You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
856 lines
26 KiB
856 lines
26 KiB
/*
|
|
* This file is part of the Polkit-qt project
|
|
* Copyright (C) 2009 Daniel Nicoletti <dantti85-pk@yahoo.com.br>
|
|
* Copyright (C) 2009 Dario Freddi <drf@kde.org>
|
|
* Copyright (C) 2009 Jaroslav Reznik <jreznik@redhat.com>
|
|
* Copyright (C) 2009 Radek Novacek <rnovacek@redhat.com>
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Library General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Library General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Library General Public License
|
|
* along with this library; see the file COPYING.LIB. If not, write to
|
|
* the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
|
* Boston, MA 02110-1301, USA.
|
|
*/
|
|
|
|
#include "polkitqt1-authority.h"
|
|
|
|
#include <TQtDBus/TQDBusInterface>
|
|
#include <TQtDBus/TQDBusReply>
|
|
|
|
#include <polkit/polkit.h>
|
|
|
|
namespace PolkitTQt1
|
|
{
|
|
|
|
class AuthorityHelper
|
|
{
|
|
public:
|
|
AuthorityHelper() : q(0) {}
|
|
~AuthorityHelper() {
|
|
delete q;
|
|
}
|
|
Authority *q;
|
|
};
|
|
|
|
Q_GLOBAL_STATIC(AuthorityHelper, s_globalAuthority)
|
|
|
|
Authority *Authority::instance(PolkitAuthority *authority)
|
|
{
|
|
if (!s_globalAuthority()->q) {
|
|
new Authority(authority);
|
|
}
|
|
|
|
return s_globalAuthority()->q;
|
|
}
|
|
|
|
Authority::Result polkitResultToResult(PolkitAuthorizationResult *result)
|
|
{
|
|
if (polkit_authorization_result_get_is_challenge(result)) {
|
|
return Authority::Challenge;
|
|
} else if (polkit_authorization_result_get_is_authorized(result)) {
|
|
return Authority::Yes;
|
|
} else {
|
|
return Authority::No;
|
|
}
|
|
}
|
|
|
|
ActionDescription::List actionsToListAndFree(GList *glist)
|
|
{
|
|
ActionDescription::List result;
|
|
for (GList *glist2 = glist; glist2; glist2 = g_list_next(glist2)) {
|
|
gpointer i = glist2->data;
|
|
result.append(ActionDescription(static_cast<PolkitActionDescription *>(i)));
|
|
g_object_unref(i);
|
|
}
|
|
|
|
g_list_free(glist);
|
|
return result;
|
|
}
|
|
|
|
class Authority::Private
|
|
{
|
|
public:
|
|
// Polkit will return NULL on failures, hence we use it instead of 0
|
|
Private(Authority *qq) : q(qq)
|
|
, pkAuthority(NULL)
|
|
, m_hasError(false) {}
|
|
|
|
~Private();
|
|
|
|
void init();
|
|
|
|
/** Use this method to set the error message to \p message. Set recover to \c true
|
|
* to try to reinitialize this object with init() method
|
|
*/
|
|
void setError(Authority::ErrorCode code, const TQString &details = TQString(), bool recover = false);
|
|
|
|
void dbusFilter(const TQDBusMessage &message);
|
|
void dbusSignalAdd(const TQString &service, const TQString &path, const TQString &interface, const TQString &name);
|
|
void seatSignalsConnect(const TQString &seat);
|
|
|
|
Authority *q;
|
|
PolkitAuthority *pkAuthority;
|
|
bool m_hasError;
|
|
Authority::ErrorCode m_lastError;
|
|
TQString m_errorDetails;
|
|
TQDBusConnection *m_systemBus;
|
|
GCancellable *m_checkAuthorizationCancellable,
|
|
*m_enumerateActionsCancellable,
