X-Git-Url: https://git.quassel-irc.org/?a=blobdiff_plain;f=src%2Fcore%2Fcore.cpp;h=a2b7283e2b51fe43fed72774efcb39ff6827fa77;hb=8dfdd498679c773cf2e7958c5fd434bf56f634e3;hp=f9bc84fad955138d435851f19a2097efd61ab780;hpb=8836fdc8e4107437e5fff0e10e18d581297d59e4;p=quassel.git diff --git a/src/core/core.cpp b/src/core/core.cpp index f9bc84fa..a2b7283e 100644 --- a/src/core/core.cpp +++ b/src/core/core.cpp @@ -1,11 +1,11 @@ /*************************************************************************** - * Copyright (C) 2005-07 by The Quassel IRC Development Team * + * Copyright (C) 2005-2020 by the Quassel Project * * devel@quassel-irc.org * * * * This program is free software; you can redistribute it and/or modify * * it under the terms of the GNU General Public License as published by * * the Free Software Foundation; either version 2 of the License, or * - * (at your option) any later version. * + * (at your option) version 3. * * * * This program is distributed in the hope that it will be useful, * * but WITHOUT ANY WARRANTY; without even the implied warranty of * @@ -15,416 +15,1248 @@ * You should have received a copy of the GNU General Public License * * along with this program; if not, write to the * * Free Software Foundation, Inc., * - * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. * + * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. * ***************************************************************************/ #include "core.h" -#include "server.h" -#include "global.h" -#include "util.h" -#include "coreproxy.h" + +#include + +#include + +#include "coreauthhandler.h" +#include "coresession.h" +#include "coresettings.h" +#include "internalpeer.h" +#include "network.h" +#include "postgresqlstorage.h" +#include "quassel.h" +#include "sqlauthenticator.h" #include "sqlitestorage.h" +#include "types.h" +#include "util.h" + +#ifdef HAVE_LDAP +# include "ldapauthenticator.h" +#endif + +// migration related +#include +#ifdef Q_OS_WIN +# include +#else +# include +# include +#endif /* Q_OS_WIN */ + +// ============================== +// Custom Events +// ============================== +const int Core::AddClientEventId = QEvent::registerEventType(); + +class AddClientEvent : public QEvent +{ +public: + AddClientEvent(RemotePeer* p, UserId uid) + : QEvent(QEvent::Type(Core::AddClientEventId)) + , peer(p) + , userId(uid) + {} + RemotePeer* peer; + UserId userId; +}; -#include -#include +// ============================== +// Core +// ============================== -Core *Core::instanceptr = 0; +Core::Core() + : Singleton{this} +{ + Q_INIT_RESOURCE(sql); -Core * Core::instance() { - if(instanceptr) return instanceptr; - instanceptr = new Core(); - instanceptr->init(); - return instanceptr; + // Parent all QObject-derived attributes, so when the Core instance gets moved into another + // thread, they get moved with it + _server.setParent(this); + _v6server.setParent(this); + _storageSyncTimer.setParent(this); } -void Core::destroy() { - delete instanceptr; - instanceptr = 0; +Core::~Core() +{ + qDeleteAll(_connectingClients); + qDeleteAll(_sessions); + syncStorage(); } -Core::Core() { +void Core::init() +{ + _startTime = QDateTime::currentDateTime().toUTC(); // for uptime :) + + // check settings version + // so far, we only have 1 + CoreSettings s; + if (s.version() != 1) { + throw ExitException{EXIT_FAILURE, tr("Invalid core settings version!")}; + } + + // Set up storage and authentication backends + registerStorageBackends(); + registerAuthenticators(); + + QProcessEnvironment environment = QProcessEnvironment::systemEnvironment(); + bool config_from_environment = Quassel::isOptionSet("config-from-environment"); + + QString db_backend; + QVariantMap db_connectionProperties; + + QString auth_authenticator; + QVariantMap auth_properties; + + bool writeError = false; + + if (config_from_environment) { + db_backend = environment.value("DB_BACKEND"); + auth_authenticator = environment.value("AUTH_AUTHENTICATOR"); + } + else { + CoreSettings cs; + + QVariantMap dbsettings = cs.storageSettings().toMap(); + db_backend = dbsettings.value("Backend").toString(); + db_connectionProperties = dbsettings.value("ConnectionProperties").toMap(); + + QVariantMap authSettings = cs.authSettings().toMap(); + auth_authenticator = authSettings.value("Authenticator", "Database").toString(); + auth_properties = authSettings.value("AuthProperties").toMap(); + + writeError = !cs.isWritable(); + } + + try { + _configured = initStorage(db_backend, db_connectionProperties, environment, config_from_environment); + if (_configured) { + _configured = initAuthenticator(auth_authenticator, auth_properties, environment, config_from_environment); + } + } + catch (ExitException) { + // Try again later + _configured = false; + } + + if (Quassel::isOptionSet("select-backend") || Quassel::isOptionSet("select-authenticator")) { + bool success{true}; + if (Quassel::isOptionSet("select-backend")) { + success &= selectBackend(Quassel::optionValue("select-backend")); + } + if (Quassel::isOptionSet("select-authenticator")) { + success &= selectAuthenticator(Quassel::optionValue("select-authenticator")); + } + throw ExitException{success ? EXIT_SUCCESS : EXIT_FAILURE}; + } + + if (!_configured) { + if (config_from_environment) { + try { + _configured = initStorage(db_backend, db_connectionProperties, environment, config_from_environment, true); + if (_configured) { + _configured = initAuthenticator(auth_authenticator, auth_properties, environment, config_from_environment, true); + } + } + catch (ExitException e) { + throw ExitException{EXIT_FAILURE, tr("Cannot configure from environment: %1").arg(e.errorString)}; + } + + if (!_configured) { + throw ExitException{EXIT_FAILURE, tr("Cannot configure from environment!")}; + } + } + else { + if (_registeredStorageBackends.empty()) { + throw ExitException{EXIT_FAILURE, + tr("Could not initialize any storage backend! Exiting...\n" + "Currently, Quassel supports SQLite3 and PostgreSQL. You need to build your\n" + "Qt library with the sqlite or postgres plugin enabled in order for quasselcore\n" + "to work.")}; + } + + if (writeError) { + throw ExitException{EXIT_FAILURE, tr("Cannot write quasselcore configuration; probably a permission problem.")