* Logging improvements / default log levels tweaked.  Less chatty now.
  Ability to tweak log levels of individual loggers via prefs.
* Various crypto module fixes, specially for RSA.
* 'service' lock removed, reuses server lock now.  dav module supports
  temporarily blocking locks to simulate the 'service' lock (login()
  needs this, since dav is not configured at that time).
* PKI support: data encryption uses randomly-generated symmetric keys,
  which are then encrypted with RSA public keys and stored on the
  server.
This commit is contained in:
Dan Mills 2008-03-19 15:17:04 -07:00
Родитель 7077b3f6d5
Коммит 384d06b7c6
8 изменённых файлов: 513 добавлений и 367 удалений

Просмотреть файл

@ -43,6 +43,7 @@ const Cu = Components.utils;
Cu.import("resource://weave/log4moz.js"); Cu.import("resource://weave/log4moz.js");
Cu.import("resource://weave/util.js"); Cu.import("resource://weave/util.js");
Cu.import("resource://weave/constants.js");
/* /*
* Asynchronous generator helpers * Asynchronous generator helpers
@ -74,6 +75,8 @@ AsyncException.prototype = {
function Generator(object, method, onComplete, args) { function Generator(object, method, onComplete, args) {
this._log = Log4Moz.Service.getLogger("Async.Generator"); this._log = Log4Moz.Service.getLogger("Async.Generator");
this._log.level =
Log4Moz.Level[Utils.prefs.getCharPref("log.logger.async")];
this._object = object; this._object = object;
this._method = method; this._method = method;
this.onComplete = onComplete; this.onComplete = onComplete;
@ -121,7 +124,9 @@ Generator.prototype = {
get onComplete() { get onComplete() {
if (this._onComplete) if (this._onComplete)
return this._onComplete; return this._onComplete;
return function() { this._log.trace("Generator " + this.name + " has no onComplete"); }; return function() {
//this._log.trace("Generator " + this.name + " has no onComplete");
};
}, },
set onComplete(value) { set onComplete(value) {
if (value && typeof value != "function") if (value && typeof value != "function")
@ -164,7 +169,7 @@ Generator.prototype = {
} else { } else {
this._log.error(Async.exceptionStr(this, e)); this._log.error(Async.exceptionStr(this, e));
this._log.trace("Stack trace:\n" + this.trace + this._log.debug("Stack trace:\n" + this.trace +
(e.trace? "\n" + e.trace : "")); (e.trace? "\n" + e.trace : ""));
} }
@ -213,6 +218,11 @@ Generator.prototype = {
}, },
_done: function AsyncGen__done(retval) { _done: function AsyncGen__done(retval) {
if (!this._generator) {
this._log.error("Generator '" + this.name + "' called 'done' after it's finalized");
this._log.trace("Initial stack trace:\n" + this.trace);
return;
}
this._generator.close(); this._generator.close();
this._generator = null; this._generator = null;
this._timer = null; this._timer = null;