|
|
*m_registerAuthenticationAgentCancellable,
|
|
*m_unregisterAuthenticationAgentCancellable,
|
|
*m_authenticationAgentResponseCancellable,
|
|
*m_enumerateTemporaryAuthorizationsCancellable,
|
|
*m_revokeTemporaryAuthorizationsCancellable,
|
|
*m_revokeTemporaryAuthorizationCancellable;
|
|
|
|
|
|
static void pk_config_changed();
|
|
static void checkAuthorizationCallback(GObject *object, GAsyncResult *result, gpointer user_data);
|
|
static void enumerateActionsCallback(GObject *object, GAsyncResult *result, gpointer user_data);
|
|
static void registerAuthenticationAgentCallback(GObject *object, GAsyncResult *result, gpointer user_data);
|
|
static void unregisterAuthenticationAgentCallback(GObject *object, GAsyncResult *result, gpointer user_data);
|
|
static void authenticationAgentResponseCallback(GObject *object, GAsyncResult *result, gpointer user_data);
|
|
static void enumerateTemporaryAuthorizationsCallback(GObject *object, GAsyncResult *result, gpointer user_data);
|
|
static void revokeTemporaryAuthorizationsCallback(GObject *object, GAsyncResult *result, gpointer user_data);
|
|
static void revokeTemporaryAuthorizationCallback(GObject *object, GAsyncResult *result, gpointer user_data);
|
|
};
|
|
|
|
Authority::Private::~Private()
|
|
{
|
|
g_object_unref(m_checkAuthorizationCancellable);
|
|
g_object_unref(m_enumerateActionsCancellable);
|
|
g_object_unref(m_registerAuthenticationAgentCancellable);
|
|
g_object_unref(m_unregisterAuthenticationAgentCancellable);
|
|
g_object_unref(m_authenticationAgentResponseCancellable);
|
|
g_object_unref(m_enumerateTemporaryAuthorizationsCancellable);
|
|
g_object_unref(m_revokeTemporaryAuthorizationsCancellable);
|
|
g_object_unref(m_revokeTemporaryAuthorizationCancellable);
|
|
}
|
|
|
|
Authority::Authority(PolkitAuthority *authority, TQObject *parent)
|
|
: TQObject(parent)
|
|
, d(new Private(this))
|
|
{
|
|
qRegisterMetaType<PolkitTQt1::Authority::Result> ();
|
|
qRegisterMetaType<PolkitTQt1::ActionDescription::List>();
|
|
|
|
Q_ASSERT(!s_globalAuthority()->q);
|
|
s_globalAuthority()->q = this;
|
|
|
|
if (authority) {
|
|
d->pkAuthority = authority;
|
|
}
|
|
|
|
d->init();
|
|
}
|
|
|
|
Authority::~Authority()
|
|
{
|
|
if (d->pkAuthority != NULL) {
|
|
g_object_unref(d->pkAuthority);
|
|
}
|
|
|
|
delete d;
|
|
}
|
|
|
|
void Authority::Private::init()
|
|
{
|
|
TQDBusError error;
|
|
TQDBusError dbus_error;
|
|
|
|
g_type_init();
|
|
|
|
m_checkAuthorizationCancellable = g_cancellable_new();
|
|
m_enumerateActionsCancellable = g_cancellable_new();
|
|
m_registerAuthenticationAgentCancellable = g_cancellable_new();
|
|
m_unregisterAuthenticationAgentCancellable = g_cancellable_new();
|
|
m_authenticationAgentResponseCancellable = g_cancellable_new();
|
|
m_enumerateTemporaryAuthorizationsCancellable = g_cancellable_new();
|
|
m_revokeTemporaryAuthorizationsCancellable = g_cancellable_new();
|
|
m_revokeTemporaryAuthorizationCancellable = g_cancellable_new();
|
|
|
|
#ifndef POLKIT_QT_1_COMPATIBILITY_MODE
|
|
GError *gerror = NULL;
|
|
#endif
|
|
