Revert fix for modest_text_utils_convert_buffer_to_html_start()
[modest] / src / modest-utils.c
1 /* Copyright (c) 2007, Nokia Corporation
2  * All rights reserved.
3  *
4  * Redistribution and use in source and binary forms, with or without
5  * modification, are permitted provided that the following conditions are
6  * met:
7  *
8  * * Redistributions of source code must retain the above copyright
9  *   notice, this list of conditions and the following disclaimer.
10  * * Redistributions in binary form must reproduce the above copyright
11  *   notice, this list of conditions and the following disclaimer in the
12  *   documentation and/or other materials provided with the distribution.
13  * * Neither the name of the Nokia Corporation nor the names of its
14  *   contributors may be used to endorse or promote products derived from
15  *   this software without specific prior written permission.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
18  * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
19  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
20  * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
21  * OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
22  * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
23  * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
24  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
25  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
26  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
27  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28  */
29
30 #include <glib.h>
31 #include <glib/gstdio.h>
32 #include <errno.h>
33 #include <string.h> /* for strlen */
34 #include <modest-runtime.h>
35 #include <libgnomevfs/gnome-vfs.h>
36 #include <tny-fs-stream.h>
37 #include <tny-camel-account.h>
38 #include <tny-status.h>
39 #include <tny-camel-transport-account.h>
40 #include <tny-camel-imap-store-account.h>
41 #include <tny-camel-pop-store-account.h>
42
43 #include <modest-defs.h>
44 #include "modest-utils.h"
45 #include "modest-platform.h"
46 #include <modest-local-folder-info.h>
47
48 GQuark
49 modest_utils_get_supported_secure_authentication_error_quark (void)
50 {
51         return g_quark_from_static_string("modest-utils-get-supported-secure-authentication-error-quark");
52 }
53
54 gboolean 
55 modest_utils_folder_writable (const gchar *filename)
56 {
57         g_return_val_if_fail (filename, FALSE);
58
59         if (!filename)
60                 return FALSE;
61         
62         if (g_strncasecmp (filename, "obex", 4) != 0) {
63                 GnomeVFSFileInfo *folder_info;
64                 gchar *folder;
65                 folder = g_path_get_dirname (filename);
66                 folder_info = gnome_vfs_file_info_new ();
67                 gnome_vfs_get_file_info (folder, folder_info,
68                                          GNOME_VFS_FILE_INFO_GET_ACCESS_RIGHTS);
69                 g_free (folder);
70                 if (!((folder_info->permissions & GNOME_VFS_PERM_ACCESS_WRITABLE) ||
71                       (folder_info->permissions & GNOME_VFS_PERM_USER_WRITE))) {
72                         return FALSE;
73                 }
74                 gnome_vfs_file_info_unref (folder_info);
75         }
76         return TRUE;
77 }
78
79 gboolean 
80 modest_utils_file_exists (const gchar *filename)
81 {
82         GnomeVFSURI *uri = NULL;
83         gboolean result = FALSE;
84
85         g_return_val_if_fail (filename, FALSE);
86         
87         uri = gnome_vfs_uri_new (filename);
88         if (uri) {
89                 result = gnome_vfs_uri_exists (uri);
90                 gnome_vfs_uri_unref (uri);
91         }
92         return result;
93 }
94
95 TnyFsStream *
96 modest_utils_create_temp_stream (const gchar *orig_name, const gchar *hash_base, gchar **path)
97 {
98         gint fd;
99         gchar *filepath = NULL;
100         gchar *tmpdir;
101         guint hash_number;
102
103         /* hmmm... maybe we need a modest_text_utils_validate_file_name? */
104         g_return_val_if_fail (orig_name && strlen(orig_name) != 0, NULL);
105
106         if (strlen(orig_name) > 200) {
107                 g_warning ("%s: filename too long ('%s')",
108                            __FUNCTION__, orig_name);
109                 return NULL;
110         }
111         
112         if (g_strstr_len (orig_name, strlen(orig_name), "/") != NULL) {
113                 g_warning ("%s: filename contains '/' character(s) (%s)",
114                            __FUNCTION__, orig_name);
115                 return NULL;
116         }
117                 
118         /* make a random subdir under /tmp or /var/tmp */
119         if (hash_base != NULL) {
120                 hash_number = g_str_hash (hash_base);
121         } else {
122                 hash_number = (guint) random ();
123         }
124         tmpdir = g_strdup_printf ("%s/%u", g_get_tmp_dir (), hash_number);
125         if ((g_access (tmpdir, R_OK) == -1) && (g_mkdir (tmpdir, 0755) == -1)) {
126                 g_warning ("%s: failed to create dir '%s': %s",
127                            __FUNCTION__, tmpdir, g_strerror(errno));
