aboutsummaryrefslogblamecommitdiffstats
path: root/e-util/e-account.c
blob: 89c05253369216ffc18ca275e7dd5c079b852e64 (plain) (tree)



















                                                                           
                   



                      

                  
                   
 



                             

                               

            






                                  

                                                  


































                                                                                                                                               
                                           

           
                                           
 

                                   
                                     

                                                    









                                                                      


           
                                  



                                                         
 

                                   

                                              











                                       

                             














                                          
                                    








                                               
        






                                            

                                            
 

                                     
                                                                   

 











                                                               
                                    


































































                                                                       









                                     
                





                                                             
         

                   

 

















































                                                                                      


                                             









                                      
                





                                                             
         

                   
















                                                                             
                                                                            
                                           


                                                                                                        














                                                                                            









                                                           
















































                                                                                       
        

                                                                     
        
















                                                                                       

                                                                                                     














                                                                                                         
                                                                                                     
                                                                                                           
                                                                                                           


                                                                                  



                                                                                                              



                                                      








                                                                                                       




                         

                                                        


                       






















                                                                  
                                                        

























                                                                     

                                                   






                                                             




                                                                 
                                                                 

                                                                    
        

                                                     
 

































                                                                                      
        
                                                        

                                                       


























                                                                                               


                                                                                     








                                                                                              

                                                                                                
                                                                                                



                                                                                           
 




                                                                                











                                            




























                                                                   











                                 

                           









                                                      
                                    




                                                           

                                               

  






                             
                      





























                                                                                                                                                                                      

                                                                                                  










                                                                                                                 

                                                                                                    










































                                                                                   






































                                                                                                              




















                                                                                                      
         









                                    
      









                                                                               
                                                                                   



                                                                             
                                            













                                                                             
                                            













                                                                             
                                            




                                                                     
















                                                                                 
                                                                                            









                                                       
                                                          
 
/* -*- Mode: C; tab-width: 8; indent-tabs-mode: t; c-basic-offset: 8 -*- */
/*
 * Copyright (C) 2003 Ximian, Inc.
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of version 2 of the GNU General Public
 * License as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public
 * License along with this library; if not, write to the
 * Free Software Foundation, Inc., 59 Temple Place - Suite 330,
 * Boston, MA 02111-1307, USA.
 */

#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

#include "e-account.h"

#include "e-uid.h"

#include <string.h>

#include <libxml/parser.h>
#include <libxml/tree.h>
#include <libxml/xmlmemory.h>

#include <gconf/gconf-client.h>

#define d(x)

enum {
    CHANGED,
    LAST_SIGNAL
};

static guint signals[LAST_SIGNAL];

G_DEFINE_TYPE (EAccount, e_account, G_TYPE_OBJECT)

/*
lock mail accounts  Relatively difficult -- involves redesign of the XML blobs which describe accounts
disable adding mail accounts    Simple -- can be done with just a Gconf key and some UI work to make assoc. widgets unavailable
disable editing mail accounts   Relatively difficult -- involves redesign of the XML blobs which describe accounts
disable removing mail accounts  
lock default character encoding Simple -- Gconf key + a little UI work to desensitize widgets, etc
disable free busy publishing    
disable specific mime types (from being viewed) 90% done already (Unknown MIME types still pose a problem)
lock image loading preference   
lock junk mail filtering settings   
**  junk mail per account
lock work week  
lock first day of work week 
lock working hours  
disable forward as icalendar    
lock color options for tasks    
lock default contact filing format  
* forbid signatures Simple -- can be done with just a Gconf key and some UI work to make assoc. widgets unavailable
* lock user to having 1 specific signature  Simple -- can be done with just a Gconf key and some UI work to make assoc. widgets unavailable
* forbid adding/removing signatures Simple -- can be done with just a Gconf key and some UI work to make assoc. widgets unavailable
* lock each account to a certain signature  Relatively difficult -- involved redesign of the XML blobs which describe accounts 
* set default folders   
set trash emptying frequency    
* lock displayed mail headers   Simple -- can be done with just a Gconf key and some UI work to make assoc. widgets unavailable
* lock authentication type (for incoming mail)  Relatively difficult -- involves redesign of the XML blobs which describe accounts
* lock authentication type (for outgoing mail)  Relatively difficult -- involves redesign of the XML blobs which describe accounts
* lock minimum check mail on server frequency   Simple -- can be done with just a Gconf key and some UI work to make assoc. widgets unavailable
** lock save password
* require ssl always    Relatively difficult -- involves redesign of the XML blobs which describe accounts
** lock imap subscribed folder option
** lock filtering of inbox
** lock source account/options
** lock destination account/options
*/

static void e_account_finalize (GObject *);

static void
e_account_class_init (EAccountClass *klass)
{
    GObjectClass *object_class;
    