Просмотреть файл

@ -88,6 +88,8 @@ WeaveCrypto.prototype = {
_init: function Crypto__init() { _init: function Crypto__init() {
this._log = Log4Moz.Service.getLogger("Service." + this._logName); this._log = Log4Moz.Service.getLogger("Service." + this._logName);
this._log.level =
Log4Moz.Level[Utils.prefs.getCharPref("log.logger.service.crypto")];
let branch = Cc["@mozilla.org/preferences-service;1"] let branch = Cc["@mozilla.org/preferences-service;1"]
.getService(Ci.nsIPrefBranch2); .getService(Ci.nsIPrefBranch2);
branch.addObserver("extensions.weave.encryption", this, false); branch.addObserver("extensions.weave.encryption", this, false);
@ -163,7 +165,7 @@ WeaveCrypto.prototype = {
// generates a random string that can be used as a passphrase // generates a random string that can be used as a passphrase
_opensslRand: function Crypto__opensslRand(length) { _opensslRand: function Crypto__opensslRand(length) {
if (!length) if (!length)
length = 256; length = 128;
let outputFile = Utils.getTmp("output"); let outputFile = Utils.getTmp("output");
if (outputFile.exists()) if (outputFile.exists())
@ -180,7 +182,7 @@ WeaveCrypto.prototype = {
}, },
// generates an rsa public/private key pair, with the private key encrypted // generates an rsa public/private key pair, with the private key encrypted
_opensslRSAKeyGen: function Crypto__opensslRSAKeyGen(password, algorithm, bits) { _opensslRSAKeyGen: function Crypto__opensslRSAKeyGen(identity, algorithm, bits) {
if (!algorithm) if (!algorithm)
algorithm = "aes-256-cbc"; algorithm = "aes-256-cbc";
if (!bits) if (!bits)
@ -206,7 +208,7 @@ WeaveCrypto.prototype = {
// nsIProcess doesn't support stdin, so we write a file instead // nsIProcess doesn't support stdin, so we write a file instead
let passFile = Utils.getTmp("pass"); let passFile = Utils.getTmp("pass");
let [passFOS] = Utils.open(passFile, ">", PERMS_PASSFILE); let [passFOS] = Utils.open(passFile, ">", PERMS_PASSFILE);
passFOS.writeString(password); passFOS.writeString(identity.password);
passFOS.close(); passFOS.close();
try { try {
@ -235,7 +237,7 @@ WeaveCrypto.prototype = {
}, },
// returns 'input' encrypted with the 'pubkey' public RSA key // returns 'input' encrypted with the 'pubkey' public RSA key
_opensslRSAencrypt: function Crypto__opensslRSAencrypt(input, pubkey) { _opensslRSAencrypt: function Crypto__opensslRSAencrypt(input, identity) {
let inputFile = Utils.getTmp("input"); let inputFile = Utils.getTmp("input");
let [inputFOS] = Utils.open(inputFile, ">"); let [inputFOS] = Utils.open(inputFile, ">");
inputFOS.writeString(input); inputFOS.writeString(input);
@ -243,18 +245,23 @@ WeaveCrypto.prototype = {
let keyFile = Utils.getTmp("key"); let keyFile = Utils.getTmp("key");
let [keyFOS] = Utils.open(keyFile, ">"); let [keyFOS] = Utils.open(keyFile, ">");
keyFOS.writeString(pubkey); keyFOS.writeString(identity.pubkey);
keyFOS.close(); keyFOS.close();
let tmpFile = Utils.getTmp("tmp-output");
if (tmpFile.exists())
tmpFile.remove(false);
let outputFile = Utils.getTmp("output"); let outputFile = Utils.getTmp("output");
if (outputFile.exists()) if (outputFile.exists())
outputFile.remove(false); outputFile.remove(false);
this._openssl("rsautl", "-encrypt", "-pubin", "-inkey", "key", this._openssl("rsautl", "-encrypt", "-pubin", "-inkey", "key",
"-in", "input", "-out", "output"); "-in", "input", "-out", "tmp-output");
this._openssl("base64", "-in", "tmp-output", "-out", "output");
let [outputFIS] = Utils.open(outputFile, "<"); let [outputFIS] = Utils.open(outputFile, "<");
let output = Utils.readStream(outpusFIS); let output = Utils.readStream(outputFIS);
outputFIS.close(); outputFIS.close();
outputFile.remove(false); outputFile.remove(false);
@ -262,7 +269,7 @@ WeaveCrypto.prototype = {
}, },
// returns 'input' decrypted with the 'privkey' private RSA key and password // returns 'input' decrypted with the 'privkey' private RSA key and password
_opensslRSAdecrypt: function Crypto__opensslRSAdecrypt(input, privkey, password) { _opensslRSAdecrypt: function Crypto__opensslRSAdecrypt(input, identity) {
let inputFile = Utils.getTmp("input"); let inputFile = Utils.getTmp("input");
let [inputFOS] = Utils.open(inputFile, ">"); let [inputFOS] = Utils.open(inputFile, ">");
inputFOS.writeString(input); inputFOS.writeString(input);
@ -270,9 +277,13 @@ WeaveCrypto.prototype = {
let keyFile = Utils.getTmp("key"); let keyFile = Utils.getTmp("key");
let [keyFOS] = Utils.open(keyFile, ">"); let [keyFOS] = Utils.open(keyFile, ">");
keyFOS.writeString(privkey); keyFOS.writeString(identity.privkey);
keyFOS.close(); keyFOS.close();
let tmpFile = Utils.getTmp("tmp-output");
if (tmpFile.exists())
tmpFile.remove(false);
let outputFile = Utils.getTmp("output"); let outputFile = Utils.getTmp("output");
if (outputFile.exists()) if (outputFile.exists())
outputFile.remove(false); outputFile.remove(false);
@ -280,12 +291,13 @@ WeaveCrypto.prototype = {
// nsIProcess doesn't support stdin, so we write a file instead // nsIProcess doesn't support stdin, so we write a file instead
let passFile = Utils.getTmp("pass"); let passFile = Utils.getTmp("pass");
let [passFOS] = Utils.open(passFile, ">", PERMS_PASSFILE); let [passFOS] = Utils.open(passFile, ">", PERMS_PASSFILE);
passFOS.writeString(password); passFOS.writeString(identity.password);
passFOS.close(); passFOS.close();
try { try {
this._openssl("rsautl", "-decrypt", "-inkey", "key", "-pass", this._openssl("base64", "-d", "-in", "input", "-out", "tmp-output");
"file:pass", "-in", "input", "-out", "output"); this._openssl("rsautl", "-decrypt", "-inkey", "key", "-passin",
"file:pass", "-in", "tmp-output", "-out", "output");
} catch(e) { } catch(e) {
throw e; throw e;
@ -295,7 +307,43 @@ WeaveCrypto.prototype = {
} }
let [outputFIS] = Utils.open(outputFile, "<"); let [outputFIS] = Utils.open(outputFile, "<");
let output = Utils.readStream(outpusFIS); let output = Utils.readStream(outputFIS);
outputFIS.close();
outputFile.remove(false);
return output;
},
// returns the public key from the private key
_opensslRSAkeydecrypt: function Crypto__opensslRSAkeydecrypt(identity) {
let keyFile = Utils.getTmp("key");
let [keyFOS] = Utils.open(keyFile, ">");
keyFOS.writeString(identity.privkey);
keyFOS.close();
let outputFile = Utils.getTmp("output");
if (outputFile.exists())
outputFile.remove(false);
// nsIProcess doesn't support stdin, so we write a file instead
let passFile = Utils.getTmp("pass");
let [passFOS] = Utils.open(passFile, ">", PERMS_PASSFILE);
passFOS.writeString(identity.password);
passFOS.close();
try {
this._openssl("rsa", "-in", "key", "-pubout", "-out", "output",
"-passin", "file:pass");
} catch(e) {
throw e;
} finally {
passFile.remove(false);
}
let [outputFIS] = Utils.open(outputFile, "<");
let output = Utils.readStream(outputFIS);
outputFIS.close(); outputFIS.close();
outputFile.remove(false); outputFile.remove(false);
@ -445,21 +493,27 @@ WeaveCrypto.prototype = {
self.done(ret); self.done(ret);
}, },
RSAkeygen: function Crypto_RSAkeygen(password) { RSAkeygen: function Crypto_RSAkeygen(identity) {
let self = yield; let self = yield;
let ret = this._opensslRSAKeyGen(password); let ret = this._opensslRSAKeyGen(identity);
self.done(ret); self.done(ret);
}, },
RSAencrypt: function Crypto_RSAencrypt(data, key) { RSAencrypt: function Crypto_RSAencrypt(data, identity) {
let self = yield; let self = yield;
let ret = this._opensslRSAencrypt(data, key); let ret = this._opensslRSAencrypt(data, identity);
self.done(ret); self.done(ret);
}, },
RSAdecrypt: function Crypto_RSAdecrypt(data, key, password) { RSAdecrypt: function Crypto_RSAdecrypt(data, identity) {
let self = yield; let self = yield;
let ret = this._opensslRSAdecrypt(data, key, password); let ret = this._opensslRSAdecrypt(data, identity);
self.done(ret);
},
RSAkeydecrypt: function Crypto_RSAkeydecrypt(identity) {
let self = yield;
let ret = this._opensslRSAkeydecrypt(identity);
self.done(ret); self.done(ret);
} }
}; };

