Jolie::Message &message) { Q_UNUSED(server) if (message.operationName() == "startConnection") { #ifndef NDEBUG kDebug() << "reset token"; #endif //add the identity Credentials identity; QByteArray identityByteArray = JolieMessage::field(JolieMessage::Field::IDENTITY, message); QDataStream stream(&identityByteArray, QIODevice::ReadOnly); stream >> identity; AuthorizationManager::self()->d->addCredentials(identity); Jolie::Message response(message.resourcePath(), message.operationName(), message.id()); QByteArray uuid = JolieMessage::field(JolieMessage::Field::UUID, message); response = appendToken(response, identity.id().toAscii(), uuid); AuthorizationManager::self()->d->server->sendReply(descriptor, response); return; } if (JolieMessage::field(JolieMessage::Field::TOKEN, message).isEmpty()) { Jolie::Message response(message.resourcePath(), message.operationName(), message.id()); response.setFault(Jolie::Fault(JolieMessage::Error::INVALIDTOKEN)); AuthorizationManager::self()->d->server->sendReply(descriptor, response); return; } //m_descriptor = descriptor; QByteArray id = JolieMessage::field(JolieMessage::Field::IDENTITYID, message); QByteArray uuid = JolieMessage::field(JolieMessage::Field::UUID, message); m_descriptorMap[id + uuid] = descriptor; authorize(message, m_tokens[id + uuid]); } void ServiceProvider::operationCompleted(Plasma::ServiceJob *job) { #ifndef NDEBUG kDebug() << "operation completed."; #endif if (!m_messageMap.contains(job)) { #ifndef NDEBUG kDebug() << "service not in map!"; #endif return; } #ifndef NDEBUG kDebug() << "found message in message map!"; #endif Jolie::Message message = m_messageMap.take(job); Jolie::Message response(message.resourcePath(), message.operationName(), message.id()); QVariant variantResult = job->result(); #ifndef NDEBUG kDebug() << "got a result: " << variantResult; #endif QByteArray byteArrayResult; QBuffer buffer(&byteArrayResult); buffer.open(QIODevice::WriteOnly); QDataStream out(&buffer); out << variantResult; Jolie::Value data; data.children(JolieMessage::Field::RESULT) << Jolie::Value(byteArrayResult); response.setData(data); if (job->error()) { response.setFault(Jolie::Fault(job->errorString().toAscii())); } QByteArray id = JolieMessage::field(JolieMessage::Field::IDENTITYID, message); QByteArray uuid = JolieMessage::field(JolieMessage::Field::UUID, message); response = appendToken(response, id, uuid); //hack around the not yet async service adaptor api in qtjolie if (m_descriptorMap.contains(id + uuid)) { #ifndef NDEBUG kDebug() << "descriptor found, sending message"; #endif AuthorizationManager::self()->d->server->sendReply( m_descriptorMap.value(id + uuid), response); } else { #ifndef NDEBUG kDebug() << "no valid entry in descriptormap."; #endif } } void ServiceProvider::ruleChanged(Plasma::AuthorizationRule *rule) { int i = 0; foreach (const Jolie::Message &message, m_messagesPendingAuthorization) { QByteArray id = JolieMessage::field(JolieMessage::Field::IDENTITYID, message); //Credentials identity = AuthorizationManager::self()->d->getCredentials(id); bool matches = rule->d->matches(message.resourcePath(), id); if (matches && rule->policy() == AuthorizationRule::PinRequired && JolieMessage::field(JolieMessage::Field::PIN, message) != rule->pin()) { #ifndef NDEBUG kDebug() << "we need a pin"; #endif authorizationFailed(message, JolieMessage::Error::REQUIREPIN); m_messagesPendingAuthorization.removeAt(i); return; /** } else if (matches && rule->policy() == AuthorizationRule::PinRequired) { #ifndef NDEBUG kDebug() << "AUTHORIZATION: Service is freely accessable for verified caller."; #endif rule->setPolicy(AuthorizationRule::Allow); authorizationSuccess(message); //TODO: it might be nicer to do a removeAll once Jolie::Message implements == m_messagesPendingAuthorization.removeAt(i); return; */ } else if (matches && rule->policy() == AuthorizationRule::Allow) { #ifndef NDEBUG kDebug() << "AUTHORIZATION: Service is freely accessable for verified caller."; #endif authorizationSuccess(message); //TODO: it might be nicer to do a removeAll once Jolie::Message implements == m_messagesPendingAuthorization.removeAt(i); return; } else if (matches && rule->policy() == AuthorizationRule::Deny) { #ifndef NDEBUG kDebug() << "AUTHORIZATION: Service is never accessable for verified caller."; #endif authorizationFailed(message, JolieMessage::Error::ACCESSDENIED); m_messagesPendingAuthorization.removeAt(i); return; } else { i++; } } } Jolie::Message ServiceProvider::appendToken(Jolie::Message message, const QByteArray &caller, const QByteArray &uuid) { m_tokens[caller + uuid] = QUuid::createUuid().toString().toAscii(); //kDebug() << "setting token: " << m_tokens[caller + uuid].toBase64() //<< " for caller: " << caller.toBase64() //<< " with uuid caller: " << uuid.toBase64(); Jolie::Value data = message.data(); data.children(JolieMessage::Field::TOKEN) << Jolie::Value(m_tokens[caller + uuid]); message.setData(data); return message; } void ServiceProvider::authorize(const Jolie::Message &message, const QByteArray &validToken) { #ifndef NDEBUG kDebug() << "VALIDATING MESSAGE:"; #endif //kDebug() << JolieMessage::print(message); //Authorization step 1: is the service accessable to all callers? In that case we can skip the //verification of the signature #ifndef NDEBUG kDebug() << "STEP1"; #endif AuthorizationRule *rule = AuthorizationManager::self()->d->matchingRule(message.resourcePath(), Credentials()); if (rule && rule->policy() == AuthorizationRule::Allow) { #ifndef NDEBUG kDebug() << "AUTHORIZATION: Service is freely accessable."; #endif authorizationSuccess(message); return; } else if (rule && rule->policy() == AuthorizationRule::Deny) { #ifndef NDEBUG kDebug() << "AUTHORIZATION: Service is never accessable."; #endif authorizationFailed(message, JolieMessage::Error::ACCESSDENIED); return; } //Authorization step 2: see if the token matches. If it doesn't we can't safely identify the //caller and are finished. #ifndef NDEBUG kDebug() << "STEP2"; #endif if (JolieMessage::field(JolieMessage::Field::TOKEN, message) != validToken && !validToken.isEmpty()) { #ifndef NDEBUG kDebug() << "AUTHORIZATION: Message token doesn't match."; #endif #ifndef NDEBUG kDebug() << "expected: " << validToken.toBase64(); #endif authorizationFailed(message, JolieMessage::Error::INVALIDTOKEN); return; } QByteArray payload = JolieMessage::payload(message); QByteArray signature = JolieMessage::field(JolieMessage::Field::SIGNATURE, message); Credentials identity = AuthorizationManager::self()->d->getCredentials( JolieMessage::field(JolieMessage::Field::IDENTITYID, message)); if (!identity.isValid()) { #ifndef NDEBUG kDebug() << "no identity"; #endif authorizationFailed(message, JolieMessage::Error::INVALIDTOKEN); return; } #ifndef NDEBUG kDebug() << "STEP3"; #endif //Authorization step 3: see if we have the key and can validate the signature. If we can't, //either the public key has changed, or somebody is doing something nasty, and we're finished. if ((!identity.isValidSignature(signature, payload))) { #ifndef NDEBUG kDebug() << "AUTHORIZATION: signature invalid."; #endif authorizationFailed(message, JolieMessage::Error::ACCESSDENIED); return; } #ifndef NDEBUG kDebug() << "STEP4"; #endif //Authorization step 4: if we have a valid signature, see if we've got a matching rule rule = AuthorizationManager::self()->d->matchingRule(message.resourcePath(), identity); if (rule && rule->policy() == AuthorizationRule::PinRequired) { #ifndef NDEBUG kDebug() << "we expect a pin!"; #endif QByteArray pin = JolieMessage::field(JolieMessage::Field::PIN, message); if (rule->pin() == QString(pin)) { authorizationSuccess(message); rule->setPolicy(AuthorizationRule::Allow); } else { authorizationFailed(message, JolieMessage::Error::ACCESSDENIED); AuthorizationManager::self()->d->rules.removeAll(rule); delete rule; } } else if (rule && rule->policy() == AuthorizationRule::Allow) { #ifndef NDEBUG kDebug() << "AUTHORIZATION: Service is freely accessable for validated sender."; #endif authorizationSuccess(message); return; } else if (rule && rule->policy() == AuthorizationRule::Deny) { #ifndef NDEBUG kDebug() << "AUTHORIZATION: Service is not accessable for validated sender."; #endif authorizationFailed(message, JolieMessage::Error::ACCESSDENIED); return; } else { //- let the shell set the rule matching this request: #ifndef NDEBUG kDebug() << "STEP6"; #endif #ifndef NDEBUG kDebug() << "leave it up to the authorization interface"; #endif m_messagesPendingAuthorization << message; AuthorizationRule *newRule = new AuthorizationRule(QString(message.resourcePath()), identity.id()); connect(newRule, SIGNAL(changed(Plasma::AuthorizationRule*)), this, SLOT(ruleChanged(Plasma::AuthorizationRule*))); AuthorizationManager::self()->d->rules.append(newRule); AuthorizationManager::self()->d->authorizationInterface->authorizationRequest(*newRule); } } void ServiceProvider::authorizationSuccess(const Jolie::Message &message) { #ifndef NDEBUG kDebug() << "message with operationName " << message.operationName() << " allowed!"; #endif //would be lovely if this kind of stuff could be autogenerated code from xml like in dbus //adaptors if (message.operationName() == "getOperations") { sendOperations(message); } else if (message.operationName() == "getEnabledOperations") { sendEnabledOperations(message); } else if (message.operationName() == "startOperationCall") { startOperationCall(message); } } void ServiceProvider::authorizationFailed(const Jolie::Message &message, const QByteArray &error) { #ifndef NDEBUG kDebug() << "message with operationName " << message.operationName() << " NOT allowed!"; #endif Jolie::Message response(message.resourcePath(), message.operationName(), message.id()); response.setFault(Jolie::Fault(error)); QByteArray id = JolieMessage::field(JolieMessage::Field::IDENTITYID, message); QByteArray uuid = JolieMessage::field(JolieMessage::Field::UUID, message); AuthorizationManager::self()->d->server->sendReply( m_descriptorMap.value(id + uuid), response); return; } } //namespace Plasma #include "moc_serviceprovider_p.cpp"