1 /* Copyright (c) 2007, Nokia Corporation
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are
8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * * Neither the name of the Nokia Corporation nor the names of its
14 * contributors may be used to endorse or promote products derived from
15 * this software without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
18 * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
19 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
20 * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
21 * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
22 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
23 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
24 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
25 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
26 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
27 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 #include <glib/gstdio.h>
33 #include <string.h> /* for strlen */
34 #include <modest-runtime.h>
35 #include <libgnomevfs/gnome-vfs.h>
36 #include <tny-fs-stream.h>
37 #include <tny-camel-account.h>
38 #include <tny-status.h>
39 #include <tny-camel-transport-account.h>
40 #include <tny-camel-imap-store-account.h>
41 #include <tny-camel-pop-store-account.h>
43 #include <modest-defs.h>
44 #include "modest-utils.h"
45 #include "modest-platform.h"
48 modest_utils_get_supported_secure_authentication_error_quark (void)
50 return g_quark_from_static_string("modest-utils-get-supported-secure-authentication-error-quark");
54 modest_utils_folder_writable (const gchar *filename)
56 g_return_val_if_fail (filename, FALSE);
61 if (g_strncasecmp (filename, "obex", 4) != 0) {
62 GnomeVFSFileInfo folder_info;
64 folder = g_path_get_dirname (filename);
65 gnome_vfs_get_file_info (folder, &folder_info,
66 GNOME_VFS_FILE_INFO_GET_ACCESS_RIGHTS);
68 if (!((folder_info.permissions & GNOME_VFS_PERM_ACCESS_WRITABLE) ||
69 (folder_info.permissions & GNOME_VFS_PERM_USER_WRITE))) {
77 modest_utils_file_exists (const gchar *filename)
79 GnomeVFSURI *uri = NULL;
80 gboolean result = FALSE;
82 uri = gnome_vfs_uri_new (filename);
84 result = gnome_vfs_uri_exists (uri);
85 gnome_vfs_uri_unref (uri);
91 modest_utils_create_temp_stream (const gchar *orig_name, const gchar *hash_base, gchar **path)
94 gchar *filepath = NULL;
98 /* hmmm... maybe we need a modest_text_utils_validate_file_name? */
99 g_return_val_if_fail (orig_name || strlen(orig_name) == 0, NULL);
100 if (strlen(orig_name) > 200) {
101 g_warning ("%s: filename too long ('%s')",
102 __FUNCTION__, orig_name);
106 if (g_strstr_len (orig_name, strlen(orig_name), "/") != NULL) {
107 g_warning ("%s: filename contains '/' character(s) (%s)",
108 __FUNCTION__, orig_name);
112 /* make a random subdir under /tmp or /var/tmp */
113 if (hash_base != NULL) {
114 hash_number = g_str_hash (hash_base);
116 hash_number = (guint) random ();
118 tmpdir = g_strdup_printf ("%s/%u", g_get_tmp_dir (), hash_number);
119 if ((g_access (tmpdir, R_OK) == -1) && (g_mkdir (tmpdir, 0755) == -1)) {
120 g_warning ("%s: failed to create dir '%s': %s",
121 __FUNCTION__, tmpdir, g_strerror(errno));
126 filepath = g_strconcat (tmpdir, "/", orig_name, NULL);
127 /* don't overwrite if it already exists, even if it is writable */
128 if (modest_utils_file_exists (filepath)) {
137 /* try to write the file there */
138 fd = g_open (filepath, O_CREAT|O_WRONLY|O_TRUNC, 0644);
140 g_warning ("%s: failed to create '%s': %s",
141 __FUNCTION__, filepath, g_strerror(errno));
153 return TNY_FS_STREAM (tny_fs_stream_new (fd));
163 } ModestGetSupportedAuthInfo;
165 static void on_camel_account_get_supported_secure_authentication_status (
166 GObject *self, TnyStatus *status, gpointer user_data)
