Blame src/goabackend/goaoauthprovider.c

Packit 79f644
/* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*- */
Packit 79f644
/*
Packit 79f644
 * Copyright © 2011 – 2017 Red Hat, Inc.
Packit 79f644
 *
Packit 79f644
 * This library is free software; you can redistribute it and/or
Packit 79f644
 * modify it under the terms of the GNU Lesser General Public
Packit 79f644
 * License as published by the Free Software Foundation; either
Packit 79f644
 * version 2 of the License, or (at your option) any later version.
Packit 79f644
 *
Packit 79f644
 * This library is distributed in the hope that it will be useful,
Packit 79f644
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
Packit 79f644
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
Packit 79f644
 * Lesser General Public License for more details.
Packit 79f644
 *
Packit 79f644
 * You should have received a copy of the GNU Lesser General
Packit 79f644
 * Public License along with this library; if not, see <http://www.gnu.org/licenses/>.
Packit 79f644
 */
Packit 79f644
Packit 79f644
#include "config.h"
Packit 79f644
#include <glib/gi18n-lib.h>
Packit 79f644
#include <stdlib.h>
Packit 79f644
Packit 79f644
#include <rest/oauth-proxy.h>
Packit 79f644
#include <libsoup/soup.h>
Packit 79f644
#include <json-glib/json-glib.h>
Packit 79f644
#include <webkit2/webkit2.h>
Packit 79f644
Packit 79f644
#include "goaprovider.h"
Packit 79f644
#include "goautils.h"
Packit 79f644
#include "goawebview.h"
Packit 79f644
#include "goaoauthprovider.h"
Packit 79f644
#include "goasouplogger.h"
Packit 79f644
Packit 79f644
/**
Packit 79f644
 * SECTION:goaoauthprovider
Packit 79f644
 * @title: GoaOAuthProvider
Packit 79f644
 * @short_description: Abstract base class for OAuth 1.0a providers
Packit 79f644
 *
Packit 79f644
 * #GoaOAuthProvider is an abstract base class for OAuth 1.0a
Packit 79f644
 * compliant implementations as defined by 
Packit 79f644
 * url="http://tools.ietf.org/html/rfc5849">RFC
Packit 79f644
 * 5849</ulink>. Additionally, the code works with providers
Packit 79f644
 * implementing 
Packit 79f644
 * url="http://oauth.googlecode.com/svn/spec/ext/session/1.0/drafts/1/spec.html">OAuth
Packit 79f644
 * Session 1.0 Draft 1</ulink> for refreshing access tokens.
Packit 79f644
 *
Packit 79f644
 * Subclasses must implement
Packit 79f644
 * #GoaOAuthProviderClass.get_consumer_key,
Packit 79f644
 * #GoaOAuthProviderClass.get_consumer_secret,
Packit 79f644
 * #GoaOAuthProviderClass.get_request_uri,
Packit 79f644
 * #GoaOAuthProviderClass.get_authorization_uri,
Packit 79f644
 * #GoaOAuthProviderClass.get_token_uri,
Packit 79f644
 * #GoaOAuthProviderClass.get_callback_uri and
Packit 79f644
 * #GoaOAuthProviderClass.get_identity_sync methods.
Packit 79f644
 *
Packit 79f644
 * Additionally, the
Packit 79f644
 * #GoaProviderClass.get_provider_type,
Packit 79f644
 * #GoaProviderClass.get_provider_name,
Packit 79f644
 * #GoaProviderClass.build_object (this should chain up to its
Packit 79f644
 * parent class) methods must be implemented.
Packit 79f644
 *
Packit 79f644
 * Note that the #GoaProviderClass.add_account,
Packit 79f644
 * #GoaProviderClass.refresh_account and
Packit 79f644
 * #GoaProviderClass.ensure_credentials_sync methods do not
Packit 79f644
 * need to be implemented - this type implements these methods.
Packit 79f644
 */
Packit 79f644
Packit 79f644
G_LOCK_DEFINE_STATIC (provider_lock);
Packit 79f644
Packit 79f644
G_DEFINE_ABSTRACT_TYPE (GoaOAuthProvider, goa_oauth_provider, GOA_TYPE_PROVIDER);
Packit 79f644
Packit 79f644
static gboolean
Packit 79f644
is_authorization_error (GError *error)
Packit 79f644
{
Packit 79f644
  gboolean ret;
Packit 79f644
Packit 79f644
  g_return_val_if_fail (error != NULL, FALSE);
Packit 79f644
Packit 79f644
  ret = FALSE;
Packit 79f644
  if (error->domain == REST_PROXY_ERROR || error->domain == SOUP_HTTP_ERROR)
Packit 79f644
    {
Packit 79f644
      if (SOUP_STATUS_IS_CLIENT_ERROR (error->code))
Packit 79f644
        ret = TRUE;
Packit 79f644
    }
Packit 79f644
  return ret;
Packit 79f644
}
Packit 79f644
Packit 79f644
/* ---------------------------------------------------------------------------------------------------- */
Packit 79f644
Packit 79f644
static gboolean
Packit 79f644
goa_oauth_provider_get_use_mobile_browser_default (GoaOAuthProvider  *provider)
Packit 79f644
{
Packit 79f644
  return FALSE;
Packit 79f644
}
Packit 79f644
Packit 79f644
/**
Packit 79f644
 * goa_oauth_provider_get_use_mobile_browser:
Packit 79f644
 * @provider: A #GoaOAuthProvider.
Packit 79f644
 *
Packit 79f644
 * Returns whether there is a need for the embedded browser to identify
Packit 79f644
 * itself as running on a mobile phone in order to get a more compact
Packit 79f644
 * version of the approval page.
Packit 79f644
 *
Packit 79f644
 * This is a virtual method where the default implementation returns
Packit 79f644
 * %FALSE.
Packit 79f644
 *
Packit 79f644
 * Returns: %TRUE if the embedded browser should identify itself as
Packit 79f644
 * running on a mobile platform, %FALSE otherwise.
Packit 79f644
 */
Packit 79f644
gboolean
Packit 79f644
goa_oauth_provider_get_use_mobile_browser (GoaOAuthProvider *provider)
Packit 79f644
{
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), FALSE);
Packit 79f644
  return GOA_OAUTH_PROVIDER_GET_CLASS (provider)->get_use_mobile_browser (provider);
Packit 79f644
}
Packit 79f644
Packit 79f644
/* ---------------------------------------------------------------------------------------------------- */
Packit 79f644
Packit 79f644
static gboolean
Packit 79f644
goa_oauth_provider_is_deny_node_default (GoaOAuthProvider *provider, WebKitDOMNode *node)
Packit 79f644
{
Packit 79f644
  return FALSE;
Packit 79f644
}
Packit 79f644
Packit 79f644
/**
Packit 79f644
 * goa_oauth_provider_is_deny_node:
Packit 79f644
 * @provider: A #GoaOAuthProvider.
Packit 79f644
 * @node: A WebKitDOMNode.
Packit 79f644
 *
Packit 79f644
 * Checks whether @node is the HTML UI element that the user can use
Packit 79f644
 * to deny permission to access his account. Usually they are either a
Packit 79f644
 * WebKitDOMHTMLButtonElement or a WebKitDOMHTMLInputElement.
Packit 79f644
 *
Packit 79f644
 * Please note that providers may have multiple such elements in their
Packit 79f644
 * UI and this method should catch all of them.
Packit 79f644
 *
Packit 79f644
 * This is a virtual method where the default implementation returns
Packit 79f644
 * %FALSE.
Packit 79f644
 *
Packit 79f644
 * Returns: %TRUE if the @node can be used to deny permission.
Packit 79f644
 */
Packit 79f644
gboolean
Packit 79f644
goa_oauth_provider_is_deny_node (GoaOAuthProvider *provider, WebKitDOMNode *node)
Packit 79f644
{
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), FALSE);
Packit 79f644
  return GOA_OAUTH_PROVIDER_GET_CLASS (provider)->is_deny_node (provider, node);
Packit 79f644
}
Packit 79f644
Packit 79f644
/* ---------------------------------------------------------------------------------------------------- */
Packit 79f644
Packit 79f644
static gboolean
Packit 79f644
goa_oauth_provider_is_password_node_default (GoaOAuthProvider *provider, WebKitDOMHTMLInputElement *element)
Packit 79f644
{
Packit 79f644
  return FALSE;
Packit 79f644
}
Packit 79f644
Packit 79f644
/**
Packit 79f644
 * goa_oauth_provider_is_password_node:
Packit 79f644
 * @provider: A #GoaOAuthProvider.
Packit 79f644
 * @element: A WebKitDOMHTMLInputElement
Packit 79f644
 *
Packit 79f644
 * Checks whether @element is the HTML UI element that the user can
Packit 79f644
 * use to enter her password. This can be used to offer a
Packit 79f644
 * #GoaPasswordBased interface by saving the user's
Packit 79f644
 * password. Providers usually frown upon doing this, so this is not
Packit 79f644
 * recommended.
Packit 79f644
 *
Packit 79f644
 * This is a virtual method where the default implementation returns
Packit 79f644
 * %FALSE.
Packit 79f644
 *
Packit 79f644
 * Returns: %TRUE if @element can be used to enter the password.
Packit 79f644
 */
Packit 79f644
gboolean
Packit 79f644
goa_oauth_provider_is_password_node (GoaOAuthProvider *provider, WebKitDOMHTMLInputElement *element)
Packit 79f644
{
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), FALSE);
Packit 79f644
  g_return_val_if_fail (WEBKIT_DOM_IS_HTML_INPUT_ELEMENT (element), FALSE);
Packit 79f644
  return GOA_OAUTH_PROVIDER_GET_CLASS (provider)->is_password_node (provider, element);
Packit 79f644
}
Packit 79f644
Packit 79f644
/* ---------------------------------------------------------------------------------------------------- */
Packit 79f644
Packit 79f644
static void
Packit 79f644
goa_oauth_provider_add_account_key_values_default (GoaOAuthProvider  *provider,
Packit 79f644
                                                   GVariantBuilder   *builder)
Packit 79f644
{
Packit 79f644
  /* do nothing */
Packit 79f644
}
Packit 79f644
Packit 79f644
/**
Packit 79f644
 * goa_oauth_provider_add_account_key_values:
Packit 79f644
 * @provider: A #GoaProvider.
Packit 79f644
 * @builder: A #GVariantBuilder for a <literal>a{ss}</literal> variant.
Packit 79f644
 *
Packit 79f644
 * Hook for implementations to add key/value pairs to the key-file
Packit 79f644
 * when creating an account.
Packit 79f644
 *
Packit 79f644
 * This is a virtual method where the default implementation does nothing.
Packit 79f644
 */
Packit 79f644
void
Packit 79f644
goa_oauth_provider_add_account_key_values (GoaOAuthProvider  *provider,
Packit 79f644
                                           GVariantBuilder   *builder)
Packit 79f644
{
Packit 79f644
  g_return_if_fail (GOA_IS_OAUTH_PROVIDER (provider));
Packit 79f644
  return GOA_OAUTH_PROVIDER_GET_CLASS (provider)->add_account_key_values (provider, builder);
Packit 79f644
}
Packit 79f644
Packit 79f644
/* ---------------------------------------------------------------------------------------------------- */
Packit 79f644
Packit 79f644
static gchar *
Packit 79f644
goa_oauth_provider_build_authorization_uri_default (GoaOAuthProvider  *provider,
Packit 79f644
                                                    const gchar       *authorization_uri,
Packit 79f644
                                                    const gchar       *escaped_oauth_token)
Packit 79f644
{
Packit 79f644
  return g_strdup_printf ("%s"
Packit 79f644
                          "?oauth_token=%s",
Packit 79f644
                          authorization_uri,
Packit 79f644
                          escaped_oauth_token);
Packit 79f644
}
Packit 79f644
Packit 79f644
/**
Packit 79f644
 * goa_oauth_provider_build_authorization_uri:
Packit 79f644
 * @provider: A #GoaOAuthProvider.