}; + } + + qInfo() << "Core is currently not configured! Please connect with a Quassel Client for basic setup."; + } + } + + // This checks separately because config-from-environment might have only configured the core just now + if (_configured) { + if (Quassel::isOptionSet("add-user")) { + bool success = createUser(); + throw ExitException{success ? EXIT_SUCCESS : EXIT_FAILURE}; + } + if (Quassel::isOptionSet("change-userpass")) { + bool success = changeUserPass(Quassel::optionValue("change-userpass")); + throw ExitException{success ? EXIT_SUCCESS : EXIT_FAILURE}; + } + + _strictIdentEnabled = Quassel::isOptionSet("strict-ident"); + if (_strictIdentEnabled) { + cacheSysIdent(); + } + + if (Quassel::isOptionSet("oidentd")) { + _oidentdConfigGenerator = new OidentdConfigGenerator(this); + } + + if (Quassel::isOptionSet("ident-daemon")) { + _identServer = new IdentServer(this); + } + + if (Quassel::isOptionSet("metrics-daemon")) { + _metricsServer = new MetricsServer(this); +#ifdef HAVE_SSL + _server.setMetricsServer(_metricsServer); + _v6server.setMetricsServer(_metricsServer); +#endif + } + + Quassel::registerReloadHandler([]() { + // Currently, only reloading SSL certificates and the sysident cache is supported + if (Core::instance()) { + Core::instance()->cacheSysIdent(); + Core::instance()->reloadCerts(); + return true; + } + return false; + }); + + connect(&_storageSyncTimer, &QTimer::timeout, this, &Core::syncStorage); + _storageSyncTimer.start(10 * 60 * 1000); // 10 minutes + } + + connect(&_server, &QTcpServer::newConnection, this, &Core::incomingConnection); + connect(&_v6server, &QTcpServer::newConnection, this, &Core::incomingConnection); + + if (!startListening()) { + throw ExitException{EXIT_FAILURE, tr("Cannot open port for listening!")}; + } + + if (_configured && !Quassel::isOptionSet("norestore")) { + Core::restoreState(); + } + + _initialized = true; + + if (_pendingInternalConnection) { + connectInternalPeer(_pendingInternalConnection); + _pendingInternalConnection = {}; + } } -void Core::init() { - if(!SqliteStorage::isAvailable()) { - qFatal("Sqlite is currently required! Please make sure your Qt library has sqlite support enabled."); - } - //SqliteStorage::init(); - storage = new SqliteStorage(); - connect(Global::instance(), SIGNAL(dataPutLocally(UserId, QString)), this, SLOT(updateGlobalData(UserId, QString))); - connect(&server, SIGNAL(newConnection()), this, SLOT(incomingConnection())); - //startListening(); // FIXME - guiUser = 0; - /* - if(Global::runMode == Global::Monolithic) { // TODO Make GUI user configurable +void Core::initAsync() +{ try { - guiUser = storage->validateUser("Default", "password"); - } catch(Storage::AuthError) { - guiUser = storage->addUser("Default", "password"); - } - Q_ASSERT(guiUser); - Global::setGuiUser(guiUser); - createSession(guiUser); - } else guiUser = 0; - */ - // Read global settings from config file - QSettings s; - s.beginGroup("Global"); - foreach(QString unum, s.childGroups()) { - UserId uid = unum.toUInt(); - s.beginGroup(unum); - foreach(QString key, s.childKeys()) { - Global::updateData(uid, key, s.value(key)); - } - s.endGroup(); - } - s.endGroup(); -} - -Core::~Core() { - foreach(QTcpSocket *sock, validClients.keys()) { - delete sock; - } - qDeleteAll(sessions); - delete storage; -} - -CoreSession *Core::session(UserId uid) { - Core *core = instance(); - if(core->sessions.contains(uid)) return core->sessions[uid]; - else return 0; -} - -CoreSession *Core::localSession() { - Core *core = instance(); - if(core->guiUser && core->sessions.contains(core->guiUser)) return core->sessions[core->guiUser]; - else return 0; -} - -CoreSession *Core::createSession(UserId uid) { - Core *core = instance(); - Q_ASSERT(!core->sessions.contains(uid)); - CoreSession *sess = new CoreSession(uid, core->storage); - core->sessions[uid] = sess; - connect(sess, SIGNAL(proxySignal(CoreSignal, QVariant, QVariant, QVariant)), core, SLOT(recvProxySignal(CoreSignal, QVariant, QVariant, QVariant))); - return sess; -} - - -bool Core::startListening(uint port) { - if(!server.listen(QHostAddress::Any, port)) { - qWarning(QString(QString("Could not open GUI client port %1: %2").arg(port).arg(server.errorString())).toAscii()); + init(); + } + catch (ExitException e) { + emit exitRequested(e.exitCode, e.errorString); + } +} + +void Core::shutdown() +{ + qInfo() << "Core shutting down..."; + + saveState(); + + for (auto&& client : _connectingClients) { + client->deleteLater(); + } + _connectingClients.clear(); + + if (_sessions.isEmpty()) { + emit shutdownComplete(); + return; + } + + for (auto&& session : _sessions) { + connect(session, &SessionThread::shutdownComplete, this, &Core::onSessionShutdown); + session->shutdown(); + } +} + +void Core::onSessionShutdown(SessionThread* session) +{ + _sessions.take(_sessions.key(session))->deleteLater(); + if (_sessions.isEmpty()) { + qInfo() << "Core shutdown complete!"; + emit shutdownComplete(); + } +} + +/*** Session Restore ***/ + +void Core::saveState() +{ + if (_storage) { + QVariantList activeSessions; + for (auto&& user : instance()->_sessions.keys()) + activeSessions << QVariant::fromValue(user); + _storage->setCoreState(activeSessions); + } +} + +void Core::restoreState() +{ + if (!_configured) { + qWarning() << qPrintable(tr("Cannot restore a state for an unconfigured core!")); + return; + } + if (_sessions.count()) { + qWarning() << qPrintable(tr("Calling restoreState() even though active sessions exist!")); + return; + } + + CoreSettings s; + /* We don't check, since we are at the first version since switching to Git + uint statever = s.coreState().toMap()["CoreStateVersion"].toUInt(); + if(statever < 1) { + qWarning() << qPrintable(tr("Core state too old, ignoring...")); + return; + } + */ + + const QList& activeSessionsFallback = s.coreState().toMap()["ActiveSessions"].toList(); + QVariantList activeSessions = instance()->_storage->getCoreState(activeSessionsFallback); + + if (activeSessions.count() > 0) { + qInfo() << "Restoring previous core state..."; + for (auto&& v : activeSessions) { + UserId user = v.value(); + sessionForUser(user, true); + } + } +} + +/*** Core Setup ***/ + +QString Core::setup(const QString& adminUser, + const QString& adminPassword, + const QString& backend, + const QVariantMap& setupData, + const QString& authenticator, + const QVariantMap& authSetupData) +{ + return instance()->setupCore(adminUser, adminPassword, backend, setupData, authenticator, authSetupData); +} + +QString Core::setupCore(const QString& adminUser, + const QString& adminPassword, + const QString& backend, + const QVariantMap& setupData, + const QString& authenticator, + const QVariantMap& authSetupData) +{ + if (_configured) + return tr("Core is already configured! Not configuring again..."); + + if (adminUser.isEmpty() || adminPassword.isEmpty()) { + return tr("Admin user or password not set."); + } + try { + if (!