Просмотреть файл

@ -45,6 +45,7 @@ Cu.import("resource://gre/modules/XPCOMUtils.jsm");
Cu.import("resource://weave/log4moz.js"); Cu.import("resource://weave/log4moz.js");
Cu.import("resource://weave/util.js"); Cu.import("resource://weave/util.js");
Cu.import("resource://weave/async.js"); Cu.import("resource://weave/async.js");
Cu.import("resource://weave/constants.js");
Function.prototype.async = Async.sugar; Function.prototype.async = Async.sugar;
@ -57,8 +58,11 @@ function DAVCollection(baseURL) {
this._baseURL = baseURL; this._baseURL = baseURL;
this._authProvider = new DummyAuthProvider(); this._authProvider = new DummyAuthProvider();
this._log = Log4Moz.Service.getLogger("Service.DAV"); this._log = Log4Moz.Service.getLogger("Service.DAV");
this._log.level =
Log4Moz.Level[Utils.prefs.getCharPref("log.logger.service.dav")];
} }
DAVCollection.prototype = { DAVCollection.prototype = {
__dp: null, __dp: null,
get _dp() { get _dp() {
if (!this.__dp) if (!this.__dp)
@ -81,11 +85,23 @@ DAVCollection.prototype = {
return this._loggedIn; return this._loggedIn;
}, },
get locked() {
return !this._lockAllowed || this._token != null;
},
_lockAllowed: true,
get allowLock() {
return this._lockAllowed;
},
set allowLock(value) {
this._lockAllowed = value;
},
_makeRequest: function DC__makeRequest(op, path, headers, data) { _makeRequest: function DC__makeRequest(op, path, headers, data) {
let self = yield; let self = yield;
let ret; let ret;
this._log.debug("Creating " + op + " request for " + this._baseURL + path); this._log.debug(op + " request for " + path);
let request = Cc["@mozilla.org/xmlextras/xmlhttprequest;1"].createInstance(); let request = Cc["@mozilla.org/xmlextras/xmlhttprequest;1"].createInstance();
request = request.QueryInterface(Ci.nsIDOMEventTarget); request = request.QueryInterface(Ci.nsIDOMEventTarget);
@ -106,9 +122,9 @@ DAVCollection.prototype = {
let key; let key;
for (key in headers) { for (key in headers) {
if (key == 'Authorization') if (key == 'Authorization')
this._log.debug("HTTP Header " + key + ": ***** (suppressed)"); this._log.trace("HTTP Header " + key + ": ***** (suppressed)");
else else
this._log.debug("HTTP Header " + key + ": " + headers[key]); this._log.trace("HTTP Header " + key + ": " + headers[key]);
request.setRequestHeader(key, headers[key]); request.setRequestHeader(key, headers[key]);
} }
@ -155,7 +171,7 @@ DAVCollection.prototype = {
this._makeRequest.async(this, self.cb, "GET", path2 + "/", this._defaultHeaders); this._makeRequest.async(this, self.cb, "GET", path2 + "/", this._defaultHeaders);
let ret = yield; let ret = yield;
if (!(ret.status == 404 || ret.status == 500)) { // FIXME: 500 is a services.m.c oddity if (!(ret.status == 404 || ret.status == 500)) { // FIXME: 500 is a services.m.c oddity
this._log.debug("Skipping creation of path " + path2 + this._log.trace("Skipping creation of path " + path2 +
" (got status " + ret.status + ")"); " (got status " + ret.status + ")");
} else { } else {
this._log.debug("Creating path: " + path2); this._log.debug("Creating path: " + path2);
@ -211,6 +227,9 @@ DAVCollection.prototype = {
}, },
LOCK: function DC_LOCK(path, data, onComplete) { LOCK: function DC_LOCK(path, data, onComplete) {
if (!this._lockAllowed)
throw "Cannot acquire lock (internal lock)";
let headers = {'Content-type': 'text/xml; charset="utf-8"', let headers = {'Content-type': 'text/xml; charset="utf-8"',
'Depth': 'infinity', 'Depth': 'infinity',
'Timeout': 'Second-600'}; 'Timeout': 'Second-600'};
@ -326,7 +345,7 @@ DAVCollection.prototype = {
let self = yield; let self = yield;
this._token = null; this._token = null;
this._log.info("Acquiring lock"); this._log.trace("Acquiring lock");
if (this._token) { if (this._token) {
this._log.debug("Lock called, but we already hold a token"); this._log.debug("Lock called, but we already hold a token");
@ -354,7 +373,7 @@ DAVCollection.prototype = {
this._token = token.textContent; this._token = token.textContent;
if (this._token) if (this._token)
this._log.debug("Lock acquired"); this._log.trace("Lock acquired");
else else
this._log.warn("Could not acquire lock"); this._log.warn("Could not acquire lock");
@ -364,9 +383,9 @@ DAVCollection.prototype = {
unlock: function DC_unlock() { unlock: function DC_unlock() {
let self = yield; let self = yield;
this._log.info("Releasing lock"); this._log.trace("Releasing lock");
if (this._token === null) { if (!this.locked) {
this._log.debug("Unlock called, but we don't hold a token right now"); this._log.debug("Unlock called, but we don't hold a token right now");
self.done(true); self.done(true);
yield; yield;
@ -384,9 +403,9 @@ DAVCollection.prototype = {
this._token = null; this._token = null;
if (this._token) if (this._token)
this._log.info("Could not release lock"); this._log.trace("Could not release lock");
else else
this._log.info("Lock released (or we didn't have one)"); this._log.trace("Lock released (or we didn't have one)");
self.done(!this._token); self.done(!this._token);
}, },