Packit 79f644
 * @authorization_uri: An authorization URI.
Packit 79f644
 * @escaped_oauth_token: An escaped oauth token.
Packit 79f644
 *
Packit 79f644
 * Builds the URI that can be opened in a web browser (or embedded web
Packit 79f644
 * browser widget) to start authenticating an user.
Packit 79f644
 *
Packit 79f644
 * The default implementation just returns the expected URI
Packit 79f644
 * (e.g. <literal>http://example.com/dialog/oauth?auth_token=1234567890</literal>)
Packit 79f644
 * - override (and chain up) if you e.g. need to to pass additional
Packit 79f644
 * parameters.
Packit 79f644
 *
Packit 79f644
 * The @authorization_uri parameter originate from the result of the
Packit 79f644
 * the goa_oauth_provider_get_authorization_uri() method. The
Packit 79f644
 * @escaped_oauth_token parameter is the temporary credentials identifier
Packit 79f644
 * escaped using g_uri_escape_string().
Packit 79f644
 *
Packit 79f644
 * Returns: (transfer full): An authorization URI that must be freed with g_free().
Packit 79f644
 */
Packit 79f644
gchar *
Packit 79f644
goa_oauth_provider_build_authorization_uri (GoaOAuthProvider  *provider,
Packit 79f644
                                            const gchar       *authorization_uri,
Packit 79f644
                                            const gchar       *escaped_oauth_token)
Packit 79f644
{
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), NULL);
Packit 79f644
  g_return_val_if_fail (authorization_uri != NULL, NULL);
Packit 79f644
  g_return_val_if_fail (escaped_oauth_token != NULL, NULL);
Packit 79f644
  return GOA_OAUTH_PROVIDER_GET_CLASS (provider)->build_authorization_uri (provider,
Packit 79f644
                                                                                   authorization_uri,
Packit 79f644
                                                                                   escaped_oauth_token);
Packit 79f644
}
Packit 79f644
Packit 79f644
/**
Packit 79f644
 * goa_oauth_provider_get_consumer_key:
Packit 79f644
 * @provider: A #GoaOAuthProvider.
Packit 79f644
 *
Packit 79f644
 * Gets the consumer key identifying the client.
Packit 79f644
 *
Packit 79f644
 * This is a pure virtual method - a subclass must provide an
Packit 79f644
 * implementation.
Packit 79f644
 *
Packit 79f644
 * Returns: (transfer none): A string owned by @provider - do not free.
Packit 79f644
 */
Packit 79f644
const gchar *
Packit 79f644
goa_oauth_provider_get_consumer_key (GoaOAuthProvider *provider)
Packit 79f644
{
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), NULL);
Packit 79f644
  return GOA_OAUTH_PROVIDER_GET_CLASS (provider)->get_consumer_key (provider);
Packit 79f644
}
Packit 79f644
Packit 79f644
/**
Packit 79f644
 * goa_oauth_provider_get_consumer_secret:
Packit 79f644
 * @provider: A #GoaOAuthProvider.
Packit 79f644
 *
Packit 79f644
 * Gets the consumer secret identifying the client.
Packit 79f644
 *
Packit 79f644
 * This is a pure virtual method - a subclass must provide an
Packit 79f644
 * implementation.
Packit 79f644
 *
Packit 79f644
 * Returns: (transfer none): A string owned by @provider - do not free.
Packit 79f644
 */
Packit 79f644
const gchar *
Packit 79f644
goa_oauth_provider_get_consumer_secret (GoaOAuthProvider *provider)
Packit 79f644
{
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), NULL);
Packit 79f644
  return GOA_OAUTH_PROVIDER_GET_CLASS (provider)->get_consumer_secret (provider);
Packit 79f644
}
Packit 79f644
Packit 79f644
/**
Packit 79f644
 * goa_oauth_provider_get_request_uri:
Packit 79f644
 * @provider: A #GoaOAuthProvider.
Packit 79f644
 *
Packit 79f644
 * Gets the request uri.
Packit 79f644
 *
Packit 79f644
 * http://tools.ietf.org/html/rfc5849#section-2.1
Packit 79f644
 *
Packit 79f644
 * This is a pure virtual method - a subclass must provide an
Packit 79f644
 * implementation.
Packit 79f644
 *
Packit 79f644
 * Returns: (transfer none): A string owned by @provider - do not free.
Packit 79f644
 */
Packit 79f644
const gchar *
Packit 79f644
goa_oauth_provider_get_request_uri (GoaOAuthProvider *provider)
Packit 79f644
{
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), NULL);
Packit 79f644
  return GOA_OAUTH_PROVIDER_GET_CLASS (provider)->get_request_uri (provider);
Packit 79f644
}
Packit 79f644
Packit 79f644
/**
Packit 79f644
 * goa_oauth_provider_get_request_uri_params:
Packit 79f644
 * @provider: A #GoaOAuthProvider.
Packit 79f644
 *
Packit 79f644
 * Gets additional parameters for the request URI.
Packit 79f644
 *
Packit 79f644
 * http://tools.ietf.org/html/rfc5849#section-2.1
Packit 79f644
 *
Packit 79f644
 * This is a virtual method where the default implementation returns
Packit 79f644
 * %NULL.
Packit 79f644
 *
Packit 79f644
 * Returns: (transfer full): %NULL (for no parameters) or a
Packit 79f644
 * %NULL-terminated array of (key, value) pairs that will be added to
Packit 79f644
 * the URI. The caller will free the returned value with g_strfreev().
Packit 79f644
 */
Packit 79f644
gchar **
Packit 79f644
goa_oauth_provider_get_request_uri_params (GoaOAuthProvider *provider)
Packit 79f644
{
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), NULL);
Packit 79f644
  return GOA_OAUTH_PROVIDER_GET_CLASS (provider)->get_request_uri_params (provider);
Packit 79f644
}
Packit 79f644
Packit 79f644
static gchar **
Packit 79f644
goa_oauth_provider_get_request_uri_params_default (GoaOAuthProvider *provider)
Packit 79f644
{
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), NULL);
Packit 79f644
  return NULL;
Packit 79f644
}
Packit 79f644
Packit 79f644
/**
Packit 79f644
 * goa_oauth_provider_get_authorization_uri:
Packit 79f644
 * @provider: A #GoaOAuthProvider.
Packit 79f644
 *
Packit 79f644
 * Gets the authorization uri.
Packit 79f644
 *
Packit 79f644
 * http://tools.ietf.org/html/rfc5849#section-2.2
Packit 79f644
 *
Packit 79f644
 * This is a pure virtual method - a subclass must provide an
Packit 79f644
 * implementation.
Packit 79f644
 *
Packit 79f644
 * Returns: (transfer none): A string owned by @provider - do not free.
Packit 79f644
 */
Packit 79f644
const gchar *
Packit 79f644
goa_oauth_provider_get_authorization_uri (GoaOAuthProvider *provider)
Packit 79f644
{
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), NULL);
Packit 79f644
  return GOA_OAUTH_PROVIDER_GET_CLASS (provider)->get_authorization_uri (provider);
Packit 79f644
}
Packit 79f644
Packit 79f644
/**
Packit 79f644
 * goa_oauth_provider_get_token_uri:
Packit 79f644
 * @provider: A #GoaOAuthProvider.
Packit 79f644
 *
Packit 79f644
 * Gets the token uri.
Packit 79f644
 *
Packit 79f644
 * http://tools.ietf.org/html/rfc5849#section-2.3
Packit 79f644
 *
Packit 79f644
 * This is a pure virtual method - a subclass must provide an
Packit 79f644
 * implementation.
Packit 79f644
 *
Packit 79f644
 * Returns: (transfer none): A string owned by @provider - do not free.
Packit 79f644
 */
Packit 79f644
const gchar *
Packit 79f644
goa_oauth_provider_get_token_uri (GoaOAuthProvider *provider)
Packit 79f644
{
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), NULL);
Packit 79f644
  return GOA_OAUTH_PROVIDER_GET_CLASS (provider)->get_token_uri (provider);
Packit 79f644
}
Packit 79f644
Packit 79f644
/**
Packit 79f644
 * goa_oauth_provider_get_callback_uri:
Packit 79f644
 * @provider: A #GoaOAuthProvider.
Packit 79f644
 *
Packit 79f644
 * Gets the callback uri.
Packit 79f644
 *
Packit 79f644
 * http://tools.ietf.org/html/rfc5849#section-2.1
Packit 79f644
 *
Packit 79f644
 * This is a pure virtual method - a subclass must provide an
Packit 79f644
 * implementation.
Packit 79f644
 *
Packit 79f644
 * Returns: (transfer none): A string owned by @provider - do not free.
Packit 79f644
 */
Packit 79f644
const gchar *
Packit 79f644
goa_oauth_provider_get_callback_uri (GoaOAuthProvider *provider)
Packit 79f644
{
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), NULL);
Packit 79f644
  return GOA_OAUTH_PROVIDER_GET_CLASS (provider)->get_callback_uri (provider);
Packit 79f644
}
Packit 79f644
Packit 79f644
/**
Packit 79f644
 * goa_oauth_provider_get_identity_sync:
Packit 79f644
 * @provider: A #GoaOAuthProvider.
Packit 79f644
 * @access_token: A valid OAuth 1.0 access token.
Packit 79f644
 * @access_token_secret: The valid secret for @access_token.
Packit 79f644
 * @out_presentation_identity: (out): Return location for presentation identity or %NULL.
Packit 79f644
 * @cancellable: (allow-none): A #GCancellable or %NULL.
Packit 79f644
 * @error: Return location for error or %NULL.
Packit 79f644
 *
Packit 79f644
 * Method that returns the identity corresponding to @access_token and
Packit 79f644
 * @access_token_secret.
Packit 79f644
 *
Packit 79f644
 * The identity is needed because all authentication happens out of
Packit 79f644
 * band. In addition to the identity, an implementation also returns a
Packit 79f644
 * <emphasis>presentation identity</emphasis> that is more suitable
Packit 79f644
 * for presentation (the identity could be a GUID for example).
Packit 79f644
 *
Packit 79f644
 * The calling thread is blocked while the identity is obtained.
Packit 79f644
 *
Packit 79f644
 * This is a pure virtual method - a subclass must provide an
Packit 79f644
 * implementation.
Packit 79f644
 *
Packit 79f644
 * Returns: The identity or %NULL if error is set. The returned string
Packit 79f644
 * must be freed with g_free().