(_configured = initStorage(backend, setupData, {}, false, true))) { + return tr("Could not setup storage!"); + } + + qInfo() << "Selected authenticator:" << authenticator; + if (!(_configured = initAuthenticator(authenticator, authSetupData, {}, false, true))) { + return tr("Could not setup authenticator!"); + } + } + catch (ExitException e) { + // Event loop is running, so trigger an exit rather than throwing an exception + QCoreApplication::exit(e.exitCode); + return e.errorString.isEmpty() ? tr("Fatal failure while trying to setup, terminating") : e.errorString; + } + + if (!saveBackendSettings(backend, setupData)) { + return tr("Could not save backend settings, probably a permission problem."); + } + saveAuthenticatorSettings(authenticator, authSetupData); + + qInfo() << qPrintable(tr("Creating admin user...")); + _storage->addUser(adminUser, adminPassword); + cacheSysIdent(); + startListening(); // TODO check when we need this + return QString(); +} + +QString Core::setupCoreForInternalUsage() +{ + Q_ASSERT(!_registeredStorageBackends.empty()); + + qsrand(QDateTime::currentDateTime().toMSecsSinceEpoch()); + int pass = 0; + for (int i = 0; i < 10; i++) { + pass *= 10; + pass += qrand() % 10; + } + + // mono client currently needs sqlite + return setupCore("AdminUser", QString::number(pass), "SQLite", QVariantMap(), "Database", QVariantMap()); +} + +/*** Storage Handling ***/ + +template +void Core::registerStorageBackend() +{ + auto backend = makeDeferredShared(this); + if (backend->isAvailable()) + _registeredStorageBackends.emplace_back(std::move(backend)); + else + backend->deleteLater(); +} + +void Core::registerStorageBackends() +{ + if (_registeredStorageBackends.empty()) { + registerStorageBackend(); + registerStorageBackend(); + } +} + +DeferredSharedPtr Core::storageBackend(const QString& backendId) const +{ + auto it = std::find_if(_registeredStorageBackends.begin(), + _registeredStorageBackends.end(), + [backendId](const DeferredSharedPtr& backend) { return backend->displayName() == backendId; }); + return it != _registeredStorageBackends.end() ? *it : nullptr; +} + +bool Core::initStorage( + const QString& backend, const QVariantMap& settings, const QProcessEnvironment& environment, bool loadFromEnvironment, bool setup) +{ + if (backend.isEmpty()) { + qWarning() << "No storage backend selected!"; + return false; + } + + auto storage = storageBackend(backend); + if (!storage) { + qCritical() << "Selected storage backend is not available:" << backend; + return false; + } + + connect(storage.get(), &Storage::dbUpgradeInProgress, this, &Core::dbUpgradeInProgress); + + Storage::State storageState = storage->init(settings, environment, loadFromEnvironment); + switch (storageState) { + case Storage::NeedsSetup: + if (!setup) + return false; // trigger setup process + if (storage->setup(settings, environment, loadFromEnvironment)) + return initStorage(backend, settings, environment, loadFromEnvironment, false); + return false; + + case Storage::NotAvailable: + if (!setup) { + // If initialization wasn't successful, we quit to keep from coming up unconfigured + throw ExitException{EXIT_FAILURE, tr("Selected storage backend %1 is not available.").arg(backend)}; + } + qCritical() << "Selected storage backend is not available:" << backend; + return false; + + case Storage::IsReady: + // delete all other backends + _registeredStorageBackends.clear(); + connect(storage.get(), &Storage::bufferInfoUpdated, this, &Core::bufferInfoUpdated); + break; + } + _storage = std::move(storage); + return true; +} + +void Core::syncStorage() +{ + if (_storage) + _storage->sync(); +} + +/*** Storage Access ***/ +bool Core::createNetwork(UserId user, NetworkInfo& info) +{ + NetworkId networkId = instance()->_storage->createNetwork(user, info); + if (!networkId.isValid()) + return false; + + info.networkId = networkId; + return true; +} + +/*** Authenticators ***/ + +// Authentication handling, now independent from storage. +template +void Core::registerAuthenticator() +{ + auto authenticator = makeDeferredShared(this); + if (authenticator->isAvailable()) + _registeredAuthenticators.emplace_back(std::move(authenticator)); + else + authenticator->deleteLater(); +} + +void Core::registerAuthenticators() +{ + if (_registeredAuthenticators.empty()) { + registerAuthenticator(); +#ifdef HAVE_LDAP + registerAuthenticator(); +#endif + } +} + +DeferredSharedPtr Core::authenticator(const QString& backendId) const +{ + auto it = std::find_if(_registeredAuthenticators.begin(), + _registeredAuthenticators.end(), + [backendId](const DeferredSharedPtr& authenticator) { + return authenticator->backendId() == backendId; + }); + return it != _registeredAuthenticators.end() ? *it : nullptr; +} + +// FIXME: Apparently, this is the legacy way of initting storage backends? +// If there's a not-legacy way, it should be used here +bool Core::initAuthenticator( + const QString& backend, const QVariantMap& settings, const QProcessEnvironment& environment, bool loadFromEnvironment, bool setup) +{ + if (backend.isEmpty()) { + qWarning() << "No authenticator selected!"; + return false; + } + + auto auth = authenticator(backend); + if (!auth) { + qCritical() << "Selected auth backend is not available:" << backend; + return false; + } + + Authenticator::State authState = auth->init(settings, environment, loadFromEnvironment); + switch (authState) { + case Authenticator::NeedsSetup: + if (!setup) + return false; // trigger setup process + if (auth->setup(settings, environment, loadFromEnvironment)) + return initAuthenticator(backend, settings, environment, loadFromEnvironment, false); + return false; + + case Authenticator::NotAvailable: + if (!setup) { + // If initialization wasn't successful, we quit to keep from coming up unconfigured + throw ExitException{EXIT_FAILURE, tr("Selected auth backend %1 is not available.").arg(backend)}; + } + qCritical() << "Selected auth backend is not available:" << backend; + return false; + + case