Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "components/password_manager/core/browser/login_database.h" | 5 #include "components/password_manager/core/browser/login_database.h" |
| 6 | 6 |
| 7 #include <algorithm> | 7 #include <algorithm> |
| 8 #include <limits> | 8 #include <limits> |
| 9 | 9 |
| 10 #include "base/bind.h" | |
| 10 #include "base/files/file_path.h" | 11 #include "base/files/file_path.h" |
| 11 #include "base/logging.h" | 12 #include "base/logging.h" |
| 12 #include "base/metrics/histogram.h" | 13 #include "base/metrics/histogram.h" |
| 13 #include "base/pickle.h" | 14 #include "base/pickle.h" |
| 14 #include "base/strings/string_util.h" | 15 #include "base/strings/string_util.h" |
| 15 #include "base/time/time.h" | 16 #include "base/time/time.h" |
| 16 #include "components/autofill/core/common/password_form.h" | 17 #include "components/autofill/core/common/password_form.h" |
| 17 #include "sql/connection.h" | 18 #include "sql/connection.h" |
| 18 #include "sql/statement.h" | 19 #include "sql/statement.h" |
| 19 #include "sql/transaction.h" | 20 #include "sql/transaction.h" |
| (...skipping 22 matching lines...) Expand all Loading... | |
| 42 COLUMN_DATE_CREATED, | 43 COLUMN_DATE_CREATED, |
| 43 COLUMN_BLACKLISTED_BY_USER, | 44 COLUMN_BLACKLISTED_BY_USER, |
| 44 COLUMN_SCHEME, | 45 COLUMN_SCHEME, |
| 45 COLUMN_PASSWORD_TYPE, | 46 COLUMN_PASSWORD_TYPE, |
| 46 COLUMN_POSSIBLE_USERNAMES, | 47 COLUMN_POSSIBLE_USERNAMES, |
| 47 COLUMN_TIMES_USED, | 48 COLUMN_TIMES_USED, |
| 48 COLUMN_FORM_DATA, | 49 COLUMN_FORM_DATA, |
| 49 COLUMN_USE_ADDITIONAL_AUTH | 50 COLUMN_USE_ADDITIONAL_AUTH |
| 50 }; | 51 }; |
| 51 | 52 |
| 53 void BindAddStatement(const PasswordForm& form, | |
| 54 const std::string& encrypted_password, | |
| 55 const Pickle& usernames_pickle, | |
|
Garrett Casto
2014/05/14 07:46:35
Any reason why you have |username_pickle| as a sep
vasilii
2014/05/14 11:20:18
Done.
| |
| 56 sql::Statement* s) { | |
| 57 s->BindString(COLUMN_ORIGIN_URL, form.origin.spec()); | |
| 58 s->BindString(COLUMN_ACTION_URL, form.action.spec()); | |
| 59 s->BindString16(COLUMN_USERNAME_ELEMENT, form.username_element); | |
| 60 s->BindString16(COLUMN_USERNAME_VALUE, form.username_value); | |
| 61 s->BindString16(COLUMN_PASSWORD_ELEMENT, form.password_element); | |
| 62 s->BindBlob(COLUMN_PASSWORD_VALUE, encrypted_password.data(), | |
| 63 static_cast<int>(encrypted_password.length())); | |
| 64 s->BindString16(COLUMN_SUBMIT_ELEMENT, form.submit_element); | |
| 65 s->BindString(COLUMN_SIGNON_REALM, form.signon_realm); | |
| 66 s->BindInt(COLUMN_SSL_VALID, form.ssl_valid); | |
| 67 s->BindInt(COLUMN_PREFERRED, form.preferred); | |
| 68 s->BindInt64(COLUMN_DATE_CREATED, form.date_created.ToTimeT()); | |
| 69 s->BindInt(COLUMN_BLACKLISTED_BY_USER, form.blacklisted_by_user); | |
| 70 s->BindInt(COLUMN_SCHEME, form.scheme); | |
| 71 s->BindInt(COLUMN_PASSWORD_TYPE, form.type); | |
| 72 s->BindBlob(COLUMN_POSSIBLE_USERNAMES, | |
| 73 usernames_pickle.data(), | |
| 74 usernames_pickle.size()); | |
| 75 s->BindInt(COLUMN_TIMES_USED, form.times_used); | |
| 76 Pickle form_data_pickle; | |
| 77 autofill::SerializeFormData(form.form_data, &form_data_pickle); | |
| 78 s->BindBlob(COLUMN_FORM_DATA, | |
| 79 form_data_pickle.data(), | |
| 80 form_data_pickle.size()); | |
| 81 s->BindInt(COLUMN_USE_ADDITIONAL_AUTH, form.use_additional_authentication); | |
| 82 } | |
| 83 | |
| 84 void AddCallback(int err, sql::Statement* /*stmt*/) { | |
| 85 if (err == 19 /*SQLITE_CONSTRAINT*/) | |
