1
0
mirror of https://git.savannah.gnu.org/git/emacs.git synced 2024-11-21 06:55:39 +00:00
emacs/lisp/net/secrets.el
Po Lu ecf08f0621 Merge from savannah/emacs-29
dc4e6b1329 ; Update copyright years in more files
64b3777631 ; Run set-copyright from admin.el
8e1c56ae46 ; Add 2024 to copyright years

# Conflicts:
#	doc/misc/modus-themes.org
#	doc/misc/texinfo.tex
#	etc/NEWS
#	etc/refcards/ru-refcard.tex
#	etc/themes/modus-operandi-theme.el
#	etc/themes/modus-themes.el
#	etc/themes/modus-vivendi-theme.el
#	lib/alloca.in.h
#	lib/binary-io.h
#	lib/c-ctype.h
#	lib/c-strcasecmp.c
#	lib/c-strncasecmp.c
#	lib/careadlinkat.c
#	lib/cloexec.c
#	lib/close-stream.c
#	lib/diffseq.h
#	lib/dup2.c
#	lib/filemode.h
#	lib/fpending.c
#	lib/fpending.h
#	lib/fsusage.c
#	lib/getgroups.c
#	lib/getloadavg.c
#	lib/gettext.h
#	lib/gettime.c
#	lib/gettimeofday.c
#	lib/group-member.c
#	lib/malloc.c
#	lib/md5-stream.c
#	lib/md5.c
#	lib/md5.h
#	lib/memmem.c
#	lib/memrchr.c
#	lib/nanosleep.c
#	lib/save-cwd.h
#	lib/sha1.c
#	lib/sig2str.c
#	lib/stdlib.in.h
#	lib/strtoimax.c
#	lib/strtol.c
#	lib/strtoll.c
#	lib/time_r.c
#	lib/xalloc-oversized.h
#	lisp/auth-source-pass.el
#	lisp/emacs-lisp/lisp-mnt.el
#	lisp/emacs-lisp/timer.el
#	lisp/info-look.el
#	lisp/jit-lock.el
#	lisp/loadhist.el
#	lisp/mail/rmail.el
#	lisp/net/ntlm.el
#	lisp/net/webjump.el
#	lisp/progmodes/asm-mode.el
#	lisp/progmodes/project.el
#	lisp/progmodes/sh-script.el
#	lisp/textmodes/flyspell.el
#	lisp/textmodes/reftex-toc.el
#	lisp/textmodes/reftex.el
#	lisp/textmodes/tex-mode.el
#	lisp/url/url-gw.el
#	m4/alloca.m4
#	m4/clock_time.m4
#	m4/d-type.m4
#	m4/dirent_h.m4
#	m4/dup2.m4
#	m4/euidaccess.m4
#	m4/fchmodat.m4
#	m4/filemode.m4
#	m4/fsusage.m4
#	m4/getgroups.m4
#	m4/getloadavg.m4
#	m4/getrandom.m4
#	m4/gettime.m4
#	m4/gettimeofday.m4
#	m4/gnulib-common.m4
#	m4/group-member.m4
#	m4/inttypes.m4
#	m4/malloc.m4
#	m4/manywarnings.m4
#	m4/mempcpy.m4
#	m4/memrchr.m4
#	m4/mkostemp.m4
#	m4/mktime.m4
#	m4/nproc.m4
#	m4/nstrftime.m4
#	m4/pathmax.m4
#	m4/pipe2.m4
#	m4/pselect.m4
#	m4/pthread_sigmask.m4
#	m4/readlink.m4
#	m4/realloc.m4
#	m4/sig2str.m4
#	m4/ssize_t.m4
#	m4/stat-time.m4
#	m4/stddef_h.m4
#	m4/stdint.m4
#	m4/stdio_h.m4
#	m4/stdlib_h.m4
#	m4/stpcpy.m4
#	m4/strnlen.m4
#	m4/strtoimax.m4
#	m4/strtoll.m4
#	m4/time_h.m4
#	m4/timegm.m4
#	m4/timer_time.m4
#	m4/timespec.m4
#	m4/unistd_h.m4
#	m4/warnings.m4
#	nt/configure.bat
#	nt/preprep.c
#	test/lisp/register-tests.el
2024-01-02 10:28:14 +08:00

951 lines
35 KiB
EmacsLisp

;;; secrets.el --- Client interface to gnome-keyring and kwallet. -*- lexical-binding: t -*-
;; Copyright (C) 2010-2024 Free Software Foundation, Inc.