Packit 79f644
 */
Packit 79f644
gchar *
Packit 79f644
goa_oauth_provider_get_identity_sync (GoaOAuthProvider *provider,
Packit 79f644
                                      const gchar      *access_token,
Packit 79f644
                                      const gchar      *access_token_secret,
Packit 79f644
                                      gchar           **out_presentation_identity,
Packit 79f644
                                      GCancellable     *cancellable,
Packit 79f644
                                      GError          **error)
Packit 79f644
{
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), NULL);
Packit 79f644
  g_return_val_if_fail (access_token != NULL, NULL);
Packit 79f644
  g_return_val_if_fail (cancellable == NULL || G_IS_CANCELLABLE (cancellable), NULL);
Packit 79f644
  g_return_val_if_fail (error == NULL || *error == NULL, NULL);
Packit 79f644
Packit 79f644
  return GOA_OAUTH_PROVIDER_GET_CLASS (provider)->get_identity_sync (provider,
Packit 79f644
                                                                     access_token,
Packit 79f644
                                                                     access_token_secret,
Packit 79f644
                                                                     out_presentation_identity,
Packit 79f644
                                                                     cancellable,
Packit 79f644
                                                                     error);
Packit 79f644
}
Packit 79f644
Packit 79f644
/**
Packit 79f644
 * goa_oauth_provider_is_identity_node:
Packit 79f644
 * @provider: A #GoaOAuthProvider.
Packit 79f644
 * @element: A WebKitDOMHTMLInputElement.
Packit 79f644
 *
Packit 79f644
 * Checks whether @element is the HTML UI element that the user can
Packit 79f644
 * use to identify herself at the provider.
Packit 79f644
 *
Packit 79f644
 * This is a pure virtual method - a subclass must provide an
Packit 79f644
 * implementation.
Packit 79f644
 *
Packit 79f644
 * Returns: %TRUE if the @element can be used to deny permission.
Packit 79f644
 */
Packit 79f644
gboolean
Packit 79f644
goa_oauth_provider_is_identity_node (GoaOAuthProvider *provider, WebKitDOMHTMLInputElement *element)
Packit 79f644
{
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), FALSE);
Packit 79f644
  return GOA_OAUTH_PROVIDER_GET_CLASS (provider)->is_identity_node (provider, element);
Packit 79f644
}
Packit 79f644
Packit 79f644
/**
Packit 79f644
 * goa_oauth_provider_parse_request_token_error:
Packit 79f644
 * @provider: A #GoaOAuthProvider.
Packit 79f644
 * @call: The #RestProxyCall that was used to fetch the request token.
Packit 79f644
 *
Packit 79f644
 * Tries to parse the headers and payload within @call to provide a
Packit 79f644
 * human readable error message in case the request token could not
Packit 79f644
 * be fetched.
Packit 79f644
 *
Packit 79f644
 * This is a pure virtual method - a subclass must provide an
Packit 79f644
 * implementation.
Packit 79f644
 *
Packit 79f644
 * Returns: A human readable error message or %NULL if the cause of the
Packit 79f644
 * error could not be determined. The returned string must be freed with
Packit 79f644
 * g_free().
Packit 79f644
 */
Packit 79f644
gchar *
Packit 79f644
goa_oauth_provider_parse_request_token_error (GoaOAuthProvider *provider, RestProxyCall *call)
Packit 79f644
{
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), NULL);
Packit 79f644
  return GOA_OAUTH_PROVIDER_GET_CLASS (provider)->parse_request_token_error (provider, call);
Packit 79f644
}
Packit 79f644
Packit 79f644
/* ---------------------------------------------------------------------------------------------------- */
Packit 79f644
Packit 79f644
static gchar *
Packit 79f644
get_tokens_sync (GoaOAuthProvider  *provider,
Packit 79f644
                 const gchar       *token,
Packit 79f644
                 const gchar       *token_secret,
Packit 79f644
                 const gchar       *session_handle, /* may be NULL */
Packit 79f644
                 const gchar       *verifier,       /* may be NULL */
Packit 79f644
                 gchar            **out_access_token_secret,
Packit 79f644
                 gint              *out_access_token_expires_in,
Packit 79f644
                 gchar            **out_session_handle,
Packit 79f644
                 gint              *out_session_handle_expires_in,
Packit 79f644
                 GCancellable      *cancellable,
Packit 79f644
                 GError           **error)
Packit 79f644
{
Packit 79f644
  RestProxy *proxy;
Packit 79f644
  RestProxyCall *call;
Packit 79f644
  SoupLogger *logger = NULL;
Packit 79f644
  gchar *ret = NULL;
Packit 79f644
  guint status_code;
Packit 79f644
  GHashTable *f;
Packit 79f644
  const gchar *expires_in_str;
Packit 79f644
  gchar *ret_access_token = NULL;
Packit 79f644
  gchar *ret_access_token_secret = NULL;
Packit 79f644
  gint ret_access_token_expires_in = 0;
Packit 79f644
  gchar *ret_session_handle = NULL;
Packit 79f644
  gint ret_session_handle_expires_in = 0;
Packit 79f644
Packit 79f644
  proxy = oauth_proxy_new (goa_oauth_provider_get_consumer_key (provider),
Packit 79f644
                           goa_oauth_provider_get_consumer_secret (provider),
Packit 79f644
                           goa_oauth_provider_get_token_uri (provider),
Packit 79f644
                           FALSE);
Packit 79f644
  logger = goa_soup_logger_new (SOUP_LOGGER_LOG_BODY, -1);
Packit 79f644
  rest_proxy_add_soup_feature (proxy, SOUP_SESSION_FEATURE (logger));
Packit 79f644
  oauth_proxy_set_token (OAUTH_PROXY (proxy), token);
Packit 79f644
  oauth_proxy_set_token_secret (OAUTH_PROXY (proxy), token_secret);
Packit 79f644
  call = rest_proxy_new_call (proxy);
Packit 79f644
  rest_proxy_call_set_method (call, "POST");
Packit 79f644
  if (verifier != NULL)
Packit 79f644
    rest_proxy_call_add_param (call, "oauth_verifier", verifier);
Packit 79f644
  if (session_handle != NULL)
Packit 79f644
    rest_proxy_call_add_param (call, "oauth_session_handle", session_handle);
Packit 79f644
  /* TODO: cancellable support? */
Packit 79f644
  if (!rest_proxy_call_sync (call, error))
Packit 79f644
    goto out;
Packit 79f644
Packit 79f644
  status_code = rest_proxy_call_get_status_code (call);
Packit 79f644
  if (status_code != 200)
Packit 79f644
    {
Packit 79f644
      g_set_error (error,
Packit 79f644
                   GOA_ERROR,
Packit 79f644
                   GOA_ERROR_FAILED,
Packit 79f644
                   /* Translators: the %d is a HTTP status code and the %s is a textual description of it */
Packit 79f644
                   _("Expected status 200 when requesting access token, instead got status %d (%s)"),
Packit 79f644
                   status_code,
Packit 79f644
                   rest_proxy_call_get_status_message (call));
Packit 79f644
      goto out;
Packit 79f644
    }
Packit 79f644
Packit 79f644
  f = soup_form_decode (rest_proxy_call_get_payload (call));
Packit 79f644
  ret_access_token = g_strdup (g_hash_table_lookup (f, "oauth_token"));
Packit 79f644
  ret_access_token_secret = g_strdup (g_hash_table_lookup (f, "oauth_token_secret"));
Packit 79f644
  ret_session_handle = g_strdup (g_hash_table_lookup (f, "oauth_session_handle"));
Packit 79f644
  expires_in_str = g_hash_table_lookup (f, "oauth_expires_in");
Packit 79f644
  if (expires_in_str != NULL)
Packit 79f644
    ret_access_token_expires_in = atoi (expires_in_str);
Packit 79f644
  expires_in_str = g_hash_table_lookup (f, "oauth_authorization_expires_in");
Packit 79f644
  if (expires_in_str != NULL)
Packit 79f644
    ret_session_handle_expires_in = atoi (expires_in_str);
Packit 79f644
  g_hash_table_unref (f);
Packit 79f644
Packit 79f644
  if (ret_access_token == NULL || ret_access_token_secret == NULL)
Packit 79f644
    {
Packit 79f644
      g_set_error (error,
Packit 79f644
                   GOA_ERROR,
Packit 79f644
                   GOA_ERROR_FAILED,
Packit 79f644
                   _("Missing access_token or access_token_secret headers in response"));
Packit 79f644
      goto out;
Packit 79f644
    }
Packit 79f644
Packit 79f644
  ret = ret_access_token; ret_access_token = NULL;
Packit 79f644
  if (out_access_token_secret != NULL)
Packit 79f644
    {
Packit 79f644
      *out_access_token_secret = ret_access_token_secret;
Packit 79f644
      ret_access_token_secret = NULL;
Packit 79f644
    }
Packit 79f644
  if (out_access_token_expires_in != NULL)
Packit 79f644
    *out_access_token_expires_in = ret_access_token_expires_in;
Packit 79f644
  if (out_session_handle != NULL)
Packit 79f644
    {
Packit 79f644
      *out_session_handle = ret_session_handle;
Packit 79f644
      ret_session_handle = NULL;
Packit 79f644
    }
Packit 79f644
  if (out_session_handle_expires_in != NULL)
Packit 79f644
    *out_session_handle_expires_in = ret_session_handle_expires_in;
Packit 79f644
Packit 79f644
 out:
Packit 79f644
  g_free (ret_access_token);
Packit 79f644
  g_free (ret_access_token_secret);
Packit 79f644
  g_free (ret_session_handle);
Packit 79f644
  g_clear_object (&call);
Packit 79f644
  g_clear_object (&proxy);
Packit 79f644
  g_clear_object (&logger);
Packit 79f644
  return ret;
Packit 79f644
}
Packit 79f644
Packit 79f644
/* ---------------------------------------------------------------------------------------------------- */
Packit 79f644
Packit 79f644
typedef struct
Packit 79f644
{
Packit 79f644
  GoaOAuthProvider *provider;
Packit 79f644
  GtkDialog *dialog;
Packit 79f644
  GError *error;
Packit 79f644
  GMainLoop *loop;
Packit 79f644
Packit 79f644
  gchar *password;
Packit 79f644
Packit 79f644
  gchar *oauth_verifier;
Packit 79f644
Packit 79f644
  const gchar *existing_identity;
Packit 79f644
Packit 79f644
  gchar *identity;
Packit 79f644
  gchar *presentation_identity;
Packit 79f644
Packit 79f644
  gchar *request_token;
Packit 79f644
  gchar *request_token_secret;
Packit 79f644
  gchar *access_token;
Packit 79f644
  gchar *access_token_secret;
Packit 79f644
  gint access_token_expires_in;
Packit 79f644
  gchar *session_handle;
Packit 79f644
  gint session_handle_expires_in;
Packit 79f644
} IdentifyData;
Packit 79f644
Packit 79f644
static void
Packit 79f644
on_web_view_deny_click (GoaWebView *web_view, gpointer user_data)
Packit 79f644
{
Packit 79f644
  IdentifyData *data = user_data;
Packit 79f644
  gtk_dialog_response (data->dialog, GTK_RESPONSE_CANCEL);
Packit 79f644
}
Packit 79f644
Packit 79f644
static void
Packit 79f644
on_web_view_password_submit (GoaWebView *web_view, const gchar *password, gpointer user_data)
Packit 79f644
{
Packit 79f644
  IdentifyData *data = user_data;
Packit 79f644
Packit 79f644
  g_free (data->password);
Packit 79f644
  data->password = g_strdup (password);
Packit 79f644
}
Packit 79f644
Packit 79f644
static gboolean
Packit 79f644
on_web_view_decide_policy (WebKitWebView            *web_view,
Packit 79f644
                           WebKitPolicyDecision     *decision,
Packit 79f644
                           WebKitPolicyDecisionType  decision_type,
Packit 79f644
                           gpointer                  user_data)
Packit 79f644
{
Packit 79f644
  GHashTable *key_value_pairs;
Packit 79f644
  IdentifyData *data = user_data;
Packit 79f644
  SoupURI *uri;
Packit 79f644
  WebKitNavigationAction *action;
Packit 79f644
  WebKitURIRequest *request;
Packit 79f644
  const gchar *query;
Packit 79f644
  const gchar *redirect_uri;
Packit 79f644
  const gchar *requested_uri;
Packit 79f644
  gint response_id = GTK_RESPONSE_NONE;
Packit 79f644
Packit 79f644
  if (decision_type != WEBKIT_POLICY_DECISION_TYPE_NAVIGATION_ACTION)
Packit 79f644
    return FALSE;
Packit 79f644
Packit 79f644
  /* TODO: use oauth_proxy_extract_access_token() */
Packit 79f644
Packit 79f644
  action = webkit_navigation_policy_decision_get_navigation_action (WEBKIT_NAVIGATION_POLICY_DECISION (decision));
Packit 79f644
  request = webkit_navigation_action_get_request (action);
Packit 79f644
  requested_uri = webkit_uri_request_get_uri (request);
Packit 79f644
  redirect_uri = goa_oauth_provider_get_callback_uri (data->provider);
Packit 79f644
Packit 79f644
  if (!g_str_has_prefix (requested_uri, redirect_uri))
Packit 79f644
    goto default_behaviour;
Packit 79f644
Packit 79f644
  uri = soup_uri_new (requested_uri);
Packit 79f644
  query = soup_uri_get_query (uri);
Packit 79f644
Packit 79f644
  if (query != NULL)
Packit 79f644
    {
Packit 79f644
      key_value_pairs = soup_form_decode (query);
Packit 79f644
Packit 79f644
      data->oauth_verifier = g_strdup (g_hash_table_lookup (key_value_pairs, "oauth_verifier"));
Packit 79f644
      if (data->oauth_verifier != NULL)
Packit 79f644
        response_id = GTK_RESPONSE_OK;
Packit 79f644
Packit 79f644
      g_hash_table_unref (key_value_pairs);
Packit 79f644
    }
Packit 79f644
Packit 79f644
  if (data->oauth_verifier != NULL)
Packit 79f644
    goto ignore_request;
Packit 79f644
Packit 79f644
  /* TODO: The only OAuth1 provider is Flickr. It doesn't send any
Packit 79f644
   * error code and only redirects to the URI specified in the Flickr
Packit 79f644
   * App Garden. Re-evaluate when the situation changes.