if (pkAuthority == NULL) {
|
|
#ifndef POLKIT_QT_1_COMPATIBILITY_MODE
|
|
pkAuthority = polkit_authority_get_sync(NULL, &gerror);
|
|
if (gerror != NULL) {
|
|
setError(E_GetAuthority, gerror->message);
|
|
g_error_free(gerror);
|
|
return;
|
|
}
|
|
#else
|
|
pkAuthority = polkit_authority_get();
|
|
#endif
|
|
}
|
|
|
|
if (pkAuthority == NULL) {
|
|
#ifdef POLKIT_QT_1_COMPATIBILITY_MODE
|
|
(E_GetAuthority);
|
|
#endif
|
|
return;
|
|
}
|
|
|
|
// connect changed signal
|
|
g_signal_connect(G_OBJECT(pkAuthority), "changed", G_CALLBACK(pk_config_changed), NULL);
|
|
|
|
// need to listen to NameOwnerChanged
|
|
dbusSignalAdd("org.freedesktop.DBus", "/", "org.freedesktop.DBus", "NameOwnerChanged");
|
|
|
|
TQString consoleKitService("org.freedesktop.ConsoleKit");
|
|
TQString consoleKitManagerPath("/org/freedesktop/ConsoleKit/Manager");
|
|
TQString consoleKitManagerInterface("org.freedesktop.ConsoleKit.Manager");
|
|
TQString consoleKitSeatInterface("org.freedesktop.ConsoleKit.Seat");
|
|
|
|
// first, add signals SeadAdded and SeatRemoved from ConsoleKit Manager
|
|
dbusSignalAdd(consoleKitService, consoleKitManagerPath, consoleKitManagerInterface, "SeatAdded");
|
|
dbusSignalAdd(consoleKitService, consoleKitManagerPath, consoleKitManagerInterface, "SeatRemoved");
|
|
|
|
// then we need to extract all seats from ConsoleKit
|
|
TQDBusMessage msg = TQDBusMessage::createMethodCall(consoleKitService, consoleKitManagerPath, consoleKitManagerInterface, "GetSeats");
|
|
msg = TQDBusConnection::systemBus().call(msg);
|
|
if (!msg.arguments().isEmpty()) {
|
|
// this method returns a list with present seats
|
|
TQList<TQString> seats;
|
|
qVariantValue<TQDBusArgument> (msg.arguments()[0]) >> seats;
|
|
// it can be multiple seats present so connect all their signals
|
|
Q_FOREACH(const TQString &seat, seats) {
|
|
seatSignalsConnect(seat);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Authority::Private::setError(Authority::ErrorCode code, const TQString &details, bool recover)
|
|
{
|
|
if (recover) {
|
|
init();
|
|
}
|
|
m_lastError = code;
|
|
m_errorDetails = details;
|
|
m_hasError = true;
|
|
}
|
|
|
|
void Authority::Private::seatSignalsConnect(const TQString &seat)
|
|
{
|
|
TQString consoleKitService("org.freedesktop.ConsoleKit");
|
|
TQString consoleKitSeatInterface("org.freedesktop.ConsoleKit.Seat");
|
|
// we want to connect to all slots of the seat
|
|
dbusSignalAdd(consoleKitService, seat, consoleKitSeatInterface, "DeviceAdded");
|
|
dbusSignalAdd(consoleKitService, seat, consoleKitSeatInterface, "DeviceRemoved");
|
|
dbusSignalAdd(consoleKitService, seat, consoleKitSeatInterface, "SessionAdded");
|
|
dbusSignalAdd(consoleKitService, seat, consoleKitSeatInterface, "SessionRemoved");
|
|
dbusSignalAdd(consoleKitService, seat, consoleKitSeatInterface, "ActiveSessionChanged");
|
|
}
|
|
|
|
void Authority::Private::dbusSignalAdd(const TQString &service, const TQString &path, const TQString &interface, const TQString &name)
|
|
{
|
|
// FIXME: This code seems to be nonfunctional - it needs to be fixed somewhere (is it TQt BUG?)