    /* virtual method override */
    object_class = G_OBJECT_CLASS (klass);
    object_class->finalize = e_account_finalize;

    signals[CHANGED] =
        g_signal_new("changed",
                 G_OBJECT_CLASS_TYPE (object_class),
                 G_SIGNAL_RUN_LAST,
                 G_STRUCT_OFFSET (EAccountClass, changed),
                 NULL, NULL,
                 g_cclosure_marshal_VOID__INT,
                 G_TYPE_NONE, 1,
                 G_TYPE_INT);
}

static void
e_account_init (EAccount *account)
{
    account->id = g_new0 (EAccountIdentity, 1);
    account->source = g_new0 (EAccountService, 1);
    account->transport = g_new0 (EAccountService, 1);

    account->parent_uid = NULL;
    
    account->source->auto_check = FALSE;
    account->source->auto_check_time = 10;
}

static void
identity_destroy (EAccountIdentity *id)
{
    if (!id)
        return;

    g_free (id->name);
    g_free (id->address);
    g_free (id->reply_to);
    g_free (id->organization);
    g_free (id->sig_uid);
    
    g_free (id);
}

static void
service_destroy (EAccountService *service)
{
    if (!service)
        return;

    g_free (service->url);

    g_free (service);
}

static void
e_account_finalize (GObject *object)
{
    EAccount *account = E_ACCOUNT (object);

    g_free (account->name);
    g_free (account->uid);

    identity_destroy (account->id);
    service_destroy (account->source);
    service_destroy (account->transport);
    
    g_free (account->drafts_folder_uri);
    g_free (account->sent_folder_uri);

    g_free (account->cc_addrs);
    g_free (account->bcc_addrs);

    g_free (account->pgp_key);
    g_free (account->smime_sign_key);
    g_free (account->smime_encrypt_key);

    g_free (account->parent_uid);

    G_OBJECT_CLASS (e_account_parent_class)->finalize (object);
}

/**
 * e_account_new:
 *
 * Return value: a blank new account which can be filled in and
 * added to an #EAccountList.
 **/
EAccount *
e_account_new (void)
{
    EAccount *account;

    account = g_object_new (E_TYPE_ACCOUNT, NULL);
    account->uid = e_uid_new ();

    return account;
}

/**
 * e_account_new_from_xml:
 * @xml: an XML account description
 *
 * Return value: a new #EAccount based on the data in @xml, or %NULL
 * if @xml could not be parsed as valid account data.
 **/
EAccount *
e_account_new_from_xml (const char *xml)
{
    EAccount *account;

    account = g_object_new (E_TYPE_ACCOUNT, NULL);
    if (!e_account_set_from_xml (account, xml)) {
        g_object_unref (account);
        return NULL;
    }

    return account;
}


static gboolean
xml_set_bool (xmlNodePtr node, const char *name, gboolean *val)
{
    gboolean bool;
    char *buf;

    if ((buf = xmlGetProp (node, name))) {
        bool = (!strcmp (buf, "true") || !strcmp (buf, "yes"));
        xmlFree (buf);

        if (bool != *val) {
            *val = bool;
            return TRUE;
        }
    }

    return FALSE;
}

static gboolean
xml_set_int (xmlNodePtr node, const char *name, int *val)
{
    int number;
    char *buf;

    if ((buf = xmlGetProp (node, name))) {
        number = strtol (buf, NULL, 10);
        xmlFree (buf);

        if (number != *val) {
            *val = number;
            return TRUE;
        }
    }

    return FALSE;
}

static gboolean
xml_set_prop (xmlNodePtr node, const char *name, char **val)
{
    char *buf;
    int res;

    buf = xmlGetProp(node, name);
    if (buf == NULL) {
        res = (*val != NULL);
        if (res) {
            g_free(*val);
            *val = NULL;
        }
    } else {
        res = *val == NULL || strcmp(*val, buf) != 0;
        if (res) {
            g_free(*val);
            *val = g_strdup(buf);
        }
        xmlFree(buf);
    }

    return res;
}

static EAccountReceiptPolicy
str_to_receipt_policy (const char *str)
{
    if (!strcmp (str, "ask"))
        return E_ACCOUNT_RECEIPT_ASK;
    if (!strcmp (str, "always"))
        return E_ACCOUNT_RECEIPT_ALWAYS;

    return E_ACCOUNT_RECEIPT_NEVER;
}

static char*
receipt_policy_to_str (EAccountReceiptPolicy val)
{
    char *ret = 0;
    
    switch (val) {
    case E_ACCOUNT_RECEIPT_NEVER:
        ret = "never";
        break;
    case E_ACCOUNT_RECEIPT_ASK:
        ret = "ask";
        break;
    case E_ACCOUNT_RECEIPT_ALWAYS:
        ret = "always";
        break;
    }

    return ret;
}

static gboolean
xml_set_receipt_policy (xmlNodePtr node, const char *name, EAccountReceiptPolicy *val)
{
    EAccountReceiptPolicy new_val;
    char *buf;

    if ((buf = xmlGetProp (node, name))) {
        new_val = str_to_receipt_policy (buf);
        xmlFree (buf);

        if (new_val != *val) {
            *val = new_val;
            return TRUE;
        }
    }