;; Author: Michael Albinus <michael.albinus@gmx.de>
;; Keywords: comm password passphrase
;; This file is part of GNU Emacs.
;; GNU Emacs is free software: you can redistribute it and/or modify
;; it under the terms of the GNU General Public License as published by
;; the Free Software Foundation, either version 3 of the License, or
;; (at your option) any later version.
;; GNU Emacs is distributed in the hope that it will be useful,
;; but WITHOUT ANY WARRANTY; without even the implied warranty of
;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
;; GNU General Public License for more details.
;; You should have received a copy of the GNU General Public License
;; along with GNU Emacs. If not, see <https://www.gnu.org/licenses/>.
;;; Commentary:
;; This package provides an implementation of the Secret Service API
;; <https://www.freedesktop.org/wiki/Specifications/secret-storage-spec>.
;; This API is meant to make GNOME-Keyring- and KWallet-like daemons
;; available under a common D-BUS interface and thus increase
;; interoperability between GNOME, KDE and other applications having
;; the need to securely store passwords and other confidential
;; information.
;; In order to activate this package, you must add the following code
;; into your .emacs:
;;
;; (require 'secrets)
;;
;; Afterwards, the variable `secrets-enabled' is non-nil when there is
;; a daemon providing this interface.
;; The atomic objects to be managed by the Secret Service API are
;; secret items, which are something an application wishes to store
;; securely. A good example is a password that an application needs
;; to save and use at a later date.
;; Secret items are grouped in collections. A collection is similar
;; in concept to the terms 'keyring' or 'wallet'. A common collection
;; is called "login". A collection is stored permanently under the
;; user's permissions, and can be accessed in a user session context.
;; A collection can have an alias name. The use case for this is to
;; set the alias "default" for a given collection, making it
;; transparent for clients, which collection is used. Other aliases
;; are not supported (yet). Since an alias is visible to all
;; applications, this setting shall be performed with care.
;; A list of all available collections is available by
;;
;; (secrets-list-collections)
;; => ("session" "login" "ssh keys")
;; The "default" alias could be set to the "login" collection by
;;
;; (secrets-set-alias "login" "default")
;; An alias can also be dereferenced
;;
;; (secrets-get-alias "default")
;; => "login"
;; Collections can be created and deleted. As already said,
;; collections are used by different applications. Therefore, those
;; operations shall also be performed with care. Common collections,
;; like "login", shall not be changed except adding or deleting secret
;; items.
;;
;; (secrets-delete-collection "my collection")
;; (secrets-create-collection "my collection")
;; With GNOME Keyring, there exists a special collection called
;; "session", which has the lifetime of the user being logged in. Its
;; data are not stored on disk and go away when the user logs out.
;; Therefore, it can be used to store and retrieve secret items
;; temporarily. The "session" collection can be addressed either by
;; the string "session", or by nil, whenever a collection parameter is
;; needed.
;; However, other Secret Service provider don't create this temporary
;; "session" collection. You shall check first that this collection
;; exists, before you use it.
;; As already said, a collection is a group of secret items. A secret
;; item has a label, the "secret" (which is a string), and a set of
;; lookup attributes. The attributes can be used to search and
;; retrieve a secret item at a later date.
;; A list of all available secret items of a collection is available by
;;
;; (secrets-list-items "my collection")
;; => ("this item" "another item")
;; Secret items can be added or deleted to a collection. In the
;; following examples, we use the special collection "session".
;;
;; (secrets-delete-item "session" "my item")
;; (secrets-create-item "session" "my item" "geheim"
;; :user "joe" :host "remote-host")
;; The string "geheim" is the secret of the secret item "my item".