|
|
TQDBusConnection::systemBus().connect(service, path, interface, name,
|
|
q, SLOT(dbusFilter(const TQDBusMessage &)));
|
|
}
|
|
|
|
void Authority::Private::dbusFilter(const TQDBusMessage &message)
|
|
{
|
|
if (message.type() == TQDBusMessage::SignalMessage) {
|
|
Q_EMIT q->consoleKitDBChanged();
|
|
|
|
// TODO: Test this with the multiseat support
|
|
if (message.member() == "SeatAdded") {
|
|
seatSignalsConnect(qVariantValue<TQDBusObjectPath> (message.arguments()[0]).path());
|
|
}
|
|
}
|
|
}
|
|
|
|
bool Authority::hasError() const
|
|
{
|
|
return d->m_hasError;
|
|
}
|
|
|
|
Authority::ErrorCode Authority::lastError() const
|
|
{
|
|
return d->m_lastError;
|
|
}
|
|
|
|
const TQString Authority::errorDetails() const
|
|
{
|
|
if (d->m_lastError == E_None) {
|
|
return TQString();
|
|
} else {
|
|
return d->m_errorDetails;
|
|
}
|
|
}
|
|
|
|
void Authority::clearError()
|
|
{
|
|
d->m_hasError = false;
|
|
d->m_lastError = E_None;
|
|
}
|
|
|
|
void Authority::Private::pk_config_changed()
|
|
{
|
|
Q_EMIT Authority::instance()->configChanged();
|
|
}
|
|
|
|
PolkitAuthority *Authority::polkitAuthority() const
|
|
{
|
|
return d->pkAuthority;
|
|
}
|
|
|
|
Authority::Result Authority::checkAuthorizationSync(const TQString &actionId, const Subject &subject, AuthorizationFlags flags)
|
|
{
|
|
PolkitAuthorizationResult *pk_result;
|
|
GError *error = NULL;
|
|
|
|
if (Authority::instance()->hasError()) {
|
|
return Unknown;
|
|
}
|
|
|
|
if (!subject.isValid()) {
|
|
d->setError(E_WrongSubject);
|
|
return Unknown;
|
|
}
|
|
|
|
pk_result = polkit_authority_check_authorization_sync(d->pkAuthority,
|
|
subject.subject(),
|
|
actionId.toAscii().data(),
|
|
NULL,
|
|
(PolkitCheckAuthorizationFlags)(int)flags,
|
|
NULL,
|
|
&error);
|
|
|
|
if (error != NULL) {
|
|
d->setError(E_CheckFailed, error->message);
|
|
g_error_free(error);
|
|
return Unknown;
|
|
}
|
|
|
|
if (!pk_result) {
|
|
d->setError(E_UnknownResult);
|
|
return Unknown;
|
|
} else {
|
|
Authority::Result res = polkitResultToResult(pk_result);
|
|
g_object_unref(pk_result);
|
|
return res;
|
|
}
|
|
}
|
|
|
|
void Authority::checkAuthorization(const TQString &actionId, const Subject &subject, AuthorizationFlags flags)
|
|
{
|
|
if (Authority::instance()->hasError()) {
|
|
return;
|
|
}
|
|
|
|
if (!subject.isValid()) {
|
|
d->setError(E_WrongSubject);
|
|
return;
|
|
}
|
|
|
|
polkit_authority_check_authorization(d->pkAuthority,
|
|
subject.subject(),
|
|
actionId.toAscii().data(),
|
|
NULL,
|
|
(PolkitCheckAuthorizationFlags)(int)flags,
|
|
d->m_checkAuthorizationCancellable,
|
|
d->checkAuthorizationCallback, this);
|
|
}
|
|
|
|
void Authority::Private::checkAuthorizationCallback(GObject *object, GAsyncResult *result, gpointer user_data)
|
|
{
|
|
Authority *authority = (Authority *) user_data;
|
|
|
|
Q_ASSERT(authority != NULL);
|
|
|
|
GError *error = NULL;
|
|
PolkitAuthorizationResult *pkResult = polkit_authority_check_authorization_finish((PolkitAuthority *) object, result, &error);
|
|
|
|
if (error != NULL) {
|
|
// We don't want to set error if this is cancellation of some action
|
|
if (error->code != 1) {
|
|
authority->d->setError(E_CheckFailed, error->message);
|
|
}
|
|
g_error_free(error);
|
|
return;
|
|
}
|
|
if (pkResult != NULL) {
|
|
Q_EMIT authority->checkAuthorizationFinished(polkitResultToResult(pkResult));
|
|
g_object_unref(pkResult);
|
|
} else {
|
|