Просмотреть файл

@ -46,6 +46,7 @@ Cu.import("resource://weave/log4moz.js");
Cu.import("resource://weave/constants.js"); Cu.import("resource://weave/constants.js");
Cu.import("resource://weave/util.js"); Cu.import("resource://weave/util.js");
Cu.import("resource://weave/crypto.js"); Cu.import("resource://weave/crypto.js");
Cu.import("resource://weave/identity.js");
Cu.import("resource://weave/stores.js"); Cu.import("resource://weave/stores.js");
Cu.import("resource://weave/syncCores.js"); Cu.import("resource://weave/syncCores.js");
Cu.import("resource://weave/async.js"); Cu.import("resource://weave/async.js");
@ -53,8 +54,8 @@ Cu.import("resource://weave/async.js");
Function.prototype.async = Async.sugar; Function.prototype.async = Async.sugar;
let Crypto = new WeaveCrypto(); let Crypto = new WeaveCrypto();
function Engine(davCollection, cryptoId) { function Engine(davCollection, pbeId) {
//this._init(davCollection, cryptoId); //this._init(davCollection, pbeId);
} }
Engine.prototype = { Engine.prototype = {
// "default-engine"; // "default-engine";
@ -114,35 +115,36 @@ Engine.prototype = {
this.__snapshot = value; this.__snapshot = value;
}, },
_init: function Engine__init(davCollection, cryptoId) { _init: function Engine__init(davCollection, pbeId) {
this._dav = davCollection; this._dav = davCollection;
this._cryptoId = cryptoId; this._pbeId = pbeId;
this._engineId = new Identity(pbeId.realm + " - " + this.logName,
pbeId.username);
this._log = Log4Moz.Service.getLogger("Service." + this.logName); this._log = Log4Moz.Service.getLogger("Service." + this.logName);
this._log.level =
Log4Moz.Level[Utils.prefs.getCharPref("log.logger.service.engine")];
this._osPrefix = "weave:" + this.name + ":"; this._osPrefix = "weave:" + this.name + ":";
this._snapshot.load(); this._snapshot.load();
}, },
_getSymKey: function Engine__getCryptoId(cryptoId) { _getSymKey: function Engine__getSymKey() {
let self = yield; let self = yield;
let done = false;
this._dav.GET(this.keysFile, self.cb); this._dav.GET(this.keysFile, self.cb);
let keysResp = yield; let keysResp = yield;
Utils.ensureStatus(keysResp.status, Utils.ensureStatus(keysResp.status,
"Could not get keys file.", [[200,300]]); "Could not get keys file.", [[200,300]]);
let keys = keysResp.responseText; let keys = this._json.decode(keysResp.responseText);
if (!keys[this._userHash]) { if (!keys || !keys.ring || !keys.ring[this._engineId.userHash])
this._log.error("Keyring does not contain a key for this user"); throw "Keyring does not contain a key for this user";
return;
}
//Crypto.RSAdecrypt.async(Crypto, self.cb, Crypto.RSAdecrypt.async(Crypto, self.cb,
// keys[this._userHash], keys.ring[this._engineId.userHash], this._pbeId);
let symkey = yield;
this._engineId.setTempPassword(symkey);
self.done(done); self.done(true);
yield;
this._log.warn("_getSymKey generator not properly closed");
}, },
_serializeCommands: function Engine__serializeCommands(commands) { _serializeCommands: function Engine__serializeCommands(commands) {
@ -165,11 +167,6 @@ Engine.prototype = {
this._log.debug("Resetting server data"); this._log.debug("Resetting server data");
this._os.notifyObservers(null, this._osPrefix + "reset-server:start", ""); this._os.notifyObservers(null, this._osPrefix + "reset-server:start", "");
this._dav.lock.async(this._dav, self.cb);
let locked = yield;
if (!locked)
throw "Could not acquire lock, aborting server reset";
// try to delete all 3, check status after // try to delete all 3, check status after
this._dav.DELETE(this.statusFile, self.cb); this._dav.DELETE(this.statusFile, self.cb);
let statusResp = yield; let statusResp = yield;
@ -178,9 +175,6 @@ Engine.prototype = {
this._dav.DELETE(this.deltasFile, self.cb); this._dav.DELETE(this.deltasFile, self.cb);
let deltasResp = yield; let deltasResp = yield;
this._dav.unlock.async(this._dav, self.cb);
let unlocked = yield;
Utils.ensureStatus(statusResp.status, Utils.ensureStatus(statusResp.status,
"Could not delete status file.", [[200,300],404]); "Could not delete status file.", [[200,300],404]);
Utils.ensureStatus(snapshotResp.status, Utils.ensureStatus(snapshotResp.status,
@ -258,215 +252,184 @@ Engine.prototype = {
_sync: function BmkEngine__sync() { _sync: function BmkEngine__sync() {
let self = yield; let self = yield;
let synced = false, locked = null;
try { this._log.info("Beginning sync");
this._log.info("Beginning sync");
this._os.notifyObservers(null, this._osPrefix + "sync:start", "");
this._dav.lock.async(this._dav, self.cb); // Before we get started, make sure we have a remote directory to play in
locked = yield; this._dav.MKCOL(this.serverPrefix, self.cb);
let ret = yield;
if (!ret)
throw "Could not create remote folder";
if (locked) // 1) Fetch server deltas
this._log.info("Lock acquired"); this._getServerData.async(this, self.cb);
else { let server = yield;
this._log.warn("Could not acquire lock, aborting sync");
return;
}
// Before we get started, make sure we have a remote directory to play in this._log.info("Local snapshot version: " + this._snapshot.version);
this._dav.MKCOL(this.serverPrefix, self.cb); this._log.info("Server status: " + server.status);
let ret = yield; this._log.info("Server maxVersion: " + server.maxVersion);
if (!ret) this._log.info("Server snapVersion: " + server.snapVersion);
throw "Could not create remote folder";
// 1) Fetch server deltas if (server.status != 0) {
this._getServerData.async(this, self.cb); this._log.fatal("Sync error: could not get server status, " +
let server = yield; "or initial upload failed. Aborting sync.");
return;
}
this._log.info("Local snapshot version: " + this._snapshot.version); // 2) Generate local deltas from snapshot -> current client status
this._log.info("Server status: " + server.status);
this._log.info("Server maxVersion: " + server.maxVersion);
this._log.info("Server snapVersion: " + server.snapVersion);
if (server.status != 0) { let localJson = new SnapshotStore();
this._log.fatal("Sync error: could not get server status, " + localJson.data = this._store.wrap();
"or initial upload failed. Aborting sync."); this._core.detectUpdates(self.cb, this._snapshot.data, localJson.data);
return; let localUpdates = yield;
}
// 2) Generate local deltas from snapshot -> current client status this._log.trace("local json:\n" + localJson.serialize());
this._log.trace("Local updates: " + this._serializeCommands(localUpdates));
this._log.trace("Server updates: " + this._serializeCommands(server.updates));
let localJson = new SnapshotStore(); if (server.updates.length == 0 && localUpdates.length == 0) {
localJson.data = this._store.wrap(); this._snapshot.version = server.maxVersion;
this._core.detectUpdates(self.cb, this._snapshot.data, localJson.data); this._log.info("Sync complete: no changes needed on client or server");
let localUpdates = yield; self.done(true);
return;
}
this._log.trace("local json:\n" + localJson.serialize()); // 3) Reconcile client/server deltas and generate new deltas for them.
this._log.trace("Local updates: " + this._serializeCommands(localUpdates));
this._log.trace("Server updates: " + this._serializeCommands(server.updates));
if (server.updates.length == 0 && localUpdates.length == 0) { this._log.info("Reconciling client/server updates");
this._snapshot.version = server.maxVersion; this._core.reconcile(self.cb, localUpdates, server.updates);
this._log.info("Sync complete (1): no changes needed on client or server"); ret = yield;
synced = true;
return;
}
// 3) Reconcile client/server deltas and generate new deltas for them. let clientChanges = ret.propagations[0];
let serverChanges = ret.propagations[1];
let clientConflicts = ret.conflicts[0];
let serverConflicts = ret.conflicts[1];
this._log.info("Reconciling client/server updates"); this._log.info("Changes for client: " + clientChanges.length);
this._core.reconcile(self.cb, localUpdates, server.updates); this._log.info("Predicted changes for server: " + serverChanges.length);
ret = yield; this._log.info("Client conflicts: " + clientConflicts.length);
this._log.info("Server conflicts: " + serverConflicts.length);
this._log.trace("Changes for client: " + this._serializeCommands(clientChanges));
this._log.trace("Predicted changes for server: " + this._serializeCommands(serverChanges));
this._log.trace("Client conflicts: " + this._serializeConflicts(clientConflicts));
this._log.trace("Server conflicts: " + this._serializeConflicts(serverConflicts));
let clientChanges = ret.propagations[0]; if (!(clientChanges.length || serverChanges.length ||
let serverChanges = ret.propagations[1]; clientConflicts.length || serverConflicts.length)) {
let clientConflicts = ret.conflicts[0]; this._log.info("Sync complete: no changes needed on client or server");
let serverConflicts = ret.conflicts[1]; this._snapshot.data = localJson.data;
this._snapshot.version = server.maxVersion;
this._snapshot.save();
self.done(true);
return;
}
this._log.info("Changes for client: " + clientChanges.length); if (clientConflicts.length || serverConflicts.length) {
this._log.info("Predicted changes for server: " + serverChanges.length); this._log.warn("Conflicts found! Discarding server changes");
this._log.info("Client conflicts: " + clientConflicts.length); }
this._log.info("Server conflicts: " + serverConflicts.length);
this._log.trace("Changes for client: " + this._serializeCommands(clientChanges));
this._log.trace("Predicted changes for server: " + this._serializeCommands(serverChanges));
this._log.trace("Client conflicts: " + this._serializeConflicts(clientConflicts));
this._log.trace("Server conflicts: " + this._serializeConflicts(serverConflicts));
if (!(clientChanges.length || serverChanges.length || let savedSnap = Utils.deepCopy(this._snapshot.data);
clientConflicts.length || serverConflicts.length)) { let savedVersion = this._snapshot.version;
this._log.info("Sync complete (2): no changes needed on client or server"); let newSnapshot;
this._snapshot.data = localJson.data;
this._snapshot.version = server.maxVersion;
this._snapshot.save();
synced = true;
return;
}
if (clientConflicts.length || serverConflicts.length) { // 3.1) Apply server changes to local store
this._log.warn("Conflicts found! Discarding server changes"); if (clientChanges.length) {
} this._log.info("Applying changes locally");
// Note that we need to need to apply client changes to the
let savedSnap = Utils.deepCopy(this._snapshot.data); // current tree, not the saved snapshot
