Chromium Code Reviews

Side by Side Diff: chrome/browser/password_manager/password_store_mac.cc

Issue 1763013: Revert 45640 - Send out notifications when logins are changed through Passwor... (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Created 10 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments.
Jump to:
View unified diff | | Annotate | Revision Log
« no previous file with comments | « chrome/browser/password_manager/password_store_mac.h ('k') | chrome/common/notification_type.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2009 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2009 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/password_manager/password_store_mac.h" 5 #include "chrome/browser/password_manager/password_store_mac.h"
6 #include "chrome/browser/password_manager/password_store_mac_internal.h" 6 #include "chrome/browser/password_manager/password_store_mac_internal.h"
7 7
8 #include <CoreServices/CoreServices.h> 8 #include <CoreServices/CoreServices.h>
9 #include <string> 9 #include <string>
10 #include <vector> 10 #include <vector>
11 11
12 #include "base/logging.h" 12 #include "base/logging.h"
13 #include "base/mac_util.h" 13 #include "base/mac_util.h"
14 #include "base/stl_util-inl.h" 14 #include "base/stl_util-inl.h"
15 #include "base/string_util.h" 15 #include "base/string_util.h"
16 #include "base/task.h"
17 #include "base/utf_string_conversions.h" 16 #include "base/utf_string_conversions.h"
18 #include "chrome/browser/keychain_mac.h" 17 #include "chrome/browser/keychain_mac.h"
19 #include "chrome/browser/password_manager/login_database.h" 18 #include "chrome/browser/password_manager/login_database.h"
20 #include "chrome/browser/password_manager/password_store_change.h"
21 19
22 using webkit_glue::PasswordForm; 20 using webkit_glue::PasswordForm;
23 21
24 // Utility class to handle the details of constructing and running a keychain 22 // Utility class to handle the details of constructing and running a keychain
25 // search from a set of attributes. 23 // search from a set of attributes.
26 class KeychainSearch { 24 class KeychainSearch {
27 public: 25 public:
28 explicit KeychainSearch(const MacKeychain& keychain); 26 explicit KeychainSearch(const MacKeychain& keychain);
29 ~KeychainSearch(); 27 ~KeychainSearch();
30 28
(...skipping 680 matching lines...)
711 #pragma mark - 709 #pragma mark -
712 710
713 PasswordStoreMac::PasswordStoreMac(MacKeychain* keychain, 711 PasswordStoreMac::PasswordStoreMac(MacKeychain* keychain,
714 LoginDatabase* login_db) 712 LoginDatabase* login_db)
715 : keychain_(keychain), login_metadata_db_(login_db) { 713 : keychain_(keychain), login_metadata_db_(login_db) {
716 DCHECK(keychain_.get()); 714 DCHECK(keychain_.get());
717 DCHECK(login_metadata_db_.get()); 715 DCHECK(login_metadata_db_.get());
718 } 716 }
719 717
720 PasswordStoreMac::~PasswordStoreMac() { 718 PasswordStoreMac::~PasswordStoreMac() {
721 if (thread_.get()) {
722 thread_->message_loop()->DeleteSoon(FROM_HERE,
723 notification_service_.release());
724 thread_->message_loop()->RunAllPending();
725 }
726 } 719 }
727 720
728 bool PasswordStoreMac::Init() { 721 bool PasswordStoreMac::Init() {
729 thread_.reset(new base::Thread("Chrome_PasswordStore_Thread")); 722 thread_.reset(new base::Thread("Chrome_PasswordStore_Thread"));
730 723
731 if (!thread_->Start()) { 724 if (!thread_->Start()) {
732 thread_.reset(NULL); 725 thread_.reset(NULL);
733 return false; 726 return false;
734 } 727 }
735 ScheduleTask(NewRunnableMethod(this,
736 &PasswordStoreMac::CreateNotificationService));
737 return PasswordStore::Init(); 728 return PasswordStore::Init();
738 } 729 }
739 730
740 void PasswordStoreMac::ScheduleTask(Task* task) { 731 void PasswordStoreMac::ScheduleTask(Task* task) {
741 if (thread_.get()) { 732 if (thread_.get()) {
742 thread_->message_loop()->PostTask(FROM_HERE, task); 733 thread_->message_loop()->PostTask(FROM_HERE, task);
743 } 734 }
744 } 735 }
745 736
746 void PasswordStoreMac::AddLoginImpl(const PasswordForm& form) { 737 void PasswordStoreMac::AddLoginImpl(const PasswordForm& form) {
747 if (AddToKeychainIfNecessary(form)) { 738 if (AddToKeychainIfNecessary(form)) {
748 if (login_metadata_db_->AddLogin(form)) { 739 login_metadata_db_->AddLogin(form);
749 PasswordStoreChangeList changes;
750 changes.push_back(PasswordStoreChange(PasswordStoreChange::ADD, form));
751 NotificationService::current()->Notify(
752 NotificationType::LOGINS_CHANGED,
753 NotificationService::AllSources(),
754 Details<PasswordStoreChangeList>(&changes));
755 }
756 } 740 }
757 } 741 }
758 742
759 void PasswordStoreMac::UpdateLoginImpl(const PasswordForm& form) { 743 void PasswordStoreMac::UpdateLoginImpl(const PasswordForm& form) {
760 // The keychain add will update if there is a collision and add if there 744 // The keychain add will update if there is a collision and add if there
761 // isn't, which is the behavior we want, so there's no separate update call. 745 // isn't, which is the behavior we want, so there's no separate update call.