Packit 79f644
   */
Packit 79f644
  response_id = GTK_RESPONSE_CANCEL;
Packit 79f644
  goto ignore_request;
Packit 79f644
Packit 79f644
 ignore_request:
Packit 79f644
  g_assert (response_id != GTK_RESPONSE_NONE);
Packit 79f644
  gtk_dialog_response (data->dialog, response_id);
Packit 79f644
  webkit_policy_decision_ignore (decision);
Packit 79f644
  return TRUE;
Packit 79f644
Packit 79f644
 default_behaviour:
Packit 79f644
  return FALSE;
Packit 79f644
}
Packit 79f644
Packit 79f644
static void
Packit 79f644
rest_proxy_call_cb (RestProxyCall *call, const GError *error, GObject *weak_object, gpointer user_data)
Packit 79f644
{
Packit 79f644
  IdentifyData *data = user_data;
Packit 79f644
  g_main_loop_quit (data->loop);
Packit 79f644
}
Packit 79f644
Packit 79f644
static gboolean
Packit 79f644
get_tokens_and_identity (GoaOAuthProvider *provider,
Packit 79f644
                         gboolean          add_account,
Packit 79f644
                         const gchar      *existing_identity,
Packit 79f644
                         GtkDialog        *dialog,
Packit 79f644
                         GtkBox           *vbox,
Packit 79f644
                         gchar           **out_access_token,
Packit 79f644
                         gchar           **out_access_token_secret,
Packit 79f644
                         gint             *out_access_token_expires_in,
Packit 79f644
                         gchar           **out_session_handle,
Packit 79f644
                         gint             *out_session_handle_expires_in,
Packit 79f644
                         gchar           **out_identity,
Packit 79f644
                         gchar           **out_presentation_identity,
Packit 79f644
                         gchar           **out_password,
Packit 79f644
                         GError          **error)
Packit 79f644
{
Packit 79f644
  gboolean ret = FALSE;
Packit 79f644
  gchar *url = NULL;
Packit 79f644
  IdentifyData data;
Packit 79f644
  gchar *escaped_request_token = NULL;
Packit 79f644
  RestProxy *proxy = NULL;
Packit 79f644
  RestProxyCall *call = NULL;
Packit 79f644
  SoupLogger *logger = NULL;
Packit 79f644
  GHashTable *f;
Packit 79f644
  GtkWidget *embed;
Packit 79f644
  GtkWidget *grid;
Packit 79f644
  GtkWidget *spinner;
Packit 79f644
  GtkWidget *web_view;
Packit 79f644
  gchar **request_params = NULL;
Packit 79f644
  guint n;
Packit 79f644
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), FALSE);
Packit 79f644
  g_return_val_if_fail ((!add_account && existing_identity != NULL && existing_identity[0] != '\0')
Packit 79f644
                        || (add_account && existing_identity == NULL), FALSE);
Packit 79f644
  g_return_val_if_fail (GTK_IS_DIALOG (dialog), FALSE);
Packit 79f644
  g_return_val_if_fail (GTK_IS_BOX (vbox), FALSE);
Packit 79f644
  g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
Packit 79f644
Packit 79f644
  /* TODO: check with NM whether we're online, if not - return error */
Packit 79f644
Packit 79f644
  memset (&data, '\0', sizeof (IdentifyData));
Packit 79f644
  data.provider = provider;
Packit 79f644
  data.dialog = dialog;
Packit 79f644
  data.loop = g_main_loop_new (NULL, FALSE);
Packit 79f644
  data.existing_identity = existing_identity;
Packit 79f644
Packit 79f644
  proxy = oauth_proxy_new (goa_oauth_provider_get_consumer_key (provider),
Packit 79f644
                           goa_oauth_provider_get_consumer_secret (provider),
Packit 79f644
                           goa_oauth_provider_get_request_uri (provider), FALSE);
Packit 79f644
  logger = goa_soup_logger_new (SOUP_LOGGER_LOG_BODY, -1);
Packit 79f644
  rest_proxy_add_soup_feature (proxy, SOUP_SESSION_FEATURE (logger));
Packit 79f644
Packit 79f644
  call = rest_proxy_new_call (proxy);
Packit 79f644
  rest_proxy_call_set_method (call, "POST");
Packit 79f644
  rest_proxy_call_add_param (call, "oauth_callback", goa_oauth_provider_get_callback_uri (provider));
Packit 79f644
Packit 79f644
  request_params = goa_oauth_provider_get_request_uri_params (provider);
Packit 79f644
  if (request_params != NULL)
Packit 79f644
    {
Packit 79f644
      g_assert (g_strv_length (request_params) % 2 == 0);
Packit 79f644
      for (n = 0; request_params[n] != NULL; n += 2)
Packit 79f644
        rest_proxy_call_add_param (call, request_params[n], request_params[n+1]);
Packit 79f644
    }
Packit 79f644
  if (!rest_proxy_call_async (call, rest_proxy_call_cb, NULL, &data, &data.error))
Packit 79f644
    {
Packit 79f644
      g_prefix_error (&data.error, _("Error getting a Request Token: "));
Packit 79f644
      goto out;
Packit 79f644
    }
Packit 79f644
Packit 79f644
  goa_utils_set_dialog_title (GOA_PROVIDER (provider), dialog, add_account);
Packit 79f644
Packit 79f644
  grid = gtk_grid_new ();
Packit 79f644
  gtk_orientable_set_orientation (GTK_ORIENTABLE (grid), GTK_ORIENTATION_VERTICAL);
Packit 79f644
  gtk_grid_set_row_spacing (GTK_GRID (grid), 12);
Packit 79f644
  gtk_container_add (GTK_CONTAINER (vbox), grid);
Packit 79f644
Packit 79f644
  spinner = gtk_spinner_new ();
Packit 79f644
  gtk_widget_set_hexpand (spinner, TRUE);
Packit 79f644
  gtk_widget_set_halign (spinner, GTK_ALIGN_CENTER);
Packit 79f644
  gtk_widget_set_vexpand (spinner, TRUE);
Packit 79f644
  gtk_widget_set_valign (spinner, GTK_ALIGN_CENTER);
Packit 79f644
  gtk_widget_set_size_request (GTK_WIDGET (spinner), 24, 24);
Packit 79f644
  gtk_spinner_start (GTK_SPINNER (spinner));
Packit 79f644
  gtk_container_add (GTK_CONTAINER (grid), spinner);
Packit 79f644
  gtk_widget_show_all (GTK_WIDGET (vbox));
Packit 79f644
Packit 79f644
  g_main_loop_run (data.loop);
Packit 79f644
  gtk_container_remove (GTK_CONTAINER (grid), spinner);
Packit 79f644
Packit 79f644
  if (rest_proxy_call_get_status_code (call) != 200)
Packit 79f644
    {
Packit 79f644
      gchar *msg;
Packit 79f644
Packit 79f644
      msg = goa_oauth_provider_parse_request_token_error (provider, call);
Packit 79f644
      if (msg == NULL)
Packit 79f644
        /* Translators: the %d is a HTTP status code and the %s is a textual description of it */
Packit 79f644
        msg = g_strdup_printf (_("Expected status 200 for getting a Request Token, instead got status %d (%s)"),
Packit 79f644
                               rest_proxy_call_get_status_code (call),
Packit 79f644
                               rest_proxy_call_get_status_message (call));
Packit 79f644
Packit 79f644
      g_set_error_literal (&data.error, GOA_ERROR, GOA_ERROR_FAILED, msg);
Packit 79f644
      g_free (msg);
Packit 79f644
      goto out;
Packit 79f644
    }
Packit 79f644
  f = soup_form_decode (rest_proxy_call_get_payload (call));
Packit 79f644
  data.request_token = g_strdup (g_hash_table_lookup (f, "oauth_token"));
Packit 79f644
  data.request_token_secret = g_strdup (g_hash_table_lookup (f, "oauth_token_secret"));
Packit 79f644
  g_hash_table_unref (f);
Packit 79f644
  if (data.request_token == NULL || data.request_token_secret == NULL)
Packit 79f644
    {
Packit 79f644
      g_set_error (&data.error,
Packit 79f644
                   GOA_ERROR,
Packit 79f644
                   GOA_ERROR_FAILED,
Packit 79f644
                   _("Missing request_token or request_token_secret headers in response"));
Packit 79f644
      goto out;
Packit 79f644
    }
Packit 79f644
Packit 79f644
  escaped_request_token = g_uri_escape_string (data.request_token, NULL, TRUE);
Packit 79f644
  url = goa_oauth_provider_build_authorization_uri (provider,
Packit 79f644
                                                            goa_oauth_provider_get_authorization_uri (provider),
Packit 79f644
                                                            escaped_request_token);
Packit 79f644
Packit 79f644
  web_view = goa_web_view_new (GOA_PROVIDER (provider), existing_identity);
Packit 79f644
  gtk_widget_set_hexpand (web_view, TRUE);
Packit 79f644
  gtk_widget_set_vexpand (web_view, TRUE);
Packit 79f644
  embed = goa_web_view_get_view (GOA_WEB_VIEW (web_view));
Packit 79f644
Packit 79f644
  if (goa_oauth_provider_get_use_mobile_browser (provider))
Packit 79f644
    goa_web_view_fake_mobile (GOA_WEB_VIEW (web_view));
Packit 79f644
Packit 79f644
  webkit_web_view_load_uri (WEBKIT_WEB_VIEW (embed), url);
Packit 79f644
  g_signal_connect (embed,
Packit 79f644
                    "decide-policy",
Packit 79f644
                    G_CALLBACK (on_web_view_decide_policy),
Packit 79f644
                    &data);
Packit 79f644
  g_signal_connect (web_view, "deny-click", G_CALLBACK (on_web_view_deny_click), &data);
Packit 79f644
  g_signal_connect (web_view, "password-submit", G_CALLBACK (on_web_view_password_submit), &data);
Packit 79f644
Packit 79f644
  gtk_container_add (GTK_CONTAINER (grid), web_view);
Packit 79f644
  gtk_window_set_default_size (GTK_WINDOW (dialog), -1, -1);
Packit 79f644
Packit 79f644
  gtk_widget_show_all (GTK_WIDGET (vbox));
Packit 79f644
  gtk_dialog_run (GTK_DIALOG (dialog));
Packit 79f644
Packit 79f644
  if (data.oauth_verifier == NULL)
Packit 79f644
    {
Packit 79f644
      if (data.error == NULL)
Packit 79f644
        {
Packit 79f644
          g_set_error (&data.error,
Packit 79f644
                       GOA_ERROR,
Packit 79f644
                       GOA_ERROR_DIALOG_DISMISSED,
Packit 79f644
                       _("Dialog was dismissed"));
Packit 79f644
        }
Packit 79f644
      goto out;
Packit 79f644
    }
Packit 79f644
  g_assert (data.error == NULL);
Packit 79f644
Packit 79f644
  /* OK, we are done interacting with the user ... but before we can
Packit 79f644
   * make up our mind, there are two more RPC calls to make and these
Packit 79f644
   * call may take some time. So hide the dialog immediately.
