Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(230)

Side by Side Diff: chrome/browser/password_manager/password_store_mac.cc

Issue 1803006: Re-land 1752007: Send out notifications when logins are changed (Closed)
Patch Set: Created 10 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « chrome/browser/password_manager/password_store_mac.h ('k') | chrome/common/notification_type.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2009 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2009 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/password_manager/password_store_mac.h" 5 #include "chrome/browser/password_manager/password_store_mac.h"
6 #include "chrome/browser/password_manager/password_store_mac_internal.h" 6 #include "chrome/browser/password_manager/password_store_mac_internal.h"
7 7
8 #include <CoreServices/CoreServices.h> 8 #include <CoreServices/CoreServices.h>
9 #include <string> 9 #include <string>
10 #include <vector> 10 #include <vector>
11 11
12 #include "base/logging.h" 12 #include "base/logging.h"
13 #include "base/mac_util.h" 13 #include "base/mac_util.h"
14 #include "base/stl_util-inl.h" 14 #include "base/stl_util-inl.h"
15 #include "base/string_util.h" 15 #include "base/string_util.h"
16 #include "base/task.h"
16 #include "base/utf_string_conversions.h" 17 #include "base/utf_string_conversions.h"
17 #include "chrome/browser/keychain_mac.h" 18 #include "chrome/browser/keychain_mac.h"
18 #include "chrome/browser/password_manager/login_database.h" 19 #include "chrome/browser/password_manager/login_database.h"
20 #include "chrome/browser/password_manager/password_store_change.h"
19 21
20 using webkit_glue::PasswordForm; 22 using webkit_glue::PasswordForm;
21 23
22 // Utility class to handle the details of constructing and running a keychain 24 // Utility class to handle the details of constructing and running a keychain
23 // search from a set of attributes. 25 // search from a set of attributes.
24 class KeychainSearch { 26 class KeychainSearch {
25 public: 27 public:
26 explicit KeychainSearch(const MacKeychain& keychain); 28 explicit KeychainSearch(const MacKeychain& keychain);
27 ~KeychainSearch(); 29 ~KeychainSearch();
28 30
(...skipping 680 matching lines...) Expand 10 before | Expand all | Expand 10 after
709 #pragma mark - 711 #pragma mark -
710 712
711 PasswordStoreMac::PasswordStoreMac(MacKeychain* keychain, 713 PasswordStoreMac::PasswordStoreMac(MacKeychain* keychain,
712 LoginDatabase* login_db) 714 LoginDatabase* login_db)
713 : keychain_(keychain), login_metadata_db_(login_db) { 715 : keychain_(keychain), login_metadata_db_(login_db) {
714 DCHECK(keychain_.get()); 716 DCHECK(keychain_.get());
715 DCHECK(login_metadata_db_.get()); 717 DCHECK(login_metadata_db_.get());
716 } 718 }
717 719
718 PasswordStoreMac::~PasswordStoreMac() { 720 PasswordStoreMac::~PasswordStoreMac() {
721 if (thread_.get()) {
722 thread_->message_loop()->DeleteSoon(FROM_HERE,
723 notification_service_.release());
724 }
719 } 725 }
720 726
721 bool PasswordStoreMac::Init() { 727 bool PasswordStoreMac::Init() {
722 thread_.reset(new base::Thread("Chrome_PasswordStore_Thread")); 728 thread_.reset(new base::Thread("Chrome_PasswordStore_Thread"));
723 729
724 if (!thread_->Start()) { 730 if (!thread_->Start()) {
725 thread_.reset(NULL); 731 thread_.reset(NULL);
726 return false; 732 return false;
727 } 733 }
734 ScheduleTask(NewRunnableMethod(this,
735 &PasswordStoreMac::CreateNotificationService));
728 return PasswordStore::Init(); 736 return PasswordStore::Init();
729 } 737 }
730 738
731 void PasswordStoreMac::ScheduleTask(Task* task) { 739 void PasswordStoreMac::ScheduleTask(Task* task) {
732 if (thread_.get()) { 740 if (thread_.get()) {
733 thread_->message_loop()->PostTask(FROM_HERE, task); 741 thread_->message_loop()->PostTask(FROM_HERE, task);
734 } 742 }
735 } 743 }
736 744
737 void PasswordStoreMac::AddLoginImpl(const PasswordForm& form) { 745 void PasswordStoreMac::AddLoginImpl(const PasswordForm& form) {
738 if (AddToKeychainIfNecessary(form)) { 746 if (AddToKeychainIfNecessary(form)) {
739 login_metadata_db_->AddLogin(form); 747 if (login_metadata_db_->AddLogin(form)) {
748 PasswordStoreChangeList changes;
749 changes.push_back(PasswordStoreChange(PasswordStoreChange::ADD, form));
750 NotificationService::current()->Notify(
751 NotificationType::LOGINS_CHANGED,
752 NotificationService::AllSources(),
753 Details<PasswordStoreChangeList>(&changes));
754 }
740 } 755 }
741 } 756 }
742 757
743 void PasswordStoreMac::UpdateLoginImpl(const PasswordForm& form) { 758 void PasswordStoreMac::UpdateLoginImpl(const PasswordForm& form) {
744 // The keychain add will update if there is a collision and add if there 759 // The keychain add will update if there is a collision and add if there
745 // isn't, which is the behavior we want, so there's no separate update call. 760 // isn't, which is the behavior we want, so there's no separate update call.