762 if (AddToKeychainIfNecessary(form)) { 746 if (AddToKeychainIfNecessary(form)) {
763 int update_count = 0; 747 int update_count = 0;
764 if (login_metadata_db_->UpdateLogin(form, &update_count)) { 748 login_metadata_db_->UpdateLogin(form, &update_count);
765 // Update will catch any database entries that we already had, but we 749 // Update will catch any database entries that we already had, but we could
766 // could also be updating a keychain-only form, in which case we need to 750 // also be updating a keychain-only form, in which case we need to add.
767 // add. 751 if (update_count == 0) {
768 PasswordStoreChangeList changes; 752 login_metadata_db_->AddLogin(form);
769 if (update_count == 0) {
770 if (login_metadata_db_->AddLogin(form)) {
771 changes.push_back(PasswordStoreChange(PasswordStoreChange::ADD,
772 form));
773 }
774 } else {
775 changes.push_back(PasswordStoreChange(PasswordStoreChange::UPDATE,
776 form));
777 }
778 if (!changes.empty()) {
779 NotificationService::current()->Notify(
780 NotificationType::LOGINS_CHANGED,
781 NotificationService::AllSources(),
782 Details<PasswordStoreChangeList>(&changes));
783 }
784 } 753 }
785 } 754 }
786 } 755 }
787 756
788 void PasswordStoreMac::RemoveLoginImpl(const PasswordForm& form) { 757 void PasswordStoreMac::RemoveLoginImpl(const PasswordForm& form) {
789 if (login_metadata_db_->RemoveLogin(form)) { 758 login_metadata_db_->RemoveLogin(form);
790 // See if we own a Keychain item associated with this item. We can do an 759
791 // exact search rather than messing around with trying to do fuzzy matching 760 // See if we own a Keychain item associated with this item. We can do an exact
792 // because passwords that we created will always have an exact-match 761 // search rather than messing around with trying to do fuzzy matching because
793 // database entry. 762 // passwords that we created will always have an exact-match database entry.
794 // (If a user does lose their profile but not their keychain we'll treat the 763 // (If a user does lose their profile but not their keychain we'll treat the
795 // entries we find like other imported entries anyway, so it's reasonable to 764 // entries we find like other imported entries anyway, so it's reasonable to
796 // handle deletes on them the way we would for an imported item.) 765 // handle deletes on them the way we would for an imported item.)
797 MacKeychainPasswordFormAdapter owned_keychain_adapter(keychain_.get()); 766 MacKeychainPasswordFormAdapter owned_keychain_adapter(keychain_.get());
798 owned_keychain_adapter.SetFindsOnlyOwnedItems(true); 767 owned_keychain_adapter.SetFindsOnlyOwnedItems(true);
799 PasswordForm* owned_password_form = 768 PasswordForm* owned_password_form =
800 owned_keychain_adapter.PasswordExactlyMatchingForm(form); 769 owned_keychain_adapter.PasswordExactlyMatchingForm(form);
801 if (owned_password_form) { 770 if (owned_password_form) {
802 // If we don't have other forms using it (i.e., a form differing only by 771 // If we don't have other forms using it (i.e., a form differing only by
803 // the names of the form elements), delete the keychain entry. 772 // the names of the form elements), delete the keychain entry.