let savedVersion = this._snapshot.version;
let newSnapshot;
// 3.1) Apply server changes to local store
if (clientChanges.length) {
this._log.info("Applying changes locally");
// Note that we need to need to apply client changes to the
// current tree, not the saved snapshot
localJson.applyCommands(clientChanges);
this._snapshot.data = localJson.data;
this._snapshot.version = server.maxVersion;
this._store.applyCommands(clientChanges);
newSnapshot = this._store.wrap();
this._core.detectUpdates(self.cb, this._snapshot.data, newSnapshot);
let diff = yield;
if (diff.length != 0) {
this._log.warn("Commands did not apply correctly");
this._log.debug("Diff from snapshot+commands -> " +
"new snapshot after commands:\n" +
this._serializeCommands(diff));
// FIXME: do we really want to revert the snapshot here?
this._snapshot.data = Utils.deepCopy(savedSnap);
this._snapshot.version = savedVersion;
}
this._snapshot.save();
}
// 3.2) Append server delta to the delta file and upload
// Generate a new diff, from the current server snapshot to the
// current client snapshot. In the case where there are no
// conflicts, it should be the same as what the resolver returned
localJson.applyCommands(clientChanges);
this._snapshot.data = localJson.data;
this._snapshot.version = server.maxVersion;
this._store.applyCommands(clientChanges);
newSnapshot = this._store.wrap(); newSnapshot = this._store.wrap();
this._core.detectUpdates(self.cb, server.snapshot, newSnapshot);
let serverDelta = yield;
// Log an error if not the same this._core.detectUpdates(self.cb, this._snapshot.data, newSnapshot);
if (!(serverConflicts.length || let diff = yield;
Utils.deepEquals(serverChanges, serverDelta))) if (diff.length != 0) {
this._log.warn("Predicted server changes differ from " + this._log.warn("Commands did not apply correctly");
"actual server->client diff (can be ignored in many cases)"); this._log.debug("Diff from snapshot+commands -> " +
"new snapshot after commands:\n" +
this._log.info("Actual changes for server: " + serverDelta.length); this._serializeCommands(diff));
this._log.debug("Actual changes for server: " + // FIXME: do we really want to revert the snapshot here?
this._serializeCommands(serverDelta)); this._snapshot.data = Utils.deepCopy(savedSnap);
this._snapshot.version = savedVersion;
if (serverDelta.length) {
this._log.info("Uploading changes to server");
this._snapshot.data = newSnapshot;
this._snapshot.version = ++server.maxVersion;
server.deltas.push(serverDelta);
if (server.formatVersion != STORAGE_FORMAT_VERSION ||
this._encryptionChanged) {
this._fullUpload.async(this, self.cb);
let status = yield;
if (!status)
this._log.error("Could not upload files to server"); // eep?
} else {
Crypto.PBEencrypt.async(Crypto, self.cb,
this._serializeCommands(server.deltas),
this._cryptoId);
let data = yield;
this._dav.PUT(this.deltasFile, data, self.cb);
let deltasPut = yield;
let c = 0;
for (GUID in this._snapshot.data)
c++;
this._dav.PUT(this.statusFile,
this._json.encode(
{GUID: this._snapshot.GUID,
formatVersion: STORAGE_FORMAT_VERSION,
snapVersion: server.snapVersion,
maxVersion: this._snapshot.version,
snapEncryption: server.snapEncryption,
deltasEncryption: Crypto.defaultAlgorithm,
itemCount: c}), self.cb);
let statusPut = yield;
if (deltasPut.status >= 200 && deltasPut.status < 300 &&
statusPut.status >= 200 && statusPut.status < 300) {
this._log.info("Successfully updated deltas and status on server");
this._snapshot.save();
} else {
// FIXME: revert snapshot here? - can't, we already applied
// updates locally! - need to save and retry
this._log.error("Could not update deltas on server");
}
}
} }
this._snapshot.save();
}
this._log.info("Sync complete"); // 3.2) Append server delta to the delta file and upload
synced = true;
} catch (e) { // Generate a new diff, from the current server snapshot to the
throw e; // current client snapshot. In the case where there are no
// conflicts, it should be the same as what the resolver returned
newSnapshot = this._store.wrap();
this._core.detectUpdates(self.cb, server.snapshot, newSnapshot);
let serverDelta = yield;
// Log an error if not the same
if (!(serverConflicts.length ||
Utils.deepEquals(serverChanges, serverDelta)))
this._log.warn("Predicted server changes differ from " +
"actual server->client diff (can be ignored in many cases)");
this._log.info("Actual changes for server: " + serverDelta.length);
this._log.debug("Actual changes for server: " +
this._serializeCommands(serverDelta));
if (serverDelta.length) {
this._log.info("Uploading changes to server");
this._snapshot.data = newSnapshot;
this._snapshot.version = ++server.maxVersion;
server.deltas.push(serverDelta);
if (server.formatVersion != STORAGE_FORMAT_VERSION ||
this._encryptionChanged) {
this._fullUpload.async(this, self.cb);
let status = yield;
if (!status)
this._log.error("Could not upload files to server"); // eep?
} finally {
let ok = false;
if (locked) {
this._dav.unlock.async(this._dav, self.cb);
ok = yield;
}
if (ok && synced) {
this._os.notifyObservers(null, this._osPrefix + "sync:success", "");
self.done(true);
} else { } else {
this._os.notifyObservers(null, this._osPrefix + "sync:error", ""); Crypto.PBEencrypt.async(Crypto, self.cb,
self.done(false); this._serializeCommands(server.deltas),
this._engineId);
let data = yield;
this._dav.PUT(this.deltasFile, data, self.cb);
let deltasPut = yield;
let c = 0;
for (GUID in this._snapshot.data)
c++;
this._dav.PUT(this.statusFile,
this._json.encode(
{GUID: this._snapshot.GUID,
formatVersion: STORAGE_FORMAT_VERSION,
snapVersion: server.snapVersion,
maxVersion: this._snapshot.version,
snapEncryption: server.snapEncryption,
deltasEncryption: Crypto.defaultAlgorithm,
itemCount: c}), self.cb);
let statusPut = yield;
if (deltasPut.status >= 200 && deltasPut.status < 300 &&
statusPut.status >= 200 && statusPut.status < 300) {
this._log.info("Successfully updated deltas and status on server");
this._snapshot.save();
} else {
// FIXME: revert snapshot here? - can't, we already applied
// updates locally! - need to save and retry
this._log.error("Could not update deltas on server");
}
} }
} }
this._log.info("Sync complete");
self.done(true);
}, },
/* Get the deltas/combined updates from the server /* Get the deltas/combined updates from the server
@ -520,6 +483,9 @@ Engine.prototype = {
break; break;
} }
this._getSymKey.async(this, self.cb);
yield;
if (status.formatVersion == 0) { if (status.formatVersion == 0) {
ret.snapEncryption = status.snapEncryption = "none"; ret.snapEncryption = status.snapEncryption = "none";
ret.deltasEncryption = status.deltasEncryption = "none"; ret.deltasEncryption = status.deltasEncryption = "none";
@ -548,7 +514,7 @@ Engine.prototype = {
Utils.ensureStatus(resp.status, "Could not download snapshot."); Utils.ensureStatus(resp.status, "Could not download snapshot.");
Crypto.PBEdecrypt.async(Crypto, self.cb, Crypto.PBEdecrypt.async(Crypto, self.cb,
resp.responseText, resp.responseText,
this._cryptoId, this._engineId,
status.snapEncryption); status.snapEncryption);
let data = yield; let data = yield;
snap.data = this._json.decode(data); snap.data = this._json.decode(data);
@ -559,7 +525,7 @@ Engine.prototype = {
Utils.ensureStatus(resp.status, "Could not download deltas."); Utils.ensureStatus(resp.status, "Could not download deltas.");
Crypto.PBEdecrypt.async(Crypto, self.cb, Crypto.PBEdecrypt.async(Crypto, self.cb,
resp.responseText, resp.responseText,
this._cryptoId, this._engineId,
status.deltasEncryption); status.deltasEncryption);
data = yield; data = yield;
allDeltas = this._json.decode(data); allDeltas = this._json.decode(data);
@ -576,7 +542,7 @@ Engine.prototype = {
Utils.ensureStatus(resp.status, "Could not download deltas."); Utils.ensureStatus(resp.status, "Could not download deltas.");
Crypto.PBEdecrypt.async(Crypto, self.cb, Crypto.PBEdecrypt.async(Crypto, self.cb,
resp.responseText, resp.responseText,
this._cryptoId, this._engineId,
status.deltasEncryption); status.deltasEncryption);
let data = yield; let data = yield;
allDeltas = this._json.decode(data); allDeltas = this._json.decode(data);
@ -593,7 +559,7 @@ Engine.prototype = {
Utils.ensureStatus(resp.status, "Could not download deltas."); Utils.ensureStatus(resp.status, "Could not download deltas.");
Crypto.PBEdecrypt.async(Crypto, self.cb, Crypto.PBEdecrypt.async(Crypto, self.cb,
resp.responseText, resp.responseText,
this._cryptoId, this._engineId,
status.deltasEncryption); status.deltasEncryption);
let data = yield; let data = yield;
allDeltas = this._json.decode(data); allDeltas = this._json.decode(data);
@ -659,9 +625,27 @@ Engine.prototype = {
let self = yield; let self = yield;
let ret = false; let ret = false;
Crypto.PBEkeygen.async(Crypto, self.cb);
let symkey = yield;
this._engineId.setTempPassword(symkey);
if (!this._engineId.password)
throw "Could not generate a symmetric encryption key";
Crypto.RSAencrypt.async(Crypto, self.cb,
this._engineId.password, this._pbeId);
let enckey = yield;
if (!enckey)
throw "Could not encrypt symmetric encryption key";
let keys = {ring: {}};
keys.ring[this._engineId.userHash] = enckey;
this._dav.PUT(this.keysFile, this._json.encode(keys), self.cb);
let resp = yield;
Utils.ensureStatus(resp.status, "Could not upload keyring file.");
Crypto.PBEencrypt.async(Crypto, self.cb, Crypto.PBEencrypt.async(Crypto, self.cb,
this._snapshot.serialize(), this._snapshot.serialize(),
this._cryptoId); this._engineId);
let data = yield; let data = yield;
this._dav.PUT(this.snapshotFile, data, self.cb); this._dav.PUT(this.snapshotFile, data, self.cb);
@ -706,8 +690,8 @@ Engine.prototype = {
} }
}; };
function BookmarksEngine(davCollection, cryptoId) { function BookmarksEngine(davCollection, pbeId) {
this._init(davCollection, cryptoId); this._init(davCollection, pbeId);
} }
BookmarksEngine.prototype = { BookmarksEngine.prototype = {
get name() { return "bookmarks-engine"; }, get name() { return "bookmarks-engine"; },
@ -730,8 +714,8 @@ BookmarksEngine.prototype = {
}; };
BookmarksEngine.prototype.__proto__ = new Engine(); BookmarksEngine.prototype.__proto__ = new Engine();
function HistoryEngine(davCollection, cryptoId) { function HistoryEngine(davCollection, pbeId) {
this._init(davCollection, cryptoId); this._init(davCollection, pbeId);
} }
HistoryEngine.prototype = { HistoryEngine.prototype = {
get name() { return "history-engine"; }, get name() { return "history-engine"; },

