Prepare for other edits in KeyEdit (change expiry date). m_targetKeyFpr -> m_targetUidValidityKeyFpr.
173 lines
6.7 KiB
C++
173 lines
6.7 KiB
C++
/*
|
|
* File: KeyEdit.cpp
|
|
* Author: SET - nmset@yandex.com
|
|
* License : GPL v2
|
|
* Copyright SET - © 2019
|
|
*
|
|
* Created on October 25, 2020, 10:38 AM
|
|
*/
|
|
|
|
#include "KeyEdit.h"
|
|
#include <Wt/WText.h>
|
|
#include <Wt/WStandardItemModel.h>
|
|
#include <Wt/WStandardItem.h>
|
|
#include "GpgMEWorker.h"
|
|
#include "Tools.h"
|
|
|
|
using namespace std;
|
|
|
|
KeyEdit::KeyEdit(K7Main * owner)
|
|
:WObject()
|
|
{
|
|
m_owner = owner;
|
|
m_popupUid = NULL;
|
|
m_targetUidValidityKeyFpr = WString::Empty;
|
|
}
|
|
|
|
KeyEdit::~KeyEdit()
|
|
{
|
|
delete m_popupUid;
|
|
}
|
|
|
|
void KeyEdit::OnOwnerTrustDoubleClicked(WTreeTableNode * keyNode, bool keyHasSecret)
|
|
{
|
|
/*
|
|
* A private key that a user does not manage will have its public part
|
|
* listed in the public WTreeTableNode. The certification trust level must
|
|
* not be editable by anyone.
|
|
*/
|
|
WText * lblFpr = static_cast<WText*> (keyNode->columnWidget(3));
|
|
if (!IsOurKey(lblFpr->text()) && Tools::KeyHasSecret(lblFpr->text())) {
|
|
m_owner->m_tmwMessage->SetText(TR("OwnerTrustReadOnly"));
|
|
return;
|
|
}
|
|
/*
|
|
* We leave a primary key with ultimate trust level for further change.
|
|
* kleopatra does not do that.
|
|
*/
|
|
WComboBox * cmbOwnerTrust = new WComboBox();
|
|
FillOwnerTrustCombo(cmbOwnerTrust, keyHasSecret);
|
|
cmbOwnerTrust->blurred().connect(std::bind(&KeyEdit::OnOwnerTrustBlurred, this, keyNode, keyHasSecret));
|
|
WText * lblOwnerTrust = static_cast<WText*> (keyNode->columnWidget(2));
|
|
cmbOwnerTrust->setCurrentIndex(cmbOwnerTrust->findText(lblOwnerTrust->text()));
|
|
/*
|
|
* Prepare to check for change in combobox item.
|
|
* Change is detected by index, not value.
|
|
*/
|
|
cmbOwnerTrust->setAttributeValue("previousTrustLevel", std::to_string(cmbOwnerTrust->currentIndex()));
|
|
keyNode->setColumnWidget(2, unique_ptr<WComboBox> (cmbOwnerTrust));
|
|
// +++
|
|
cmbOwnerTrust->setFocus();
|
|
}
|
|
|
|
void KeyEdit::OnOwnerTrustBlurred(WTreeTableNode* keyNode, bool keyHasSecret)
|
|
{
|
|
// Get new level (not index)
|
|
WComboBox * cmbOwnerTrust = static_cast<WComboBox*> (keyNode->columnWidget(2));
|
|
shared_ptr<WAbstractItemModel> aiModel = cmbOwnerTrust->model();
|
|
WStandardItemModel * iModel = static_cast<WStandardItemModel*> (aiModel.get());
|
|
WStandardItem * item = iModel->item(cmbOwnerTrust->currentIndex(), 0);
|
|
int newLevel = Tools::ToInt(item->text().toUTF8());
|
|
|
|
WText * lblOwnerTrust = new WText(cmbOwnerTrust->currentText());
|
|
lblOwnerTrust->doubleClicked().connect(std::bind(&KeyEdit::OnOwnerTrustDoubleClicked, this, keyNode, keyHasSecret));
|
|
const WText * lblFpr = static_cast<WText*> (keyNode->columnWidget(3));
|
|
const uint newTrustLevel = cmbOwnerTrust->currentIndex();
|
|
const WString previousTrustLevel = cmbOwnerTrust->attributeValue("previousTrustLevel");
|
|
keyNode->setColumnWidget(2, unique_ptr<WText> (lblOwnerTrust));
|
|
// If nothing was changed, don't go to engine.