128                 g_free (tmpdir);
129                 return NULL;
130         }
131
132         filepath = g_strconcat (tmpdir, "/", orig_name, NULL);
133         /* don't overwrite if it already exists, even if it is writable */
134         if (modest_utils_file_exists (filepath)) {
135                 if (path!=NULL) {
136                         *path = filepath;
137                 } else {
138                         g_free (filepath);
139                 }
140                 g_free (tmpdir);
141                 return NULL;
142         } else {
143                 /* try to write the file there */
144                 fd = g_open (filepath, O_CREAT|O_WRONLY|O_TRUNC, 0644);
145                 if (fd == -1) {
146                         g_warning ("%s: failed to create '%s': %s",
147                                         __FUNCTION__, filepath, g_strerror(errno));                     
148                         g_free (filepath);
149                         g_free (tmpdir);
150                         return NULL;
151                 }
152         }
153
154         g_free (tmpdir);
155
156         if (path)
157                 *path = filepath;
158
159         return TNY_FS_STREAM (tny_fs_stream_new (fd));
160 }
161
162 typedef struct 
163 {
164         gboolean cancel;
165         GList *result;
166         GtkWidget* dialog;
167         GtkWidget* progress;
168         GError* error;
169 } ModestGetSupportedAuthInfo;
170
171 static void on_camel_account_get_supported_secure_authentication_status (
172         GObject *self, TnyStatus *status, gpointer user_data)
173 {
174         /*ModestGetSupportedAuthInfo* info = (ModestGetSupportedAuthInfo*) user_data;*/
175 }
176
177 static gboolean
178 on_idle_secure_auth_finished (gpointer user_data)
179 {
180         ModestGetSupportedAuthInfo *info = (ModestGetSupportedAuthInfo*)user_data;
181         /* Operation has finished, close the dialog. Control continues after
182          * gtk_dialog_run in modest_utils_get_supported_secure_authentication_methods() */
183
184         /* This is a GDK lock because we are an idle callback and
185          * the code below is or does Gtk+ code */
186
187         gdk_threads_enter(); /* CHECKED */
188         gtk_dialog_response (GTK_DIALOG (info->dialog), GTK_RESPONSE_ACCEPT);
189         gdk_threads_leave(); /* CHECKED */
190
191         return FALSE;
192 }
193
194 static void
195 on_camel_account_get_supported_secure_authentication (TnyCamelAccount *self, gboolean cancelled,
196         TnyList *auth_types, GError *err, gpointer user_data)
197 {
198         g_return_if_fail (TNY_IS_CAMEL_ACCOUNT(self));
199         g_return_if_fail (TNY_IS_LIST(auth_types));
200         
201         ModestGetSupportedAuthInfo *info = (ModestGetSupportedAuthInfo*)user_data;
202         g_return_if_fail (info);
203         
204
205         /* Free everything if the actual action was canceled */
206         if (info->cancel) {
207                 /* The operation was canceled and the ownership of the info given to us
208                  * so that we could still check the cancel flag. */
209                 g_slice_free (ModestGetSupportedAuthInfo, info);
210                 info = NULL;
211         }
212         else
213         {
214                 if (err) {
215                         if (info->error) {
216                                 g_error_free (info->error);
217                                 info->error = NULL;
218                         }
219                         
220                         info->error = g_error_copy (err);
221                 }
222
223                 if (!auth_types) {
224                         g_warning ("DEBUG: %s: auth_types is NULL.\n", __FUNCTION__);
225                 }
226                 else if (tny_list_get_length(auth_types) == 0) 
227                         g_warning ("DEBUG: %s: auth_types is an empty TnyList.\n", __FUNCTION__);
228                 else {
229                         ModestPairList* pairs = modest_protocol_info_get_auth_protocol_pair_list ();
230   
231                         /* Get the enum value for the strings: */
232                         GList *result = NULL;
233                         TnyIterator* iter = tny_list_create_iterator(auth_types);
234                         while (!tny_iterator_is_done(iter)) {
235                                 TnyPair *pair = TNY_PAIR(tny_iterator_get_current(iter));
236                                 const gchar *auth_name = NULL;
237                                 if (pair) {
238                                         auth_name = tny_pair_get_name(pair);
239                                         g_object_unref (pair);
240                                         pair = NULL;
241                                 }
242
243                                 printf("DEBUG: %s: auth_name=%s\n", __FUNCTION__, auth_name);
244
245                                 ModestAuthProtocol proto = modest_protocol_info_get_auth_protocol (auth_name);
246                                 if(proto != MODEST_PROTOCOL_AUTH_NONE)
247                                                 result = g_list_prepend(result, GINT_TO_POINTER(proto));