Просмотреть файл

@ -66,9 +66,39 @@ Identity.prototype = {
get username() { return this._username; }, get username() { return this._username; },
set username(value) { this._username = value; }, set username(value) { this._username = value; },
_key: null, get userHash() {
get key() { return this._key; }, //this._log.trace("Hashing username " + this.username);
set key(value) { this._key = value; },
let converter = Cc["@mozilla.org/intl/scriptableunicodeconverter"].
createInstance(Ci.nsIScriptableUnicodeConverter);
converter.charset = "UTF-8";
let hasher = Cc["@mozilla.org/security/hash;1"]
.createInstance(Ci.nsICryptoHash);
hasher.init(hasher.SHA1);
let data = converter.convertToByteArray(this.username, {});
hasher.update(data, data.length);
let rawHash = hasher.finish(false);
// return the two-digit hexadecimal code for a byte
function toHexString(charCode) {
return ("0" + charCode.toString(16)).slice(-2);
}
let hash = [toHexString(rawHash.charCodeAt(i)) for (i in rawHash)].join("");
//this._log.trace("Username hashes to " + hash);
return hash;
},
_privkey: null,
get privkey() { return this._privkey; },
set privkey(value) { this._privkey = value; },
// FIXME: get this from the privkey using crypto.js?
_pubkey: null,
get pubkey() { return this._pubkey; },
set pubkey(value) { this._pubkey = value; },
_password: null, _password: null,
get password() { get password() {