;; The secret string can be retrieved from items:
;;
;; (secrets-get-secret "session" "my item")
;; => "geheim"
;; The lookup attributes, which are specified during creation of a
;; secret item, must be a key-value pair. Keys are keyword symbols,
;; starting with a colon; values are strings. They can be retrieved
;; from a given secret item:
;;
;; (secrets-get-attribute "session" "my item" :host)
;; => "remote-host"
;;
;; (secrets-get-attributes "session" "my item")
;; => ((:user . "joe") (:host ."remote-host"))
;; The lookup attributes can be used for searching of items. If you,
;; for example, are looking for all secret items for the user "joe",
;; you would perform
;;
;; (secrets-search-items "session" :user "joe")
;; => ("my item" "another item")
;; Interactively, collections, items and their attributes could be
;; inspected by the command `secrets-show-secrets'.
;;; Code:
;; It has been tested with GNOME Keyring 2.29.92. An implementation
;; for KWallet will be available at
;; svn://anonsvn.kde.org/home/kde/trunk/playground/base/ksecretservice;
;; not tested yet. This package has also been tested with KeePassXC 2.6.6.
;; Pacify byte-compiler. D-Bus support in the Emacs core can be
;; disabled with configuration option "--without-dbus". Declare used
;; subroutines and variables of `dbus' therefore.
(eval-when-compile (require 'cl-lib))
(defvar dbus-debug)
(require 'dbus)
(autoload 'tree-widget-set-theme "tree-widget")
(autoload 'widget-create-child-and-convert "wid-edit")
(autoload 'widget-default-value-set "wid-edit")
(autoload 'widget-field-end "wid-edit")
(autoload 'widget-member "wid-edit")
(defvar tree-widget-after-toggle-functions)
(defvar secrets-enabled nil
"Whether there is a daemon offering the Secret Service API.")
(defvar secrets-debug nil
"Write debug messages.")
(defconst secrets-service "org.freedesktop.secrets"
"The D-Bus name used to talk to Secret Service.")
(defconst secrets-path "/org/freedesktop/secrets"
"The D-Bus root object path used to talk to Secret Service.")
(defconst secrets-empty-path "/"
"The D-Bus object path representing an empty object.")
(defsubst secrets-empty-path (path)
"Check, whether PATH is a valid object path.
It returns t if not."
(or (not (stringp path))
(string-equal path secrets-empty-path)))
(defconst secrets-interface-service "org.freedesktop.Secret.Service"
"The D-Bus interface managing sessions and collections.")
;; <interface name="org.freedesktop.Secret.Service">
;; <property name="Collections" type="ao" access="read"/>
;; <method name="OpenSession">
;; <arg name="algorithm" type="s" direction="in"/>
;; <arg name="input" type="v" direction="in"/>
;; <arg name="output" type="v" direction="out"/>
;; <arg name="result" type="o" direction="out"/>
;; </method>
;; <method name="CreateCollection">
;; <arg name="props" type="a{sv}" direction="in"/>
;; <arg name="alias" type="s" direction="in"/> ;; Added 2011/3/1
;; <arg name="collection" type="o" direction="out"/>
;; <arg name="prompt" type="o" direction="out"/>
;; </method>
;; <method name="SearchItems">
;; <arg name="attributes" type="a{ss}" direction="in"/>
;; <arg name="unlocked" type="ao" direction="out"/>
;; <arg name="locked" type="ao" direction="out"/>
;; </method>
;; <method name="Unlock">
;; <arg name="objects" type="ao" direction="in"/>
;; <arg name="unlocked" type="ao" direction="out"/>
;; <arg name="prompt" type="o" direction="out"/>
;; </method>
;; <method name="Lock">
;; <arg name="objects" type="ao" direction="in"/>
;; <arg name="locked" type="ao" direction="out"/>
;; <arg name="Prompt" type="o" direction="out"/>
;; </method>
;; <method name="GetSecrets">
;; <arg name="items" type="ao" direction="in"/>
;; <arg name="session" type="o" direction="in"/>
;; <arg name="secrets" type="a{o(oayays)}" direction="out"/>
;; </method>
;; <method name="ReadAlias">
;; <arg name="name" type="s" direction="in"/>
;; <arg name="collection" type="o" direction="out"/>
;; </method>
;; <method name="SetAlias">
;; <arg name="name" type="s" direction="in"/>
;; <arg name="collection" type="o" direction="in"/>
;; </method>
;; <signal name="CollectionCreated">
;; <arg name="collection" type="o"/>
;; </signal>
;; <signal name="CollectionDeleted">
;; <arg name="collection" type="o"/>
;; </signal>
;; </interface>
(defconst secrets-interface-collection "org.freedesktop.Secret.Collection"
"A collection of items containing secrets.")