    return FALSE;
}

static gboolean
xml_set_content (xmlNodePtr node, char **val)
{
    char *buf;
    int res;

    buf = xmlNodeGetContent(node);
    if (buf == NULL) {
        res = (*val != NULL);
        if (res) {
            g_free(*val);
            *val = NULL;
        }
    } else {
        res = *val == NULL || strcmp(*val, buf) != 0;
        if (res) {
            g_free(*val);
            *val = g_strdup(buf);
        }
        xmlFree(buf);
    }

    return res;
}

static gboolean
xml_set_identity (xmlNodePtr node, EAccountIdentity *id)
{
    gboolean changed = FALSE;

    for (node = node->children; node; node = node->next) {
        if (!strcmp (node->name, "name"))
            changed |= xml_set_content (node, &id->name);
        else if (!strcmp (node->name, "addr-spec"))
            changed |= xml_set_content (node, &id->address);
        else if (!strcmp (node->name, "reply-to"))
            changed |= xml_set_content (node, &id->reply_to);
        else if (!strcmp (node->name, "organization"))
            changed |= xml_set_content (node, &id->organization);
        else if (!strcmp (node->name, "signature")) {
            changed |= xml_set_prop (node, "uid", &id->sig_uid);
            if (!id->sig_uid) {

                /* WTF is this shit doing here?  Migrate is supposed to "handle this" */

                /* set a fake sig uid so the migrate code can handle this */
                gboolean autogen = FALSE;
                int sig_id = 0;
                
                xml_set_bool (node, "auto", &autogen);
                xml_set_int (node, "default", &sig_id);
                
                if (autogen) {
                    id->sig_uid = g_strdup ("::0");
                    changed = TRUE;
                } else if (sig_id) {
                    id->sig_uid = g_strdup_printf ("::%d", sig_id + 1);
                    changed = TRUE;
                }
            }
        }
    }

    return changed;
}

static gboolean
xml_set_service (xmlNodePtr node, EAccountService *service)
{
    gboolean changed = FALSE;

    changed |= xml_set_bool (node, "save-passwd", &service->save_passwd);
    changed |= xml_set_bool (node, "keep-on-server", &service->keep_on_server);

    changed |= xml_set_bool (node, "auto-check", &service->auto_check);
    changed |= xml_set_int (node, "auto-check-timeout", &service->auto_check_time);
    if (service->auto_check && service->auto_check_time <= 0) {
        service->auto_check = FALSE;
        service->auto_check_time = 0;
    }

    for (node = node->children; node; node = node->next) {
        if (!strcmp (node->name, "url")) {
            changed |= xml_set_content (node, &service->url);
            break;
        }
    }

    return changed;
}

/**
 * e_account_set_from_xml:
 * @account: an #EAccount
 * @xml: an XML account description.
 *
 * Changes @account to match @xml.
 *
 * Return value: %TRUE if @account was changed, %FALSE if @account
 * already matched @xml or @xml could not be parsed
 **/
gboolean
e_account_set_from_xml (EAccount *account, const char *xml)
{
    xmlNodePtr node, cur;
    xmlDocPtr doc;
    gboolean changed = FALSE;

    if (!(doc = xmlParseDoc ((char *)xml)))
        return FALSE;

    node = doc->children;
    if (strcmp (node->name, "account") != 0) {
        xmlFreeDoc (doc);
        return FALSE;
    }

    if (!account->uid)
        xml_set_prop (node, "uid", &account->uid);
    
    changed |= xml_set_prop (node, "name", &account->name);
    changed |= xml_set_bool (node, "enabled", &account->enabled);
    
    for (node = node->children; node; node = node->next) {
        if (!strcmp (node->name, "identity")) {
            changed |= xml_set_identity (node, account->id);
        } else if (!strcmp (node->name, "source")) {
            changed |= xml_set_service (node, account->source);
        } else if (!strcmp (node->name, "transport")) {
            changed |= xml_set_service (node, account->transport);
        } else if (!strcmp (node->name, "drafts-folder")) {
            changed |= xml_set_content (node, &account->drafts_folder_uri);
        } else if (!strcmp (node->name, "sent-folder")) {
            changed |= xml_set_content (node, &account->sent_folder_uri);
        } else if (!strcmp (node->name, "auto-cc")) {
            changed |= xml_set_bool (node, "always", &account->always_cc);
            changed |= xml_set_content (node, &account->cc_addrs);
        } else if (!strcmp (node->name, "auto-bcc")) {
            changed |= xml_set_bool (node, "always", &account->always_bcc);
            changed |= xml_set_content (node, &account->bcc_addrs);
        } else if (!strcmp (node->name, "receipt-policy")) {
            changed |= xml_set_receipt_policy (node, "policy", &account->receipt_policy);
        } else if (!strcmp (node->name, "pgp")) {
            changed |= xml_set_bool (node, "encrypt-to-self", &account->pgp_encrypt_to_self);
            changed |= xml_set_bool (node, "always-trust", &account->pgp_always_trust);
            changed |= xml_set_bool (node, "always-sign", &account->pgp_always_sign);
            changed |= xml_set_bool (node, "no-imip-sign", &account->pgp_no_imip_sign);