Authenticator::IsReady: + // delete all other backends + _registeredAuthenticators.clear(); + break; + } + _authenticator = std::move(auth); + return true; +} + +/*** Network Management ***/ + +bool Core::sslSupported() +{ +#ifdef HAVE_SSL + auto* sslServer = qobject_cast(&instance()->_server); + return sslServer && sslServer->isCertValid(); +#else return false; - } - qDebug() << "Listening for GUI clients on port" << server.serverPort(); - return true; -} - -void Core::stopListening() { - server.close(); - qDebug() << "No longer listening for GUI clients."; -} - -void Core::incomingConnection() { - // TODO implement SSL - QTcpSocket *socket = server.nextPendingConnection(); - connect(socket, SIGNAL(disconnected()), this, SLOT(clientDisconnected())); - connect(socket, SIGNAL(readyRead()), this, SLOT(clientHasData())); - blockSizes.insert(socket, (quint32)0); - qDebug() << "Client connected from " << socket->peerAddress().toString(); -} - -void Core::clientHasData() { - QTcpSocket *socket = dynamic_cast(sender()); - Q_ASSERT(socket && blockSizes.contains(socket)); - quint32 bsize = blockSizes.value(socket); - QVariant item; - while(readDataFromDevice(socket, bsize, item)) { - if(validClients.contains(socket)) { - QList sigdata = item.toList(); - if((ClientSignal)sigdata[0].toInt() == GS_UPDATE_GLOBAL_DATA) { - processClientUpdate(socket, sigdata[1].toString(), sigdata[2]); - } else { - sessions[validClients[socket]]->processSignal((ClientSignal)sigdata[0].toInt(), sigdata[1], sigdata[2], sigdata[3]); - } - } else { - // we need to auth the client - try { - processClientInit(socket, item); - } catch(Storage::AuthError) { - qWarning() << "Authentification error!"; // FIXME - socket->close(); +#endif +} + +bool Core::reloadCerts() +{ +#ifdef HAVE_SSL + auto* sslServerv4 = qobject_cast(&_server); + bool retv4 = sslServerv4->reloadCerts(); + + auto* sslServerv6 = qobject_cast(&_v6server); + bool retv6 = sslServerv6->reloadCerts(); + + return retv4 && retv6; +#else + // SSL not supported, don't mark configuration reload as failed + return true; +#endif +} + +void Core::cacheSysIdent() +{ + if (isConfigured()) { + _authUserNames = _storage->getAllAuthUserNames(); + } +} + +QString Core::strictSysIdent(UserId user) const +{ + if (_authUserNames.contains(user)) { + return _authUserNames[user]; + } + + // A new user got added since we last pulled our cache from the database. + // There's no way to avoid a database hit - we don't even know the authname! + instance()->cacheSysIdent(); + + if (_authUserNames.contains(user)) { + return _authUserNames[user]; + } + + // ...something very weird is going on if we ended up here (an active CoreSession without a corresponding database entry?) + qWarning().nospace() << "Unable to find authusername for UserId " << user << ", this should never happen!"; + return "unknown"; // Should we just terminate the program instead? +} + +bool Core::startListening() +{ + // in mono mode we only start a local port if a port is specified in the cli call + if (Quassel::runMode() == Quassel::Monolithic && !Quassel::isOptionSet("port")) + return true; + + bool success = false; + uint port = Quassel::optionValue("port").toUInt(); + + const QString listen = Quassel::optionValue("listen"); + const QStringList listen_list = listen.split(",", QString::SkipEmptyParts); + if (listen_list.size() > 0) { + foreach (const QString listen_term, listen_list) { // TODO: handle multiple interfaces for same TCP version gracefully + QHostAddress addr; + if (!addr.setAddress(listen_term)) { + qCritical() << qPrintable(tr("Invalid listen address %1").arg(listen_term)); + } + else { + switch (addr.protocol()) { + case QAbstractSocket::IPv6Protocol: + if (_v6server.listen(addr, port)) { + qInfo() << qPrintable(tr("Listening for GUI clients on IPv6 %1 port %2 using protocol version %3") + .arg(addr.toString()) + .arg(_v6server.serverPort()) + .arg(Quassel::buildInfo().protocolVersion)); + success = true; + } + else + qWarning() << qPrintable(tr("Could not open IPv6 interface %1:%2: %3").arg(addr.toString()).arg(port).arg(_v6server.errorString())); + break; + case QAbstractSocket::IPv4Protocol: + if (_server.listen(addr, port)) { + qInfo() << qPrintable(tr("Listening for GUI clients on IPv4 %1 port %2 using protocol version %3") + .arg(addr.toString()) + .arg(_server.serverPort()) + .arg(Quassel::buildInfo().protocolVersion)); + success = true; + } + else { + // if v6 succeeded on Any, the port will be already in use - don't display the error then + if (!success || _server.serverError() != QAbstractSocket::AddressInUseError) + qWarning() << qPrintable(tr("Could not open IPv4 interface %1:%2: %3").arg(addr.toString()).arg(port).arg(_server.errorString())); + } + break; + default: + qCritical() << qPrintable(tr("Invalid listen address %1, unknown network protocol").arg(listen_term)); + break; + } + } + } + } + if (!success) + qCritical() << qPrintable(tr("Could not open any network interfaces to listen on!")); + + if (_identServer) { + _identServer->startListening(); + } + + if (_metricsServer) { + _metricsServer->startListening(); + } + + return success; +} + +void Core::stopListening(const QString& reason) +{ + if (_identServer) { + _identServer->stopListening(reason); + } + + if (_metricsServer) { + _metricsServer->stopListening(reason); + } + + bool wasListening = false; + if (_server.isListening()) { + wasListening = true; + _server.close(); + } + if (_v6server.isListening()) { + wasListening = true; + _v6server.close(); + } + if (wasListening) { + if (reason.isEmpty()) + qInfo() << "No longer listening for GUI clients."; + else + qInfo() << qPrintable(reason); + } +} + +void Core::incomingConnection() +{ + auto* server = qobject_cast(sender()); + Q_ASSERT(server); + while (server->hasPendingConnections()) { + QTcpSocket* socket = server->nextPendingConnection(); + + auto* handler = new CoreAuthHandler(socket, this); + _connectingClients.insert(handler); + + connect(handler, &AuthHandler::disconnected, this, &Core::clientDisconnected); + connect(handler, &AuthHandler::socketError, this, &Core::socketError); + connect(handler, &CoreAuthHandler::handshakeComplete, this, &Core::setupClientSession); + + qInfo() << qPrintable(tr("Client connected from")) << qPrintable(handler->hostAddress().toString()); + + if (!