aboutsummaryrefslogtreecommitdiffstats
path: root/lib/ephy-profile-migration.c
diff options
context:
space:
mode:
Diffstat (limited to 'lib/ephy-profile-migration.c')
-rw-r--r--lib/ephy-profile-migration.c410
1 files changed, 410 insertions, 0 deletions
diff --git a/lib/ephy-profile-migration.c b/lib/ephy-profile-migration.c
new file mode 100644
index 000000000..c0c319d04
--- /dev/null
+++ b/lib/ephy-profile-migration.c
@@ -0,0 +1,410 @@
+/*
+ * Copyright © 2009 Xan López
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2, or (at your option)
+ * any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+ *
+ */
+
+/* Portions of this file based on Chromium code.
+ * License block as follows:
+ *
+ * Copyright (c) 2009 The Chromium Authors. All rights reserved.
+ * Use of this source code is governed by a BSD-style license that can be
+ * found in the LICENSE file.
+ *
+ * The LICENSE file from Chromium can be found in the LICENSE.chromium
+ * file.
+ */
+
+#include "config.h"
+
+#include "ephy-profile-migration.h"
+
+#include "ephy-file-helpers.h"
+#ifdef ENABLE_NSS
+#include "ephy-nss-glue.h"
+#endif
+
+#include <glib/gi18n.h>
+#include <gnome-keyring.h>
+#include <libsoup/soup-gnome.h>
+
+/*
+ * What to do to add new migration steps:
+ * - Bump PROFILE_MIGRATION_VERSION
+ * - Add your function at the end of the 'migrators' array
+ */
+
+#define PROFILE_MIGRATION_VERSION 3
+
+typedef void (*EphyProfileMigrator) (void);
+
+static void
+migrate_cookies ()
+{
+ const char *cookies_file_sqlite = "cookies.sqlite";
+ const char *cookies_file_txt = "cookies.txt";
+ char *src_sqlite = NULL, *src_txt = NULL, *dest = NULL;
+
+ dest = g_build_filename (ephy_dot_dir (), cookies_file_sqlite, NULL);
+ /* If we already have a cookies.sqlite file, do nothing */
+ if (g_file_test (dest, G_FILE_TEST_EXISTS))
+ goto out;
+
+ src_sqlite = g_build_filename (ephy_dot_dir (), "mozilla",
+ "epiphany", cookies_file_sqlite, NULL);
+ src_txt = g_build_filename (ephy_dot_dir (), "mozilla",
+ "epiphany", cookies_file_txt, NULL);
+
+ /* First check if we have a cookies.sqlite file in Mozilla */
+ if (g_file_test (src_sqlite, G_FILE_TEST_EXISTS)) {
+ GFile *gsrc, *gdest;
+
+ /* Copy the file */
+ gsrc = g_file_new_for_path (src_sqlite);
+ gdest = g_file_new_for_path (dest);
+
+ if (!g_file_copy (gsrc, gdest, 0, NULL, NULL, NULL, NULL))
+ g_warning (_("Failed to copy cookies file from Mozilla."));
+
+ g_object_unref (gsrc);
+ g_object_unref (gdest);
+ } else if (g_file_test (src_txt, G_FILE_TEST_EXISTS)) {
+ /* Create a SoupCookieJarSQLite with the contents of the txt file */
+ GSList *cookies, *p;
+ SoupCookieJar *txt, *sqlite;
+
+ txt = soup_cookie_jar_text_new (src_txt, TRUE);
+ sqlite = soup_cookie_jar_sqlite_new (dest, FALSE);
+ cookies = soup_cookie_jar_all_cookies (txt);
+
+ for (p = cookies; p; p = p->next) {
+ SoupCookie *cookie = (SoupCookie*)p->data;
+ /* Cookie is stolen, so we won't free it */
+ soup_cookie_jar_add_cookie (sqlite, cookie);
+ }
+
+ g_slist_free (cookies);
+ g_object_unref (txt);
+ g_object_unref (sqlite);
+ }
+
+ out:
+ g_free (src_sqlite);
+ g_free (src_txt);
+ g_free (dest);
+}
+
+#ifdef ENABLE_NSS
+static gchar*
+_g_utf8_substr(const gchar* string, gint start, gint end)
+{
+ gchar *start_ptr, *output;
+ gsize len_in_bytes;
+ glong str_len = g_utf8_strlen (string, -1);
+
+ if (start > str_len || end > str_len)
+ return NULL;
+
+ start_ptr = g_utf8_offset_to_pointer (string, start);
+ len_in_bytes = g_utf8_offset_to_pointer (string, end) - start_ptr + 1;
+ output = g_malloc0 (len_in_bytes + 1);
+
+ return g_utf8_strncpy (output, start_ptr, end - start + 1);
+}
+
+static char*
+decrypt (const char *data)
+{
+ unsigned char *plain;
+ gsize out_len;
+
+ /* The old style password is encoded in base64. They are identified
+ * by a leading '~'. Otherwise, we should decrypt the text.
