kdeconnect-kde/core/device.cpp

425 lines
14 KiB
C++
Raw Normal View History

2014-06-09 10:52:16 +01:00
/**
* Copyright 2013 Albert Vaca <albertvaka@gmail.com>
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License as
* published by the Free Software Foundation; either version 2 of
* the License or (at your option) version 3 or any later version
* accepted by the membership of KDE e.V. (or its successor approved
* by the membership of KDE e.V.), which shall act as a proxy
* defined in Section 14 of version 3 of the license.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
2013-06-25 17:06:51 +01:00
#include "device.h"
2014-06-09 10:52:16 +01:00
#ifdef interface // MSVC language extension, QDBusConnection uses this as a variable name
#undef interface
#endif
#include <QDBusConnection>
2016-07-05 13:13:48 +01:00
#include <QSslCertificate>
2014-06-09 10:52:16 +01:00
#include <KSharedConfig>
#include <KConfigGroup>
#include <KLocalizedString>
#include "core_debug.h"
#include "kdeconnectplugin.h"
#include "pluginloader.h"
#include "backends/devicelink.h"
#include "backends/linkprovider.h"
#include "networkpackage.h"
#include "kdeconnectconfig.h"
#include "daemon.h"
Q_LOGGING_CATEGORY(KDECONNECT_CORE, "kdeconnect.core")
2015-12-17 14:53:29 +00:00
static void warn(const QString &info)
{
qWarning() << "Device pairing error" << info;
}
2014-01-22 22:31:27 +00:00
Device::Device(QObject* parent, const QString& id)
: QObject(parent)
, m_deviceId(id)
, m_protocolVersion(NetworkPackage::ProtocolVersion) //We don't know it yet
{
KdeConnectConfig::DeviceInfo info = KdeConnectConfig::instance()->getTrustedDevice(id);
m_deviceName = info.deviceName;
m_deviceType = str2type(info.deviceType);
//Register in bus
2013-08-20 12:52:25 +01:00
QDBusConnection::sessionBus().registerObject(dbusPath(), this, QDBusConnection::ExportScriptableContents | QDBusConnection::ExportAdaptors);
2015-12-17 14:53:29 +00:00
//Assume every plugin is supported until addLink is called and we can get the actual list
m_supportedPlugins = PluginLoader::instance()->getPluginList().toSet();
2015-12-17 14:53:29 +00:00
connect(this, &Device::pairingError, this, &warn);
2013-06-25 17:06:51 +01:00
}
2014-01-22 22:31:27 +00:00
Device::Device(QObject* parent, const NetworkPackage& identityPackage, DeviceLink* dl)
: QObject(parent)
, m_deviceId(identityPackage.get<QString>("deviceId"))
, m_deviceName(identityPackage.get<QString>("deviceName"))
{
2014-01-17 22:07:30 +00:00
addLink(identityPackage, dl);
//Register in bus
2013-08-20 12:52:25 +01:00
QDBusConnection::sessionBus().registerObject(dbusPath(), this, QDBusConnection::ExportScriptableContents | QDBusConnection::ExportAdaptors);
2015-12-17 14:53:29 +00:00
connect(this, &Device::pairingError, this, &warn);
}
2013-08-16 08:27:32 +01:00
Device::~Device()
{
qDeleteAll(m_deviceLinks);
m_deviceLinks.clear();
}
bool Device::hasPlugin(const QString& name) const
{
return m_plugins.contains(name);
}
QStringList Device::loadedPlugins() const
{
return m_plugins.keys();
}
void Device::reloadPlugins()
{
QHash<QString, KdeConnectPlugin*> newPluginMap, oldPluginMap = m_plugins;
QMultiMap<QString, KdeConnectPlugin*> newPluginsByIncomingCapability;
2015-12-01 18:45:14 +00:00
if (isTrusted() && isReachable()) { //Do not load any plugin for unpaired devices, nor useless loading them for unreachable devices
PluginLoader* loader = PluginLoader::instance();
Q_FOREACH (const QString& pluginName, m_supportedPlugins) {
const KPluginMetaData service = loader->getPluginInfo(pluginName);
const bool pluginEnabled = isPluginEnabled(pluginName);
const QSet<QString> incomingCapabilities = KPluginMetaData::readStringList(service.rawData(), "X-KdeConnect-SupportedPackageType").toSet();