            if (node->children) {
                for (cur = node->children; cur; cur = cur->next) {
                    if (!strcmp (cur->name, "key-id")) {
                        changed |= xml_set_content (cur, &account->pgp_key);
                        break;
                    }
                }
            }
        } else if (!strcmp (node->name, "smime")) {
            changed |= xml_set_bool (node, "sign-default", &account->smime_sign_default);
            changed |= xml_set_bool (node, "encrypt-to-self", &account->smime_encrypt_to_self);
            changed |= xml_set_bool (node, "encrypt-default", &account->smime_encrypt_default);

            if (node->children) {
                for (cur = node->children; cur; cur = cur->next) {
                    if (!strcmp (cur->name, "sign-key-id")) {
                        changed |= xml_set_content (cur, &account->smime_sign_key);
                    } else if (!strcmp (cur->name, "encrypt-key-id")) {
                        changed |= xml_set_content (cur, &account->smime_encrypt_key);
                        break;
                    }
                }
            }
        } else if (!strcmp (node->name, "proxy")) {
            if (node->children) {
                for (cur = node->children; cur; cur = cur->next) {
                    if (!strcmp (cur->name, "parent-uid")) {
                        changed |= xml_set_content (cur, &account->parent_uid);
                        break;
                    }
                }
            }
        }
    }

    xmlFreeDoc (doc);

    g_signal_emit(account, signals[CHANGED], 0, -1);

    return changed;
}

/**
 * e_account_import:
 * @dest: destination account object
 * @src: source account object
 *
 * Import the settings from @src to @dest.
 **/
void
e_account_import (EAccount *dest, EAccount *src)
{
    g_free (dest->name);
    dest->name = g_strdup (src->name);
    
    dest->enabled = src->enabled;
    
    g_free (dest->id->name);
    dest->id->name = g_strdup (src->id->name);
    g_free (dest->id->address);
    dest->id->address = g_strdup (src->id->address);
    g_free (dest->id->reply_to);
    dest->id->reply_to = g_strdup (src->id->reply_to);
    g_free (dest->id->organization);
    dest->id->organization = g_strdup (src->id->organization);
    dest->id->sig_uid = g_strdup (src->id->sig_uid);
    
    g_free (dest->source->url);
    dest->source->url = g_strdup (src->source->url);
    dest->source->keep_on_server = src->source->keep_on_server;
    dest->source->auto_check = src->source->auto_check;
    dest->source->auto_check_time = src->source->auto_check_time;
    dest->source->save_passwd = src->source->save_passwd;
    
    g_free (dest->transport->url);
    dest->transport->url = g_strdup (src->transport->url);
    dest->transport->save_passwd = src->transport->save_passwd;
    
    g_free (dest->drafts_folder_uri);
    dest->drafts_folder_uri = g_strdup (src->drafts_folder_uri);
    
    g_free (dest->sent_folder_uri);
    dest->sent_folder_uri = g_strdup (src->sent_folder_uri);
    
    dest->always_cc = src->always_cc;
    g_free (dest->cc_addrs);
    dest->cc_addrs = g_strdup (src->cc_addrs);
    
    dest->always_bcc = src->always_bcc;
    g_free (dest->bcc_addrs);
    dest->bcc_addrs = g_strdup (src->bcc_addrs);
    
    dest->receipt_policy = src->receipt_policy;
    
    g_free (dest->pgp_key);
    dest->pgp_key = g_strdup (src->pgp_key);
    dest->pgp_encrypt_to_self = src->pgp_encrypt_to_self;
    dest->pgp_always_sign = src->pgp_always_sign;
    dest->pgp_no_imip_sign = src->pgp_no_imip_sign;
    dest->pgp_always_trust = src->pgp_always_trust;
    
    dest->smime_sign_default = src->smime_sign_default;
    g_free (dest->smime_sign_key);
    dest->smime_sign_key = g_strdup (src->smime_sign_key);

    dest->smime_encrypt_default = src->smime_encrypt_default;
    dest->smime_encrypt_to_self = src->smime_encrypt_to_self;
    g_free (dest->smime_encrypt_key);
    dest->smime_encrypt_key = g_strdup (src->smime_encrypt_key);
    
    g_signal_emit(dest, signals[CHANGED], 0, -1);
}

/**
 * e_account_to_xml:
 * @account: an #EAccount
 *
 * Return value: an XML representation of @account, which the caller
 * must free.
 **/
char *
e_account_to_xml (EAccount *account)
{
    xmlNodePtr root, node, id, src, xport;
    char *tmp, buf[20];
    xmlChar *xmlbuf;
    xmlDocPtr doc;
    int n;

    doc = xmlNewDoc ("1.0");

    root = xmlNewDocNode (doc, NULL, "account", NULL);
    xmlDocSetRootElement (doc, root);