;; <interface name="org.freedesktop.Secret.Collection">
;; <property name="Items" type="ao" access="read"/>
;; <property name="Label" type="s" access="readwrite"/>
;; <property name="Locked" type="b" access="read"/>
;; <property name="Created" type="t" access="read"/>
;; <property name="Modified" type="t" access="read"/>
;; <method name="Delete">
;; <arg name="prompt" type="o" direction="out"/>
;; </method>
;; <method name="SearchItems">
;; <arg name="attributes" type="a{ss}" direction="in"/>
;; <arg name="results" type="ao" direction="out"/>
;; </method>
;; <method name="CreateItem">
;; <arg name="props" type="a{sv}" direction="in"/>
;; <arg name="secret" type="(oayays)" direction="in"/>
;; <arg name="replace" type="b" direction="in"/>
;; <arg name="item" type="o" direction="out"/>
;; <arg name="prompt" type="o" direction="out"/>
;; </method>
;; <signal name="ItemCreated">
;; <arg name="item" type="o"/>
;; </signal>
;; <signal name="ItemDeleted">
;; <arg name="item" type="o"/>
;; </signal>
;; <signal name="ItemChanged">
;; <arg name="item" type="o"/>
;; </signal>
;; </interface>
;; This exist only for GNOME Keyring.
(defconst secrets-session-collection-path
"/org/freedesktop/secrets/collection/session"
"The D-Bus temporary session collection object path.")
(defconst secrets-interface-prompt "org.freedesktop.Secret.Prompt"
"A session tracks state between the service and a client application.")
;; <interface name="org.freedesktop.Secret.Prompt">
;; <method name="Prompt">
;; <arg name="window-id" type="s" direction="in"/>
;; </method>
;; <method name="Dismiss"></method>
;; <signal name="Completed">
;; <arg name="dismissed" type="b"/>
;; <arg name="result" type="v"/>
;; </signal>
;; </interface>
(defconst secrets-interface-item "org.freedesktop.Secret.Item"
"A collection of items containing secrets.")
;; <interface name="org.freedesktop.Secret.Item">
;; <property name="Locked" type="b" access="read"/>
;; <property name="Attributes" type="a{ss}" access="readwrite"/>
;; <property name="Label" type="s" access="readwrite"/>
;; <property name="Created" type="t" access="read"/>
;; <property name="Modified" type="t" access="read"/>
;; <method name="Delete">
;; <arg name="prompt" type="o" direction="out"/>
;; </method>
;; <method name="GetSecret">
;; <arg name="session" type="o" direction="in"/>
;; <arg name="secret" type="(oayays)" direction="out"/>
;; </method>
;; <method name="SetSecret">
;; <arg name="secret" type="(oayays)" direction="in"/>
;; </method>
;; </interface>
;;
;; STRUCT secret
;; OBJECT PATH session
;; ARRAY BYTE parameters
;; ARRAY BYTE value
;; STRING content_type ;; Added 2011/2/9
(defconst secrets-interface-item-type-generic "org.freedesktop.Secret.Generic"
"The default item type we are using.")
(defconst secrets-struct-secret-content-type "text/plain"
"The content_type of a secret struct.")
(defconst secrets-interface-session "org.freedesktop.Secret.Session"
"A session tracks state between the service and a client application.")
;; <interface name="org.freedesktop.Secret.Session">
;; <method name="Close"></method>
;; </interface>
;;; Sessions.
(defvar secrets-session-path secrets-empty-path
"The D-Bus session path of the active session.