authority->d->setError(E_UnknownResult);
|
|
}
|
|
}
|
|
|
|
void Authority::checkAuthorizationCancel()
|
|
{
|
|
if (!g_cancellable_is_cancelled(d->m_checkAuthorizationCancellable)) {
|
|
g_cancellable_cancel(d->m_checkAuthorizationCancellable);
|
|
}
|
|
}
|
|
|
|
ActionDescription::List Authority::enumerateActionsSync()
|
|
{
|
|
if (Authority::instance()->hasError()) {
|
|
return ActionDescription::List();
|
|
}
|
|
|
|
GError *error = NULL;
|
|
|
|
GList *glist = polkit_authority_enumerate_actions_sync(d->pkAuthority,
|
|
NULL,
|
|
&error);
|
|
|
|
if (error != NULL) {
|
|
d->setError(E_EnumFailed, error->message);
|
|
g_error_free(error);
|
|
return ActionDescription::List();
|
|
}
|
|
|
|
return actionsToListAndFree(glist);
|
|
}
|
|
|
|
void Authority::enumerateActions()
|
|
{
|
|
if (Authority::instance()->hasError()) {
|
|
return;
|
|
}
|
|
|
|
polkit_authority_enumerate_actions(d->pkAuthority,
|
|
d->m_enumerateActionsCancellable,
|
|
d->enumerateActionsCallback,
|
|
Authority::instance());
|
|
}
|
|
|
|
void Authority::Private::enumerateActionsCallback(GObject *object, GAsyncResult *result, gpointer user_data)
|
|
{
|
|
Authority *authority = (Authority *) user_data;
|
|
Q_ASSERT(authority != NULL);
|
|
GError *error = NULL;
|
|
GList *list = polkit_authority_enumerate_actions_finish((PolkitAuthority *) object, result, &error);
|
|
if (error != NULL) {
|
|
// We don't want to set error if this is cancellation of some action
|
|
if (error->code != 1) {
|
|
authority->d->setError(E_EnumFailed, error->message);
|
|
}
|
|
g_error_free(error);
|
|
return;
|
|
}
|
|
|
|
Q_EMIT authority->enumerateActionsFinished(actionsToListAndFree(list));
|
|
}
|
|
|
|
void Authority::enumerateActionsCancel()
|
|
{
|
|
if (!g_cancellable_is_cancelled(d->m_enumerateActionsCancellable)) {
|
|
g_cancellable_cancel(d->m_enumerateActionsCancellable);
|
|
}
|
|
}
|
|
|
|
bool Authority::registerAuthenticationAgentSync(const Subject &subject, const TQString &locale, const TQString &objectPath)
|
|
{
|
|
if (Authority::instance()->hasError()) {
|
|
return false;
|
|
}
|
|
|
|
gboolean result;
|
|
GError *error = NULL;
|
|
|
|
if (!subject.isValid()) {
|
|
d->setError(E_WrongSubject);
|
|
return false;
|
|
}
|
|
|
|
result = polkit_authority_register_authentication_agent_sync(d->pkAuthority,
|
|
subject.subject(), locale.toAscii().data(),
|
|
objectPath.toAscii().data(), NULL, &error);
|
|
|
|
if (error) {
|
|
d->setError(E_RegisterFailed, error->message);
|
|
g_error_free(error);
|
|
return false;
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
void Authority::registerAuthenticationAgent(const Subject &subject, const TQString &locale, const TQString &objectPath)
|
|
{
|
|
if (Authority::instance()->hasError()) {
|
|
return;
|
|
}
|
|
|
|
if (!subject.isValid()) {
|
|
d->setError(E_WrongSubject);
|
|
return;
|
|
}
|
|
|
|
polkit_authority_register_authentication_agent(d->pkAuthority,
|
|
subject.subject(),
|
|
locale.toAscii().data(),
|
|
objectPath.toAscii().data(),
|
|
d->m_registerAuthenticationAgentCancellable,
|
|
d->registerAuthenticationAgentCallback,
|
|
this);
|
|
}
|
|
|
|
void Authority::Private::registerAuthenticationAgentCallback(GObject *object, GAsyncResult *result, gpointer user_data)
|
|
{
|
|
Authority *authority = (Authority *) user_data;
|
|
Q_ASSERT(authority != NULL);
|
|
GError *error = NULL;
|
|
bool res = polkit_authority_register_authentication_agent_finish((PolkitAuthority *) object, result, &error);