    xmlSetProp (root, "name", account->name);
    xmlSetProp (root, "uid", account->uid);
    xmlSetProp (root, "enabled", account->enabled ? "true" : "false");

    id = xmlNewChild (root, NULL, "identity", NULL);
    if (account->id->name)
        xmlNewTextChild (id, NULL, "name", account->id->name);
    if (account->id->address)
        xmlNewTextChild (id, NULL, "addr-spec", account->id->address);
    if (account->id->reply_to)
        xmlNewTextChild (id, NULL, "reply-to", account->id->reply_to);
    if (account->id->organization)
        xmlNewTextChild (id, NULL, "organization", account->id->organization);
    
    node = xmlNewChild (id, NULL, "signature",NULL);
    xmlSetProp (node, "uid", account->id->sig_uid);
    
    src = xmlNewChild (root, NULL, "source", NULL);
    xmlSetProp (src, "save-passwd", account->source->save_passwd ? "true" : "false");
    xmlSetProp (src, "keep-on-server", account->source->keep_on_server ? "true" : "false");
    xmlSetProp (src, "auto-check", account->source->auto_check ? "true" : "false");
    sprintf (buf, "%d", account->source->auto_check_time);
    xmlSetProp (src, "auto-check-timeout", buf);
    if (account->source->url)
        xmlNewTextChild (src, NULL, "url", account->source->url);

    xport = xmlNewChild (root, NULL, "transport", NULL);
    xmlSetProp (xport, "save-passwd", account->transport->save_passwd ? "true" : "false");
    if (account->transport->url)
        xmlNewTextChild (xport, NULL, "url", account->transport->url);

    xmlNewTextChild (root, NULL, "drafts-folder", account->drafts_folder_uri);
    xmlNewTextChild (root, NULL, "sent-folder", account->sent_folder_uri);

    node = xmlNewChild (root, NULL, "auto-cc", NULL);
    xmlSetProp (node, "always", account->always_cc ? "true" : "false");
    if (account->cc_addrs)
        xmlNewTextChild (node, NULL, "recipients", account->cc_addrs);

    node = xmlNewChild (root, NULL, "auto-bcc", NULL);
    xmlSetProp (node, "always", account->always_bcc ? "true" : "false");
    if (account->bcc_addrs)
        xmlNewTextChild (node, NULL, "recipients", account->bcc_addrs);

    node = xmlNewChild (root, NULL, "receipt-policy", NULL);
    xmlSetProp (node, "policy", receipt_policy_to_str (account->receipt_policy));
    
    node = xmlNewChild (root, NULL, "pgp", NULL);
    xmlSetProp (node, "encrypt-to-self", account->pgp_encrypt_to_self ? "true" : "false");
    xmlSetProp (node, "always-trust", account->pgp_always_trust ? "true" : "false");
    xmlSetProp (node, "always-sign", account->pgp_always_sign ? "true" : "false");
    xmlSetProp (node, "no-imip-sign", account->pgp_no_imip_sign ? "true" : "false");
    if (account->pgp_key)
        xmlNewTextChild (node, NULL, "key-id", account->pgp_key);

    node = xmlNewChild (root, NULL, "smime", NULL);
    xmlSetProp (node, "sign-default", account->smime_sign_default ? "true" : "false");
    xmlSetProp (node, "encrypt-default", account->smime_encrypt_default ? "true" : "false");
    xmlSetProp (node, "encrypt-to-self", account->smime_encrypt_to_self ? "true" : "false");
    if (account->smime_sign_key)
        xmlNewTextChild (node, NULL, "sign-key-id", account->smime_sign_key);
    if (account->smime_encrypt_key)
        xmlNewTextChild (node, NULL, "encrypt-key-id", account->smime_encrypt_key);

    if (account->parent_uid) {
        node = xmlNewChild (root, NULL, "proxy", NULL);
        xmlNewTextChild (node, NULL, "parent-uid", account->parent_uid);
    }   

    xmlDocDumpMemory (doc, &xmlbuf, &n);
    xmlFreeDoc (doc);

    /* remap to glib memory */
    tmp = g_malloc (n + 1);
    memcpy (tmp, xmlbuf, n);
    tmp[n] = '\0';
    xmlFree (xmlbuf);

    return tmp;
}

/**
 * e_account_uid_from_xml:
 * @xml: an XML account description
 *
 * Return value: the permanent UID of the account described by @xml
 * (or %NULL if @xml could not be parsed or did not contain a uid).
 * The caller must free this string.
 **/
char *
e_account_uid_from_xml (const char *xml)
{
    xmlNodePtr node;
    xmlDocPtr doc;
    char *uid = NULL;

    if (!(doc = xmlParseDoc ((char *)xml)))
        return NULL;

    node = doc->children;
    if (strcmp (node->name, "account") != 0) {
        xmlFreeDoc (doc);
        return NULL;
    }

    xml_set_prop (node, "uid", &uid);
    xmlFreeDoc (doc);