A session path `secrets-empty-path' indicates there is no open session.")
(defun secrets-close-session ()
"Close the secret service session, if any."
(dbus-ignore-errors
(dbus-call-method
:session secrets-service secrets-session-path
secrets-interface-session "Close"))
(setq secrets-session-path secrets-empty-path))
(defun secrets-open-session (&optional reopen)
"Open a new session with \"plain\" algorithm.
If there exists another active session, and REOPEN is nil, that
session will be used. The object path of the session will be
returned, and it will be stored in `secrets-session-path'."
(when reopen (secrets-close-session))
(when (secrets-empty-path secrets-session-path)
(setq secrets-session-path
(cadr
(dbus-call-method
:session secrets-service secrets-path
secrets-interface-service "OpenSession" "plain" '(:variant "")))))
(when secrets-debug
(message "Secret Service session: %s" secrets-session-path))
secrets-session-path)
;;; Prompts.
(defvar secrets-prompt-signal nil
"Internal variable to catch signals from `secrets-interface-prompt'.")
(defun secrets-prompt (prompt)
"Handle the prompt identified by object path PROMPT."
(unless (secrets-empty-path prompt)
(let ((object
(dbus-register-signal
:session secrets-service prompt
secrets-interface-prompt "Completed" 'secrets-prompt-handler)))
(dbus-call-method
:session secrets-service prompt
secrets-interface-prompt "Prompt" (frame-parameter nil 'window-id))
(unwind-protect
(progn
;; Wait until the returned prompt signal has put the
;; result into `secrets-prompt-signal'.
(while (null secrets-prompt-signal)
(read-event nil nil 0.1))
;; Return the object(s). It is a variant, so we must use a car.
(car secrets-prompt-signal))
;; Cleanup.
(setq secrets-prompt-signal nil)
(dbus-unregister-object object)))))
(defun secrets-prompt-handler (&rest args)
"Handler for signals emitted by `secrets-interface-prompt'."
;; An empty object path is always identified as `secrets-empty-path'
;; or nil. Either we set it explicitly, or it is returned by the
;; "Completed" signal.
(if (car args) ;; dismissed
(setq secrets-prompt-signal (list secrets-empty-path))
(setq secrets-prompt-signal (cadr args))))
;;; Collections.
(defvar secrets-collection-paths nil
"Cached D-Bus object paths of available collections.")
(defun secrets-collection-handler (&rest args)
"Handler for signals emitted by `secrets-interface-service'."
(cond
((string-equal (dbus-event-member-name last-input-event) "CollectionCreated")
(cl-pushnew (car args) secrets-collection-paths))
((string-equal (dbus-event-member-name last-input-event) "CollectionDeleted")
(setq secrets-collection-paths
(delete (car args) secrets-collection-paths)))))
(defun secrets-get-collections ()
"Return the object paths of all available collections."
(setq secrets-collection-paths
(or secrets-collection-paths
(dbus-get-property
:session secrets-service secrets-path
secrets-interface-service "Collections"))))
(defun secrets-get-collection-properties (collection-path)
"Return all properties of collection identified by COLLECTION-PATH."
(unless (secrets-empty-path collection-path)
(dbus-get-all-properties
:session secrets-service collection-path
secrets-interface-collection)))
(defun secrets-get-collection-property (collection-path property)
"Return property PROPERTY of collection identified by COLLECTION-PATH."
(unless (or (secrets-empty-path collection-path) (not (stringp property)))
(dbus-get-property
:session secrets-service collection-path
secrets-interface-collection property)))
(defun secrets-list-collections ()
"Return a list of collection names."
(mapcar
(lambda (collection-path)
(if (string-equal collection-path secrets-session-collection-path)
"session"
(secrets-get-collection-property collection-path "Label")))
(secrets-get-collections)))
(defun secrets-collection-path (collection)
"Return the object path of collection labeled COLLECTION.
If COLLECTION is nil, return the session collection path.
If there is no such COLLECTION, return nil."
(or
;; The "session" collection.
(if (or (null collection) (string-equal "session" collection))
secrets-session-collection-path)
;; Check for an alias.