|
|
if (error != NULL) {
|
|
// We don't want to set error if this is cancellation of some action
|
|
if (error->code != 1) {
|
|
authority->d->setError(E_EnumFailed , error->message);
|
|
}
|
|
g_error_free(error);
|
|
return;
|
|
}
|
|
|
|
Q_EMIT authority->registerAuthenticationAgentFinished(res);
|
|
}
|
|
|
|
void Authority::registerAuthenticationAgentCancel()
|
|
{
|
|
if (!g_cancellable_is_cancelled(d->m_registerAuthenticationAgentCancellable)) {
|
|
g_cancellable_cancel(d->m_registerAuthenticationAgentCancellable);
|
|
}
|
|
}
|
|
|
|
bool Authority::unregisterAuthenticationAgentSync(const Subject &subject, const TQString &objectPath)
|
|
{
|
|
if (d->pkAuthority) {
|
|
return false;
|
|
}
|
|
|
|
if (!subject.isValid()) {
|
|
d->setError(E_WrongSubject);
|
|
return false;
|
|
}
|
|
|
|
GError *error = NULL;
|
|
|
|
bool result = polkit_authority_unregister_authentication_agent_sync(d->pkAuthority,
|
|
subject.subject(),
|
|
objectPath.toUtf8().data(),
|
|
NULL,
|
|
&error);
|
|
|
|
if (error != NULL) {
|
|
d->setError(E_UnregisterFailed, error->message);
|
|
g_error_free(error);
|
|
return false;
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
void Authority::unregisterAuthenticationAgent(const Subject &subject, const TQString &objectPath)
|
|
{
|
|
if (Authority::instance()->hasError()) {
|
|
return;
|
|
}
|
|
|
|
if (!subject.isValid()) {
|
|
d->setError(E_WrongSubject);
|
|
return;
|
|
}
|
|
|
|
polkit_authority_unregister_authentication_agent(d->pkAuthority,
|
|
subject.subject(),
|
|
objectPath.toUtf8().data(),
|
|
d->m_unregisterAuthenticationAgentCancellable,
|
|
d->unregisterAuthenticationAgentCallback,
|
|
this);
|
|
}
|
|
|
|
void Authority::Private::unregisterAuthenticationAgentCallback(GObject *object, GAsyncResult *result, gpointer user_data)
|
|
{
|
|
Authority *authority = (Authority *) user_data;
|
|
Q_ASSERT(authority);
|
|
GError *error = NULL;
|
|
bool res = polkit_authority_unregister_authentication_agent_finish((PolkitAuthority *) object, result, &error);
|
|
if (error != NULL) {
|
|
// We don't want to set error if this is cancellation of some action
|
|
if (error->code != 1) {
|
|
authority->d->setError(E_UnregisterFailed, error->message);
|
|
}
|
|
g_error_free(error);
|
|
return;
|
|
}
|
|
|
|
Q_EMIT authority->unregisterAuthenticationAgentFinished(res);
|
|
}
|
|
|
|
void Authority::unregisterAuthenticationAgentCancel()
|
|
{
|
|
if (!g_cancellable_is_cancelled(d->m_unregisterAuthenticationAgentCancellable)) {
|
|
g_cancellable_cancel(d->m_unregisterAuthenticationAgentCancellable);
|
|
}
|
|
}
|
|
|
|
bool Authority::authenticationAgentResponseSync(const TQString &cookie, const Identity &identity)
|
|
{
|
|
if (Authority::instance()->hasError()) {
|
|
return false;
|
|
}
|
|
|
|
if (cookie.isEmpty() || !identity.isValid()) {
|
|
d->setError(E_CookieOrIdentityEmpty);
|
|
return false;
|
|
}
|
|
|
|
GError *error = NULL;
|
|
|
|
bool result = polkit_authority_authentication_agent_response_sync(d->pkAuthority,
|
|
cookie.toUtf8().data(),
|
|
identity.identity(),
|
|
NULL,
|
|
&error);
|
|
if (error != NULL) {
|
|
d->setError(E_AgentResponseFailed, error->message);
|
|
g_error_free(error);
|
|
return false;
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
void Authority::authenticationAgentResponse(const TQString &cookie, const Identity &identity)
|
|
{
|
|