168 /*ModestGetSupportedAuthInfo* info = (ModestGetSupportedAuthInfo*) user_data;*/
172 on_idle_secure_auth_finished (gpointer user_data)
174 ModestGetSupportedAuthInfo *info = (ModestGetSupportedAuthInfo*)user_data;
175 /* Operation has finished, close the dialog. Control continues after
176 * gtk_dialog_run in modest_utils_get_supported_secure_authentication_methods() */
178 /* This is a GDK lock because we are an idle callback and
179 * the code below is or does Gtk+ code */
181 gdk_threads_enter(); /* CHECKED */
182 gtk_dialog_response (GTK_DIALOG (info->dialog), GTK_RESPONSE_ACCEPT);
183 gdk_threads_leave(); /* CHECKED */
189 on_camel_account_get_supported_secure_authentication (
190 TnyCamelAccount *self, gboolean cancelled,
191 TnyList *auth_types, GError *err,
194 ModestGetSupportedAuthInfo *info = (ModestGetSupportedAuthInfo*)user_data;
195 g_return_if_fail (info);
198 /* Free everything if the actual action was canceled */
201 /* The operation was canceled and the ownership of the info given to us
202 * so that we could still check the cancel flag. */
203 g_slice_free (ModestGetSupportedAuthInfo, info);
211 g_error_free (info->error);
215 info->error = g_error_copy (err);
219 g_warning ("DEBUG: %s: auth_types is NULL.\n", __FUNCTION__);
221 else if (tny_list_get_length(auth_types) == 0) {
222 g_warning ("DEBUG: %s: auth_types is an empty TnyList.\n", __FUNCTION__);
225 ModestPairList* pairs = modest_protocol_info_get_auth_protocol_pair_list ();
227 /* Get the enum value for the strings: */
228 GList *result = NULL;
229 TnyIterator* iter = tny_list_create_iterator(auth_types);
230 while (!tny_iterator_is_done(iter)) {
231 TnyPair *pair = TNY_PAIR(tny_iterator_get_current(iter));
232 const gchar *auth_name = NULL;
234 auth_name = tny_pair_get_name(pair);
235 g_object_unref (pair);
239 printf("DEBUG: %s: auth_name=%s\n", __FUNCTION__, auth_name);
241 ModestAuthProtocol proto = modest_protocol_info_get_auth_protocol (auth_name);
242 if(proto != MODEST_PROTOCOL_AUTH_NONE)
243 result = g_list_prepend(result, GINT_TO_POINTER(proto));
245 tny_iterator_next(iter);
247 g_object_unref (iter);
249 modest_pair_list_free (pairs);
251 info->result = result;
254 printf("DEBUG: finished\n");
256 /* Close the dialog in a main thread */
257 g_idle_add(on_idle_secure_auth_finished, info);
262 on_secure_auth_cancel(GtkWidget* dialog, int response, gpointer user_data)
264 if(response == GTK_RESPONSE_REJECT || response == GTK_RESPONSE_DELETE_EVENT)
266 ModestGetSupportedAuthInfo *info = (ModestGetSupportedAuthInfo*)user_data;
267 g_return_if_fail(info);
268 /* This gives the ownership of the info to the worker thread. */
275 modest_utils_get_supported_secure_authentication_methods (ModestTransportStoreProtocol proto,
276 const gchar* hostname, gint port, const gchar* username, GtkWindow *parent_window, GError** error)
278 g_return_val_if_fail (proto != MODEST_PROTOCOL_TRANSPORT_STORE_UNKNOWN, NULL);
280 /* We need a connection to get the capabilities; */
281 if (!modest_platform_connect_and_wait (GTK_WINDOW (parent_window), NULL))
285 result = g_list_append (result, GINT_TO_POINTER (MODEST_PROTOCOL_AUTH_CRAMMD5));
288 /* Create a TnyCamelAccount so we can use
289 * tny_camel_account_get_supported_secure_authentication(): */
290 TnyAccount * tny_account = NULL;
292 case MODEST_PROTOCOL_TRANSPORT_SENDMAIL:
293 case MODEST_PROTOCOL_TRANSPORT_SMTP:
294 tny_account = TNY_ACCOUNT(tny_camel_transport_account_new ()); break;
295 case MODEST_PROTOCOL_STORE_POP:
296 tny_account = TNY_ACCOUNT(tny_camel_pop_store_account_new ()); break;
297 case MODEST_PROTOCOL_STORE_IMAP:
298 tny_account = TNY_ACCOUNT(tny_camel_imap_store_account_new ()); break;
299 case MODEST_PROTOCOL_STORE_MAILDIR:
300 case MODEST_PROTOCOL_STORE_MBOX:
301 tny_account = TNY_ACCOUNT(tny_camel_store_account_new()); break;
308 g_printerr ("%s could not create tny account.", __FUNCTION__);
312 /* Set proto, so that the prepare_func() vfunc will work when we call
314 /* TODO: Why isn't this done in account_new()? */
315 tny_account_set_proto (tny_account,
316 modest_protocol_info_get_transport_store_protocol_name(proto));
318 tny_account_set_hostname (tny_account, hostname);
319 /* Required for POP, at least */
320 tny_account_set_user (tny_account, username);
323 tny_account_set_port (tny_account, port);
325 /* Set the session for the account, so we can use it: */
326 ModestTnyAccountStore *account_store = modest_runtime_get_account_store ();
327 TnySessionCamel *session =
328 modest_tny_account_store_get_session (TNY_ACCOUNT_STORE (account_store));
329 g_return_val_if_fail (session, NULL);
330 tny_camel_account_set_session (TNY_CAMEL_ACCOUNT(tny_account), session);
333 /* Ask camel to ask the server, asynchronously: */
334 ModestGetSupportedAuthInfo *info = g_slice_new (ModestGetSupportedAuthInfo);
336 info->cancel = FALSE;
338 info->progress = gtk_progress_bar_new();
339 /* TODO: Need logical_ID for the title: */
340 info->dialog = gtk_dialog_new_with_buttons(_("Authentication"),
341 parent_window, GTK_DIALOG_MODAL,
342 _("mcen_bd_dialog_cancel"),
345 //gtk_window_set_default_size(GTK_WINDOW(info->dialog), 300, 100);
347 g_signal_connect(G_OBJECT(info->dialog), "response", G_CALLBACK(on_secure_auth_cancel), info);
349 gtk_container_add(GTK_CONTAINER(GTK_DIALOG(info->dialog)->vbox),
350 gtk_label_new("Checking for supported authentication types..."));
351 gtk_container_add(GTK_CONTAINER(GTK_DIALOG(info->dialog)->vbox), info->progress);
352 gtk_widget_show_all(info->dialog);
353 gtk_progress_bar_pulse(GTK_PROGRESS_BAR(info->progress));
355 printf ("DEBUG: %s: STARTING.\n", __FUNCTION__);
356 tny_camel_account_get_supported_secure_authentication (
357 TNY_CAMEL_ACCOUNT (tny_account),
358 on_camel_account_get_supported_secure_authentication,
359 on_camel_account_get_supported_secure_authentication_status,
362 gtk_dialog_run (GTK_DIALOG (info->dialog));
364 gtk_widget_destroy(info->dialog);
366 GList *result = info->result;
370 gchar * debug_url_string = tny_account_get_url_string (tny_account);
371 g_warning ("DEBUG: %s:\n error: %s\n account url: %s", __FUNCTION__, info->error->message,
373 g_free (debug_url_string);
375 g_propagate_error(error, info->error);
379 g_slice_free (ModestGetSupportedAuthInfo, info);
384 // Tell the caller that the operation was canceled so it can
387 modest_utils_get_supported_secure_authentication_error_quark(),
388 MODEST_UTILS_GET_SUPPORTED_SECURE_AUTHENTICATION_ERROR_CANCELED,
389 "User has canceled query");
396 modest_utils_show_dialog_and_forget (GtkWindow *parent_window,
399 gtk_window_set_transient_for (GTK_WINDOW (dialog), parent_window);
401 /* Destroy the dialog when it is closed: */
402 g_signal_connect_swapped (dialog,
404 G_CALLBACK (gtk_widget_destroy),
407 gtk_widget_show (GTK_WIDGET (dialog));
411 modest_utils_toggle_action_set_active_block_notify (GtkToggleAction *action, gboolean value)
413 GSList *proxies = NULL;
415 g_return_if_fail (GTK_IS_TOGGLE_ACTION (action));
417 for (proxies = gtk_action_get_proxies (GTK_ACTION (action));
418 proxies != NULL; proxies = g_slist_next (proxies)) {
419 GtkWidget *widget = (GtkWidget *) proxies->data;
420 gtk_action_block_activate_from (GTK_ACTION (action), widget);
423 gtk_toggle_action_set_active (action, value);
425 for (proxies = gtk_action_get_proxies (GTK_ACTION (action));
426 proxies != NULL; proxies = g_slist_next (proxies)) {
427 GtkWidget *widget = (GtkWidget *) proxies->data;
428 gtk_action_unblock_activate_from (GTK_ACTION (action), widget);