_configured) { + stopListening(tr("Closing server for basic setup.")); + } + } +} + +// Potentially called during the initialization phase (before handing the connection off to the session) +void Core::clientDisconnected() +{ + auto* handler = qobject_cast(sender()); + Q_ASSERT(handler); + + qInfo() << qPrintable(tr("Non-authed client disconnected:")) << qPrintable(handler->hostAddress().toString()); + _connectingClients.remove(handler); + handler->deleteLater(); + + // make server listen again if still not configured + if (!_configured) { + startListening(); + } + + // TODO remove unneeded sessions - if necessary/possible... + // Suggestion: kill sessions if they are not connected to any network and client. +} + +void Core::setupClientSession(RemotePeer* peer, UserId uid) +{ + auto* handler = qobject_cast(sender()); + Q_ASSERT(handler); + + // From now on everything is handled by the client session + disconnect(handler, nullptr, this, nullptr); + _connectingClients.remove(handler); + handler->deleteLater(); + + // Find or create session for validated user + sessionForUser(uid); + + // as we are currently handling an event triggered by incoming data on this socket + // it is unsafe to directly move the socket to the client thread. + QCoreApplication::postEvent(this, new AddClientEvent(peer, uid)); +} + +void Core::customEvent(QEvent* event) +{ + if (event->type() == AddClientEventId) { + auto* addClientEvent = static_cast(event); + addClientHelper(addClientEvent->peer, addClientEvent->userId); + return; + } +} + +void Core::addClientHelper(RemotePeer* peer, UserId uid) +{ + // Find or create session for validated user + SessionThread* session = sessionForUser(uid); + session->addClient(peer); +} + +void Core::connectInternalPeer(QPointer peer) +{ + if (_initialized && peer) { + setupInternalClientSession(peer); + } + else { + _pendingInternalConnection = peer; + } +} + +void Core::setupInternalClientSession(QPointer clientPeer) +{ + if (!_configured) { + stopListening(); + auto errorString = setupCoreForInternalUsage(); + if (!errorString.isEmpty()) { + emit exitRequested(EXIT_FAILURE, errorString); + return; + } + } + + UserId uid; + if (_storage) { + uid = _storage->internalUser(); + } + else { + qWarning() << "Core::setupInternalClientSession(): You're trying to run monolithic Quassel with an unusable Backend! Go fix it!"; + emit exitRequested(EXIT_FAILURE, tr("Cannot setup storage backend.")); return; - } catch(Exception e) { - qWarning() << "Client init error:" << e.msg(); - socket->close(); + } + + if (!clientPeer) { + qWarning() << "Client peer went away, not starting a session"; return; - } - } - blockSizes[socket] = bsize = 0; - } - blockSizes[socket] = bsize; -} - -void Core::clientDisconnected() { - QTcpSocket *socket = dynamic_cast(sender()); - blockSizes.remove(socket); - validClients.remove(socket); - qDebug() << "Client disconnected."; - // TODO remove unneeded sessions - if necessary/possible... -} - -QVariant Core::connectLocalClient(QString user, QString passwd) { - UserId uid = instance()->storage->validateUser(user, passwd); - QVariant reply = instance()->initSession(uid); - instance()->guiUser = uid; - Global::setGuiUser(uid); - qDebug() << "Local client connected."; - return reply; -} - -QVariant Core::disconnectLocalClient() { - qDebug() << "Local client disconnected."; - instance()->guiUser = 0; - Global::setGuiUser(0); -} - -void Core::processClientInit(QTcpSocket *socket, const QVariant &v) { - VarMap msg = v.toMap(); - if(msg["GUIProtocol"].toUInt() != GUI_PROTOCOL) { - //qWarning() << "Client version mismatch."; - throw Exception("GUI client version mismatch"); - } - // Auth - UserId uid = storage->validateUser(msg["User"].toString(), msg["Password"].toString()); // throws exception if this failed - VarMap reply = initSession(uid).toMap(); - validClients[socket] = uid; - QList sigdata; - sigdata.append(CS_CORE_STATE); sigdata.append(QVariant(reply)); sigdata.append(QVariant()); sigdata.append(QVariant()); - writeDataToDevice(socket, QVariant(sigdata)); -} - -QVariant Core::initSession(UserId uid) { - // Find or create session for validated user - CoreSession *sess; - if(sessions.contains(uid)) sess = sessions[uid]; - else { - sess = createSession(uid); - //validClients[socket] = uid; - } - VarMap reply; - VarMap coreData; - QStringList dataKeys = Global::keys(uid); - foreach(QString key, dataKeys) { - coreData[key] = Global::data(uid, key); - } - reply["CoreData"] = coreData; - reply["SessionState"] = sess->sessionState(); - return reply; -} - -void Core::processClientUpdate(QTcpSocket *socket, QString key, const QVariant &data) { - UserId uid = validClients[socket]; - Global::updateData(uid, key, data); - QList sigdata; - sigdata.append(CS_UPDATE_GLOBAL_DATA); sigdata.append(key); sigdata.append(data); sigdata.append(QVariant()); - foreach(QTcpSocket *s, validClients.keys()) { - if(validClients[s] == uid && s != socket) writeDataToDevice(s, QVariant(sigdata)); - } -} - -void Core::updateGlobalData(UserId uid, QString key) { - QVariant data = Global::data(uid, key); - QList sigdata; - sigdata.append(CS_UPDATE_GLOBAL_DATA); sigdata.append(key); sigdata.append(data); sigdata.append(QVariant()); - foreach(QTcpSocket *socket, validClients.keys()) { - if(validClients[socket] == uid) writeDataToDevice(socket, QVariant(sigdata)); - } -} - -void Core::recvProxySignal(CoreSignal sig, QVariant arg1, QVariant arg2, QVariant arg3) { - CoreSession *sess = qobject_cast(sender()); - Q_ASSERT(sess); - UserId uid = sess->userId(); - QList sigdata; - sigdata.append(sig); sigdata.append(arg1); sigdata.append(arg2); sigdata.append(arg3); - //qDebug() << "Sending signal: " << sigdata; - foreach(QTcpSocket *socket, validClients.keys()) { - if(validClients[socket] == uid) writeDataToDevice(socket, QVariant(sigdata)); - } -} - -/* - // Read global settings from config file - QSettings s; - s.beginGroup("Global"); - QString key; - foreach(key, s.childKeys()) { - global->updateData(key, s.value(key)); - } - - global->updateData("CoreReady", true); - // Now that we are in sync, we can connect signals to automatically store further updates. - // I don't think we care if global data changed locally or if it was updated by a client. - connect(global, SIGNAL(dataUpdatedRemotely(QString)), SLOT(globalDataUpdated(QString))); - connect(global, SIGNAL(dataPutLocally(QString)), SLOT(globalDataUpdated(QString))); - -} - */ - -CoreSession::CoreSession(UserId uid, Storage *_storage) : user(uid), storage(_storage) { - coreProxy = new CoreProxy(); - - connect(coreProxy, SIGNAL(send(CoreSignal, QVariant, QVariant, QVariant)), this, SIGNAL(proxySignal(CoreSignal, QVariant, QVariant, QVariant))); - connect(coreProxy, SIGNAL(requestServerStates()), this, SIGNAL(serverStateRequested())); - connect(coreProxy, SIGNAL(gsRequestConnect(QStringList)), this, SLOT(connectToIrc(QStringList))); - connect(coreProxy, SIGNAL(gsUserInput(BufferId, QString)), this, SLOT(msgFromGui(BufferId, QString))); - connect(coreProxy, SIGNAL(gsImportBacklog()), storage, SLOT(importOldBacklog())); - connect(coreProxy, SIGNAL(gsRequestBacklog(BufferId, QVariant, QVariant)), this, SLOT(sendBacklog(BufferId, QVariant, QVariant))); - connect(coreProxy, SIGNAL(gsRequestNetworkStates()), this, SLOT(sendServerStates())); - connect(this, SIGNAL(displayMsg(Message)), coreProxy, SLOT(csDisplayMsg(Message))); - connect(this, SIGNAL(displayStatusMsg(QString, QString)), coreProxy, SLOT(csDisplayStatusMsg(QString, QString))); - connect(this, SIGNAL(backlogData(BufferId, QList, bool)), coreProxy, SLOT(csBacklogData(BufferId, QList, bool))); - connect(this, SIGNAL(bufferIdUpdated(BufferId)), coreProxy, SLOT(csUpdateBufferId(BufferId))); - connect(storage, SIGNAL(bufferIdUpdated(BufferId)), coreProxy, SLOT(csUpdateBufferId(BufferId))); - connect(Global::instance(), SIGNAL(dataUpdatedRemotely(UserId, QString)), this, SLOT(globalDataUpdated(UserId, QString))); - connect(Global::instance(), SIGNAL(dataPutLocally(UserId, QString)), this, SLOT(globalDataUpdated(UserId, QString))); -} - -CoreSession::~CoreSession() { - -} - -UserId CoreSession::userId() { - return user; -} + } + + auto* corePeer = new InternalPeer(this); + corePeer->setPeer(clientPeer); + clientPeer->setPeer(corePeer); -void CoreSession::processSignal(ClientSignal sig, QVariant arg1, QVariant arg2, QVariant arg3) { - coreProxy->recv(sig, arg1, arg2, arg3); + // Find or create session for validated user + SessionThread* sessionThread = sessionForUser(uid); + sessionThread->addClient(corePeer); } -void CoreSession::globalDataUpdated(UserId uid, QString key) { - Q_ASSERT(uid == userId()); - QVariant data = Global::data(userId(), key); - QSettings s; - s.setValue(QString("Global/%1/").arg(userId())+key, data); +SessionThread* Core::sessionForUser(UserId uid, bool restore) +{ + if (_sessions.contains(uid)) + return _sessions[uid]; + + return (_sessions[uid] = new SessionThread(uid, restore, strictIdentEnabled(), this)); } -void CoreSession::connectToIrc(QStringList networks) { - foreach(QString net, networks) { - if(servers.contains(net)) { +void Core::socketError(QAbstractSocket::SocketError err, const QString& errorString) +{ + qWarning() << QString("Socket error %1: %2").arg(err).arg(errorString); +} - } else { - Server *server = new Server(userId(), net); - connect(this, SIGNAL(serverStateRequested()), server, SLOT(sendState())); - connect(this, SIGNAL(connectToIrc(QString)), server, SLOT(connectToIrc(QString))); - connect(this, SIGNAL(disconnectFromIrc(QString)), server, SLOT(disconnectFromIrc(QString))); - connect(this, SIGNAL(msgFromGui(QString, QString, QString)), server, SLOT(userInput(QString, QString, QString))); +QVariantList Core::backendInfo() +{ + instance()->registerStorageBackends(); - connect(server, SIGNAL(connected(QString)), this, SLOT(serverConnected(QString))); - connect(server, SIGNAL(disconnected(QString)), this, SLOT(serverDisconnected(QString))); + QVariantList backendInfos; + for (auto&& backend : instance()->_registeredStorageBackends) { + QVariantMap v; + v["BackendId"] = backend->backendId(); + v["DisplayName"] = backend->displayName(); + v["Description"] = backend->description(); + v["SetupData"] = backend->setupData(); // ignored by legacy clients - connect(server, SIGNAL(serverState(QString, VarMap)), coreProxy, SLOT(csServerState(QString, VarMap))); - //connect(server, SIGNAL(displayMsg(Message)), this, SLOT(recvMessageFromServer(Message))); - connect(server, SIGNAL(displayMsg(Message::Type, QString, QString, QString, quint8)), this, SLOT(recvMessageFromServer(Message::Type, QString, QString, QString, quint8))); - connect(server, SIGNAL(displayStatusMsg(QString)), this, SLOT(recvStatusMsgFromServer(QString))); - connect(server, SIGNAL(modeSet(QString, QString, QString)), coreProxy, SLOT(csModeSet(QString, QString, QString))); - connect(server, SIGNAL(topicSet(QString, QString, QString)), coreProxy, SLOT(csTopicSet(QString, QString, QString))); - connect(server, SIGNAL(nickAdded(QString, QString, VarMap)), coreProxy, SLOT(csNickAdded(QString, QString, VarMap))); - connect(server, SIGNAL(nickRenamed(QString, QString, QString)), coreProxy, SLOT(csNickRenamed(QString, QString, QString))); - connect(server, SIGNAL(nickRemoved(QString, QString)), coreProxy, SLOT(csNickRemoved(QString, QString))); - connect(server, SIGNAL(nickUpdated(QString, QString, VarMap)), coreProxy, SLOT(csNickUpdated(QString, QString, VarMap))); - connect(server, SIGNAL(ownNickSet(QString, QString)), coreProxy, SLOT(csOwnNickSet(QString, QString))); - connect(server, SIGNAL(queryRequested(QString, QString)), coreProxy, SLOT(csQueryRequested(QString, QString))); - // TODO add error handling - connect(server, SIGNAL(connected(QString)), coreProxy, SLOT(csServerConnected(QString))); - connect(server, SIGNAL(disconnected(QString)), coreProxy, SLOT(csServerDisconnected(QString))); + // TODO Protocol Break: Remove legacy (cf. authenticatorInfo()) + const auto& setupData = backend->setupData(); + QStringList setupKeys; + QVariantMap setupDefaults; + for (int i = 0; i + 2 < setupData.size(); i += 3) { + setupKeys << setupData[i].toString(); + setupDefaults[setupData[i].toString()] = setupData[i + 2]; + } + v["SetupKeys"] = setupKeys; + v["SetupDefaults"] = setupDefaults; + // TODO Protocol Break: Remove + v["IsDefault"] = (backend->backendId() == "SQLite"); // newer clients will just use the first in the list - server->start(); - servers[net] = server; + backendInfos << v; } - emit connectToIrc(net); - } + return backendInfos; } -void CoreSession::serverConnected(QString net) { - storage->getBufferId(userId(), net); // create status buffer +QVariantList Core::authenticatorInfo() +{ + instance()->registerAuthenticators(); + + QVariantList authInfos; + for (auto&& backend : instance()->_registeredAuthenticators) { + QVariantMap