Packit 79f644
   */
Packit 79f644
  gtk_widget_hide (GTK_WIDGET (dialog));
Packit 79f644
Packit 79f644
  /* OK, we now have the request token... we can exchange that for a
Packit 79f644
   * (short-lived) access token and session_handle (used to refresh the
Packit 79f644
   * access token)..
Packit 79f644
   */
Packit 79f644
Packit 79f644
  /* TODO: run in worker thread */
Packit 79f644
  data.access_token = get_tokens_sync (provider,
Packit 79f644
                                       data.request_token,
Packit 79f644
                                       data.request_token_secret,
Packit 79f644
                                       NULL, /* session_handle */
Packit 79f644
                                       data.oauth_verifier,
Packit 79f644
                                       &data.access_token_secret,
Packit 79f644
                                       &data.access_token_expires_in,
Packit 79f644
                                       &data.session_handle,
Packit 79f644
                                       &data.session_handle_expires_in,
Packit 79f644
                                       NULL, /* GCancellable */
Packit 79f644
                                       &data.error);
Packit 79f644
  if (data.access_token == NULL)
Packit 79f644
    {
Packit 79f644
      g_prefix_error (&data.error, _("Error getting an Access Token: "));
Packit 79f644
      goto out;
Packit 79f644
    }
Packit 79f644
Packit 79f644
  /* TODO: run in worker thread */
Packit 79f644
  data.identity = goa_oauth_provider_get_identity_sync (provider,
Packit 79f644
                                                                data.access_token,
Packit 79f644
                                                                data.access_token_secret,
Packit 79f644
                                                                &data.presentation_identity,
Packit 79f644
                                                                NULL, /* TODO: GCancellable */
Packit 79f644
                                                                &data.error);
Packit 79f644
  if (data.identity == NULL)
Packit 79f644
    {
Packit 79f644
      g_prefix_error (&data.error, _("Error getting identity: "));
Packit 79f644
      goto out;
Packit 79f644
    }
Packit 79f644
Packit 79f644
  ret = TRUE;
Packit 79f644
Packit 79f644
 out:
Packit 79f644
  g_clear_object (&call);
Packit 79f644
Packit 79f644
  if (ret)
Packit 79f644
    {
Packit 79f644
      g_warn_if_fail (data.error == NULL);
Packit 79f644
      if (out_access_token != NULL)
Packit 79f644
        *out_access_token = g_strdup (data.access_token);
Packit 79f644
      if (out_access_token_secret != NULL)
Packit 79f644
        *out_access_token_secret = g_strdup (data.access_token_secret);
Packit 79f644
      if (out_access_token_expires_in != NULL)
Packit 79f644
        *out_access_token_expires_in = data.access_token_expires_in;
Packit 79f644
      if (out_session_handle != NULL)
Packit 79f644
        *out_session_handle = g_strdup (data.session_handle);
Packit 79f644
      if (out_session_handle_expires_in != NULL)
Packit 79f644
        *out_session_handle_expires_in = data.session_handle_expires_in;
Packit 79f644
      if (out_identity != NULL)
Packit 79f644
        *out_identity = g_strdup (data.identity);
Packit 79f644
      if (out_presentation_identity != NULL)
Packit 79f644
        *out_presentation_identity = g_strdup (data.presentation_identity);
Packit 79f644
      if (out_password != NULL)
Packit 79f644
        *out_password = g_strdup (data.password);
Packit 79f644
    }
Packit 79f644
  else
Packit 79f644
    {
Packit 79f644
      g_warn_if_fail (data.error != NULL);
Packit 79f644
      g_propagate_error (error, data.error);
Packit 79f644
    }
Packit 79f644
Packit 79f644
  g_free (data.password);
Packit 79f644
  g_free (data.presentation_identity);
Packit 79f644
  g_free (data.identity);
Packit 79f644
  g_free (url);
Packit 79f644
Packit 79f644
  g_free (data.oauth_verifier);
Packit 79f644
  g_clear_pointer (&data.loop, (GDestroyNotify) g_main_loop_unref);
Packit 79f644
  g_free (data.access_token);
Packit 79f644
  g_free (data.access_token_secret);
Packit 79f644
  g_free (escaped_request_token);
Packit 79f644
Packit 79f644
  g_free (data.request_token);
Packit 79f644
  g_free (data.request_token_secret);
Packit 79f644
Packit 79f644
  g_strfreev (request_params);
Packit 79f644
  g_clear_object (&proxy);
Packit 79f644
  g_clear_object (&logger);
Packit 79f644
  return ret;
Packit 79f644
}
Packit 79f644
Packit 79f644
/* ---------------------------------------------------------------------------------------------------- */
Packit 79f644
Packit 79f644
typedef struct
Packit 79f644
{
Packit 79f644
  GError *error;
Packit 79f644
  GMainLoop *loop;
Packit 79f644
  gchar *account_object_path;
Packit 79f644
} AddData;
Packit 79f644
Packit 79f644
static void
Packit 79f644
add_account_cb (GoaManager   *manager,
Packit 79f644
                GAsyncResult *res,
Packit 79f644
                gpointer      user_data)
Packit 79f644
{
Packit 79f644
  AddData *data = user_data;
Packit 79f644
  goa_manager_call_add_account_finish (manager,
Packit 79f644
                                       &data->account_object_path,
Packit 79f644
                                       res,
Packit 79f644
                                       &data->error);
Packit 79f644
  g_main_loop_quit (data->loop);
Packit 79f644
}
Packit 79f644
Packit 79f644
static gint64
Packit 79f644
duration_to_abs_usec (gint duration_sec)
Packit 79f644
{
Packit 79f644
  gint64 ret;
Packit 79f644
  GTimeVal now;
Packit 79f644
Packit 79f644
  g_get_current_time (&now;;
Packit 79f644
  ret = ((gint64) now.tv_sec) * 1000L * 1000L + ((gint64) now.tv_usec);
Packit 79f644
  ret += ((gint64) duration_sec) * 1000L * 1000L;
Packit 79f644
  return ret;
Packit 79f644
}
Packit 79f644
Packit 79f644
static gint
Packit 79f644
abs_usec_to_duration (gint64 abs_usec)
Packit 79f644
{
Packit 79f644
  gint64 ret;
Packit 79f644
  GTimeVal now;
Packit 79f644
Packit 79f644
  g_get_current_time (&now;;
Packit 79f644
  ret = abs_usec - (((gint64) now.tv_sec) * 1000L * 1000L + ((gint64) now.tv_usec));
Packit 79f644
  ret /= 1000L * 1000L;
Packit 79f644
  return ret;
Packit 79f644
}
Packit 79f644
Packit 79f644
static GoaObject *
Packit 79f644
goa_oauth_provider_add_account (GoaProvider *_provider,
Packit 79f644
                                GoaClient   *client,
Packit 79f644
                                GtkDialog   *dialog,
Packit 79f644
                                GtkBox      *vbox,
Packit 79f644
                                GError     **error)
Packit 79f644
{
Packit 79f644
  GoaOAuthProvider *provider = GOA_OAUTH_PROVIDER (_provider);
Packit 79f644
  GoaObject *ret = NULL;
Packit 79f644
  gchar *access_token = NULL;
Packit 79f644
  gchar *access_token_secret = NULL;
Packit 79f644
  gint access_token_expires_in;
Packit 79f644
  gchar *session_handle = NULL;
Packit 79f644
  gint session_handle_expires_in;
Packit 79f644
  gchar *identity = NULL;
Packit 79f644
  gchar *presentation_identity = NULL;
Packit 79f644
  gchar *password = NULL;
Packit 79f644
  AddData data;
Packit 79f644
  GVariantBuilder credentials;
Packit 79f644
  GVariantBuilder details;
Packit 79f644
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), NULL);
Packit 79f644
  g_return_val_if_fail (GOA_IS_CLIENT (client), NULL);
Packit 79f644
  g_return_val_if_fail (GTK_IS_DIALOG (dialog), NULL);
Packit 79f644
  g_return_val_if_fail (GTK_IS_BOX (vbox), NULL);
Packit 79f644
  g_return_val_if_fail (error == NULL || *error == NULL, NULL);
Packit 79f644
Packit 79f644
  memset (&data, '\0', sizeof (AddData));
Packit 79f644
  data.loop = g_main_loop_new (NULL, FALSE);
Packit 79f644
Packit 79f644
  if (!get_tokens_and_identity (provider,
Packit 79f644
                                TRUE,
Packit 79f644
                                NULL,
Packit 79f644
                                dialog,
Packit 79f644
                                vbox,
Packit 79f644
                                &access_token,
Packit 79f644
                                &access_token_secret,
Packit 79f644
                                &access_token_expires_in,
Packit 79f644
                                &session_handle,
Packit 79f644
                                &session_handle_expires_in,
Packit 79f644
                                &identity,
Packit 79f644
                                &presentation_identity,
Packit 79f644
                                &password,
Packit 79f644
                                &data.error))
Packit 79f644
    goto out;
Packit 79f644
Packit 79f644
  /* OK, got the identity... see if there's already an account
Packit 79f644
   * of this type with the given identity
Packit 79f644
   */
Packit 79f644
  if (!goa_utils_check_duplicate (client,
Packit 79f644
                                  identity,
Packit 79f644
                                  presentation_identity,
Packit 79f644
                                  goa_provider_get_provider_type (GOA_PROVIDER (provider)),
Packit 79f644
                                  (GoaPeekInterfaceFunc) goa_object_peek_oauth_based,
Packit 79f644
                                  &data.error))
Packit 79f644
    goto out;
Packit 79f644
Packit 79f644
  g_variant_builder_init (&credentials, G_VARIANT_TYPE_VARDICT);
Packit 79f644
  g_variant_builder_add (&credentials, "{sv}", "access_token", g_variant_new_string (access_token));
Packit 79f644
  g_variant_builder_add (&credentials, "{sv}", "access_token_secret", g_variant_new_string (access_token_secret));
Packit 79f644
  if (access_token_expires_in > 0)
Packit 79f644
    g_variant_builder_add (&credentials, "{sv}", "access_token_expires_at",
Packit 79f644
                           g_variant_new_int64 (duration_to_abs_usec (access_token_expires_in)));
Packit 79f644
  if (session_handle != NULL)
Packit 79f644
    g_variant_builder_add (&credentials, "{sv}", "session_handle", g_variant_new_string (session_handle));
Packit 79f644
  if (session_handle_expires_in > 0)
Packit 79f644
    g_variant_builder_add (&credentials, "{sv}", "session_handle_expires_at",
Packit 79f644
                           g_variant_new_int64 (duration_to_abs_usec (session_handle_expires_in)));
Packit 79f644
  if (password != NULL)
Packit 79f644
    g_variant_builder_add (&credentials, "{sv}", "password", g_variant_new_string (password));
Packit 79f644
Packit 79f644
  g_variant_builder_init (&details, G_VARIANT_TYPE ("a{ss}"));
Packit 79f644
  goa_oauth_provider_add_account_key_values (provider, &details);
Packit 79f644
Packit 79f644
  /* we want the GoaClient to update before this method returns (so it
Packit 79f644
   * can create a proxy for the new object) so run the mainloop while
Packit 79f644
   * waiting for this to complete
Packit 79f644
   */
Packit 79f644
  goa_manager_call_add_account (goa_client_get_manager (client),
Packit 79f644
                                goa_provider_get_provider_type (GOA_PROVIDER (provider)),
Packit 79f644
                                identity,
Packit 79f644
                                presentation_identity,
Packit 79f644
                                g_variant_builder_end (&credentials),
Packit 79f644
                                g_variant_builder_end (&details),
Packit 79f644
                                NULL, /* GCancellable* */
Packit 79f644
                                (GAsyncReadyCallback) add_account_cb,
Packit 79f644
                                &data);
Packit 79f644
  g_main_loop_run (data.loop);
Packit 79f644
  if (data.error != NULL)
Packit 79f644
    goto out;
Packit 79f644
Packit 79f644
  ret = GOA_OBJECT (g_dbus_object_manager_get_object (goa_client_get_object_manager (client),
Packit 79f644
                                                      data.account_object_path));
Packit 79f644
Packit 79f644
 out:
Packit 79f644
  /* We might have an object even when data.error is set.