(let ((collection-path
(dbus-call-method
:session secrets-service secrets-path
secrets-interface-service "ReadAlias" collection)))
(unless (secrets-empty-path collection-path)
collection-path))
;; Check the collections.
(catch 'collection-found
(dolist (collection-path (secrets-get-collections) nil)
(when (string-equal
collection
(secrets-get-collection-property collection-path "Label"))
(throw 'collection-found collection-path))))))
(defun secrets-create-collection (collection &optional alias)
"Create collection labeled COLLECTION if it doesn't exist.
Set ALIAS as alias of the collection. Return the D-Bus object
path for collection."
(let ((collection-path (secrets-collection-path collection)))
;; Create the collection.
(when (secrets-empty-path collection-path)
(setq collection-path
(secrets-prompt
(cadr
;; "CreateCollection" returns the prompt path as second arg.
(dbus-call-method
:session secrets-service secrets-path
secrets-interface-service "CreateCollection"
`(:array
(:dict-entry ,(concat secrets-interface-collection ".Label")
(:variant ,collection)))
(or alias ""))))))
;; Return object path of the collection.
collection-path))
(defun secrets-get-alias (alias)
"Return the collection name ALIAS is referencing to.
For the time being, only the alias \"default\" is supported."
(secrets-get-collection-property
(dbus-call-method
:session secrets-service secrets-path
secrets-interface-service "ReadAlias" alias)
"Label"))
(defun secrets-set-alias (collection alias)
"Set ALIAS as alias of collection labeled COLLECTION.
For the time being, only the alias \"default\" is supported."
(let ((collection-path (secrets-collection-path collection)))
(unless (secrets-empty-path collection-path)
(dbus-call-method
:session secrets-service secrets-path
secrets-interface-service "SetAlias"
alias :object-path collection-path))))
(defun secrets-delete-alias (alias)
"Delete ALIAS, referencing to a collection."
(dbus-call-method
:session secrets-service secrets-path
secrets-interface-service "SetAlias"
alias :object-path secrets-empty-path))
(defun secrets-lock-collection (collection)
"Lock collection labeled COLLECTION.
If successful, return the object path of the collection."
(let ((collection-path (secrets-collection-path collection)))
(unless (secrets-empty-path collection-path)
(secrets-prompt
(cadr
(dbus-call-method
:session secrets-service secrets-path secrets-interface-service
"Lock" `(:array :object-path ,collection-path)))))
collection-path))
(defun secrets-unlock-collection (collection)
"Unlock collection labeled COLLECTION.
If successful, return the object path of the collection."
(let ((collection-path (secrets-collection-path collection)))
(unless (secrets-empty-path collection-path)
(secrets-prompt
(cadr
(dbus-call-method
:session secrets-service secrets-path secrets-interface-service
"Unlock" `(:array :object-path ,collection-path)))))
collection-path))
(defun secrets-delete-collection (collection)
"Delete collection labeled COLLECTION."
(let ((collection-path (secrets-collection-path collection)))
(unless (secrets-empty-path collection-path)
(secrets-prompt
(dbus-call-method
:session secrets-service collection-path
secrets-interface-collection "Delete")))))
;;; Items.
(defun secrets-get-items (collection-path)
"Return the object paths of all available items in COLLECTION-PATH."
(unless (secrets-empty-path collection-path)
(dbus-get-property
:session secrets-service collection-path
secrets-interface-collection "Items")))
(defun secrets-get-item-properties (item-path)
"Return all properties of item identified by ITEM-PATH."
(unless (secrets-empty-path item-path)
(dbus-get-all-properties
:session secrets-service item-path
secrets-interface-item)))
(defun secrets-get-item-property (item-path property)
"Return property PROPERTY of item identified by ITEM-PATH."
(unless (or (secrets-empty-path item-path) (not (stringp property)))
(dbus-get-property
:session secrets-service item-path
secrets-interface-item property)))
(defun secrets-list-items (collection)
"Return a list of all item labels of COLLECTION."