v; + v["BackendId"] = backend->backendId(); + v["DisplayName"] = backend->displayName(); + v["Description"] = backend->description(); + v["SetupData"] = backend->setupData(); + authInfos << v; + } + return authInfos; } -void CoreSession::serverDisconnected(QString net) { - delete servers[net]; - servers.remove(net); - coreProxy->csServerDisconnected(net); +// migration / backend selection +bool Core::selectBackend(const QString& backend) +{ + // reregister all storage backends + registerStorageBackends(); + auto storage = storageBackend(backend); + if (!storage) { + QStringList backends; + std::transform(_registeredStorageBackends.begin(), + _registeredStorageBackends.end(), + std::back_inserter(backends), + [](const DeferredSharedPtr& backend) { return backend->displayName(); }); + qWarning() << qPrintable(tr("Unsupported storage backend: %1").arg(backend)); + qWarning() << qPrintable(tr("Supported backends are:")) << qPrintable(backends.join(", ")); + return false; + } + + QVariantMap settings = promptForSettings(storage.get()); + + Storage::State storageState = storage->init(settings); + switch (storageState) { + case Storage::IsReady: + if (!saveBackendSettings(backend, settings)) { + qCritical() << qPrintable(QString("Could not save backend settings, probably a permission problem.")); + } + qWarning() << qPrintable(tr("Switched storage backend to: %1").arg(backend)); + qWarning() << qPrintable(tr("Backend already initialized. Skipping Migration...")); + return true; + case Storage::NotAvailable: + qCritical() << qPrintable(tr("Storage backend is not available: %1").arg(backend)); + return false; + case Storage::NeedsSetup: + if (!storage->setup(settings)) { + qWarning() << qPrintable(tr("Unable to setup storage backend: %1").arg(backend)); + return false; + } + + if (storage->init(settings) != Storage::IsReady) { + qWarning() << qPrintable(tr("Unable to initialize storage backend: %1").arg(backend)); + return false; + } + + if (!saveBackendSettings(backend, settings)) { + qCritical() << qPrintable(QString("Could not save backend settings, probably a permission problem.")); + } + qWarning() << qPrintable(tr("Switched storage backend to: %1").arg(backend)); + break; + } + + // let's see if we have a current storage object we can migrate from + auto reader = getMigrationReader(_storage.get()); + auto writer = getMigrationWriter(storage.get()); + if (reader && writer) { + qDebug() << qPrintable(tr("Migrating storage backend %1 to %2...").arg(_storage->displayName(), storage->displayName())); + _storage.reset(); + storage.reset(); + if (reader->migrateTo(writer.get())) { + qDebug() << "Migration finished!"; + qDebug() << qPrintable(tr("Migration finished!")); + if (!saveBackendSettings(backend, settings)) { + qCritical() << qPrintable(QString("Could not save backend settings, probably a permission problem.")); + return false; + } + return true; + } + qWarning() << qPrintable(tr("Unable to migrate storage backend! (No migration writer for %1)").arg(backend)); + return false; + } + + // inform the user why we cannot merge + if (!_storage) { + qWarning() << qPrintable(tr("No currently active storage backend. Skipping migration...")); + } + else if (!reader) { + qWarning() << qPrintable(tr("Currently active storage backend does not support migration: %1").arg(_storage->displayName())); + } + if (writer) { + qWarning() << qPrintable(tr("New storage backend does not support migration: %1").arg(backend)); + } + + // so we were unable to merge, but let's create a user \o/ + _storage = std::move(storage); + createUser(); + return true; } -void CoreSession::msgFromGui(BufferId bufid, QString msg) { - emit msgFromGui(bufid.network(), bufid.buffer(), msg); +// TODO: I am not sure if this function is implemented correctly. +// There is currently no concept of migraiton between auth backends. +bool Core::selectAuthenticator(const QString& backend) +{ + // Register all authentication backends. + registerAuthenticators(); + auto auther = authenticator(backend); + if (!auther) { + QStringList authenticators; + std::transform(_registeredAuthenticators.begin(), + _registeredAuthenticators.end(), + std::back_inserter(authenticators), + [](const DeferredSharedPtr& authenticator) { return authenticator->displayName(); }); + qWarning() << qPrintable(tr("Unsupported authenticator: %1").arg(backend)); + qWarning() << qPrintable(tr("Supported authenticators are:")) << qPrintable(authenticators.join(", ")); + return false; + } + + QVariantMap settings = promptForSettings(auther.get()); + + Authenticator::State state = auther->init(settings); + switch (state) { + case Authenticator::IsReady: + saveAuthenticatorSettings(backend, settings); + qWarning() << qPrintable(tr("Switched authenticator to: %1").arg(backend)); + return true; + case Authenticator::NotAvailable: + qCritical() << qPrintable(tr("Authenticator is not available: %1").arg(backend)); + return false; + case Authenticator::NeedsSetup: + if (!auther->setup(settings)) { + qWarning() << qPrintable(tr("Unable to setup authenticator: %1").arg(backend)); + return false; + } + + if (auther->init(settings) != Authenticator::IsReady) { + qWarning() << qPrintable(tr("Unable to initialize authenticator: %1").arg(backend)); + return false; + } + + saveAuthenticatorSettings(backend, settings); + qWarning() << qPrintable(tr("Switched authenticator to: %1").arg(backend)); + } + + _authenticator = std::move(auther); + return true; } -// ALL messages coming pass through these functions before going to the GUI. -// So this is the perfect place for storing the backlog and log stuff. +bool Core::createUser() +{ + QTextStream out(stdout); + QTextStream in(stdin); + out << "Add a new user:" << endl; + out << "Username: "; + out.flush(); + QString username = in.readLine().trimmed(); + + disableStdInEcho(); + out << "Password: "; + out.flush(); + QString password = in.readLine().trimmed(); + out << endl; + out << "Repeat Password: "; + out.flush(); + QString password2 = in.readLine().trimmed(); + out << endl; + enableStdInEcho(); -void CoreSession::recvMessageFromServer(Message::Type type, QString target, QString text, QString sender, quint8 flags) { - Server *s = qobject_cast(this->sender()); - Q_ASSERT(s); - BufferId buf; - if((flags & Message::PrivMsg) && !