1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 #include "chrome/browser/password_manager/password_store_x.h" 6 7 #include <algorithm> 8 #include <map> 9 #include <vector> 10 11 #include "base/bind.h" 12 #include "base/logging.h" 13 #include "base/prefs/pref_service.h" 14 #include "base/stl_util.h" 15 #include "chrome/browser/chrome_notification_types.h" 16 #include "components/password_manager/core/browser/password_store_change.h" 17 #include "components/password_manager/core/common/password_manager_pref_names.h" 18 #include "components/pref_registry/pref_registry_syncable.h" 19 #include "content/public/browser/browser_thread.h" 20 #include "content/public/browser/notification_service.h" 21 22 using autofill::PasswordForm; 23 using content::BrowserThread; 24 using password_manager::PasswordStoreChange; 25 using password_manager::PasswordStoreChangeList; 26 using password_manager::PasswordStoreDefault; 27 using std::vector; 28 29 namespace { 30 31 bool AddLoginToBackend(const scoped_ptr<PasswordStoreX::NativeBackend>& backend, 32 const PasswordForm& form, 33 PasswordStoreChangeList* changes) { 34 *changes = backend->AddLogin(form); 35 return (!changes->empty() && 36 changes->back().type() == PasswordStoreChange::ADD); 37 } 38 39 } // namespace 40 41 PasswordStoreX::PasswordStoreX( 42 scoped_refptr<base::SingleThreadTaskRunner> main_thread_runner, 43 scoped_refptr<base::SingleThreadTaskRunner> db_thread_runner, 44 password_manager::LoginDatabase* login_db, 45 NativeBackend* backend) 46 : PasswordStoreDefault(main_thread_runner, db_thread_runner, login_db), 47 backend_(backend), 48 migration_checked_(!backend), 49 allow_fallback_(false) {} 50 51 PasswordStoreX::~PasswordStoreX() {} 52 53 PasswordStoreChangeList PasswordStoreX::AddLoginImpl(const PasswordForm& form) { 54 CheckMigration(); 55 PasswordStoreChangeList changes; 56 if (use_native_backend() && AddLoginToBackend(backend_, form, &changes)) { 57 allow_fallback_ = false; 58 } else if (allow_default_store()) { 59 changes = PasswordStoreDefault::AddLoginImpl(form); 60 } 61 return changes; 62 } 63 64 PasswordStoreChangeList PasswordStoreX::UpdateLoginImpl( 65 const PasswordForm& form) { 66 CheckMigration(); 67 PasswordStoreChangeList changes; 68 if (use_native_backend() && backend_->UpdateLogin(form, &changes)) { 69 allow_fallback_ = false; 70 } else if (allow_default_store()) { 71 changes = PasswordStoreDefault::UpdateLoginImpl(form); 72 } 73 return changes; 74 } 75 76 PasswordStoreChangeList PasswordStoreX::RemoveLoginImpl( 77 const PasswordForm& form) { 78 CheckMigration(); 79 PasswordStoreChangeList changes; 80 if (use_native_backend() && backend_->RemoveLogin(form)) { 81 changes.push_back(PasswordStoreChange(PasswordStoreChange::REMOVE, form)); 82 allow_fallback_ = false; 83 } else if (allow_default_store()) { 84 changes = PasswordStoreDefault::RemoveLoginImpl(form); 85 } 86 return changes; 87 } 88 89 PasswordStoreChangeList PasswordStoreX::RemoveLoginsCreatedBetweenImpl( 90 base::Time delete_begin, 91 base::Time delete_end) { 92 CheckMigration(); 93 PasswordStoreChangeList changes; 94 if (use_native_backend() && 95 backend_->RemoveLoginsCreatedBetween( 96 delete_begin, delete_end, &changes)) { 97 LogStatsForBulkDeletion(changes.size()); 98 allow_fallback_ = false; 99 } else if (allow_default_store()) { 100 changes = PasswordStoreDefault::RemoveLoginsCreatedBetweenImpl(delete_begin, 101 delete_end); 102 } 103 return changes; 104 } 105 106 PasswordStoreChangeList