|
|
if (WString(std::to_string(newTrustLevel)) == previousTrustLevel)
|
|
return;
|
|
|
|
GpgMEWorker gpgWorker;
|
|
GpgME::Error e = gpgWorker.EditOwnerTrust(lblFpr->text().toUTF8().c_str(), (GpgME::Key::OwnerTrust) newLevel);
|
|
if (e.code() != 0)
|
|
{
|
|
lblOwnerTrust->setText(previousTrustLevel);
|
|
m_owner->m_tmwMessage->SetText(TR("OwnerTrustFailure"));
|
|
return;
|
|
}
|
|
m_owner->m_tmwMessage->SetText(TR("OwnerTrustSuccess"));
|
|
}
|
|
|
|
void KeyEdit::FillOwnerTrustCombo(WComboBox * cmb, bool keyHasSecret)
|
|
{
|
|
shared_ptr<WStandardItemModel> siModel = make_shared<WStandardItemModel> ();
|
|
OwnerTrustMap OwnerTrustLevel = m_owner->OwnerTrustLevel;
|
|
vector<unique_ptr < WStandardItem>> colIndex;
|
|
vector<unique_ptr < WStandardItem>> colText;
|
|
colIndex.push_back(cpp14::make_unique<WStandardItem> (std::to_string(UserID::Validity::Unknown)));
|
|
colText.push_back(cpp14::make_unique<WStandardItem> (TR("UidUnknown")));
|
|
if (keyHasSecret) {
|
|
colIndex.push_back(cpp14::make_unique<WStandardItem> (std::to_string(UserID::Validity::Ultimate)));
|
|
colText.push_back(cpp14::make_unique<WStandardItem> (TR("UidUltimate")));
|
|
} else {
|
|
colIndex.push_back(cpp14::make_unique<WStandardItem> (std::to_string(UserID::Validity::Never)));
|
|
colText.push_back(cpp14::make_unique<WStandardItem> (TR("UidNever")));
|
|
colIndex.push_back(cpp14::make_unique<WStandardItem> (std::to_string(UserID::Validity::Marginal)));
|
|
colText.push_back(cpp14::make_unique<WStandardItem> (TR("UidMarginal")));
|
|
colIndex.push_back(cpp14::make_unique<WStandardItem> (std::to_string(UserID::Validity::Full)));
|
|
colText.push_back(cpp14::make_unique<WStandardItem> (TR("UidFull")));
|
|
}
|
|
siModel->appendColumn(std::move(colIndex));
|
|
siModel->appendColumn(std::move(colText));
|
|
cmb->clear();
|
|
cmb->setModel(siModel);
|
|
cmb->setModelColumn(1);
|
|
}
|
|
|
|
bool KeyEdit::IsOurKey(const WString& fpr)
|
|
{
|
|
vector<WString> ourKeys = m_owner->m_config->PrivateKeyIds();
|
|
vector<WString> ::iterator it;
|
|
for (it = ourKeys.begin(); it != ourKeys.end(); it++)
|
|
{
|
|
if (*it == fpr)
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
void KeyEdit::OnUidValidityClicked(WTreeTableNode* uidNode, vector<WString>& privateKeys, const WString& targetKeyFpr)
|
|
{
|
|
if (targetKeyFpr != m_targetUidValidityKeyFpr) {
|
|
bool passwordVisibility = true;
|
|
if (m_popupUid)
|
|
passwordVisibility = m_popupUid->IsPasswordVisible();
|
|
delete m_popupUid;
|
|
WText * lblUidValidity = static_cast<WText*> (uidNode->columnWidget(2));
|
|
m_popupUid = new PopupCertifyUserId(lblUidValidity, m_owner->m_tmwMessage);
|
|
m_popupUid->Create(privateKeys, targetKeyFpr);
|
|
m_popupUid->ShowPassphrase(passwordVisibility);
|
|
m_targetUidValidityKeyFpr = targetKeyFpr;
|
|
m_popupUid->GetCertifyButton()->clicked().connect(this, &KeyEdit::CertifyKey);
|
|
}
|
|
m_popupUid->show();
|
|
}
|
|
|
|
void KeyEdit::CertifyKey()
|
|
{
|
|
vector<uint>& uidsToSign = m_popupUid->GetUidsToSign();
|
|
if (uidsToSign.size() == 0) {
|
|
m_owner->m_tmwMessage->SetText(TR("NoUidSelected"));
|
|
return;
|
|
}
|
|
const WString signingKey = m_popupUid->GetSelectedKey();
|
|
const WString keyToSign = m_popupUid->GetKeyToSign();
|
|
int options = m_popupUid->GetCertifyOptions();
|
|
GpgMEWorker gpgWorker;
|
|
GpgME::Error e = gpgWorker.CertifyKey(signingKey.toUTF8().c_str(),
|
|
keyToSign.toUTF8().c_str(),
|
|
uidsToSign, options,
|
|
m_popupUid->GetPassphrase());
|
|
if (e.code() != 0)
|
|
{
|
|
m_owner->m_tmwMessage->SetText(TR("CertificationFailure"));
|
|
m_popupUid->ShowPassphrase(true);
|
|
return;
|
|
}
|
|
m_owner->m_tmwMessage->SetText(TR("CertificationSuccess"));
|
|
m_popupUid->ShowPassphrase(false);
|
|
m_owner->DisplayUids(keyToSign);
|
|
}
|