(let ((collection-path (secrets-unlock-collection collection)))
(unless (secrets-empty-path collection-path)
(mapcar
(lambda (item-path)
(secrets-get-item-property item-path "Label"))
(secrets-get-items collection-path)))))
(defun secrets-search-item-paths (collection &rest attributes)
"Search items in COLLECTION with ATTRIBUTES.
ATTRIBUTES are key-value pairs. The keys are keyword symbols,
starting with a colon. Example:
(secrets-search-item-paths \"Tramp collection\" :user \"joe\")
The object paths of the found items are returned as list."
(let ((collection-path (secrets-unlock-collection collection))
props)
(unless (secrets-empty-path collection-path)
;; Create attributes list.
(while (consp (cdr attributes))
(unless (keywordp (car attributes))
(error 'wrong-type-argument (car attributes)))
(unless (stringp (cadr attributes))
(error 'wrong-type-argument (cadr attributes)))
(setq props (append
props
`((:dict-entry
,(substring (symbol-name (car attributes)) 1)
,(cadr attributes))))
attributes (cddr attributes)))
;; Search. The result is a list of object paths.
(dbus-call-method
:session secrets-service collection-path
secrets-interface-collection "SearchItems"
(if props
(cons :array props)
'(:array :signature "{ss}"))))))
(defun secrets-search-items (collection &rest attributes)
"Search items in COLLECTION with ATTRIBUTES.
ATTRIBUTES are key-value pairs. The keys are keyword symbols,
starting with a colon. Example:
(secrets-search-items \"Tramp collection\" :user \"joe\")
The object labels of the found items are returned as list."
(mapcar
(lambda (item-path) (secrets-get-item-property item-path "Label"))
(apply #'secrets-search-item-paths collection attributes)))
(defun secrets-create-item (collection item password &rest attributes)
"Create a new item in COLLECTION with label ITEM and password PASSWORD.
The label ITEM does not have to be unique in COLLECTION.
ATTRIBUTES are key-value pairs set for the created item. The
keys are keyword symbols, starting with a colon. Example:
(secrets-create-item \"Tramp collection\" \"item\" \"geheim\"
:method \"sudo\" :user \"joe\" :host \"remote-host\")
The key `:xdg:schema' determines the scope of the item to be
generated, i.e. for which applications the item is intended for.
This is just a string like \"org.freedesktop.NetworkManager.Mobile\"
or \"org.gnome.OnlineAccounts\", the other required keys are
determined by this. If no `:xdg:schema' is given,
\"org.freedesktop.Secret.Generic\" is used by default.
The object path of the created item is returned."
(let ((collection-path (secrets-unlock-collection collection))
result props)
(unless (secrets-empty-path collection-path)
;; Set default type if needed.
(unless (member :xdg:schema attributes)
(setq attributes
(append
attributes `(:xdg:schema ,secrets-interface-item-type-generic))))
;; Create attributes list.
(while (consp (cdr attributes))
(unless (keywordp (car attributes))
(error 'wrong-type-argument (car attributes)))
(unless (stringp (cadr attributes))
(error 'wrong-type-argument (cadr attributes)))
(setq props (append
props
`((:dict-entry
,(substring (symbol-name (car attributes)) 1)
,(cadr attributes))))
attributes (cddr attributes)))
;; Create the item.
(setq result
(dbus-call-method
:session secrets-service collection-path
secrets-interface-collection "CreateItem"
;; Properties.
(append
`(:array
(:dict-entry ,(concat secrets-interface-item ".Label")
(:variant ,item)))
(when props
`((:dict-entry ,(concat secrets-interface-item ".Attributes")
(:variant ,(append '(:array) props))))))
;; Secret.
`(:struct :object-path ,secrets-session-path
(:array :signature "y") ;; No parameters.
,(dbus-string-to-byte-array password)
,secrets-struct-secret-content-type)
;; Do not replace. Replace does not seem to work.
nil))
(secrets-prompt (cadr result))
;; Return the object path.
(car result))))
(defun secrets-item-path (collection item)
"Return the object path of item labeled ITEM in COLLECTION.
If there are several items labeled ITEM, it is undefined which
one is returned. If there is no such item, return nil.