248
249                                 tny_iterator_next(iter);
250                         }
251                         g_object_unref (iter);
252
253                         modest_pair_list_free (pairs);
254         
255                         info->result = result;
256                 }
257
258                 printf("DEBUG: finished\n");
259                                 
260                 /* Close the dialog in a main thread */
261                 g_idle_add(on_idle_secure_auth_finished, info);
262         }
263 }
264
265 static void
266 on_secure_auth_cancel(GtkWidget* dialog, int response, gpointer user_data)
267 {
268         g_return_if_fail (GTK_IS_WIDGET(dialog));
269         
270         if(response == GTK_RESPONSE_REJECT || response == GTK_RESPONSE_DELETE_EVENT) {
271                 ModestGetSupportedAuthInfo *info = (ModestGetSupportedAuthInfo*)user_data;
272                 g_return_if_fail(info);
273                 /* This gives the ownership of the info to the worker thread. */
274                 info->result = NULL;
275                 info->cancel = TRUE;
276         }
277 }
278
279 GList*
280 modest_utils_get_supported_secure_authentication_methods (ModestTransportStoreProtocol proto, 
281         const gchar* hostname, gint port, const gchar* username, GtkWindow *parent_window, GError** error)
282 {
283         g_return_val_if_fail (proto != MODEST_PROTOCOL_TRANSPORT_STORE_UNKNOWN, NULL);
284         
285         /* We need a connection to get the capabilities; */
286         if (!modest_platform_connect_and_wait (GTK_WINDOW (parent_window), NULL))
287                 return NULL;
288          
289         /*
290         result = g_list_append (result, GINT_TO_POINTER (MODEST_PROTOCOL_AUTH_CRAMMD5));
291         */
292         
293         /* Create a TnyCamelAccount so we can use 
294          * tny_camel_account_get_supported_secure_authentication(): */
295         TnyAccount * tny_account = NULL;
296         switch (proto) {
297         case MODEST_PROTOCOL_TRANSPORT_SENDMAIL:
298         case MODEST_PROTOCOL_TRANSPORT_SMTP:
299                 tny_account = TNY_ACCOUNT(tny_camel_transport_account_new ()); break;
300         case MODEST_PROTOCOL_STORE_POP:
301                 tny_account = TNY_ACCOUNT(tny_camel_pop_store_account_new ()); break;
302         case MODEST_PROTOCOL_STORE_IMAP:
303                 tny_account = TNY_ACCOUNT(tny_camel_imap_store_account_new ()); break;
304         case MODEST_PROTOCOL_STORE_MAILDIR:
305         case MODEST_PROTOCOL_STORE_MBOX:
306                 tny_account = TNY_ACCOUNT(tny_camel_store_account_new()); break;
307         default:
308                 tny_account = NULL;
309         }
310
311         
312         if (!tny_account) {
313                 g_printerr ("%s could not create tny account.", __FUNCTION__);
314                 return NULL;
315         }
316         
317         /* Set proto, so that the prepare_func() vfunc will work when we call 
318          * set_session(): */
319          /* TODO: Why isn't this done in account_new()? */
320         tny_account_set_proto (tny_account,
321                                modest_protocol_info_get_transport_store_protocol_name(proto));
322
323         tny_account_set_hostname (tny_account, hostname);
324         /* Required for POP, at least */
325         tny_account_set_user (tny_account, username);
326                                
327         if(port > 0)
328                 tny_account_set_port (tny_account, port);
329                 
330         /* Set the session for the account, so we can use it: */
331         ModestTnyAccountStore *account_store = modest_runtime_get_account_store ();
332         TnySessionCamel *session = 
333                 modest_tny_account_store_get_session (TNY_ACCOUNT_STORE (account_store));
334         g_return_val_if_fail (session, NULL);
335         tny_camel_account_set_session (TNY_CAMEL_ACCOUNT(tny_account), session);
336         
337         
338         /* Ask camel to ask the server, asynchronously: */
339         ModestGetSupportedAuthInfo *info = g_slice_new (ModestGetSupportedAuthInfo);
340         info->result = NULL;
341         info->cancel = FALSE;
342         info->error = NULL;
343         info->progress = gtk_progress_bar_new();
344         /* TODO: Need logical_ID for the title: */
345         info->dialog = gtk_dialog_new_with_buttons(_("Authentication"),
346                                                    parent_window, GTK_DIALOG_MODAL,
347                                                    _("mcen_bd_dialog_cancel"),
348                                                    GTK_RESPONSE_REJECT,
349                                                    NULL);
350         //gtk_window_set_default_size(GTK_WINDOW(info->dialog), 300, 100);
351         
352         g_signal_connect(G_OBJECT(info->dialog), "response", G_CALLBACK(on_secure_auth_cancel), info);
353         
354         gtk_container_add(GTK_CONTAINER(GTK_DIALOG(info->dialog)->vbox),
355                           gtk_label_new("Checking for supported authentication types..."));