    return uid;
}

enum {
    EAP_IMAP_SUBSCRIBED = 0,
    EAP_IMAP_NAMESPACE,
    EAP_FILTER_INBOX,
    EAP_FILTER_JUNK,
    EAP_FORCE_SSL,
    EAP_LOCK_SIGNATURE,
    EAP_LOCK_AUTH,
    EAP_LOCK_AUTOCHECK,
    EAP_LOCK_DEFAULT_FOLDERS,
    EAP_LOCK_SAVE_PASSWD,
    EAP_LOCK_SOURCE,
    EAP_LOCK_TRANSPORT,
};

static struct _system_info {
    const char *key;
    guint32 perm;
} system_perms[] = {
    { "imap_subscribed", 1<<EAP_IMAP_SUBSCRIBED },
    { "imap_namespace", 1<<EAP_IMAP_NAMESPACE },
    { "filter_inbox", 1<<EAP_FILTER_INBOX },
    { "filter_junk", 1<<EAP_FILTER_JUNK },
    { "ssl", 1<<EAP_FORCE_SSL },
    { "signature", 1<<EAP_LOCK_SIGNATURE },
    { "authtype", 1<<EAP_LOCK_AUTH },
    { "autocheck", 1<<EAP_LOCK_AUTOCHECK },
    { "default_folders", 1<<EAP_LOCK_DEFAULT_FOLDERS },
    { "save_passwd" , 1<<EAP_LOCK_SAVE_PASSWD },
    { "source", 1<<EAP_LOCK_SOURCE },
    { "transport", 1<<EAP_LOCK_TRANSPORT },
};

#define TYPE_STRING (1)
#define TYPE_INT (2)
#define TYPE_BOOL (3)
#define TYPE_MASK (0xff)
#define TYPE_STRUCT (1<<8)

static struct _account_info {
    guint32 perms;
    guint32 type;
    unsigned int offset;
    unsigned int struct_offset;
} account_info[E_ACCOUNT_ITEM_LAST] = {
    { /* E_ACCOUNT_NAME */ 0, TYPE_STRING, G_STRUCT_OFFSET(EAccount, name) },

    { /* E_ACCOUNT_ID_NAME, */ 0, TYPE_STRING|TYPE_STRUCT, G_STRUCT_OFFSET(EAccount, id), G_STRUCT_OFFSET(EAccountIdentity, name) },
    { /* E_ACCOUNT_ID_ADDRESS, */ 0, TYPE_STRING|TYPE_STRUCT, G_STRUCT_OFFSET(EAccount, id), G_STRUCT_OFFSET(EAccountIdentity, address) },
    { /* E_ACCOUNT_ID_REPLY_TO, */ 0, TYPE_STRING|TYPE_STRUCT, G_STRUCT_OFFSET(EAccount, id), G_STRUCT_OFFSET(EAccountIdentity, reply_to) },
    { /* E_ACCOUNT_ID_ORGANIZATION */ 0, TYPE_STRING|TYPE_STRUCT, G_STRUCT_OFFSET(EAccount, id), G_STRUCT_OFFSET(EAccountIdentity, organization) },
    { /* E_ACCOUNT_ID_SIGNATURE */ 1<<EAP_LOCK_SIGNATURE, TYPE_STRING|TYPE_STRUCT, G_STRUCT_OFFSET(EAccount, id), G_STRUCT_OFFSET(EAccountIdentity, sig_uid) },

    { /* E_ACCOUNT_SOURCE_URL */ 1<<EAP_LOCK_SOURCE, TYPE_STRING|TYPE_STRUCT, G_STRUCT_OFFSET(EAccount, source), G_STRUCT_OFFSET(EAccountService, url) },
    { /* E_ACCOUNT_SOURCE_KEEP_ON_SERVER */ 0, TYPE_BOOL|TYPE_STRUCT, G_STRUCT_OFFSET(EAccount, source), G_STRUCT_OFFSET(EAccountService, keep_on_server) },
    { /* E_ACCOUNT_SOURCE_AUTO_CHECK */ 1<<EAP_LOCK_AUTOCHECK, TYPE_BOOL|TYPE_STRUCT, G_STRUCT_OFFSET(EAccount, source), G_STRUCT_OFFSET(EAccountService, auto_check) },
    { /* E_ACCOUNT_SOURCE_AUTO_CHECK_TIME */ 1<<EAP_LOCK_AUTOCHECK, TYPE_INT|TYPE_STRUCT, G_STRUCT_OFFSET(EAccount, source), G_STRUCT_OFFSET(EAccountService, auto_check_time) },
    { /* E_ACCOUNT_SOURCE_SAVE_PASSWD */ 1<<EAP_LOCK_SAVE_PASSWD, TYPE_BOOL|TYPE_STRUCT, G_STRUCT_OFFSET(EAccount, source), G_STRUCT_OFFSET(EAccountService, save_passwd) },

