Page Menu
Home
GnuPG
Search
Configure Global Search
Log In
Files
F35401158
No One
Temporary
Actions
View File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Award Token
Size
15 KB
Subscribers
None
View Options
diff --git a/crypto/decryptverifyfilescontroller.cpp b/crypto/decryptverifyfilescontroller.cpp
index 778126bac..9cf02e41b 100644
--- a/crypto/decryptverifyfilescontroller.cpp
+++ b/crypto/decryptverifyfilescontroller.cpp
@@ -1,421 +1,423 @@
- /* -*- mode: c++; c-basic-offset:4 -*-
+/* -*- mode: c++; c-basic-offset:4 -*-
decryptverifyfilescontroller.cpp
This file is part of Kleopatra, the KDE keymanager
Copyright (c) 2008 Klarälvdalens Datakonsult AB
Kleopatra is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
Kleopatra is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
In addition, as a special exception, the copyright holders give
permission to link the code of this program with any edition of
the Qt library by Trolltech AS, Norway (or with modified versions
of Qt that use the same license as Qt), and distribute linked
combinations including the two. You must obey the GNU General
Public License in all respects for all of the code used other than
Qt. If you modify this file, you may extend this exception to
your version of the file, but you are not obligated to do so. If
you do not wish to do so, delete this exception statement from
your version.
*/
#include <config-kleopatra.h>
#include "decryptverifyfilescontroller.h"
#include <crypto/gui/decryptverifyoperationwidget.h>
#include <crypto/gui/decryptverifyfileswizard.h>
#include <crypto/decryptverifytask.h>
#include <crypto/taskcollection.h>
#include <utils/classify.h>
#include <utils/gnupg-helper.h>
#include <utils/input.h>
#include <utils/output.h>
#include <utils/kleo_assert.h>
#include <KDebug>
#include <KLocalizedString>
#include <QDir>
#include <QFile>
#include <QFileInfo>
#include <QPointer>
#include <QTimer>
#include <boost/shared_ptr.hpp>
#include <memory>
#include <vector>
using namespace boost;
using namespace GpgME;
using namespace Kleo;
using namespace Kleo::Crypto;
using namespace Kleo::Crypto::Gui;
class DecryptVerifyFilesController::Private {
DecryptVerifyFilesController* const q;
public:
static QString heuristicBaseDirectory( const QStringList& fileNames );
static shared_ptr<AbstractDecryptVerifyTask> taskFromOperationWidget( const DecryptVerifyOperationWidget * w, const shared_ptr<QFile> & file, const QDir & outDir, const shared_ptr<OverwritePolicy> & overwritePolicy );
explicit Private( DecryptVerifyFilesController* qq );
void slotWizardOperationPrepared();
void slotWizardCanceled();
void schedule();
std::vector< shared_ptr<QFile> > prepareWizardFromPassedFiles();
std::vector<shared_ptr<Task> > buildTasks( const std::vector<shared_ptr<QFile> > &, const shared_ptr<OverwritePolicy> & );
QString heuristicBaseDirectory() const;
void ensureWizardCreated();
void ensureWizardVisible();
void reportError( int err, const QString & details ) {
emit q->error( err, details );
}
void cancelAllTasks();
std::vector<shared_ptr<QFile> > m_passedFiles, m_filesAfterPreparation;
QPointer<DecryptVerifyFilesWizard> m_wizard;
std::vector<shared_ptr<const DecryptVerifyResult> > m_results;
std::vector<shared_ptr<Task> > m_runnableTasks, m_completedTasks;
shared_ptr<Task> m_runningTask;
bool m_errorDetected;
DecryptVerifyOperation m_operation;
};
// static