Packit 79f644
   * eg., if we failed to store the credentials in the keyring.
Packit 79f644
   */
Packit 79f644
  if (data.error != NULL)
Packit 79f644
    g_propagate_error (error, data.error);
Packit 79f644
  else
Packit 79f644
    g_assert (ret != NULL);
Packit 79f644
Packit 79f644
  g_free (identity);
Packit 79f644
  g_free (presentation_identity);
Packit 79f644
  g_free (password);
Packit 79f644
  g_free (access_token);
Packit 79f644
  g_free (access_token_secret);
Packit 79f644
  g_free (session_handle);
Packit 79f644
  g_free (data.account_object_path);
Packit 79f644
  g_clear_pointer (&data.loop, (GDestroyNotify) g_main_loop_unref);
Packit 79f644
  return ret;
Packit 79f644
}
Packit 79f644
Packit 79f644
/* ---------------------------------------------------------------------------------------------------- */
Packit 79f644
Packit 79f644
static gboolean
Packit 79f644
goa_oauth_provider_refresh_account (GoaProvider  *_provider,
Packit 79f644
                                    GoaClient    *client,
Packit 79f644
                                    GoaObject    *object,
Packit 79f644
                                    GtkWindow    *parent,
Packit 79f644
                                    GError      **error)
Packit 79f644
{
Packit 79f644
  GoaOAuthProvider *provider = GOA_OAUTH_PROVIDER (_provider);
Packit 79f644
  GoaAccount *account;
Packit 79f644
  GtkWidget *dialog;
Packit 79f644
  gchar *access_token = NULL;
Packit 79f644
  gchar *access_token_secret = NULL;
Packit 79f644
  gchar *password = NULL;
Packit 79f644
  gint access_token_expires_in;
Packit 79f644
  gchar *session_handle = NULL;
Packit 79f644
  gint session_handle_expires_in;
Packit 79f644
  gchar *identity = NULL;
Packit 79f644
  const gchar *existing_identity;
Packit 79f644
  const gchar *existing_presentation_identity;
Packit 79f644
  GVariantBuilder builder;
Packit 79f644
  gboolean ret = FALSE;
Packit 79f644
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), FALSE);
Packit 79f644
  g_return_val_if_fail (GOA_IS_CLIENT (client), FALSE);
Packit 79f644
  g_return_val_if_fail (GOA_IS_OBJECT (object), FALSE);
Packit 79f644
  g_return_val_if_fail (parent == NULL || GTK_IS_WINDOW (parent), FALSE);
Packit 79f644
  g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
Packit 79f644
Packit 79f644
  dialog = gtk_dialog_new_with_buttons (NULL,
Packit 79f644
                                        parent,
Packit 79f644
                                        GTK_DIALOG_MODAL
Packit 79f644
                                        | GTK_DIALOG_DESTROY_WITH_PARENT
Packit 79f644
                                        | GTK_DIALOG_USE_HEADER_BAR,
Packit 79f644
                                        NULL,
Packit 79f644
                                        NULL);
Packit 79f644
  gtk_container_set_border_width (GTK_CONTAINER (dialog), 12);
Packit 79f644
  gtk_window_set_resizable (GTK_WINDOW (dialog), FALSE);
Packit 79f644
  gtk_widget_show_all (dialog);
Packit 79f644
Packit 79f644
  account = goa_object_peek_account (object);
Packit 79f644
Packit 79f644
  /* We abuse presentation identity here because for some providers
Packit 79f644
   * identity can be a machine readable ID, which can not be used to
Packit 79f644
   * log in via the provider's web interface.
Packit 79f644
   */
Packit 79f644
  existing_presentation_identity = goa_account_get_presentation_identity (account);
Packit 79f644
  if (!get_tokens_and_identity (provider,
Packit 79f644
                                FALSE,
Packit 79f644
                                existing_presentation_identity,
Packit 79f644
                                GTK_DIALOG (dialog),
Packit 79f644
                                GTK_BOX (gtk_dialog_get_content_area (GTK_DIALOG (dialog))),
Packit 79f644
                                &access_token,
Packit 79f644
                                &access_token_secret,
Packit 79f644
                                &access_token_expires_in,
Packit 79f644
                                &session_handle,
Packit 79f644
                                &session_handle_expires_in,
Packit 79f644
                                &identity,
Packit 79f644
                                NULL, /* out_presentation_identity */
Packit 79f644
                                &password,
Packit 79f644
                                error))
Packit 79f644
    goto out;
Packit 79f644
Packit 79f644
  /* Changes made to the web interface by the providers can break our
Packit 79f644
   * DOM parsing. So we should still query and check the identity
Packit 79f644
   * afterwards.
Packit 79f644
   */
Packit 79f644
  existing_identity = goa_account_get_identity (account);
Packit 79f644
  if (g_strcmp0 (identity, existing_identity) != 0)
Packit 79f644
    {
Packit 79f644
      g_set_error (error,
Packit 79f644
                   GOA_ERROR,
Packit 79f644
                   GOA_ERROR_FAILED,
Packit 79f644
                   _("Was asked to log in as %s, but logged in as %s"),
Packit 79f644
                   existing_identity,
Packit 79f644
                   identity);
Packit 79f644
      goto out;
Packit 79f644
    }
Packit 79f644
Packit 79f644
  g_variant_builder_init (&builder, G_VARIANT_TYPE_VARDICT);
Packit 79f644
  g_variant_builder_add (&builder, "{sv}", "access_token", g_variant_new_string (access_token));
Packit 79f644
  g_variant_builder_add (&builder, "{sv}", "access_token_secret", g_variant_new_string (access_token_secret));
Packit 79f644
  if (access_token_expires_in > 0)
Packit 79f644
    g_variant_builder_add (&builder, "{sv}", "access_token_expires_at",
Packit 79f644
                           g_variant_new_int64 (duration_to_abs_usec (access_token_expires_in)));
Packit 79f644
  if (session_handle != NULL)
Packit 79f644
    g_variant_builder_add (&builder, "{sv}", "session_handle", g_variant_new_string (session_handle));
Packit 79f644
  if (session_handle_expires_in > 0)
Packit 79f644
    g_variant_builder_add (&builder, "{sv}", "session_handle_expires_at",
Packit 79f644
                           g_variant_new_int64 (duration_to_abs_usec (session_handle_expires_in)));
Packit 79f644
  if (password != NULL)
Packit 79f644
    g_variant_builder_add (&builder, "{sv}", "password", g_variant_new_string (password));
Packit 79f644
  /* TODO: run in worker thread */
Packit 79f644
  if (!goa_utils_store_credentials_for_object_sync (GOA_PROVIDER (provider),
Packit 79f644
                                                    object,
Packit 79f644
                                                    g_variant_builder_end (&builder),
Packit 79f644
                                                    NULL, /* GCancellable  */
Packit 79f644
                                                    error))
Packit 79f644
    goto out;
Packit 79f644
Packit 79f644
  goa_account_call_ensure_credentials (goa_object_peek_account (object),
Packit 79f644
                                       NULL, /* GCancellable */
Packit 79f644
                                       NULL, NULL); /* callback, user_data */
Packit 79f644
Packit 79f644
  ret = TRUE;
Packit 79f644
Packit 79f644
 out:
Packit 79f644
  gtk_widget_destroy (dialog);
Packit 79f644
Packit 79f644
  g_free (identity);
Packit 79f644
  g_free (access_token);
Packit 79f644
  g_free (access_token_secret);
Packit 79f644
  g_free (password);
Packit 79f644
  g_free (session_handle);
Packit 79f644
  return ret;
Packit 79f644
}
Packit 79f644
Packit 79f644
/* ---------------------------------------------------------------------------------------------------- */
Packit 79f644
Packit 79f644
static void
Packit 79f644
free_mutex (GMutex *mutex)
Packit 79f644
{
Packit 79f644
  g_mutex_clear (mutex);
Packit 79f644
  g_slice_free (GMutex, mutex);
Packit 79f644
}
Packit 79f644
Packit 79f644
/**
Packit 79f644
 * goa_oauth_provider_get_access_token_sync:
Packit 79f644
 * @provider: A #GoaOAuthProvider.
Packit 79f644
 * @object: A #GoaObject.
Packit 79f644
 * @force_refresh: If set to %TRUE, forces a refresh of the access token, if possible.
Packit 79f644
 * @out_access_token_secret: (out): The secret for the return access token.
Packit 79f644
 * @out_access_token_expires_in: (out): Return location for how many seconds the returned token is valid for (0 if unknown) or %NULL.
Packit 79f644
 * @cancellable: (allow-none): A #GCancellable or %NULL.