    { /* E_ACCOUNT_TRANSPORT_URL */ 1<<EAP_LOCK_TRANSPORT, TYPE_STRING|TYPE_STRUCT, G_STRUCT_OFFSET(EAccount, transport), G_STRUCT_OFFSET(EAccountService, url) },
    { /* E_ACCOUNT_TRANSPORT_SAVE_PASSWD */ 1<<EAP_LOCK_SAVE_PASSWD, TYPE_BOOL|TYPE_STRUCT, G_STRUCT_OFFSET(EAccount, transport), G_STRUCT_OFFSET(EAccountService, save_passwd) },

    { /* E_ACCOUNT_DRAFTS_FOLDER_URI */ 1<<EAP_LOCK_DEFAULT_FOLDERS, TYPE_STRING, G_STRUCT_OFFSET(EAccount, drafts_folder_uri) },
    { /* E_ACCOUNT_SENT_FOLDER_URI */ 1<<EAP_LOCK_DEFAULT_FOLDERS, TYPE_STRING, G_STRUCT_OFFSET(EAccount, sent_folder_uri) },

    { /* E_ACCOUNT_CC_ALWAYS */ 0, TYPE_BOOL, G_STRUCT_OFFSET(EAccount, always_cc) },
    { /* E_ACCOUNT_CC_ADDRS */ 0, TYPE_STRING, G_STRUCT_OFFSET(EAccount, cc_addrs) },

    { /* E_ACCOUNT_BCC_ALWAYS */ 0, TYPE_BOOL, G_STRUCT_OFFSET(EAccount, always_bcc) },
    { /* E_ACCOUNT_BCC_ADDRS */ 0, TYPE_STRING, G_STRUCT_OFFSET(EAccount, bcc_addrs) },

    { /* E_ACCOUNT_RECEIPT_POLICY */ 0, TYPE_INT, G_STRUCT_OFFSET(EAccount, receipt_policy) },
    
    { /* E_ACCOUNT_PGP_KEY */ 0, TYPE_STRING, G_STRUCT_OFFSET(EAccount, pgp_key) },
    { /* E_ACCOUNT_PGP_ENCRYPT_TO_SELF */ 0, TYPE_BOOL, G_STRUCT_OFFSET(EAccount, pgp_encrypt_to_self) },
    { /* E_ACCOUNT_PGP_ALWAYS_SIGN */ 0, TYPE_BOOL, G_STRUCT_OFFSET(EAccount, pgp_always_sign) },
    { /* E_ACCOUNT_PGP_NO_IMIP_SIGN */ 0, TYPE_BOOL, G_STRUCT_OFFSET(EAccount, pgp_no_imip_sign) },
    { /* E_ACCOUNT_PGP_ALWAYS_TRUST */ 0, TYPE_BOOL, G_STRUCT_OFFSET(EAccount, pgp_always_trust) },

    { /* E_ACCOUNT_SMIME_SIGN_KEY */ 0, TYPE_STRING, G_STRUCT_OFFSET(EAccount, smime_sign_key) },
    { /* E_ACCOUNT_SMIME_ENCRYPT_KEY */ 0, TYPE_STRING, G_STRUCT_OFFSET(EAccount, smime_encrypt_key) },
    { /* E_ACCOUNT_SMIME_SIGN_DEFAULT */ 0, TYPE_BOOL, G_STRUCT_OFFSET(EAccount, smime_sign_default) },
    { /* E_ACCOUNT_SMIME_ENCRYPT_TO_SELF */ 0, TYPE_BOOL, G_STRUCT_OFFSET(EAccount, smime_encrypt_to_self) },
    { /* E_ACCOUNT_SMIME_ENCRYPT_DEFAULT */ 0, TYPE_BOOL, G_STRUCT_OFFSET(EAccount, smime_encrypt_default) },

    { /* E_ACCOUNT_PROXY_PARENT_UID, */ 0, TYPE_STRING, G_STRUCT_OFFSET(EAccount, parent_uid) },
};

static GHashTable *ea_option_table;
static GHashTable *ea_system_table;
static guint32 ea_perms;

static struct _option_info {
    char *key;
    guint32 perms;
} ea_option_list[] = {
    { "imap_use_lsub", 1<<EAP_IMAP_SUBSCRIBED },
    { "imap_override_namespace", 1<<EAP_IMAP_NAMESPACE },
    { "imap_filter", 1<<EAP_FILTER_INBOX },
    { "imap_filter_junk", 1<<EAP_FILTER_JUNK },
    { "imap_filter_junk_inbox", 1<<EAP_FILTER_JUNK },
    { "*_use_ssl", 1<<EAP_FORCE_SSL },
    { "*_auth", 1<<EAP_LOCK_AUTH },
};