shared_ptr<AbstractDecryptVerifyTask> DecryptVerifyFilesController::Private::taskFromOperationWidget( const DecryptVerifyOperationWidget * w, const shared_ptr<QFile> & file, const QDir & outDir, const shared_ptr<OverwritePolicy> & overwritePolicy ) {
kleo_assert( w );
shared_ptr<AbstractDecryptVerifyTask> task;
switch ( w->mode() ) {
case DecryptVerifyOperationWidget::VerifyDetachedWithSignature:
{
shared_ptr<VerifyDetachedTask> t( new VerifyDetachedTask );
t->setInput( Input::createFromFile( file ) );
t->setSignedData( Input::createFromFile( w->signedDataFileName() ) );
task = t;
kleo_assert( file->fileName() == w->inputFileName() );
}
break;
case DecryptVerifyOperationWidget::VerifyDetachedWithSignedData:
{
shared_ptr<VerifyDetachedTask> t( new VerifyDetachedTask );
t->setInput( Input::createFromFile( w->inputFileName() ) );
t->setSignedData( Input::createFromFile( file ) );
task = t;
kleo_assert( file->fileName() == w->signedDataFileName() );
}
break;
case DecryptVerifyOperationWidget::DecryptVerifyOpaque:
{
shared_ptr<DecryptVerifyTask> t( new DecryptVerifyTask );
t->setInput( Input::createFromFile( file ) );
t->setOutput( Output::createFromFile( outDir.absoluteFilePath( outputFileName( QFileInfo( file->fileName() ).fileName() ) ), overwritePolicy ) );
task = t;
kleo_assert( file->fileName() == w->inputFileName() );
}
break;
}
task->autodetectProtocolFromInput();
return task;
}
DecryptVerifyFilesController::Private::Private( DecryptVerifyFilesController* qq ) : q( qq ), m_errorDetected( false ), m_operation( DecryptVerify )
{
qRegisterMetaType<VerificationResult>();
}
void DecryptVerifyFilesController::Private::slotWizardOperationPrepared()
{
try {
ensureWizardCreated();
std::vector<shared_ptr<Task> > tasks = buildTasks( m_filesAfterPreparation, shared_ptr<OverwritePolicy>( new OverwritePolicy( m_wizard ) ) );
kleo_assert( m_runnableTasks.empty() );
m_runnableTasks.swap( tasks );
shared_ptr<TaskCollection> coll( new TaskCollection );
Q_FOREACH( const shared_ptr<Task> & i, m_runnableTasks )
q->connectTask( i );
coll->setTasks( m_runnableTasks );
m_wizard->setTaskCollection( coll );
QTimer::singleShot( 0, q, SLOT( schedule() ) );
} catch ( const Kleo::Exception & e ) {
reportError( e.error().encodedError(), e.message() );
} catch ( const std::exception & e ) {
reportError( gpg_error( GPG_ERR_UNEXPECTED ),
i18n("Caught unexpected exception in DecryptVerifyFilesController::Private::slotWizardOperationPrepared: %1",
QString::fromLocal8Bit( e.what() ) ) );
} catch ( ... ) {
reportError( gpg_error( GPG_ERR_UNEXPECTED ),
i18n("Caught unknown exception in DecryptVerifyFilesController::Private::slotWizardOperationPrepared") );
}
}
void DecryptVerifyFilesController::Private::slotWizardCanceled()
{
kDebug();
reportError( gpg_error( GPG_ERR_CANCELED ), i18n("User canceled") );
}
void DecryptVerifyFilesController::doTaskDone( const Task* task, const shared_ptr<const Task::Result> & result )
{
assert( task );
assert( task == d->m_runningTask.get() );
// We could just delete the tasks here, but we can't use
// Qt::QueuedConnection here (we need sender()) and other slots
// might not yet have executed. Therefore, we push completed tasks
// into a burial container
d->m_completedTasks.push_back( d->m_runningTask );
d->m_runningTask.reset();
if ( const shared_ptr<const DecryptVerifyResult> & dvr = boost::dynamic_pointer_cast<const DecryptVerifyResult>( result ) )
d->m_results.push_back( dvr );
QTimer::singleShot( 0, this, SLOT(schedule()) );
}
void DecryptVerifyFilesController::Private::schedule()
{
if ( !m_runningTask && !m_runnableTasks.empty() ) {
const shared_ptr<Task> t = m_runnableTasks.back();