+ */
+ plain = g_base64_decode (data, &out_len);
+ if (data[0] != '~') {
+ char *decrypted;
+
+ decrypted = ephy_nss_glue_decrypt (plain, out_len);
+ g_free (plain);
+ plain = (unsigned char*)decrypted;
+ }
+
+ return (char*)plain;
+}
+
+static void
+parse_and_decrypt_signons (const char *signons)
+{
+ int version;
+ gchar **lines;
+ int i;
+ guint length;
+
+ lines = g_strsplit (signons, "\r\n", -1);
+ if (!g_ascii_strncasecmp (lines[0], "#2c", 3))
+ version = 1;
+ else if (!g_ascii_strncasecmp (lines[0], "#2d", 3))
+ version = 2;
+ else if (!g_ascii_strncasecmp (lines[0], "#2e", 3))
+ version = 3;
+ else
+ goto out;
+
+ /* Skip the never-saved list */
+ for (i = 1; lines[i] && !g_str_equal (lines[i], "."); i++) {
+ ;
+ }
+
+ i++;
+
+ /*
+ * Read saved passwords. The information is stored in blocks
+ * separated by lines that only contain a dot. We find a block by
+ * the separator and parse them one by one.
+ */
+ length = g_strv_length (lines);
+
+ while (i < length) {
+ size_t begin = i;
+ size_t end = i + 1;
+ const char *realmBracketBegin = " (";
+ const char *realmBracketEnd = ")";
+ SoupURI *uri = NULL;
+ char *realm = NULL;
+
+ while (lines[end] && !g_str_equal (lines[end], "."))
+ end++;
+
+ i = end + 1;
+
+ /* A block has at least five lines */
+ if (end - begin < 5)
+ continue;
+
+ /* The first line is the site URL.
+ * For HTTP authentication logins, the URL may contain http realm,
+ * which will be in bracket:
+ * sitename:8080 (realm)
+ */
+ if (g_strstr_len (lines[begin], -1, realmBracketBegin)) {
+ char *start_ptr, *end_ptr;
+ char *full_url, *url;
+ glong start, end;
+
+ /* In this case the scheme may not exist. We assume that the
+ * scheme is HTTP.
+ */
+ if (!g_strstr_len (lines[begin], -1, "://"))
+ full_url = g_strconcat ("http://", lines[begin], NULL);
+ else
+ full_url = g_strdup (lines[begin]);
+
+ start_ptr = g_strstr_len (full_url, -1, realmBracketBegin);
+ start = g_utf8_pointer_to_offset (full_url, start_ptr);
+ url = _g_utf8_substr (full_url, 0, start);
+ url = g_strstrip (url);
+ uri = soup_uri_new (url);
+ g_free (url);
+
+ start += strlen (realmBracketBegin);
+ end_ptr = g_strstr_len (full_url, -1, realmBracketEnd);
+ end = g_utf8_pointer_to_offset (full_url, end_ptr);
+ realm = _g_utf8_substr (full_url, start, end);
+
+ g_free (full_url);
+ } else {
+ /* Don't have HTTP realm. It is the URL that the following
+ * password belongs to.
+ */
+ uri = soup_uri_new (lines[begin]);
+ }
+
+ if (!SOUP_URI_VALID_FOR_HTTP (uri)) {
+ soup_uri_free (uri);
+ g_free (realm);
+ continue;
+ }
+
+ ++begin;
+
+ /* There may be multiple username/password pairs for this site.
+ * In this case, they are saved in one block without a separated
+ * line (contains a dot).