(flags & Message::Self)) { - buf = storage->getBufferId(user, s->getNetwork(), nickFromMask(sender)); - } else { - buf = storage->getBufferId(user, s->getNetwork(), target); - } - Message msg(buf, type, text, sender, flags); - msg.msgId = storage->logMessage(msg); //qDebug() << msg.msgId; - Q_ASSERT(msg.msgId); - emit displayMsg(msg); + if (password != password2) { + qWarning() << "Passwords don't match!"; + return false; + } + if (password.isEmpty()) { + qWarning() << "Password is empty!"; + return false; + } + + if (_configured && _storage->addUser(username, password).isValid()) { + out << "Added user " << username << " successfully!" << endl; + return true; + } + else { + qWarning() << "Unable to add user:" << qPrintable(username); + return false; + } } -void CoreSession::recvStatusMsgFromServer(QString msg) { - Server *s = qobject_cast(sender()); - Q_ASSERT(s); - emit displayStatusMsg(s->getNetwork(), msg); +bool Core::changeUserPass(const QString& username) +{ + QTextStream out(stdout); + QTextStream in(stdin); + UserId userId = _storage->getUserId(username); + if (!userId.isValid()) { + out << "User " << username << " does not exist." << endl; + return false; + } + + if (!canChangeUserPassword(userId)) { + out << "User " << username << " is configured through an auth provider that has forbidden manual password changing." << endl; + return false; + } + + out << "Change password for user: " << username << endl; + + disableStdInEcho(); + out << "New Password: "; + out.flush(); + QString password = in.readLine().trimmed(); + out << endl; + out << "Repeat Password: "; + out.flush(); + QString password2 = in.readLine().trimmed(); + out << endl; + enableStdInEcho(); + + if (password != password2) { + qWarning() << "Passwords don't match!"; + return false; + } + if (password.isEmpty()) { + qWarning() << "Password is empty!"; + return false; + } + + if (_configured && _storage->updateUser(userId, password)) { + out << "Password changed successfully!" << endl; + return true; + } + else { + qWarning() << "Failed to change password!"; + return false; + } } +bool Core::changeUserPassword(UserId userId, const QString& password) +{ + if (!isConfigured() || !userId.isValid()) + return false; + + if (!canChangeUserPassword(userId)) + return false; -QList CoreSession::buffers() const { - return storage->requestBuffers(user); + return instance()->_storage->updateUser(userId, password); } +// TODO: this code isn't currently 100% optimal because the core +// doesn't know it can have multiple auth providers configured (there aren't +// multiple auth providers at the moment anyway) and we have hardcoded the +// Database provider to be always allowed. +bool Core::canChangeUserPassword(UserId userId) +{ + QString authProvider = instance()->_storage->getUserAuthenticator(userId); + if (authProvider != "Database") { + if (authProvider != instance()->_authenticator->backendId()) { + return false; + } + else if (instance()->_authenticator->canChangePassword()) { + return false; + } + } + return true; +} + +std::unique_ptr Core::getMigrationReader(Storage* storage) +{ + if (!storage) + return nullptr; + + auto* sqlStorage = qobject_cast(storage); + if (!sqlStorage) { + qDebug() << "Core::migrateDb(): only SQL based backends can be migrated!"; + return nullptr; + } + + return sqlStorage->createMigrationReader(); +} + +std::unique_ptr Core::getMigrationWriter(Storage* storage) +{ + if (!storage) + return nullptr; -QVariant CoreSession::sessionState() { - VarMap v; - QList bufs; - foreach(BufferId id, storage->requestBuffers(user)) { bufs.append(QVariant::fromValue(id)); } - v["Buffers"] = bufs; + auto* sqlStorage = qobject_cast(storage); + if (!sqlStorage) { + qDebug() << "Core::migrateDb(): only SQL based backends can be migrated!"; + return nullptr; + } + + return sqlStorage->createMigrationWriter(); +} - return v; +bool Core::saveBackendSettings(const QString& backend, const QVariantMap& settings) +{ + QVariantMap dbsettings; + dbsettings["Backend"] = backend; + dbsettings["ConnectionProperties"] = settings; + CoreSettings s = CoreSettings(); + s.setStorageSettings(dbsettings); + return s.sync(); } -void CoreSession::sendServerStates() { - emit serverStateRequested(); +void Core::saveAuthenticatorSettings(const QString& backend, const QVariantMap& settings) +{ + QVariantMap dbsettings; + dbsettings["Authenticator"] = backend; + dbsettings["AuthProperties"] = settings; + CoreSettings().setAuthSettings(dbsettings); } -void CoreSession::sendBacklog(BufferId id, QVariant v1, QVariant v2) { - QList log; - QList msglist; - if(v1.type() == QVariant::DateTime) { +// Generic version of promptForSettings that doesn't care what *type* of +// backend it runs over. +template +QVariantMap Core::promptForSettings(const Backend* backend) +{ + QVariantMap settings; + const QVariantList& setupData = backend->setupData(); + + if (setupData.isEmpty()) + return settings; + QTextStream out(stdout); + QTextStream in(stdin); + out << "Default values are in brackets" << endl; - } else { - msglist = storage->requestMsgs(id, v1.toInt(), v2.toInt()); - } + for (int i = 0; i + 2 < setupData.size(); i += 3) { + QString key = setupData[i].toString(); + out << setupData[i + 1].toString() << " [" << setupData[i + 2].toString() << "]: " << flush; - // Send messages out in smaller packages - we don't want to make the signal data too large! - for(int i = 0; i < msglist.count(); i++) { - log.append(QVariant::fromValue(msglist[i])); - if(log.count() >= 5) { - emit backlogData(id, log, i >= msglist.count() - 1); - log.clear(); + bool noEcho = key.toLower().contains("password"); + if (noEcho) { + disableStdInEcho(); + } + QString input = in.readLine().trimmed(); + if (noEcho) { + out << endl; + enableStdInEcho(); + } + + QVariant value{setupData[i + 2]}; + if (!input.isEmpty()) { + switch (value.type()) { + case QVariant::Int: + value = input.toInt(); + break; + default: + value = input; + } + } + settings[key] = value; } - } - if(log.count() > 0) emit backlogData(id, log, true); + return settings; +} + +#ifdef Q_OS_WIN +void Core::stdInEcho(bool on) +{ + HANDLE hStdin = GetStdHandle(STD_INPUT_HANDLE); + DWORD mode = 0; + GetConsoleMode(hStdin, &mode); + if (on) + mode |= ENABLE_ECHO_INPUT; + else + mode &= ~ENABLE_ECHO_INPUT; + SetConsoleMode(hStdin, mode); } +#else +void Core::stdInEcho(bool on) +{ + termios t; + tcgetattr(STDIN_FILENO, &t); + if (on) + t.c_lflag |= ECHO; + else + t.c_lflag &= ~ECHO; + tcsetattr(STDIN_FILENO, TCSANOW, &t); +} -//Core *core = 0; +#endif /* Q_OS_WIN */