746 if (AddToKeychainIfNecessary(form)) { 761 if (AddToKeychainIfNecessary(form)) {
747 int update_count = 0; 762 int update_count = 0;
748 login_metadata_db_->UpdateLogin(form, &update_count); 763 if (login_metadata_db_->UpdateLogin(form, &update_count)) {
749 // Update will catch any database entries that we already had, but we could 764 // Update will catch any database entries that we already had, but we
750 // also be updating a keychain-only form, in which case we need to add. 765 // could also be updating a keychain-only form, in which case we need to
751 if (update_count == 0) { 766 // add.
752 login_metadata_db_->AddLogin(form); 767 PasswordStoreChangeList changes;
768 if (update_count == 0) {
769 if (login_metadata_db_->AddLogin(form)) {
770 changes.push_back(PasswordStoreChange(PasswordStoreChange::ADD,
771 form));
772 }
773 } else {
774 changes.push_back(PasswordStoreChange(PasswordStoreChange::UPDATE,
775 form));
776 }
777 if (!changes.empty()) {
778 NotificationService::current()->Notify(
779 NotificationType::LOGINS_CHANGED,
780 NotificationService::AllSources(),
781 Details<PasswordStoreChangeList>(&changes));
782 }
753 } 783 }
754 } 784 }
755 } 785 }
756 786
757 void PasswordStoreMac::RemoveLoginImpl(const PasswordForm& form) { 787 void PasswordStoreMac::RemoveLoginImpl(const PasswordForm& form) {
758 login_metadata_db_->RemoveLogin(form); 788 if (login_metadata_db_->RemoveLogin(form)) {
789 // See if we own a Keychain item associated with this item. We can do an
790 // exact search rather than messing around with trying to do fuzzy matching
791 // because passwords that we created will always have an exact-match
792 // database entry.
793 // (If a user does lose their profile but not their keychain we'll treat the
794 // entries we find like other imported entries anyway, so it's reasonable to
795 // handle deletes on them the way we would for an imported item.)
796 MacKeychainPasswordFormAdapter owned_keychain_adapter(keychain_.get());
797 owned_keychain_adapter.SetFindsOnlyOwnedItems(true);
798 PasswordForm* owned_password_form =
799 owned_keychain_adapter.PasswordExactlyMatchingForm(form);
800 if (owned_password_form) {
801 // If we don't have other forms using it (i.e., a form differing only by
802 // the names of the form elements), delete the keychain entry.
803 if (!DatabaseHasFormMatchingKeychainForm(form)) {
804 owned_keychain_adapter.RemovePassword(form);
805 }
806 }
759 807
760 // See if we own a Keychain item associated with this item. We can do an exact 808 PasswordStoreChangeList changes;
761 // search rather than messing around with trying to do fuzzy matching because 809 changes.push_back(PasswordStoreChange(PasswordStoreChange::REMOVE, form));
762 // passwords that we created will always have an exact-match database entry. 810 NotificationService::current()->Notify(
763 // (If a user does lose their profile but not their keychain we'll treat the 811 NotificationType::LOGINS_CHANGED,
764 // entries we find like other imported entries anyway, so it's reasonable to 812 NotificationService::AllSources(),
765 // handle deletes on them the way we would for an imported item.) 813 Details<PasswordStoreChangeList>(&changes));
766 MacKeychainPasswordFormAdapter owned_keychain_adapter(keychain_.get());
767 owned_keychain_adapter.SetFindsOnlyOwnedItems(true);
768 PasswordForm* owned_password_form =
769 owned_keychain_adapter.PasswordExactlyMatchingForm(form);
770 if (owned_password_form) {
771 // If we don't have other forms using it (i.e., a form differing only by
772 // the names of the form elements), delete the keychain entry.