+ */
+ while (begin + 4 < end) {
+ char *username = NULL;
+ char *password = NULL;
+ guint32 item_id;
+
+ /* The username */
+ begin++; /* Skip username element */
+ username = decrypt (lines[begin++]);
+
+ /* The password */
+ /* The element name has a leading '*' */
+ if (lines[begin][0] == '*') {
+ begin++; /* Skip password element */
+ password = decrypt (lines[begin++]);
+ } else {
+ /* Maybe the file is broken, skip to the next block */
+ g_free (username);
+ break;
+ }
+
+ /* The action attribute for from the form element. This line
+ * exists in version 2 or above
+ */
+ if (version >= 2) {
+ if (begin < end)
+ /* Skip it */ ;
+ begin++;
+
+ /* Version 3 has an extra line for further use */
+ if (version == 3)
+ begin++;
+ }
+
+ if (username && password)
+ gnome_keyring_set_network_password_sync (NULL,
+ username,
+ realm,
+ uri->host,
+ NULL,
+ uri->scheme,
+ NULL,
+ uri->port,
+ password,
+ &item_id);
+ g_free (username);
+ g_free (password);
+ }
+
+ soup_uri_free (uri);
+ g_free (realm);
+ }
+
+ out:
+ g_strfreev (lines);
+}
+#endif
+
+static void
+migrate_passwords ()
+{
+#ifdef ENABLE_NSS
+ char *dest, *contents, *gecko_passwords_backup;
+ gsize length;
+ GError *error = NULL;
+
+ dest = g_build_filename (ephy_dot_dir (),
+ "mozilla", "epiphany", "signons3.txt",
+ NULL);
+ if (!g_file_test (dest, G_FILE_TEST_EXISTS)) {
+ g_free (dest);
+ dest = g_build_filename (ephy_dot_dir (),
+ "mozilla", "epiphany", "signons2.txt",
+ NULL);
+ if (!g_file_test (dest, G_FILE_TEST_EXISTS)) {
+ g_free (dest);
+ return;
+ }
+ }
+
+ if (!ephy_nss_glue_init ())
+ return;
+
+ if (!g_file_get_contents (dest, &contents, &length, &error)) {
+ g_free (dest);
+ }
+
+ parse_and_decrypt_signons (contents);
+
+ /* Save the contents in a backup directory for future data
+ extraction when we support more features */
+ gecko_passwords_backup = g_build_filename (ephy_dot_dir (),
+ "gecko-passwords.txt", NULL);
+
+ if (!g_file_set_contents (gecko_passwords_backup, contents,
+ -1, &error)) {
+ g_error_free (error);
+ }
+
+ g_free (gecko_passwords_backup);
+ g_free (contents);
+
+ ephy_nss_glue_close ();
+#endif
+}
+
+const EphyProfileMigrator migrators[] = {
+ migrate_cookies,
+ migrate_passwords,
+ /* Yes, again! Version 2 had some bugs, so we need to run
+ migrate_passwords again to possibly migrate more passwords*/
+ migrate_passwords
+};
+
+#define PROFILE_MIGRATION_FILE ".migrated"
+
+void
+_ephy_profile_migrate ()
+{
+ int latest, i;
+ char *migrated_file, *contents;
+
+ /* Figure out the latest migration that occured */
+ migrated_file = g_build_filename (ephy_dot_dir (),
+ PROFILE_MIGRATION_FILE,
+ NULL);
+ if (g_file_test (migrated_file, G_FILE_TEST_EXISTS)) {
+ gsize size;
+ int result;
+
+ g_file_get_contents (migrated_file, &contents, &size, NULL);
+ result = sscanf(contents, "%d", &latest);
+ g_free (contents);
+
+ if (result != 1) {
+ g_warning (_("Failed to read latest migration marker, aborting profile migration."));
+ g_free (migrated_file);
+ return;
+ }
+ } else
+ /* Never migrated */
+ latest = 0;
+
+ for (i = latest; i < PROFILE_MIGRATION_VERSION; i++) {
+ EphyProfileMigrator m;
+
+ /* No need to run the password migration twice in a row. It
+ appears twice in the list for the benefit of people that were
+ using the development snapshots, since an early version didn't
+ migrate all passwords correctly. */
+ if (i == 1)
+ continue;
+
+ m = migrators[i];
+ m();
+ }
+
+ /* Write down the latest migration */
+ contents = g_strdup_printf ("%d", PROFILE_MIGRATION_VERSION);
+ g_file_set_contents (migrated_file, contents, -1, NULL);
+ g_free (contents);
+ g_free (migrated_file);
+}
+