#define LOCK_BASE "/apps/evolution/lock/mail/accounts"

static void
ea_setting_notify(GConfClient *gconf, guint cnxn_id, GConfEntry *entry, void *crap)
{
    GConfValue *value;
    char *tkey;
    struct _system_info *info;

    g_return_if_fail (gconf_entry_get_key (entry) != NULL);
    
    if (!(value = gconf_entry_get_value (entry)))
        return;
    
    tkey = strrchr(entry->key, '/');
    g_return_if_fail (tkey != NULL);

    info = g_hash_table_lookup(ea_system_table, tkey+1);
    if (info) {
        if (gconf_value_get_bool(value))
            ea_perms |= info->perm;
        else
            ea_perms &= ~info->perm;
    }
}

static void
ea_setting_setup(void)
{
    GConfClient *gconf = gconf_client_get_default();
    GConfEntry *entry;
    GError *err = NULL;
    int i;
    char key[64];

    if (ea_option_table != NULL)
        return;

    ea_option_table = g_hash_table_new(g_str_hash, g_str_equal);
    for (i=0;i<sizeof(ea_option_list)/sizeof(ea_option_list[0]);i++)
        g_hash_table_insert(ea_option_table, ea_option_list[i].key, &ea_option_list[i]);

    gconf_client_add_dir(gconf, LOCK_BASE, GCONF_CLIENT_PRELOAD_NONE, NULL);

    ea_system_table = g_hash_table_new(g_str_hash, g_str_equal);
    for (i=0;i<sizeof(system_perms)/sizeof(system_perms[0]);i++) {
        g_hash_table_insert(ea_system_table, (char *)system_perms[i].key, &system_perms[i]);
        sprintf(key, LOCK_BASE "/%s", system_perms[i].key);
        entry = gconf_client_get_entry(gconf, key, NULL, TRUE, &err);
        if (entry)
            ea_setting_notify(gconf, 0, entry, NULL);
        gconf_entry_free(entry);
    }

    if (err) {
        g_warning("Could not load account lock settings: %s", err->message);
        g_error_free(err);
    }

    gconf_client_notify_add(gconf, LOCK_BASE, (GConfClientNotifyFunc)ea_setting_notify, NULL, NULL, NULL);
    g_object_unref(gconf);
}

/* look up the item in the structure or the substructure using our table of reflection data */
#define addr(ea, type) \
    ((account_info[type].type & TYPE_STRUCT)? \
    (((char **)(((char *)ea)+account_info[type].offset))[0] + account_info[type].struct_offset): \
    (((char *)ea)+account_info[type].offset))
    
const char *e_account_get_string(EAccount *ea, e_account_item_t type)
{
    return *((const char **)addr(ea, type));
}

int e_account_get_int(EAccount *ea, e_account_item_t type)
{
    return *((int *)addr(ea, type));
}

gboolean e_account_get_bool(EAccount *ea, e_account_item_t type)
{
    return *((gboolean *)addr(ea, type));
}

#if d(!)0
static void
dump_account(EAccount *ea)
{
    char *xml;

    printf("Account changed\n");
    xml = e_account_to_xml(ea);
    printf(" ->\n%s\n", xml);
    g_free(xml);
}
#endif

/* TODO: should it return true if it changed? */
void e_account_set_string(EAccount *ea, e_account_item_t type, const char *val)
{
    char **p;

    if (!e_account_writable(ea, type)) {
        g_warning("Trying to set non-writable option account value");
    } else {
        p = (char **)addr(ea, type);
        d(printf("Setting string %d: old '%s' new '%s'\n", type, *p, val));
        if (*p != val
            && (*p == NULL || val == NULL || strcmp(*p, val) != 0)) {
            g_free(*p);
            *p = g_strdup(val);
            d(dump_account(ea));
            g_signal_emit(ea, signals[CHANGED], 0, type);
        }
    }
}

void e_account_set_int(EAccount *ea, e_account_item_t type, int val)
{
    if (!e_account_writable(ea, type)) {
        g_warning("Trying to set non-writable option account value");
    } else {
        int *p = (int *)addr(ea, type);

        if (*p != val) {
            *p = val;
            d(dump_account(ea));
            g_signal_emit(ea, signals[CHANGED], 0, type);
        }
    }
}

void e_account_set_bool(EAccount *ea, e_account_item_t type, gboolean val)
{
    if (!e_account_writable(ea, type)) {
        g_warning("Trying to set non-writable option account value");
    } else {
        gboolean *p = (gboolean *)addr(ea, type);

        if (*p != val) {
            *p = val;
            d(dump_account(ea));
            g_signal_emit(ea, signals[CHANGED], 0, type);
        }
    }
}

gboolean
e_account_writable_option(EAccount *ea, const char *protocol, const char *option)
{
    char *key;
    struct _option_info *info;

    ea_setting_setup();

    key = alloca(strlen(protocol)+strlen(option)+2);
    sprintf(key, "%s_%s", protocol, option);

    info = g_hash_table_lookup(ea_option_table, key);
    if (info == NULL) {
        sprintf(key, "*_%s", option);
        info = g_hash_table_lookup(ea_option_table, key);
    }

    d(printf("checking writable option '%s' perms=%08x\n", option, info?info->perms:0));

    return info == NULL
        || (info->perms & ea_perms) == 0;
}

gboolean
e_account_writable(EAccount *ea, e_account_item_t type)
{
    ea_setting_setup();

    return (account_info[type].perms & ea_perms) == 0;
}