if (pluginEnabled) {
KdeConnectPlugin* plugin = m_plugins.take(pluginName);
if (!plugin) {
plugin = loader->instantiatePluginForDevice(pluginName, this);
}
Q_ASSERT(plugin);
Q_FOREACH (const QString& interface, incomingCapabilities) {
newPluginsByIncomingCapability.insert(interface, plugin);
}
2015-09-12 16:48:24 +01:00
newPluginMap[pluginName] = plugin;
}
}
}
const bool differentPlugins = oldPluginMap != newPluginMap;
//Erase all left plugins in the original map (meaning that we don't want
//them anymore, otherwise they would have been moved to the newPluginMap)
qDeleteAll(m_plugins);
m_plugins = newPluginMap;
m_pluginsByIncomingCapability = newPluginsByIncomingCapability;
//TODO: see how it works in Android (only done once, when created)
Q_FOREACH(KdeConnectPlugin* plugin, m_plugins) {
plugin->connected();
}
if (differentPlugins) {
Q_EMIT pluginsChanged();
}
}
QString Device::pluginsConfigFile() const
{
return KdeConnectConfig::instance()->deviceConfigDir(id()).absoluteFilePath("config");
}
void Device::requestPair()
{
2015-12-01 18:45:14 +00:00
if (isTrusted()) {
Q_EMIT pairingError(i18n("Already paired"));
2015-11-30 18:36:01 +00:00
return;
}
if (!isReachable()) {
2015-12-01 18:45:14 +00:00
Q_EMIT pairingError(i18n("Device not reachable"));
return;
}
2015-12-01 18:45:14 +00:00
Q_FOREACH(DeviceLink* dl, m_deviceLinks) {
2015-12-02 19:04:35 +00:00
dl->userRequestsPair();
}
}
void Device::unpair()
{
2015-12-01 18:45:14 +00:00
Q_FOREACH(DeviceLink* dl, m_deviceLinks) {
2015-12-02 19:04:35 +00:00
dl->userRequestsUnpair();
2015-07-09 22:51:08 +01:00
}
2015-12-01 18:45:14 +00:00
KdeConnectConfig::instance()->removeTrustedDevice(id());
}
2015-12-01 18:45:14 +00:00
void Device::pairStatusChanged(DeviceLink::PairStatus status)
{
2015-12-01 18:45:14 +00:00
if (status == DeviceLink::NotPaired) {
KdeConnectConfig::instance()->removeTrustedDevice(id());
2015-12-01 18:45:14 +00:00
Q_FOREACH(DeviceLink* dl, m_deviceLinks) {
if (dl != sender()) {
2015-12-02 19:04:35 +00:00
dl->setPairStatus(DeviceLink::NotPaired);
2015-12-01 18:45:14 +00:00
}
}
} else {
KdeConnectConfig::instance()->addTrustedDevice(id(), name(), type());
2015-11-30 18:36:01 +00:00
}
2015-12-01 18:45:14 +00:00
reloadPlugins(); //Will load/unload plugins
2015-11-30 18:36:01 +00:00
2015-12-01 18:45:14 +00:00
bool isTrusted = (status == DeviceLink::Paired);
Q_EMIT trustedChanged(isTrusted? Trusted : NotTrusted);
Q_ASSERT(isTrusted == this->isTrusted());
}
static bool lessThan(DeviceLink* p1, DeviceLink* p2)
{
return p1->provider()->priority() > p2->provider()->priority();
}
void Device::addLink(const NetworkPackage& identityPackage, DeviceLink* link)
{
//qCDebug(KDECONNECT_CORE) << "Adding link to" << id() << "via" << link->provider();
2015-12-17 15:44:29 +00:00
Q_ASSERT(!m_deviceLinks.contains(link));
m_protocolVersion = identityPackage.get<int>("protocolVersion", -1);
if (m_protocolVersion != NetworkPackage::ProtocolVersion) {
2015-09-07 17:54:11 +01:00
qCWarning(KDECONNECT_CORE) << m_deviceName << "- warning, device uses a different protocol version" << m_protocolVersion << "expected" << NetworkPackage::ProtocolVersion;
}
connect(link, SIGNAL(destroyed(QObject*)),
this, SLOT(linkDestroyed(QObject*)));
m_deviceLinks.append(link);
//re-read the device name from the identityPackage because it could have changed
setName(identityPackage.get<QString>("deviceName"));
m_deviceType = str2type(identityPackage.get<QString>("deviceType"));
//Theoretically we will never add two links from the same provider (the provider should destroy
//the old one before this is called), so we do not have to worry about destroying old links.