804 if (!DatabaseHasFormMatchingKeychainForm(form)) { 773 if (!DatabaseHasFormMatchingKeychainForm(form)) {
805 owned_keychain_adapter.RemovePassword(form); 774 owned_keychain_adapter.RemovePassword(form);
806 }
807 } 775 }
808
809 PasswordStoreChangeList changes;
810 changes.push_back(PasswordStoreChange(PasswordStoreChange::REMOVE, form));
811 NotificationService::current()->Notify(
812 NotificationType::LOGINS_CHANGED,
813 NotificationService::AllSources(),
814 Details<PasswordStoreChangeList>(&changes));
815 } 776 }
816 } 777 }
817 778
818 void PasswordStoreMac::RemoveLoginsCreatedBetweenImpl( 779 void PasswordStoreMac::RemoveLoginsCreatedBetweenImpl(
819 const base::Time& delete_begin, const base::Time& delete_end) { 780 const base::Time& delete_begin, const base::Time& delete_end) {
820 std::vector<PasswordForm*> forms; 781 login_metadata_db_->RemoveLoginsCreatedBetween(delete_begin, delete_end);
821 if (login_metadata_db_->GetLoginsCreatedBetween(delete_begin, delete_end,
822 &forms)) {
823 if (login_metadata_db_->RemoveLoginsCreatedBetween(delete_begin,
824 delete_end)) {
825 // We can't delete from the Keychain by date because we may be sharing
826 // items with database entries that weren't in the delete range. Instead,
827 // we find all the Keychain items we own but aren't using any more and
828 // delete those.
829 std::vector<PasswordForm*> orphan_keychain_forms =
830 GetUnusedKeychainForms();
831 // This is inefficient, since we have to re-look-up each keychain item
832 // one at a time to delete it even though the search step already had a
833 // list of Keychain item references. If this turns out to be noticeably
834 // slow we'll need to rearchitect to allow the search and deletion steps
835 // to share.
836 RemoveKeychainForms(orphan_keychain_forms);
837 STLDeleteElements(&orphan_keychain_forms);
838 782
839 PasswordStoreChangeList changes; 783 // We can't delete from the Keychain by date because we may be sharing items
840 for (std::vector<PasswordForm*>::const_iterator it = forms.begin(); 784 // with database entries that weren't in the delete range. Instead, we find
841 it != forms.end(); ++it) { 785 // all the Keychain items we own but aren't using any more and delete those.
842 changes.push_back(PasswordStoreChange(PasswordStoreChange::REMOVE, 786 std::vector<PasswordForm*> orphan_keychain_forms = GetUnusedKeychainForms();
843 **it)); 787 // This is inefficient, since we have to re-look-up each keychain item one at
844 } 788 // a time to delete it even though the search step already had a list of
845 NotificationService::current()->Notify( 789 // Keychain item references. If this turns out to be noticeably slow we'll
846 NotificationType::LOGINS_CHANGED, 790 // need to rearchitect to allow the search and deletion steps to share.
847 NotificationService::AllSources(), 791 RemoveKeychainForms(orphan_keychain_forms);
848 Details<PasswordStoreChangeList>(&changes)); 792 STLDeleteElements(&orphan_keychain_forms);
849 }
850 }
851 } 793 }
852 794
853 void PasswordStoreMac::GetLoginsImpl(GetLoginsRequest* request, 795 void PasswordStoreMac::GetLoginsImpl(GetLoginsRequest* request,
854 const webkit_glue::PasswordForm& form) { 796 const webkit_glue::PasswordForm& form) {
855 MacKeychainPasswordFormAdapter keychain_adapter(keychain_.get()); 797 MacKeychainPasswordFormAdapter keychain_adapter(keychain_.get());
856 std::vector<PasswordForm*> keychain_forms = 798 std::vector<PasswordForm*> keychain_forms =
857 keychain_adapter.PasswordsFillingForm(form); 799 keychain_adapter.PasswordsFillingForm(form);
858 800
859 std::vector<PasswordForm*> database_forms; 801 std::vector<PasswordForm*> database_forms;
860 login_metadata_db_->GetLogins(form, &database_forms); 802 login_metadata_db_->GetLogins(form, &database_forms);
(...skipping 96 matching lines...)
957 899
958 void PasswordStoreMac::RemoveKeychainForms( 900 void PasswordStoreMac::RemoveKeychainForms(
959 const std::vector<PasswordForm*>& forms) { 901 const std::vector<PasswordForm*>& forms) {
960 MacKeychainPasswordFormAdapter owned_keychain_adapter(keychain_.get()); 902 MacKeychainPasswordFormAdapter owned_keychain_adapter(keychain_.get());
961 owned_keychain_adapter.SetFindsOnlyOwnedItems(true); 903 owned_keychain_adapter.SetFindsOnlyOwnedItems(true);
962 for (std::vector<PasswordForm*>::const_iterator i = forms.begin(); 904 for (std::vector<PasswordForm*>::const_iterator i = forms.begin();
963 i != forms.end(); ++i) { 905 i != forms.end(); ++i) {
964 owned_keychain_adapter.RemovePassword(**i); 906 owned_keychain_adapter.RemovePassword(**i);
965 } 907 }
966 } 908 }
967
968 void PasswordStoreMac::CreateNotificationService() {
969 notification_service_.reset(new NotificationService);
970 }
OLDNEW
« no previous file with comments | « chrome/browser/password_manager/password_store_mac.h ('k') | chrome/common/notification_type.h » ('j') | no next file with comments »

Powered by Google App Engine