356         gtk_container_add(GTK_CONTAINER(GTK_DIALOG(info->dialog)->vbox), info->progress);
357         gtk_widget_show_all(info->dialog);
358         gtk_progress_bar_pulse(GTK_PROGRESS_BAR(info->progress));
359         
360         printf ("DEBUG: %s: STARTING.\n", __FUNCTION__);
361         tny_camel_account_get_supported_secure_authentication (
362                 TNY_CAMEL_ACCOUNT (tny_account),
363                 on_camel_account_get_supported_secure_authentication,
364                 on_camel_account_get_supported_secure_authentication_status,
365                 info);
366
367         gtk_dialog_run (GTK_DIALOG (info->dialog));
368         
369         gtk_widget_destroy(info->dialog);
370                         
371         GList *result = info->result;
372         if (!info->cancel)
373         {
374                 if (info->error) {
375                         gchar * debug_url_string = tny_account_get_url_string  (tny_account);
376                         g_warning ("DEBUG: %s:\n  error: %s\n  account url: %s", __FUNCTION__, info->error->message, 
377                                 debug_url_string);
378                         g_free (debug_url_string);
379                         
380                         g_propagate_error(error, info->error);
381                         info->error = NULL;
382                 }
383
384                 g_slice_free (ModestGetSupportedAuthInfo, info);
385                 info = NULL;
386         }
387         else
388         {
389                 // Tell the caller that the operation was canceled so it can
390                 // make a difference
391                 g_set_error(error,
392                             modest_utils_get_supported_secure_authentication_error_quark(),
393                             MODEST_UTILS_GET_SUPPORTED_SECURE_AUTHENTICATION_ERROR_CANCELED,
394                             "User has canceled query");
395         }
396
397         return result;
398 }
399
400 void 
401 modest_utils_show_dialog_and_forget (GtkWindow *parent_window, 
402                                      GtkDialog *dialog)
403 {
404         g_return_if_fail (GTK_IS_WINDOW(parent_window));
405         g_return_if_fail (GTK_IS_DIALOG(dialog));
406
407         gtk_window_set_transient_for (GTK_WINDOW (dialog), parent_window);
408         
409         /* Destroy the dialog when it is closed: */
410         g_signal_connect_swapped (dialog, 
411                                   "response", 
412                                   G_CALLBACK (gtk_widget_destroy), 
413                                   dialog);
414
415         gtk_widget_show (GTK_WIDGET (dialog));
416 }
417
418 void
419 modest_utils_toggle_action_set_active_block_notify (GtkToggleAction *action, gboolean value)
420 {
421         GSList *proxies = NULL;
422
423         g_return_if_fail (GTK_IS_TOGGLE_ACTION (action));
424
425         for (proxies = gtk_action_get_proxies (GTK_ACTION (action));
426              proxies != NULL; proxies = g_slist_next (proxies)) {
427                 GtkWidget *widget = (GtkWidget *) proxies->data;
428                 gtk_action_block_activate_from (GTK_ACTION (action), widget);
429         }
430
431         gtk_toggle_action_set_active (action, value);
432
433         for (proxies = gtk_action_get_proxies (GTK_ACTION (action));
434              proxies != NULL; proxies = g_slist_next (proxies)) {
435                 GtkWidget *widget = (GtkWidget *) proxies->data;
436                 gtk_action_unblock_activate_from (GTK_ACTION (action), widget);
437         }
438
439 }
440
441
442 gint 
443 modest_list_index (TnyList *list, GObject *object)
444 {
445         TnyIterator *iter;
446         gint index = 0;
447
448         g_return_val_if_fail (TNY_IS_LIST(list), -1);
449         g_return_val_if_fail (G_IS_OBJECT(object), -1);
450         
451         iter = tny_list_create_iterator (list);
452         while (!tny_iterator_is_done (iter)) {
453                 GObject *current = tny_iterator_get_current (iter);
454
455                 g_object_unref (current);
456                 if (current == object)
457                         break;
458
459                 tny_iterator_next (iter);
460                 index++;
461         }
462
463         if (tny_iterator_is_done (iter))
464                 index = -1;
465         g_object_unref (iter);
466         return index;
467 }
468
469 guint64 
470 modest_folder_available_space (const gchar *maildir_path)
471 {
472         gchar *folder;
473         gchar *uri_string;
474         GnomeVFSURI *uri;
475         GnomeVFSFileSize size;
476
477         folder = modest_local_folder_info_get_maildir_path (maildir_path);
478         uri_string = gnome_vfs_get_uri_from_local_path (folder);
479         uri = gnome_vfs_uri_new (uri_string);
480         g_free (folder);
481         g_free (uri_string);
482
483         if (uri) {
484                 if (gnome_vfs_get_volume_free_space (uri, &size) != GNOME_VFS_OK)
485                         size = -1;
486                 gnome_vfs_uri_unref (uri);
487         } else {
488                 size = -1;
489         }
490
491         return (guint64) size;
492 }