PasswordStoreX::RemoveLoginsSyncedBetweenImpl( 107 base::Time delete_begin, 108 base::Time delete_end) { 109 CheckMigration(); 110 PasswordStoreChangeList changes; 111 if (use_native_backend() && 112 backend_->RemoveLoginsSyncedBetween(delete_begin, delete_end, &changes)) { 113 allow_fallback_ = false; 114 } else if (allow_default_store()) { 115 changes = PasswordStoreDefault::RemoveLoginsSyncedBetweenImpl(delete_begin, 116 delete_end); 117 } 118 return changes; 119 } 120 121 namespace { 122 struct LoginLessThan { 123 bool operator()(const PasswordForm* a, const PasswordForm* b) { 124 return a->origin < b->origin; 125 } 126 }; 127 } // anonymous namespace 128 129 void PasswordStoreX::SortLoginsByOrigin(NativeBackend::PasswordFormList* list) { 130 // In login_database.cc, the query has ORDER BY origin_url. Simulate that. 131 std::sort(list->begin(), list->end(), LoginLessThan()); 132 } 133 134 void PasswordStoreX::GetLoginsImpl( 135 const autofill::PasswordForm& form, 136 AuthorizationPromptPolicy prompt_policy, 137 const ConsumerCallbackRunner& callback_runner) { 138 CheckMigration(); 139 std::vector<autofill::PasswordForm*> matched_forms; 140 if (use_native_backend() && backend_->GetLogins(form, &matched_forms)) { 141 SortLoginsByOrigin(&matched_forms); 142 // The native backend may succeed and return no data even while locked, if 143 // the query did not match anything stored. So we continue to allow fallback 144 // until we perform a write operation, or until a read returns actual data. 145 if (matched_forms.size() > 0) 146 allow_fallback_ = false; 147 } else if (allow_default_store()) { 148 DCHECK(matched_forms.empty()); 149 PasswordStoreDefault::GetLoginsImpl(form, prompt_policy, callback_runner); 150 return; 151 } 152 // The consumer will be left hanging unless we reply. 153 callback_runner.Run(matched_forms); 154 } 155 156 void PasswordStoreX::GetAutofillableLoginsImpl(GetLoginsRequest* request) { 157 CheckMigration(); 158 if (use_native_backend() && 159 backend_->GetAutofillableLogins(request->result())) { 160 SortLoginsByOrigin(request->result()); 161 // See GetLoginsImpl() for why we disallow fallback conditionally here. 162 if (request->result()->size() > 0) 163 allow_fallback_ = false; 164 } else if (allow_default_store()) { 165 PasswordStoreDefault::GetAutofillableLoginsImpl(request); 166 return; 167 } 168 // The consumer will be left hanging unless we reply. 169 ForwardLoginsResult(request); 170 } 171 172 void PasswordStoreX::GetBlacklistLoginsImpl(GetLoginsRequest* request) { 173 CheckMigration(); 174 if (use_native_backend() && 175 backend_->GetBlacklistLogins(request->result())) { 176 SortLoginsByOrigin(request->result()); 177 // See GetLoginsImpl() for why we disallow fallback conditionally here. 178 if (request->result()->size() > 0) 179 allow_fallback_ = false; 180 } else if (allow_default_store()) { 181 PasswordStoreDefault::GetBlacklistLoginsImpl(request); 182 return; 183 } 184 // The consumer will be left hanging unless we reply. 