m_runnableTasks.pop_back();
t->start();
m_runningTask = t;
}
if ( !m_runningTask ) {
kleo_assert( m_runnableTasks.empty() );
Q_FOREACH ( const shared_ptr<const DecryptVerifyResult> & i, m_results )
emit q->verificationResult( i->verificationResult() );
q->emitDoneOrError();
}
}
void DecryptVerifyFilesController::Private::ensureWizardCreated()
{
if ( m_wizard )
return;
std::auto_ptr<DecryptVerifyFilesWizard> w( new DecryptVerifyFilesWizard );
w->setWindowTitle( i18n( "Decrypt/Verify Files" ) );
w->setAttribute( Qt::WA_DeleteOnClose );
connect( w.get(), SIGNAL(operationPrepared()), q, SLOT(slotWizardOperationPrepared()), Qt::QueuedConnection );
connect( w.get(), SIGNAL(canceled()), q, SLOT(slotWizardCanceled()), Qt::QueuedConnection );
m_wizard = w.release();
}
std::vector<shared_ptr<QFile> > DecryptVerifyFilesController::Private::prepareWizardFromPassedFiles()
{
ensureWizardCreated();
std::vector< shared_ptr<QFile> > files;
unsigned int counter = 0;
Q_FOREACH( const shared_ptr<QFile> & file, m_passedFiles ) {
kleo_assert( file );
const QString fname = file->fileName();
kleo_assert( !fname.isEmpty() );
const unsigned int classification = classify( fname );
if ( mayBeOpaqueSignature( classification ) || mayBeCipherText( classification ) || mayBeDetachedSignature( classification ) ) {
DecryptVerifyOperationWidget * const op = m_wizard->operationWidget( counter++ );
kleo_assert( op != 0 );
if ( mayBeOpaqueSignature( classification ) || mayBeCipherText( classification ) )
op->setMode( DecryptVerifyOperationWidget::DecryptVerifyOpaque );
else
op->setMode( DecryptVerifyOperationWidget::VerifyDetachedWithSignature );
op->setInputFileName( fname );
op->setSignedDataFileName( findSignedData( fname ) );
files.push_back( file );
} else {
// probably the signed data file was selected:
- QStringList signatures = findSignatures( fname );
+ const QStringList signatures = findSignatures( fname );
if ( signatures.empty() ) {
// We are assuming this is a detached signature file, but
// there were no signature files for it. Let's guess it's encrypted after all.
// ### FIXME once we have a proper heuristic for this, this should move into
// classify() and/or classifyContent()
DecryptVerifyOperationWidget * const op = m_wizard->operationWidget( counter++ );
kleo_assert( op != 0 );
op->setMode( DecryptVerifyOperationWidget::DecryptVerifyOpaque );
op->setInputFileName( fname );
files.push_back( file );
- }
+ } else {
- Q_FOREACH( const QString s, signatures ) {
- DecryptVerifyOperationWidget * op = m_wizard->operationWidget( counter++ );
- kleo_assert( op != 0 );
+ Q_FOREACH( const QString & s, signatures ) {
+ DecryptVerifyOperationWidget * op = m_wizard->operationWidget( counter++ );
+ kleo_assert( op != 0 );
- op->setMode( DecryptVerifyOperationWidget::VerifyDetachedWithSignedData );
- op->setInputFileName( s );
- op->setSignedDataFileName( fname );
+ op->setMode( DecryptVerifyOperationWidget::VerifyDetachedWithSignedData );
+ op->setInputFileName( s );
+ op->setSignedDataFileName( fname );
+
+ files.push_back( file );
+ }
- files.push_back( file );
}
}
}
kleo_assert( counter == files.size() );
if ( !counter )
throw Kleo::Exception( makeGnuPGError( GPG_ERR_ASS_NO_INPUT ), i18n("No usable inputs found") );
m_wizard->setOutputDirectory( heuristicBaseDirectory() );
return files;
}
std::vector< shared_ptr<Task> > DecryptVerifyFilesController::Private::buildTasks( const std::vector<shared_ptr<QFile> > & files, const shared_ptr<OverwritePolicy> & overwritePolicy )