Packit 79f644
 * @error: Return location for error or %NULL.
Packit 79f644
 *
Packit 79f644
 * Synchronously gets an access token for @object. The calling thread
Packit 79f644
 * is blocked while the operation is pending.
Packit 79f644
 *
Packit 79f644
 * The resulting token is typically read from the local cache so most
Packit 79f644
 * of the time only a local roundtrip to the storage for the token
Packit 79f644
 * cache (e.g. <command>gnome-keyring-daemon</command>) is
Packit 79f644
 * needed. However, the operation may involve refreshing the token
Packit 79f644
 * with the service provider so a full network round-trip may be
Packit 79f644
 * needed.
Packit 79f644
 *
Packit 79f644
 * Note that multiple calls are serialized to avoid multiple
Packit 79f644
 * outstanding requests to the service provider.
Packit 79f644
 *
Packit 79f644
 * This operation may fail if e.g. unable to refresh the credentials
Packit 79f644
 * or if network connectivity is not available. Note that even if a
Packit 79f644
 * token is returned, the returned token isn't guaranteed to work -
Packit 79f644
 * use goa_provider_ensure_credentials_sync() if you need
Packit 79f644
 * stronger guarantees.
Packit 79f644
 *
Packit 79f644
 * Returns: The access token or %NULL if error is set. The returned
Packit 79f644
 * string must be freed with g_free().
Packit 79f644
 */
Packit 79f644
gchar *
Packit 79f644
goa_oauth_provider_get_access_token_sync (GoaOAuthProvider   *provider,
Packit 79f644
                                          GoaObject          *object,
Packit 79f644
                                          gboolean            force_refresh,
Packit 79f644
                                          gchar             **out_access_token_secret,
Packit 79f644
                                          gint               *out_access_token_expires_in,
Packit 79f644
                                          GCancellable       *cancellable,
Packit 79f644
                                          GError            **error)
Packit 79f644
{
Packit 79f644
  GVariant *credentials = NULL;
Packit 79f644
  GVariantIter iter;
Packit 79f644
  const gchar *key;
Packit 79f644
  GVariant *value;
Packit 79f644
  gchar *access_token = NULL;
Packit 79f644
  gchar *access_token_secret = NULL;
Packit 79f644
  gchar *session_handle = NULL;
Packit 79f644
  gchar *access_token_for_refresh = NULL;
Packit 79f644
  gchar *access_token_secret_for_refresh = NULL;
Packit 79f644
  gchar *session_handle_for_refresh = NULL;
Packit 79f644
  gchar *password = NULL;
Packit 79f644
  gint access_token_expires_in = 0;
Packit 79f644
  gint session_handle_expires_in = 0;
Packit 79f644
  gboolean success = FALSE;
Packit 79f644
  GVariantBuilder builder;
Packit 79f644
  gchar *ret = NULL;
Packit 79f644
  GMutex *lock;
Packit 79f644
Packit 79f644
  g_return_val_if_fail (GOA_IS_OAUTH_PROVIDER (provider), NULL);
Packit 79f644
  g_return_val_if_fail (GOA_IS_OBJECT (object), NULL);
Packit 79f644
  g_return_val_if_fail (cancellable == NULL || G_IS_CANCELLABLE (cancellable), NULL);
Packit 79f644
  g_return_val_if_fail (error == NULL || *error == NULL, NULL);
Packit 79f644
Packit 79f644
  /* provider_lock is too coarse, use a per-object lock instead */
Packit 79f644
  G_LOCK (provider_lock);
Packit 79f644
  lock = g_object_get_data (G_OBJECT (object), "-goa-oauth-provider-get-access-token-lock");
Packit 79f644
  if (lock == NULL)
Packit 79f644
    {
Packit 79f644
      lock = g_slice_new0 (GMutex);
Packit 79f644
      g_mutex_init (lock);
Packit 79f644
      g_object_set_data_full (G_OBJECT (object),
Packit 79f644
                              "-goa-oauth-provider-get-access-token-lock",
Packit 79f644
                              lock,
Packit 79f644
                              (GDestroyNotify) free_mutex);
Packit 79f644
    }
Packit 79f644
  G_UNLOCK (provider_lock);
Packit 79f644
Packit 79f644
  g_mutex_lock (lock);
Packit 79f644
Packit 79f644
  /* First, get the credentials from the keyring */
Packit 79f644
  credentials = goa_utils_lookup_credentials_sync (GOA_PROVIDER (provider),
Packit 79f644
                                                   object,
Packit 79f644
                                                   cancellable,
Packit 79f644
                                                   error);
Packit 79f644
  if (credentials == NULL)
Packit 79f644
    {
Packit 79f644
      if (error != NULL)
Packit 79f644
        {
Packit 79f644
          (*error)->domain = GOA_ERROR;
Packit 79f644
          (*error)->code = GOA_ERROR_NOT_AUTHORIZED;
Packit 79f644
        }
Packit 79f644
      goto out;
Packit 79f644
    }
Packit 79f644
Packit 79f644
  g_variant_iter_init (&iter, credentials);
Packit 79f644
  while (g_variant_iter_next (&iter, "{&sv}", &key, &value))
Packit 79f644
    {
Packit 79f644
      if (g_strcmp0 (key, "access_token") == 0)
Packit 79f644
        access_token = g_variant_dup_string (value, NULL);
Packit 79f644
      else if (g_strcmp0 (key, "access_token_secret") == 0)
Packit 79f644
        access_token_secret = g_variant_dup_string (value, NULL);
Packit 79f644
      else if (g_strcmp0 (key, "access_token_expires_at") == 0)
Packit 79f644
        access_token_expires_in = abs_usec_to_duration (g_variant_get_int64 (value));
Packit 79f644
      else if (g_strcmp0 (key, "session_handle") == 0)
Packit 79f644
        session_handle = g_variant_dup_string (value, NULL);
Packit 79f644
      else if (g_strcmp0 (key, "session_handle_expires_at") == 0)
Packit 79f644
        session_handle_expires_in = abs_usec_to_duration (g_variant_get_int64 (value));
Packit 79f644
      else if (g_strcmp0 (key, "password") == 0)
Packit 79f644
        password = g_variant_dup_string (value, NULL);
Packit 79f644
      g_variant_unref (value);
Packit 79f644
    }
Packit 79f644
Packit 79f644
  if (access_token == NULL || access_token_secret == NULL)
Packit 79f644
    {
Packit 79f644
      g_set_error (error,
Packit 79f644
                   GOA_ERROR,
Packit 79f644
                   GOA_ERROR_NOT_AUTHORIZED,
Packit 79f644
                   _("Credentials do not contain access_token or access_token_secret"));
Packit 79f644
      goto out;
Packit 79f644
    }
Packit 79f644
Packit 79f644
  /* if we can't refresh the token, just return it no matter what */
Packit 79f644
  if (session_handle == NULL)
Packit 79f644
    {
Packit 79f644
      g_debug ("Returning locally cached credentials that cannot be refreshed");
Packit 79f644
      success = TRUE;
Packit 79f644
      goto out;
Packit 79f644
    }
Packit 79f644
Packit 79f644
  /* If access_token is still "fresh enough" (e.g. more than ten
Packit 79f644
   * minutes of life left in it), just return it unless we've been
Packit 79f644
   * asked to forcibly refresh it
Packit 79f644
   */
Packit 79f644
  if (!force_refresh && access_token_expires_in > 10*60)
Packit 79f644
    {
Packit 79f644
      g_debug ("Returning locally cached credentials (expires in %d seconds)", access_token_expires_in);
Packit 79f644
      success = TRUE;
Packit 79f644
      goto out;
Packit 79f644
    }
Packit 79f644
Packit 79f644
  g_debug ("Refreshing locally cached credentials (expires in %d seconds, force_refresh=%d)", access_token_expires_in, force_refresh);
Packit 79f644
Packit 79f644
  /* Otherwise, refresh it */
Packit 79f644
  access_token_for_refresh        = access_token; access_token = NULL;
Packit 79f644
  access_token_secret_for_refresh = access_token_secret; access_token_secret = NULL;
Packit 79f644
  session_handle_for_refresh      = session_handle; session_handle = NULL;
Packit 79f644
  access_token = get_tokens_sync (provider,
Packit 79f644
                                  access_token_for_refresh,
Packit 79f644
                                  access_token_secret_for_refresh,
Packit 79f644
                                  session_handle_for_refresh,
Packit 79f644
                                  NULL, /* verifier */
Packit 79f644
                                  &access_token_secret,
Packit 79f644
                                  &access_token_expires_in,
Packit 79f644
                                  &session_handle,
Packit 79f644
                                  &session_handle_expires_in,
Packit 79f644
                                  cancellable,
Packit 79f644
                                  error);
Packit 79f644
  if (access_token == NULL)
Packit 79f644
    {
Packit 79f644
      if (error != NULL)
Packit 79f644
        {
Packit 79f644
          g_prefix_error (error, _("Failed to refresh access token (%s, %d): "),
Packit 79f644
                          g_quark_to_string ((*error)->domain), (*error)->code);
Packit 79f644
          (*error)->code = is_authorization_error (*error) ? GOA_ERROR_NOT_AUTHORIZED : GOA_ERROR_FAILED;
Packit 79f644
          (*error)->domain = GOA_ERROR;
Packit 79f644
        }
Packit 79f644
      goto out;
Packit 79f644
    }
Packit 79f644
Packit 79f644
  /* Good. Now update the keyring with the refreshed credentials */
Packit 79f644
  g_variant_builder_init (&builder, G_VARIANT_TYPE_VARDICT);
Packit 79f644
  g_variant_builder_add (&builder, "{sv}", "access_token", g_variant_new_string (access_token));
Packit 79f644
  g_variant_builder_add (&builder, "{sv}", "access_token_secret", g_variant_new_string (access_token_secret));
Packit 79f644
  if (access_token_expires_in > 0)
Packit 79f644
    g_variant_builder_add (&builder, "{sv}", "access_token_expires_at",
Packit 79f644
                           g_variant_new_int64 (duration_to_abs_usec (access_token_expires_in)));
Packit 79f644
  if (session_handle != NULL)
Packit 79f644
    g_variant_builder_add (&builder, "{sv}", "session_handle", g_variant_new_string (session_handle));
Packit 79f644
  if (session_handle_expires_in > 0)
Packit 79f644
    g_variant_builder_add (&builder, "{sv}", "session_handle_expires_at",
Packit 79f644
                           g_variant_new_int64 (duration_to_abs_usec (session_handle_expires_in)));
Packit 79f644
  if (password != NULL)
Packit 79f644
    g_variant_builder_add (&builder, "{sv}", "password", g_variant_new_string (password));
Packit 79f644
Packit 79f644
  /* TODO: run in worker thread */
Packit 79f644
  if (!goa_utils_store_credentials_for_object_sync (GOA_PROVIDER (provider),
Packit 79f644
                                                    object,
Packit 79f644
                                                    g_variant_builder_end (&builder),
Packit 79f644
                                                    cancellable,
Packit 79f644
                                                    error))
Packit 79f644
    {
Packit 79f644
      if (error != NULL)
Packit 79f644
        {
Packit 79f644
          (*error)->domain = GOA_ERROR;
Packit 79f644
          (*error)->code = GOA_ERROR_NOT_AUTHORIZED;
Packit 79f644
        }
Packit 79f644
      goto out;
Packit 79f644
    }
Packit 79f644
Packit 79f644
  success = TRUE;
Packit 79f644
Packit 79f644
 out:
Packit 79f644
  if (success)
Packit 79f644
    {
Packit 79f644
      ret = access_token; access_token = NULL;
Packit 79f644
      g_assert (ret != NULL);
Packit 79f644
      if (out_access_token_secret != NULL)
Packit 79f644
        {
Packit 79f644
          *out_access_token_secret = access_token_secret; access_token_secret = NULL;