Просмотреть файл

@ -62,17 +62,6 @@ let Crypto = new WeaveCrypto();
function WeaveSyncService() { this._init(); } function WeaveSyncService() { this._init(); }
WeaveSyncService.prototype = { WeaveSyncService.prototype = {
__prefs: null,
get _prefs() {
if (!this.__prefs) {
this.__prefs = Cc["@mozilla.org/preferences-service;1"]
.getService(Ci.nsIPrefService);
this.__prefs = this.__prefs.getBranch(PREFS_BRANCH);
this.__prefs.QueryInterface(Ci.nsIPrefBranch2);
}
return this.__prefs;
},
__os: null, __os: null,
get _os() { get _os() {
if (!this.__os) if (!this.__os)
@ -134,13 +123,13 @@ WeaveSyncService.prototype = {
}, },
get username() { get username() {
return this._prefs.getCharPref("username"); return Utils.prefs.getCharPref("username");
}, },
set username(value) { set username(value) {
if (value) if (value)
this._prefs.setCharPref("username", value); Utils.prefs.setCharPref("username", value);
else else
this._prefs.clearUserPref("username"); Utils.prefs.clearUserPref("username");
// fixme - need to loop over all Identity objects - needs some rethinking... // fixme - need to loop over all Identity objects - needs some rethinking...
this._mozId.username = value; this._mozId.username = value;
@ -153,30 +142,7 @@ WeaveSyncService.prototype = {
get passphrase() { return this._cryptoId.password; }, get passphrase() { return this._cryptoId.password; },
set passphrase(value) { this._cryptoId.password = value; }, set passphrase(value) { this._cryptoId.password = value; },
get userPath() { get userPath() { return this._mozId.userHash; },
this._log.info("Hashing username " + this.username);
let converter = Cc["@mozilla.org/intl/scriptableunicodeconverter"].
createInstance(Ci.nsIScriptableUnicodeConverter);
converter.charset = "UTF-8";
let hasher = Cc["@mozilla.org/security/hash;1"]
.createInstance(Ci.nsICryptoHash);
hasher.init(hasher.SHA1);
let data = converter.convertToByteArray(this.username, {});
hasher.update(data, data.length);
let rawHash = hasher.finish(false);
// return the two-digit hexadecimal code for a byte
function toHexString(charCode) {
return ("0" + charCode.toString(16)).slice(-2);
}
let hash = [toHexString(rawHash.charCodeAt(i)) for (i in rawHash)].join("");
this._log.debug("Username hashes to " + hash);
return hash;
},
get currentUser() { get currentUser() {
if (this._dav.loggedIn) if (this._dav.loggedIn)
@ -185,20 +151,20 @@ WeaveSyncService.prototype = {
}, },
get enabled() { get enabled() {
return this._prefs.getBoolPref("enabled"); return Utils.prefs.getBoolPref("enabled");
}, },
get schedule() { get schedule() {
if (!this.enabled) if (!this.enabled)
return 0; // manual/off return 0; // manual/off
return this._prefs.getIntPref("schedule"); return Utils.prefs.getIntPref("schedule");
}, },
_init: function WeaveSync__init() { _init: function WeaveSync__init() {
this._initLogs(); this._initLogs();
this._log.info("Weave Sync Service Initializing"); this._log.info("Weave Sync Service Initializing");
this._prefs.addObserver("", this, false); Utils.prefs.addObserver("", this, false);
if (!this.enabled) { if (!this.enabled) {
this._log.info("Weave Sync disabled"); this._log.info("Weave Sync disabled");
@ -252,17 +218,19 @@ WeaveSyncService.prototype = {
_initLogs: function WeaveSync__initLogs() { _initLogs: function WeaveSync__initLogs() {
this._log = Log4Moz.Service.getLogger("Service.Main"); this._log = Log4Moz.Service.getLogger("Service.Main");
this._log.level =
Log4Moz.Level[Utils.prefs.getCharPref("log.logger.service.main")];
let formatter = Log4Moz.Service.newFormatter("basic"); let formatter = Log4Moz.Service.newFormatter("basic");
let root = Log4Moz.Service.rootLogger; let root = Log4Moz.Service.rootLogger;
root.level = Log4Moz.Level[this._prefs.getCharPref("log.rootLogger")]; root.level = Log4Moz.Level[Utils.prefs.getCharPref("log.rootLogger")];
let capp = Log4Moz.Service.newAppender("console", formatter); let capp = Log4Moz.Service.newAppender("console", formatter);
capp.level = Log4Moz.Level[this._prefs.getCharPref("log.appender.console")]; capp.level = Log4Moz.Level[Utils.prefs.getCharPref("log.appender.console")];
root.addAppender(capp); root.addAppender(capp);
let dapp = Log4Moz.Service.newAppender("dump", formatter); let dapp = Log4Moz.Service.newAppender("dump", formatter);
dapp.level = Log4Moz.Level[this._prefs.getCharPref("log.appender.dump")]; dapp.level = Log4Moz.Level[Utils.prefs.getCharPref("log.appender.dump")];
root.addAppender(dapp); root.addAppender(dapp);
let brief = this._dirSvc.get("ProfD", Ci.nsIFile); let brief = this._dirSvc.get("ProfD", Ci.nsIFile);
@ -279,35 +247,62 @@ WeaveSyncService.prototype = {
verbose.create(verbose.NORMAL_FILE_TYPE, PERMS_FILE); verbose.create(verbose.NORMAL_FILE_TYPE, PERMS_FILE);
let fapp = Log4Moz.Service.newFileAppender("rotating", brief, formatter); let fapp = Log4Moz.Service.newFileAppender("rotating", brief, formatter);
fapp.level = Log4Moz.Level[this._prefs.getCharPref("log.appender.briefLog")]; fapp.level = Log4Moz.Level[Utils.prefs.getCharPref("log.appender.briefLog")];
root.addAppender(fapp); root.addAppender(fapp);
let vapp = Log4Moz.Service.newFileAppender("rotating", verbose, formatter); let vapp = Log4Moz.Service.newFileAppender("rotating", verbose, formatter);
vapp.level = Log4Moz.Level[this._prefs.getCharPref("log.appender.debugLog")]; vapp.level = Log4Moz.Level[Utils.prefs.getCharPref("log.appender.debugLog")];
root.addAppender(vapp); root.addAppender(vapp);
}, },
_lock: function weaveSync__lock() { _lock: function weaveSync__lock() {
if (this._locked) { let self = yield;
this._dav.lock.async(this._dav, self.cb);
let locked = yield;
if (!locked) {
this._log.warn("Service lock failed: already locked"); this._log.warn("Service lock failed: already locked");
this._os.notifyObservers(null, "weave:service-lock:error", ""); this._os.notifyObservers(null, "weave:service-lock:error", "");
return false; self.done(false);
return;
} }
this._locked = true;
this._log.debug("Service lock acquired"); this._log.debug("Service lock acquired");
this._os.notifyObservers(null, "weave:service-lock:success", ""); this._os.notifyObservers(null, "weave:service-lock:success", "");
return true; self.done(true);
}, },
_unlock: function WeaveSync__unlock() { _unlock: function WeaveSync__unlock() {
this._locked = false; let self = yield;
this._dav.unlock.async(this._dav, self.cb);
let unlocked = yield;
if (!unlocked) {
this._log.error("Service unlock failed");
this._os.notifyObservers(null, "weave:service-unlock:error", "");
self.done(false);
return;
}
this._log.debug("Service lock released"); this._log.debug("Service lock released");
this._os.notifyObservers(null, "weave:service-unlock:success", ""); this._os.notifyObservers(null, "weave:service-unlock:success", "");
self.done(true);
}, },
_login: function WeaveSync__login() { _login: function WeaveSync__login(password, passphrase) {
let self = yield; let self = yield;
try { try {
if (this._dav.locked)
throw "Could not login: could not acquire lock";
this._dav.allowLock = false;
// cache password & passphrase
// if null, we'll try to get them from the pw manager below
this._mozId.setTempPassword(password);
this._cryptoId.setTempPassword(passphrase);
this._log.debug("Logging in"); this._log.debug("Logging in");
this._os.notifyObservers(null, "weave:service-login:start", ""); this._os.notifyObservers(null, "weave:service-login:start", "");
@ -316,7 +311,7 @@ WeaveSyncService.prototype = {
if (!this.password) if (!this.password)
throw "No password given or found in password manager"; throw "No password given or found in password manager";
let serverURL = this._prefs.getCharPref("serverURL"); let serverURL = Utils.prefs.getCharPref("serverURL");
this._dav.baseURL = serverURL + "user/" + this.userPath + "/"; this._dav.baseURL = serverURL + "user/" + this.userPath + "/";
this._log.info("Using server URL: " + this._dav.baseURL); this._log.info("Using server URL: " + this._dav.baseURL);
@ -354,7 +349,9 @@ WeaveSyncService.prototype = {
"Could not get private key from server", [[200,300],404]); "Could not get private key from server", [[200,300],404]);
if (keyResp.status != 404) { if (keyResp.status != 404) {
this._cryptoId.key = keyResp.responseText; this._cryptoId.privkey = keyResp.responseText;
Crypto.RSAkeydecrypt.async(Crypto, self.cb, this._cryptoId);
this._cryptoId.pubkey = yield;
} else { } else {
// FIXME: hack to wipe everyone's server data... needs to be removed at some point // FIXME: hack to wipe everyone's server data... needs to be removed at some point
@ -363,10 +360,11 @@ WeaveSyncService.prototype = {
// generate a new key // generate a new key
this._log.debug("Generating new RSA key"); this._log.debug("Generating new RSA key");
Crypto.RSAkeygen.async(Crypto, self.cb, this._cryptoId.password); Crypto.RSAkeygen.async(Crypto, self.cb, this._cryptoId);
let [privkey, pubkey] = yield; let [privkey, pubkey] = yield;
this._cryptoId.key = privkey; this._cryptoId.privkey = privkey;
this._cryptoId.pubkey = pubkey;
this._dav.MKCOL("private/", self.cb); this._dav.MKCOL("private/", self.cb);
ret = yield; ret = yield;
@ -388,17 +386,34 @@ WeaveSyncService.prototype = {
} }
this._passphrase = null; this._passphrase = null;
this._dav.allowLock = true;
this._os.notifyObservers(null, "weave:service-login:success", ""); this._os.notifyObservers(null, "weave:service-login:success", "");
self.done(true); self.done(true);
} catch (e) { } catch (e) {
this._log.warn(Async.exceptionStr(self, e)); this._dav.allowLock = true;
this._log.trace(e.trace);
this._os.notifyObservers(null, "weave:service-login:error", ""); this._os.notifyObservers(null, "weave:service-login:error", "");
self.done(false); throw e;
} }
}, },
// NOTE: doesn't lock because it's called from _login() which already holds the lock
_serverWipe: function WeaveSync__serverWipe() {
let self = yield;
this._dav.listFiles.async(this._dav, self.cb);
let names = yield;
for (let i = 0; i < names.length; i++) {
this._dav.DELETE(names[i], self.cb);
let resp = yield;
this._log.debug(resp.status);
}
self.done();
},
// NOTE: can't lock because it assumes the lock is being held ;)
_resetLock: function WeaveSync__resetLock() { _resetLock: function WeaveSync__resetLock() {
let self = yield; let self = yield;
let success = false; let success = false;
@ -425,76 +440,104 @@ WeaveSyncService.prototype = {
} }
}, },
_syncEngine: function WeaveSync__syncEngine(eng) {
let self = yield;
this._os.notifyObservers(null, "weave:" + eng.name + ":sync:start", "");
let ret;
try {
eng.sync(self.cb);
ret = yield;
} catch (e) {
this._log.warn("Engine failed with error: " + Utils.exceptionStr(e));
if (e.trace)
this._log.debug("Engine stack trace: " + Utils.stackTrace(e.trace));
}
if (ret)
this._os.notifyObservers(null, "weave:" + eng.name + ":sync:success", "");
else
this._os.notifyObservers(null, "weave:" + eng.name + ":sync:error", "");
self.done();
},
_sync: function WeaveSync__sync() { _sync: function WeaveSync__sync() {
let self = yield; let self = yield;
let success = false;
try { try {
if (!this._lock()) this._lock.async(this, self.cb)
return; let locked = yield;
if (!locked)
return;
this._os.notifyObservers(null, "weave:service:sync:start", ""); this._os.notifyObservers(null, "weave:service:sync:start", "");
if (this._prefs.getBoolPref("bookmarks")) { if (Utils.prefs.getBoolPref("bookmarks")) {
this._bmkEngine.sync(self.cb); this._syncEngine.async(this, self.cb, this._bmkEngine);
yield; yield;
} }
if (this._prefs.getBoolPref("history")) { if (Utils.prefs.getBoolPref("history")) {
this._histEngine.sync(self.cb); this._syncEngine.async(this, self.cb, this._histEngine);
yield; yield;
} }
success = true; this._unlock.async(this, self.cb)
this._unlock(); yield;
this._os.notifyObservers(null, "weave:service:sync:success", "");
} catch (e) { } catch (e) {
this._unlock.async(this, self.cb)
yield;
this._os.notifyObservers(null, "weave:service:sync:error", "");
throw e; throw e;
} finally {
if (success)
this._os.notifyObservers(null, "weave:service:sync:success", "");
else
this._os.notifyObservers(null, "weave:service:sync:error", "");
self.done();
} }
self.done();
}, },
_resetServer: function WeaveSync__resetServer() { _resetServer: function WeaveSync__resetServer() {
let self = yield; let self = yield;
if (!this._lock()) this._lock.async(this, self.cb)
throw "Could not acrquire lock"; let locked = yield;
if (!locked)
return;
this._bmkEngine.resetServer(self.cb); try {
this._histEngine.resetServer(self.cb); this._bmkEngine.resetServer(self.cb);
this._histEngine.resetServer(self.cb);
} catch (e) {
throw e;
} finally {
this._unlock.async(this, self.cb)
yield;
}
this._unlock();
self.done(); self.done();
}, },
_resetClient: function WeaveSync__resetClient() { _resetClient: function WeaveSync__resetClient() {
let self = yield; let self = yield;
if (!this._lock()) this._lock.async(this, self.cb)
throw "Could not acrquire lock"; let locked = yield;
if (!locked)
return;
this._bmkEngine.resetClient(self.cb); try {
this._histEngine.resetClient(self.cb); this._bmkEngine.resetClient(self.cb);
this._histEngine.resetClient(self.cb);
this._unlock(); } catch (e) {
self.done(); throw e;
},
_serverWipe: function WeaveSync__serverWipe() { } finally {
let self = yield; this._unlock.async(this, self.cb)
yield;
this._dav.listFiles.async(this._dav, self.cb);
let names = yield;
for (let i = 0; i < names.length; i++) {
this._dav.DELETE(names[i], self.cb);
let resp = yield;
this._log.debug(resp.status);
} }
self.done(); self.done();
@ -519,14 +562,7 @@ WeaveSyncService.prototype = {
// These are global (for all engines) // These are global (for all engines)
login: function WeaveSync_login(password, passphrase) { login: function WeaveSync_login(password, passphrase) {
if (!this._lock()) this._login.async(this, null, password, passphrase);
return;
// cache password & passphrase
// if null, _login() will try to get them from the pw manager
this._mozId.setTempPassword(password);
this._cryptoId.setTempPassword(passphrase);
let self = this;
this._login.async(this, function() {self._unlock()});
}, },
logout: function WeaveSync_logout() { logout: function WeaveSync_logout() {
@ -537,12 +573,7 @@ WeaveSyncService.prototype = {
this._os.notifyObservers(null, "weave:service-logout:success", ""); this._os.notifyObservers(null, "weave:service-logout:success", "");
}, },
resetLock: function WeaveSync_resetLock() { resetLock: function WeaveSync_resetLock() { this._resetLock.async(this); },
if (!this._lock())
return;
let self = this;
this._resetLock.async(this, function() {self._unlock()});
},
// These are per-engine // These are per-engine