| 86 DLOG(WARNING) << "LoginDatabase::AddLogin updated an existing form"; | |
| 87 } | |
| 88 | |
| 52 } // namespace | 89 } // namespace |
| 53 | 90 |
| 54 LoginDatabase::LoginDatabase() { | 91 LoginDatabase::LoginDatabase() { |
| 55 } | 92 } |
| 56 | 93 |
| 57 LoginDatabase::~LoginDatabase() { | 94 LoginDatabase::~LoginDatabase() { |
| 58 } | 95 } |
| 59 | 96 |
| 60 bool LoginDatabase::Init(const base::FilePath& db_path) { | 97 bool LoginDatabase::Init(const base::FilePath& db_path) { |
| 61 // Set pragmas for a small, private database (based on WebDatabase). | 98 // Set pragmas for a small, private database (based on WebDatabase). |
| (...skipping 169 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 231 "PasswordManager.TimesGeneratedPasswordUsed", | 268 "PasswordManager.TimesGeneratedPasswordUsed", |
| 232 usage_statement.ColumnInt(1), 0, 100, 10); | 269 usage_statement.ColumnInt(1), 0, 100, 10); |
| 233 } else { | 270 } else { |
| 234 UMA_HISTOGRAM_CUSTOM_COUNTS( | 271 UMA_HISTOGRAM_CUSTOM_COUNTS( |
| 235 "PasswordManager.TimesPasswordUsed", | 272 "PasswordManager.TimesPasswordUsed", |
| 236 usage_statement.ColumnInt(1), 0, 100, 10); | 273 usage_statement.ColumnInt(1), 0, 100, 10); |
| 237 } | 274 } |
| 238 } | 275 } |
| 239 } | 276 } |
| 240 | 277 |
| 241 bool LoginDatabase::AddLogin(const PasswordForm& form) { | 278 PasswordStoreChangeList LoginDatabase::AddLogin(const PasswordForm& form) { |
| 279 PasswordStoreChangeList list; | |
| 242 std::string encrypted_password; | 280 std::string encrypted_password; |
| 243 if (EncryptedString(form.password_value, &encrypted_password) != | 281 if (EncryptedString(form.password_value, &encrypted_password) != |
| 244 ENCRYPTION_RESULT_SUCCESS) | 282 ENCRYPTION_RESULT_SUCCESS) |
| 245 return false; | 283 return list; |
| 246 | 284 |
| 247 // You *must* change LoginTableColumns if this query changes. | 285 // You *must* change LoginTableColumns if this query changes. |
| 248 sql::Statement s(db_.GetCachedStatement(SQL_FROM_HERE, | 286 sql::Statement s(db_.GetCachedStatement(SQL_FROM_HERE, |
| 287 "INSERT INTO logins " | |
| 288 "(origin_url, action_url, username_element, username_value, " | |
| 289 " password_element, password_value, submit_element, " | |
| 290 " signon_realm, ssl_valid, preferred, date_created, blacklisted_by_user, " | |
| 291 " scheme, password_type, possible_usernames, times_used, form_data, " | |
| 292 " use_additional_auth) VALUES " | |
| 293 "(?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)")); | |
| 294 BindAddStatement(form, encrypted_password, | |
| 295 SerializeVector(form.other_possible_usernames), | |
| 296 &s); | |
| 297 db_.set_error_callback(base::Bind(&AddCallback)); | |
| 298 const bool success = s.Run(); | |
| 299 db_.reset_error_callback(); | |
| 300 if (success) { | |
| 301 list.push_back(PasswordStoreChange(PasswordStoreChange::ADD, form)); | |
| 302 return list; | |
| 303 } | |
| 304 // Repeat the same statement but with REPLACE semantic. | |
| 305 s.Assign(db_.GetCachedStatement(SQL_FROM_HERE, | |
| 249 "INSERT OR REPLACE INTO logins " | 306 "INSERT OR REPLACE INTO logins " |
| 250 "(origin_url, action_url, username_element, username_value, " | 307 "(origin_url, action_url, username_element, username_value, " |
| 251 " password_element, password_value, submit_element, " | 308 " password_element, password_value, submit_element, " |
| 252 " signon_realm, ssl_valid, preferred, date_created, blacklisted_by_user, " | 309 " signon_realm, ssl_valid, preferred, date_created, blacklisted_by_user, " |