if (Authority::instance()->hasError()) {
|
|
return;
|
|
}
|
|
|
|
if (cookie.isEmpty() || !identity.isValid()) {
|
|
d->setError(E_CookieOrIdentityEmpty);
|
|
return;
|
|
}
|
|
|
|
polkit_authority_authentication_agent_response(d->pkAuthority,
|
|
cookie.toUtf8().data(),
|
|
identity.identity(),
|
|
d->m_authenticationAgentResponseCancellable,
|
|
d->authenticationAgentResponseCallback,
|
|
this);
|
|
}
|
|
|
|
void Authority::Private::authenticationAgentResponseCallback(GObject *object, GAsyncResult *result, gpointer user_data)
|
|
{
|
|
Authority *authority = (Authority *) user_data;
|
|
Q_ASSERT(authority);
|
|
GError *error = NULL;
|
|
bool res = polkit_authority_authentication_agent_response_finish((PolkitAuthority *) object, result, &error);
|
|
if (error != NULL) {
|
|
// We don't want to set error if this is cancellation of some action
|
|
if (error->code != 1) {
|
|
authority->d->setError(E_AgentResponseFailed, error->message);
|
|
}
|
|
g_error_free(error);
|
|
return;
|
|
}
|
|
|
|
Q_EMIT authority->authenticationAgentResponseFinished(res);
|
|
}
|
|
|
|
void Authority::authenticationAgentResponseCancel()
|
|
{
|
|
if (!g_cancellable_is_cancelled(d->m_authenticationAgentResponseCancellable)) {
|
|
g_cancellable_cancel(d->m_authenticationAgentResponseCancellable);
|
|
}
|
|
}
|
|
|
|
TemporaryAuthorization::List Authority::enumerateTemporaryAuthorizationsSync(const Subject &subject)
|
|
{
|
|
TemporaryAuthorization::List result;
|
|
|
|
GError *error = NULL;
|
|
GList *glist = polkit_authority_enumerate_temporary_authorizations_sync(d->pkAuthority,
|
|
subject.subject(),
|
|
NULL,
|
|
&error);
|
|
if (error != NULL) {
|
|
d->setError(E_EnumFailed, error->message);
|
|
g_error_free(error);
|
|
return result;
|
|
}
|
|
|
|
GList *glist2;
|
|
for (glist2 = glist; glist2 != NULL; glist2 = g_list_next(glist2)) {
|
|
result.append(TemporaryAuthorization((PolkitTemporaryAuthorization *) glist2->data));
|
|
g_object_unref(glist2->data);
|
|
}
|
|
|
|
g_list_free(glist);
|
|
|
|
return result;
|
|
}
|
|
|
|
void Authority::Private::enumerateTemporaryAuthorizationsCallback(GObject *object, GAsyncResult *result, gpointer user_data)
|
|
{
|
|
Authority *authority = (Authority *) user_data;
|
|
Q_ASSERT(authority);
|
|
GError *error = NULL;
|
|
|
|
GList *glist = polkit_authority_enumerate_temporary_authorizations_finish((PolkitAuthority *) object, result, &error);
|
|
|
|
if (error != NULL) {
|
|
// We don't want to set error if this is cancellation of some action
|
|
if (error->code != 1) {
|
|
authority->d->setError(E_EnumFailed, error->message);
|
|
}
|
|
g_error_free(error);
|
|
return;
|
|
}
|
|
TemporaryAuthorization::List res;
|
|
GList *glist2;
|
|
for (glist2 = glist; glist2 != NULL; glist2 = g_list_next(glist2)) {
|
|
res.append(TemporaryAuthorization((PolkitTemporaryAuthorization *) glist2->data));
|
|
g_object_unref(glist2->data);
|
|
}
|
|
|
|
g_list_free(glist);
|
|
|
|
Q_EMIT authority->enumerateTemporaryAuthorizationsFinished(res);
|
|
}
|
|
|
|
void Authority::enumerateTemporaryAuthorizationsCancel()
|
|
{
|
|
if (!g_cancellable_is_cancelled(d->m_enumerateTemporaryAuthorizationsCancellable)) {
|
|
g_cancellable_cancel(d->m_enumerateTemporaryAuthorizationsCancellable);
|
|
}
|
|
}
|
|
|
|
bool Authority::revokeTemporaryAuthorizationsSync(const Subject &subject)
|
|
{
|
|
bool result;
|
|
if (Authority::instance()->hasError()) {
|
|
return false;
|
|
}
|