Packit 79f644
        }
Packit 79f644
      if (out_access_token_expires_in != NULL)
Packit 79f644
        *out_access_token_expires_in = access_token_expires_in;
Packit 79f644
    }
Packit 79f644
  g_free (access_token);
Packit 79f644
  g_free (access_token_secret);
Packit 79f644
  g_free (session_handle);
Packit 79f644
  g_free (access_token_for_refresh);
Packit 79f644
  g_free (access_token_secret_for_refresh);
Packit 79f644
  g_free (session_handle_for_refresh);
Packit 79f644
  g_free (password);
Packit 79f644
  g_clear_pointer (&credentials, (GDestroyNotify) g_variant_unref);
Packit 79f644
Packit 79f644
  g_mutex_unlock (lock);
Packit 79f644
Packit 79f644
  return ret;
Packit 79f644
}
Packit 79f644
Packit 79f644
/* ---------------------------------------------------------------------------------------------------- */
Packit 79f644
Packit 79f644
static gboolean on_handle_get_access_token (GoaOAuthBased         *object,
Packit 79f644
                                            GDBusMethodInvocation *invocation,
Packit 79f644
                                            gpointer               user_data);
Packit 79f644
Packit 79f644
static gboolean
Packit 79f644
goa_oauth_provider_build_object (GoaProvider         *provider,
Packit 79f644
                                 GoaObjectSkeleton   *object,
Packit 79f644
                                 GKeyFile            *key_file,
Packit 79f644
                                 const gchar         *group,
Packit 79f644
                                 GDBusConnection     *connection,
Packit 79f644
                                 gboolean             just_added,
Packit 79f644
                                 GError             **error)
Packit 79f644
{
Packit 79f644
  GoaOAuthBased *oauth_based;
Packit 79f644
  gchar *identity;
Packit 79f644
Packit 79f644
  identity = NULL;
Packit 79f644
Packit 79f644
  oauth_based = goa_object_get_oauth_based (GOA_OBJECT (object));
Packit 79f644
  if (oauth_based != NULL)
Packit 79f644
    goto out;
Packit 79f644
Packit 79f644
  oauth_based = goa_oauth_based_skeleton_new ();
Packit 79f644
  goa_oauth_based_set_consumer_key (oauth_based,
Packit 79f644
                                    goa_oauth_provider_get_consumer_key (GOA_OAUTH_PROVIDER (provider)));
Packit 79f644
  goa_oauth_based_set_consumer_secret (oauth_based,
Packit 79f644
                                       goa_oauth_provider_get_consumer_secret (GOA_OAUTH_PROVIDER (provider)));
Packit 79f644
  /* Ensure D-Bus method invocations run in their own thread */
Packit 79f644
  g_dbus_interface_skeleton_set_flags (G_DBUS_INTERFACE_SKELETON (oauth_based),
Packit 79f644
                                       G_DBUS_INTERFACE_SKELETON_FLAGS_HANDLE_METHOD_INVOCATIONS_IN_THREAD);
Packit 79f644
  goa_object_skeleton_set_oauth_based (object, oauth_based);
Packit 79f644
  g_signal_connect (oauth_based,
Packit 79f644
                    "handle-get-access-token",
Packit 79f644
                    G_CALLBACK (on_handle_get_access_token),
Packit 79f644
                    NULL);
Packit 79f644
Packit 79f644
 out:
Packit 79f644
  g_object_unref (oauth_based);
Packit 79f644
  g_free (identity);
Packit 79f644
  return TRUE;
Packit 79f644
}
Packit 79f644
Packit 79f644
/* ---------------------------------------------------------------------------------------------------- */
Packit 79f644
Packit 79f644
static gboolean
Packit 79f644
goa_oauth_provider_ensure_credentials_sync (GoaProvider    *_provider,
Packit 79f644
                                            GoaObject      *object,
Packit 79f644
                                            gint           *out_expires_in,
Packit 79f644
                                            GCancellable   *cancellable,
Packit 79f644
                                            GError        **error)
Packit 79f644
{
Packit 79f644
  GoaOAuthProvider *provider = GOA_OAUTH_PROVIDER (_provider);
Packit 79f644
  gboolean ret = FALSE;
Packit 79f644
  gchar *access_token = NULL;
Packit 79f644
  gchar *access_token_secret = NULL;
Packit 79f644
  gint access_token_expires_in;
Packit 79f644
  gchar *identity = NULL;
Packit 79f644
  gboolean force_refresh = FALSE;
Packit 79f644
Packit 79f644
 again:
Packit 79f644
  access_token = goa_oauth_provider_get_access_token_sync (provider,
Packit 79f644
                                                                   object,
Packit 79f644
                                                                   force_refresh,
Packit 79f644
                                                                   &access_token_secret,
Packit 79f644
                                                                   &access_token_expires_in,
Packit 79f644
                                                                   cancellable,
Packit 79f644
                                                                   error);
Packit 79f644
  if (access_token == NULL)
Packit 79f644
    goto out;
Packit 79f644
Packit 79f644
  identity = goa_oauth_provider_get_identity_sync (provider,
Packit 79f644
                                                           access_token,
Packit 79f644
                                                           access_token_secret,
Packit 79f644
                                                           NULL, /* out_presentation_identity */
Packit 79f644
                                                           cancellable,
Packit 79f644
                                                           error);
Packit 79f644
  if (identity == NULL)
Packit 79f644
    {
Packit 79f644
      /* OK, try again, with forcing the locally cached credentials to be refreshed */
Packit 79f644
      if (!force_refresh)
Packit 79f644
        {
Packit 79f644
          force_refresh = TRUE;
Packit 79f644
          g_free (access_token); access_token = NULL;
Packit 79f644
          g_free (access_token_secret); access_token_secret = NULL;
Packit 79f644
          g_clear_error (error);
Packit 79f644
          goto again;
Packit 79f644
        }
Packit 79f644
      else
Packit 79f644
        {
Packit 79f644
          goto out;
Packit 79f644
        }
Packit 79f644
    }
Packit 79f644
Packit 79f644
  /* TODO: maybe check with the identity we have */
Packit 79f644
  ret = TRUE;
Packit 79f644
  if (out_expires_in != NULL)
Packit 79f644
    *out_expires_in = access_token_expires_in;
Packit 79f644
Packit 79f644
 out:
Packit 79f644
  g_free (identity);
Packit 79f644
  g_free (access_token);
Packit 79f644
  g_free (access_token_secret);
Packit 79f644
  return ret;
Packit 79f644
}
Packit 79f644
Packit 79f644
Packit 79f644
/* ---------------------------------------------------------------------------------------------------- */
Packit 79f644
Packit 79f644
static void
Packit 79f644
goa_oauth_provider_init (GoaOAuthProvider *client)
Packit 79f644
{
Packit 79f644
}
Packit 79f644
Packit 79f644
static void
Packit 79f644
goa_oauth_provider_class_init (GoaOAuthProviderClass *klass)
Packit 79f644
{
Packit 79f644
  GoaProviderClass *provider_class;
Packit 79f644
Packit 79f644
  provider_class = GOA_PROVIDER_CLASS (klass);
Packit 79f644
  provider_class->add_account                = goa_oauth_provider_add_account;
Packit 79f644
  provider_class->refresh_account            = goa_oauth_provider_refresh_account;
Packit 79f644
  provider_class->build_object               = goa_oauth_provider_build_object;
Packit 79f644
  provider_class->ensure_credentials_sync    = goa_oauth_provider_ensure_credentials_sync;
Packit 79f644
Packit 79f644
  klass->build_authorization_uri  = goa_oauth_provider_build_authorization_uri_default;
Packit 79f644
  klass->get_use_mobile_browser   = goa_oauth_provider_get_use_mobile_browser_default;
Packit 79f644
  klass->is_deny_node             = goa_oauth_provider_is_deny_node_default;
Packit 79f644
  klass->is_password_node         = goa_oauth_provider_is_password_node_default;
Packit 79f644
  klass->get_request_uri_params   = goa_oauth_provider_get_request_uri_params_default;
Packit 79f644
  klass->add_account_key_values   = goa_oauth_provider_add_account_key_values_default;
Packit 79f644
}
Packit 79f644
Packit 79f644
/* ---------------------------------------------------------------------------------------------------- */
Packit 79f644
Packit 79f644
/* runs in a thread dedicated to handling @invocation */
Packit 79f644
static gboolean
Packit 79f644
on_handle_get_access_token (GoaOAuthBased         *interface,
Packit 79f644
                            GDBusMethodInvocation *invocation,
Packit 79f644
                            gpointer               user_data)
Packit 79f644
{
Packit 79f644
  GoaObject *object;
Packit 79f644
  GoaAccount *account;
Packit 79f644
  GoaProvider *provider;
Packit 79f644
  GError *error;
Packit 79f644
  const gchar *id;
Packit 79f644
  const gchar *method_name;
Packit 79f644
  const gchar *provider_type;
Packit 79f644
  gchar *access_token = NULL;
Packit 79f644
  gchar *access_token_secret = NULL;
Packit 79f644
  gint access_token_expires_in;
Packit 79f644
Packit 79f644
  /* TODO: maybe log what app is requesting access */
Packit 79f644
Packit 79f644
  object = GOA_OBJECT (g_dbus_interface_get_object (G_DBUS_INTERFACE (interface)));
Packit 79f644
  account = goa_object_peek_account (object);
Packit 79f644
Packit 79f644
  id = goa_account_get_id (account);
Packit 79f644
  provider_type = goa_account_get_provider_type (account);
Packit 79f644
  method_name = g_dbus_method_invocation_get_method_name (invocation);
Packit 79f644
  g_debug ("Handling %s for account (%s, %s)", method_name, provider_type, id);
Packit 79f644
Packit 79f644
  provider = goa_provider_get_for_provider_type (provider_type);
Packit 79f644
Packit 79f644
  error = NULL;
Packit 79f644
  access_token = goa_oauth_provider_get_access_token_sync (GOA_OAUTH_PROVIDER (provider),
Packit 79f644
                                                                   object,
Packit 79f644
                                                                   FALSE, /* force_refresh */
Packit 79f644
                                                                   &access_token_secret,
Packit 79f644
                                                                   &access_token_expires_in,
Packit 79f644
                                                                   NULL, /* GCancellable* */
Packit 79f644
                                                                   &error);
Packit 79f644
  if (access_token == NULL)
Packit 79f644
    {
Packit 79f644
      g_dbus_method_invocation_take_error (invocation, error);
Packit 79f644
    }
Packit 79f644
  else
Packit 79f644
    {
Packit 79f644
      goa_oauth_based_complete_get_access_token (interface,
Packit 79f644
                                                 invocation,
Packit 79f644
                                                 access_token,
Packit 79f644
                                                 access_token_secret,
Packit 79f644
                                                 access_token_expires_in);
Packit 79f644
    }
Packit 79f644
  g_free (access_token);
Packit 79f644
  g_free (access_token_secret);
Packit 79f644
  g_object_unref (provider);
Packit 79f644
  return TRUE; /* invocation was handled */
Packit 79f644
}