//-- Actually, we should not destroy them or the provider will store an invalid ref!
connect(link, SIGNAL(receivedPackage(NetworkPackage)),
this, SLOT(privateReceivedPackage(NetworkPackage)));
qSort(m_deviceLinks.begin(), m_deviceLinks.end(), lessThan);
const bool capabilitiesSupported = identityPackage.has("incomingCapabilities") || identityPackage.has("outgoingCapabilities");
if (capabilitiesSupported) {
const QSet<QString> outgoingCapabilities = identityPackage.get<QStringList>("outgoingCapabilities").toSet()
, incomingCapabilities = identityPackage.get<QStringList>("incomingCapabilities").toSet();
m_supportedPlugins = PluginLoader::instance()->pluginsForCapabilities(incomingCapabilities, outgoingCapabilities);
2016-07-12 11:49:21 +01:00
//qDebug() << "new plugins for" << m_deviceName << m_supportedPlugins << incomingCapabilities << outgoingCapabilities;
} else {
m_supportedPlugins = PluginLoader::instance()->getPluginList().toSet();
}
reloadPlugins();
if (m_deviceLinks.size() == 1) {
Q_EMIT reachableStatusChanged();
}
2015-12-06 00:51:53 +00:00
connect(link, &DeviceLink::pairStatusChanged, this, &Device::pairStatusChanged);
connect(link, &DeviceLink::pairingError, this, &Device::pairingError);
}
void Device::linkDestroyed(QObject* o)
{
removeLink(static_cast<DeviceLink*>(o));
}
void Device::removeLink(DeviceLink* link)
{
2015-12-01 18:45:14 +00:00
m_deviceLinks.removeAll(link);
//qCDebug(KDECONNECT_CORE) << "RemoveLink" << m_deviceLinks.size() << "links remaining";
if (m_deviceLinks.isEmpty()) {
reloadPlugins();
Q_EMIT reachableStatusChanged();
}
}
bool Device::sendPackage(NetworkPackage& np)
{
2015-12-02 19:04:35 +00:00
Q_ASSERT(np.type() != PACKAGE_TYPE_PAIR);
Q_ASSERT(isTrusted());
//Maybe we could block here any package that is not an identity or a pairing package to prevent sending non encrypted data
Q_FOREACH(DeviceLink* dl, m_deviceLinks) {
if (dl->sendPackage(np)) return true;
}
return false;
}
void Device::privateReceivedPackage(const NetworkPackage& np)
{
2015-12-01 18:45:14 +00:00
Q_ASSERT(np.type() != PACKAGE_TYPE_PAIR);
if (isTrusted()) {
const QList<KdeConnectPlugin*> plugins = m_pluginsByIncomingCapability.values(np.type());
2016-06-03 14:51:05 +01:00
if (plugins.isEmpty()) {
qWarning() << "discarding unsupported package" << np.type() << "for" << name();
2016-06-03 14:51:05 +01:00
}
2016-06-21 13:50:17 +01:00
Q_FOREACH (KdeConnectPlugin* plugin, plugins) {
plugin->receivePackage(np);
}
} else {
qCDebug(KDECONNECT_CORE) << "device" << name() << "not paired, ignoring package" << np.type();
2015-07-27 16:28:58 +01:00
unpair();
}
}
2015-12-01 18:45:14 +00:00
bool Device::isTrusted() const
2015-12-01 15:25:34 +00:00
{
2015-12-01 18:45:14 +00:00
return KdeConnectConfig::instance()->trustedDevices().contains(id());
}
QStringList Device::availableLinks() const
{
QStringList sl;
Q_FOREACH(DeviceLink* dl, m_deviceLinks) {
sl.append(dl->provider()->name());
}
return sl;
}
void Device::cleanUnneededLinks() {
if (isTrusted()) {
return;
}
for(int i = 0; i < m_deviceLinks.size(); ) {
DeviceLink* dl = m_deviceLinks[i];
if (!dl->linkShouldBeKeptAlive()) {
dl->deleteLater();
m_deviceLinks.remove(i);
} else {
i++;
}
}
}
2015-09-12 08:45:59 +01:00
Device::DeviceType Device::str2type(const QString &deviceType) {