Просмотреть файл

@ -278,6 +278,17 @@ let Utils = {
return function innerBind() { return method.apply(object, arguments); } return function innerBind() { return method.apply(object, arguments); }
}, },
_prefs: null,
get prefs() {
if (!this.__prefs) {
this.__prefs = Cc["@mozilla.org/preferences-service;1"]
.getService(Ci.nsIPrefService);
this.__prefs = this.__prefs.getBranch(PREFS_BRANCH);
this.__prefs.QueryInterface(Ci.nsIPrefBranch2);
}
return this.__prefs;
},
/* /*
* Event listener object * Event listener object
* Used to handle XMLHttpRequest and nsITimer callbacks * Used to handle XMLHttpRequest and nsITimer callbacks
@ -286,7 +297,9 @@ let Utils = {
EventListener: function Weave_EventListener(handler, eventName) { EventListener: function Weave_EventListener(handler, eventName) {
this._handler = handler; this._handler = handler;
this._eventName = eventName; this._eventName = eventName;
this._log = Log4Moz.Service.getLogger("Service.EventHandler"); this._log = Log4Moz.Service.getLogger("Async.EventHandler");
this._log.level =
Log4Moz.Level[Utils.prefs.getCharPref("log.logger.async")];
} }
}; };

Просмотреть файл

@ -13,9 +13,14 @@ pref("extensions.weave.bookmarks", true);
pref("extensions.weave.history", true); pref("extensions.weave.history", true);
pref("extensions.weave.schedule", 1); pref("extensions.weave.schedule", 1);
pref("extensions.weave.log.rootLogger", "Config");
pref("extensions.weave.log.appender.console", "Warn"); pref("extensions.weave.log.appender.console", "Warn");
pref("extensions.weave.log.appender.dump", "Error"); pref("extensions.weave.log.appender.dump", "Error");
pref("extensions.weave.log.appender.briefLog", "Info"); pref("extensions.weave.log.appender.briefLog", "Info");
pref("extensions.weave.log.appender.debugLog", "Config"); pref("extensions.weave.log.appender.debugLog", "Trace");
pref("extensions.weave.log.rootLogger", "Debug");
pref("extensions.weave.log.logger.async", "Debug");
pref("extensions.weave.log.logger.service.crypto", "Debug");
pref("extensions.weave.log.logger.service.dav", "Debug");
pref("extensions.weave.log.logger.service.engine", "Debug");
pref("extensions.weave.log.logger.service.main", "Trace");