| 253 " scheme, password_type, possible_usernames, times_used, form_data, " | 310 " scheme, password_type, possible_usernames, times_used, form_data, " |
| 254 " use_additional_auth) VALUES " | 311 " use_additional_auth) VALUES " |
| 255 "(?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)")); | 312 "(?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)")); |
| 256 s.BindString(COLUMN_ORIGIN_URL, form.origin.spec()); | 313 BindAddStatement(form, encrypted_password, |
| 257 s.BindString(COLUMN_ACTION_URL, form.action.spec()); | 314 SerializeVector(form.other_possible_usernames), |
| 258 s.BindString16(COLUMN_USERNAME_ELEMENT, form.username_element); | 315 &s); |
| 259 s.BindString16(COLUMN_USERNAME_VALUE, form.username_value); | 316 if (s.Run()) { |
| 260 s.BindString16(COLUMN_PASSWORD_ELEMENT, form.password_element); | 317 list.push_back(PasswordStoreChange(PasswordStoreChange::REMOVE, form)); |
| 261 s.BindBlob(COLUMN_PASSWORD_VALUE, encrypted_password.data(), | 318 list.push_back(PasswordStoreChange(PasswordStoreChange::ADD, form)); |
| 262 static_cast<int>(encrypted_password.length())); | 319 } |
| 263 s.BindString16(COLUMN_SUBMIT_ELEMENT, form.submit_element); | 320 return list; |
| 264 s.BindString(COLUMN_SIGNON_REALM, form.signon_realm); | |
| 265 s.BindInt(COLUMN_SSL_VALID, form.ssl_valid); | |
| 266 s.BindInt(COLUMN_PREFERRED, form.preferred); | |
| 267 s.BindInt64(COLUMN_DATE_CREATED, form.date_created.ToTimeT()); | |
| 268 s.BindInt(COLUMN_BLACKLISTED_BY_USER, form.blacklisted_by_user); | |
| 269 s.BindInt(COLUMN_SCHEME, form.scheme); | |
| 270 s.BindInt(COLUMN_PASSWORD_TYPE, form.type); | |
| 271 Pickle usernames_pickle = SerializeVector(form.other_possible_usernames); | |
| 272 s.BindBlob(COLUMN_POSSIBLE_USERNAMES, | |
| 273 usernames_pickle.data(), | |
| 274 usernames_pickle.size()); | |
| 275 s.BindInt(COLUMN_TIMES_USED, form.times_used); | |
| 276 Pickle form_data_pickle; | |
| 277 autofill::SerializeFormData(form.form_data, &form_data_pickle); | |
| 278 s.BindBlob(COLUMN_FORM_DATA, | |
| 279 form_data_pickle.data(), | |
| 280 form_data_pickle.size()); | |
| 281 s.BindInt(COLUMN_USE_ADDITIONAL_AUTH, form.use_additional_authentication); | |
| 282 | |
| 283 return s.Run(); | |
| 284 } | 321 } |
| 285 | 322 |
| 286 bool LoginDatabase::UpdateLogin(const PasswordForm& form, int* items_changed) { | 323 bool LoginDatabase::UpdateLogin(const PasswordForm& form, int* items_changed) { |
| 287 std::string encrypted_password; | 324 std::string encrypted_password; |
| 288 if (EncryptedString(form.password_value, &encrypted_password) != | 325 if (EncryptedString(form.password_value, &encrypted_password) != |
| 289 ENCRYPTION_RESULT_SUCCESS) | 326 ENCRYPTION_RESULT_SUCCESS) |
| 290 return false; | 327 return false; |
| 291 | 328 |
| 292 // Replacement is necessary to deal with updating imported credentials. See | 329 // Replacement is necessary to deal with updating imported credentials. See |
| 293 // crbug.com/349138 for details. | 330 // crbug.com/349138 for details. |
| (...skipping 306 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 600 base::string16 str; | 637 base::string16 str; |
| 601 | 638 |
| 602 PickleIterator iterator(p); | 639 PickleIterator iterator(p); |
| 603 while (iterator.ReadString16(&str)) { | 640 while (iterator.ReadString16(&str)) { |
| 604 ret.push_back(str); | 641 ret.push_back(str); |
| 605 } | 642 } |
| 606 return ret; | 643 return ret; |
| 607 } | 644 } |
| 608 | 645 |
| 609 } // namespace password_manager | 646 } // namespace password_manager |
| OLD | NEW |