185 ForwardLoginsResult(request); 186 } 187 188 bool PasswordStoreX::FillAutofillableLogins(vector<PasswordForm*>* forms) { 189 CheckMigration(); 190 if (use_native_backend() && backend_->GetAutofillableLogins(forms)) { 191 // See GetLoginsImpl() for why we disallow fallback conditionally here. 192 if (forms->size() > 0) 193 allow_fallback_ = false; 194 return true; 195 } 196 if (allow_default_store()) 197 return PasswordStoreDefault::FillAutofillableLogins(forms); 198 return false; 199 } 200 201 bool PasswordStoreX::FillBlacklistLogins(vector<PasswordForm*>* forms) { 202 CheckMigration(); 203 if (use_native_backend() && backend_->GetBlacklistLogins(forms)) { 204 // See GetLoginsImpl() for why we disallow fallback conditionally here. 205 if (forms->size() > 0) 206 allow_fallback_ = false; 207 return true; 208 } 209 if (allow_default_store()) 210 return PasswordStoreDefault::FillBlacklistLogins(forms); 211 return false; 212 } 213 214 void PasswordStoreX::CheckMigration() { 215 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::DB)); 216 if (migration_checked_ || !backend_.get()) 217 return; 218 migration_checked_ = true; 219 ssize_t migrated = MigrateLogins(); 220 if (migrated > 0) { 221 VLOG(1) << "Migrated " << migrated << " passwords to native store."; 222 } else if (migrated == 0) { 223 // As long as we are able to migrate some passwords, we know the native 224 // store is working. But if there is nothing to migrate, the "migration" 225 // can succeed even when the native store would fail. In this case we 226 // allow a later fallback to the default store. Once any later operation 227 // succeeds on the native store, we will no longer allow fallback. 228 allow_fallback_ = true; 229 } else { 230 LOG(WARNING) << "Native password store migration failed! " << 231 "Falling back on default (unencrypted) store."; 232 backend_.reset(NULL); 233 } 234 } 235 236 bool PasswordStoreX::allow_default_store() { 237 if (allow_fallback_) { 238 LOG(WARNING) << "Native password store failed! " << 239 "Falling back on default (unencrypted) store."; 240 backend_.reset(NULL); 241 // Don't warn again. We'll use the default store because backend_ is NULL. 242 allow_fallback_ = false; 243 } 244 return !backend_.get(); 245 } 246 247 ssize_t PasswordStoreX::MigrateLogins() { 248 DCHECK(backend_.get()); 249 vector<PasswordForm*> forms; 250 bool ok = PasswordStoreDefault::FillAutofillableLogins(&forms) && 251 PasswordStoreDefault::FillBlacklistLogins(&forms); 252 if (ok) { 253 // We add all the passwords (and blacklist entries) to the native backend 254 // before attempting to remove any from the login database, to make sure we 255 // don't somehow end up with some of the passwords in one store and some in 256 // another. We'll always have at least one intact store this way. 257 for (size_t i = 0; i < forms.size(); ++i) { 258 PasswordStoreChangeList changes; 259 if (!AddLoginToBackend(backend_, *forms[i], &changes)) { 260 ok = false; 261 break; 262 } 263 } 264 if (ok) { 265 for (size_t i = 0; i < forms.size(); ++i) { 266 // If even one of these calls to RemoveLoginImpl() succeeds, then we 267 // should prefer the native backend to the now-incomplete login 268 // database. Thus we want to return a success status even in the case 269 // where some fail. The only real problem with this is that we might 270 // leave passwords in the login database and never come back to clean 271 // them out if any of these calls do fail. 272 PasswordStoreDefault::RemoveLoginImpl(*forms[i]); 273 } 274 // Finally, delete the database file itself. We remove the passwords from 275 // it before deleting the file just in case there is some problem deleting 276 // the file (e.g. directory is not writable, but file is), which would 277 // otherwise cause passwords to re-migrate next (or maybe every) time. 278 DeleteAndRecreateDatabaseFile(); 279 } 280 } 281 ssize_t result = ok ? forms.size() : -1; 282 STLDeleteElements(&forms); 283 return result; 284 } 285