773 if (!DatabaseHasFormMatchingKeychainForm(form)) {
774 owned_keychain_adapter.RemovePassword(form);
775 }
776 } 814 }
777 } 815 }
778 816
779 void PasswordStoreMac::RemoveLoginsCreatedBetweenImpl( 817 void PasswordStoreMac::RemoveLoginsCreatedBetweenImpl(
780 const base::Time& delete_begin, const base::Time& delete_end) { 818 const base::Time& delete_begin, const base::Time& delete_end) {
781 login_metadata_db_->RemoveLoginsCreatedBetween(delete_begin, delete_end); 819 std::vector<PasswordForm*> forms;
820 if (login_metadata_db_->GetLoginsCreatedBetween(delete_begin, delete_end,
821 &forms)) {
822 if (login_metadata_db_->RemoveLoginsCreatedBetween(delete_begin,
823 delete_end)) {
824 // We can't delete from the Keychain by date because we may be sharing
825 // items with database entries that weren't in the delete range. Instead,
826 // we find all the Keychain items we own but aren't using any more and
827 // delete those.
828 std::vector<PasswordForm*> orphan_keychain_forms =
829 GetUnusedKeychainForms();
830 // This is inefficient, since we have to re-look-up each keychain item
831 // one at a time to delete it even though the search step already had a
832 // list of Keychain item references. If this turns out to be noticeably
833 // slow we'll need to rearchitect to allow the search and deletion steps
834 // to share.
835 RemoveKeychainForms(orphan_keychain_forms);
836 STLDeleteElements(&orphan_keychain_forms);
782 837
783 // We can't delete from the Keychain by date because we may be sharing items 838 PasswordStoreChangeList changes;
784 // with database entries that weren't in the delete range. Instead, we find 839 for (std::vector<PasswordForm*>::const_iterator it = forms.begin();
785 // all the Keychain items we own but aren't using any more and delete those. 840 it != forms.end(); ++it) {
786 std::vector<PasswordForm*> orphan_keychain_forms = GetUnusedKeychainForms(); 841 changes.push_back(PasswordStoreChange(PasswordStoreChange::REMOVE,
787 // This is inefficient, since we have to re-look-up each keychain item one at 842 **it));
788 // a time to delete it even though the search step already had a list of 843 }
789 // Keychain item references. If this turns out to be noticeably slow we'll 844 NotificationService::current()->Notify(
790 // need to rearchitect to allow the search and deletion steps to share. 845 NotificationType::LOGINS_CHANGED,
791 RemoveKeychainForms(orphan_keychain_forms); 846 NotificationService::AllSources(),
792 STLDeleteElements(&orphan_keychain_forms); 847 Details<PasswordStoreChangeList>(&changes));
848 }
849 }
793 } 850 }
794 851
795 void PasswordStoreMac::GetLoginsImpl(GetLoginsRequest* request, 852 void PasswordStoreMac::GetLoginsImpl(GetLoginsRequest* request,
796 const webkit_glue::PasswordForm& form) { 853 const webkit_glue::PasswordForm& form) {
797 MacKeychainPasswordFormAdapter keychain_adapter(keychain_.get()); 854 MacKeychainPasswordFormAdapter keychain_adapter(keychain_.get());
798 std::vector<PasswordForm*> keychain_forms = 855 std::vector<PasswordForm*> keychain_forms =
799 keychain_adapter.PasswordsFillingForm(form); 856 keychain_adapter.PasswordsFillingForm(form);
800 857
801 std::vector<PasswordForm*> database_forms; 858 std::vector<PasswordForm*> database_forms;
802 login_metadata_db_->GetLogins(form, &database_forms); 859 login_metadata_db_->GetLogins(form, &database_forms);
(...skipping 96 matching lines...) Expand 10 before | Expand all | Expand 10 after
899 956
900 void PasswordStoreMac::RemoveKeychainForms( 957 void PasswordStoreMac::RemoveKeychainForms(
901 const std::vector<PasswordForm*>& forms) { 958 const std::vector<PasswordForm*>& forms) {
902 MacKeychainPasswordFormAdapter owned_keychain_adapter(keychain_.get()); 959 MacKeychainPasswordFormAdapter owned_keychain_adapter(keychain_.get());
903 owned_keychain_adapter.SetFindsOnlyOwnedItems(true); 960 owned_keychain_adapter.SetFindsOnlyOwnedItems(true);
904 for (std::vector<PasswordForm*>::const_iterator i = forms.begin(); 961 for (std::vector<PasswordForm*>::const_iterator i = forms.begin();
905 i != forms.end(); ++i) { 962 i != forms.end(); ++i) {
906 owned_keychain_adapter.RemovePassword(**i); 963 owned_keychain_adapter.RemovePassword(**i);
907 } 964 }
908 } 965 }
966
967 void PasswordStoreMac::CreateNotificationService() {
968 notification_service_.reset(new NotificationService);
969 }
OLDNEW
« no previous file with comments | « chrome/browser/password_manager/password_store_mac.h ('k') | chrome/common/notification_type.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698