if (deviceType == "desktop") return Desktop;
if (deviceType == "laptop") return Laptop;
if (deviceType == "smartphone" || deviceType == "phone") return Phone;
if (deviceType == "tablet") return Tablet;
return Unknown;
}
QString Device::type2str(Device::DeviceType deviceType) {
if (deviceType == Desktop) return "desktop";
if (deviceType == Laptop) return "laptop";
if (deviceType == Phone) return "smartphone";
if (deviceType == Tablet) return "tablet";
return "unknown";
}
QString Device::statusIconName() const
{
2015-12-01 18:45:14 +00:00
return iconForStatus(isReachable(), isTrusted());
}
QString Device::iconName() const
{
return iconForStatus(true, false);
}
2015-12-01 18:45:14 +00:00
QString Device::iconForStatus(bool reachable, bool trusted) const
{
Device::DeviceType deviceType = m_deviceType;
if (deviceType == Device::Unknown) {
deviceType = Device::Phone; //Assume phone if we don't know the type
} else if (deviceType == Device::Desktop) {
deviceType = Device::Device::Laptop; // We don't have desktop icon yet
}
2015-12-01 18:45:14 +00:00
QString status = (reachable? (trusted? QStringLiteral("connected") : QStringLiteral("disconnected")) : QStringLiteral("trusted"));
QString type = type2str(deviceType);
return type+'-'+status;
}
void Device::setName(const QString &name)
{
if (m_deviceName != name) {
m_deviceName = name;
Q_EMIT nameChanged(name);
}
}
KdeConnectPlugin* Device::plugin(const QString& pluginName) const
{
return m_plugins[pluginName];
}
void Device::setPluginEnabled(const QString& pluginName, bool enabled)
{
KConfigGroup pluginStates = KSharedConfig::openConfig(pluginsConfigFile())->group("Plugins");
const QString enabledKey = pluginName + QStringLiteral("Enabled");
pluginStates.writeEntry(enabledKey, enabled);
reloadPlugins();
}
bool Device::isPluginEnabled(const QString& pluginName) const
{
const QString enabledKey = pluginName + QStringLiteral("Enabled");
KConfigGroup pluginStates = KSharedConfig::openConfig(pluginsConfigFile())->group("Plugins");
return (pluginStates.hasKey(enabledKey) ? pluginStates.readEntry(enabledKey, false)
: PluginLoader::instance()->getPluginInfo(pluginName).isEnabledByDefault());
}
2015-11-30 18:36:01 +00:00
QString Device::encryptionInfo() const
{
QString result;
QCryptographicHash::Algorithm digestAlgorithm = QCryptographicHash::Algorithm::Sha1;
2015-11-30 18:36:01 +00:00
QString localSha1 = QString::fromLatin1(KdeConnectConfig::instance()->certificate().digest(digestAlgorithm).toHex());
for (int i=2 ; i<localSha1.size() ; i+=3) {
localSha1.insert(i, ':'); // Improve readability
2015-11-30 18:36:01 +00:00
}
result += i18n("SHA1 fingerprint of your device certificate is: %1\n", localSha1);
2015-11-30 18:36:01 +00:00
std::string remotePem = KdeConnectConfig::instance()->getDeviceProperty(id(), "certificate").toStdString();
QSslCertificate remoteCertificate = QSslCertificate(QByteArray(remotePem.c_str(), remotePem.size()));
QString remoteSha1 = QString::fromLatin1(remoteCertificate.digest(digestAlgorithm).toHex());
for (int i=2 ; i<remoteSha1.size() ; i+=3) {
remoteSha1.insert(i, ':'); // Improve readability
2015-11-30 18:36:01 +00:00
}
result += i18n("SHA1 fingerprint of remote device certificate is: %1\n", remoteSha1);
2015-11-30 18:36:01 +00:00
return result;
}