|
|
|
GError *error = NULL;
|
|
result = polkit_authority_revoke_temporary_authorizations_sync(d->pkAuthority,
|
|
subject.subject(),
|
|
NULL,
|
|
&error);
|
|
if (error != NULL) {
|
|
d->setError(E_RevokeFailed, error->message);
|
|
g_error_free(error);
|
|
return false;
|
|
}
|
|
return result;
|
|
}
|
|
|
|
void Authority::revokeTemporaryAuthorizations(const Subject &subject)
|
|
{
|
|
if (Authority::instance()->hasError()) {
|
|
return;
|
|
}
|
|
|
|
polkit_authority_revoke_temporary_authorizations(d->pkAuthority,
|
|
subject.subject(),
|
|
d->m_revokeTemporaryAuthorizationsCancellable,
|
|
d->revokeTemporaryAuthorizationsCallback,
|
|
this);
|
|
}
|
|
|
|
void Authority::Private::revokeTemporaryAuthorizationsCallback(GObject *object, GAsyncResult *result, gpointer user_data)
|
|
{
|
|
Authority *authority = (Authority *) user_data;
|
|
Q_ASSERT(authority != NULL);
|
|
GError *error = NULL;
|
|
|
|
bool res = polkit_authority_revoke_temporary_authorizations_finish((PolkitAuthority *) object, result, &error);
|
|
|
|
if (error != NULL) {
|
|
// We don't want to set error if this is cancellation of some action
|
|
if (error->code != 1) {
|
|
authority->d->setError(E_RevokeFailed, error->message);
|
|
}
|
|
g_error_free(error);
|
|
return;
|
|
}
|
|
|
|
Q_EMIT authority->revokeTemporaryAuthorizationsFinished(res);
|
|
}
|
|
|
|
void Authority::revokeTemporaryAuthorizationsCancel()
|
|
{
|
|
if (!g_cancellable_is_cancelled(d->m_revokeTemporaryAuthorizationsCancellable)) {
|
|
g_cancellable_cancel(d->m_revokeTemporaryAuthorizationsCancellable);
|
|
}
|
|
}
|
|
|
|
bool Authority::revokeTemporaryAuthorizationSync(const TQString &id)
|
|
{
|
|
bool result;
|
|
if (Authority::instance()->hasError()) {
|
|
return false;
|
|
}
|
|
|
|
GError *error = NULL;
|
|
result = polkit_authority_revoke_temporary_authorization_by_id_sync(d->pkAuthority,
|
|
id.toUtf8().data(),
|
|
NULL,
|
|
&error);
|
|
if (error != NULL) {
|
|
d->setError(E_RevokeFailed, error->message);
|
|
g_error_free(error);
|
|
return false;
|
|
}
|
|
return result;
|
|
}
|
|
|
|
void Authority::revokeTemporaryAuthorization(const TQString &id)
|
|
{
|
|
if (Authority::instance()->hasError()) {
|
|
return;
|
|
}
|
|
|
|
polkit_authority_revoke_temporary_authorization_by_id(d->pkAuthority,
|
|
id.toUtf8().data(),
|
|
d->m_revokeTemporaryAuthorizationCancellable,
|
|
d->revokeTemporaryAuthorizationCallback,
|
|
this);
|
|
}
|
|
|
|
void Authority::Private::revokeTemporaryAuthorizationCallback(GObject *object, GAsyncResult *result, gpointer user_data)
|
|
{
|
|
Authority *authority = (Authority *) user_data;
|
|
Q_ASSERT(authority != NULL);
|
|
GError *error = NULL;
|
|
|
|
bool res = polkit_authority_revoke_temporary_authorization_by_id_finish((PolkitAuthority *) object, result, &error);
|
|
|
|
if (error != NULL) {
|
|
// We don't want to set error if this is cancellation of some action
|
|
if (error->code != 1) {
|
|
authority->d->setError(E_RevokeFailed, error->message);
|
|
}
|
|
g_error_free(error);
|
|
return;
|
|
}
|
|
|
|
Q_EMIT authority->revokeTemporaryAuthorizationFinished(res);
|
|
}
|
|
|
|
void Authority::revokeTemporaryAuthorizationCancel()
|
|
{
|
|
if (!g_cancellable_is_cancelled(d->m_revokeTemporaryAuthorizationCancellable)) {
|
|
g_cancellable_cancel(d->m_revokeTemporaryAuthorizationCancellable);
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
#include "polkitqt1-authority.moc"
|