{
const bool useOutDir = m_wizard->useOutputDirectory();
const QFileInfo outDirInfo( m_wizard->outputDirectory() );
kleo_assert( !useOutDir || outDirInfo.isDir() );
const QDir outDir( outDirInfo.absoluteFilePath() );
kleo_assert( !useOutDir || outDir.exists() );
std::vector<shared_ptr<Task> > tasks;
for ( unsigned int i = 0 ; i < files.size(); ++i )
try {
const QDir fileDir = QFileInfo( *files[i] ).absoluteDir();
kleo_assert( fileDir.exists() );
tasks.push_back( taskFromOperationWidget( m_wizard->operationWidget( i ), files[i], useOutDir ? outDir : fileDir, overwritePolicy ) );
} catch ( const GpgME::Exception & e ) {
tasks.push_back( Task::makeErrorTask( e.error().code(), QString::fromLocal8Bit( e.what() ), QFileInfo( *files[i] ).fileName() ) );
}
return tasks;
}
void DecryptVerifyFilesController::setFiles( const std::vector<boost::shared_ptr<QFile> >& files )
{
d->m_passedFiles = files;
}
void DecryptVerifyFilesController::Private::ensureWizardVisible()
{
ensureWizardCreated();
q->bringToForeground( m_wizard );
}
DecryptVerifyFilesController::DecryptVerifyFilesController( QObject* parent ) : Controller( parent ), d( new Private( this ) )
{
}
DecryptVerifyFilesController::DecryptVerifyFilesController( const shared_ptr<const ExecutionContext> & ctx, QObject* parent ) : Controller( ctx, parent ), d( new Private( this ) )
{
}
DecryptVerifyFilesController::~DecryptVerifyFilesController() { kDebug(); }
void DecryptVerifyFilesController::start()
{
d->m_filesAfterPreparation = d->prepareWizardFromPassedFiles();
d->ensureWizardVisible();
}
static QString commonPrefix( const QString & s1, const QString & s2 ) {
return QString( s1.data(), std::mismatch( s1.data(), s1.data() + std::min( s1.size(), s2.size() ), s2.data() ).first - s1.data() );
}
static QString longestCommonPrefix( const QStringList & sl ) {
if ( sl.empty() )
return QString();
QString result = sl.front();
Q_FOREACH( const QString & s, sl )
result = commonPrefix( s, result );
return result;
}
QString DecryptVerifyFilesController::Private::heuristicBaseDirectory() const {
QStringList fileNames;
Q_FOREACH ( const shared_ptr<QFile> & i, m_passedFiles )
fileNames.push_back( i->fileName() );
return heuristicBaseDirectory( fileNames );
}
QString DecryptVerifyFilesController::Private::heuristicBaseDirectory( const QStringList& fileNames ) {
const QString candidate = longestCommonPrefix( fileNames );
const QFileInfo fi( candidate );
if ( fi.isDir() )
return candidate;
else
return fi.absolutePath();
}
void DecryptVerifyFilesController::setOperation( DecryptVerifyOperation op )
{
d->m_operation = op;
}
DecryptVerifyOperation DecryptVerifyFilesController::operation() const
{
return d->m_operation;
}
void DecryptVerifyFilesController::Private::cancelAllTasks() {
// we just kill all runnable tasks - this will not result in
// signal emissions.
m_runnableTasks.clear();
// a cancel() will result in a call to
if ( m_runningTask )
m_runningTask->cancel();
}
void DecryptVerifyFilesController::cancel()
{
kDebug();
try {
d->m_errorDetected = true;
if ( d->m_wizard )
d->m_wizard->close();
d->cancelAllTasks();
} catch ( const std::exception & e ) {
qDebug( "Caught exception: %s", e.what() );
}
}
#include "decryptverifyfilescontroller.moc"
File Metadata
Details
Attached
Mime Type
text/x-diff
Expires
Sat, Feb 7, 5:31 PM (1 d, 10 h)
Storage Engine
local-disk
Storage Format
Raw Data
Storage Handle
11/75/cbd2c1bf7980123432039409e3b9
Attached To
rKLEOPATRA Kleopatra
Event Timeline
Log In to Comment