ITEM can also be an object path, which is returned if contained in COLLECTION."
(let ((collection-path (secrets-unlock-collection collection)))
(or (and (member item (secrets-get-items collection-path)) item)
(catch 'item-found
(dolist (item-path (secrets-get-items collection-path))
(when (string-equal
item (secrets-get-item-property item-path "Label"))
(throw 'item-found item-path)))))))
(defun secrets-lock-item (collection item)
"Lock collection item labeled ITEM in COLLECTION.
If successful, return the object path of the item. Does not lock
the collection."
(let ((item-path (secrets-item-path collection item)))
(unless (secrets-empty-path item-path)
(secrets-prompt
(cadr
(dbus-call-method
:session secrets-service secrets-path secrets-interface-service
"Lock" `(:array :object-path ,item-path)))))
item-path))
(defun secrets-unlock-item (collection item)
"Unlock item labeled ITEM from collection labeled COLLECTION.
If successful, return the object path of the item."
(let ((item-path (secrets-item-path collection item)))
(unless (secrets-empty-path item-path)
(secrets-prompt
(cadr
(dbus-call-method
:session secrets-service secrets-path secrets-interface-service
"Unlock" `(:array :object-path ,item-path)))))
item-path))
(defun secrets-get-secret (collection item)
"Return the secret of item labeled ITEM in COLLECTION.
If there are several items labeled ITEM, it is undefined which
one is returned. If there is no such item, return nil.
ITEM can also be an object path, which is used if contained in COLLECTION."
(let ((item-path (secrets-unlock-item collection item)))
(unless (secrets-empty-path item-path)
(dbus-byte-array-to-string
(nth 2
(dbus-call-method
:session secrets-service item-path secrets-interface-item
"GetSecret" :object-path secrets-session-path))))))
(defun secrets-get-attributes (collection item)
"Return the lookup attributes of item labeled ITEM in COLLECTION.
If there are several items labeled ITEM, it is undefined which
one is returned. If there is no such item, or the item has no
attributes, return nil.
ITEM can also be an object path, which is used if contained in COLLECTION."
(let ((item-path (secrets-item-path collection item)))
(unless (secrets-empty-path item-path)
(mapcar
(lambda (attribute)
(cons (intern (concat ":" (car attribute))) (cadr attribute)))
(dbus-get-property
:session secrets-service item-path
secrets-interface-item "Attributes")))))
(defun secrets-get-attribute (collection item attribute)
"Return the value of ATTRIBUTE of item labeled ITEM in COLLECTION.
If there are several items labeled ITEM, it is undefined which
one is returned. If there is no such item, or the item doesn't
own this attribute, return nil.
ITEM can also be an object path, which is used if contained in COLLECTION."
(cdr (assoc attribute (secrets-get-attributes collection item))))
(defun secrets-delete-item (collection item)
"Delete item labeled ITEM in COLLECTION.
If there are several items labeled ITEM, it is undefined which
one is deleted.
ITEM can also be an object path, which is used if contained in COLLECTION."
(let ((item-path (secrets-item-path collection item)))
(unless (secrets-empty-path item-path)
(secrets-prompt
(dbus-call-method
:session secrets-service item-path
secrets-interface-item "Delete")))))
;;; Visualization.
(defvar-keymap secrets-mode-map
:doc "Keymap used in `secrets-mode' buffers."
:parent (make-composed-keymap special-mode-map
widget-keymap)
"n" #'next-line
"p" #'previous-line
"z" #'kill-current-buffer)
(define-derived-mode secrets-mode special-mode "Secrets"
"Major mode for presenting password entries retrieved by Security Service.
In this mode, widgets represent the search results.
\\{secrets-mode-map}"
(setq buffer-undo-list t)
(setq-local revert-buffer-function
#'secrets-show-collections)
;; When we toggle, we must set temporary widgets.
(add-hook 'tree-widget-after-toggle-functions
#'secrets-tree-widget-after-toggle-function nil t))
;; It doesn't make sense to call it interactively.
(put 'secrets-mode 'disabled t)
;; We autoload `secrets-show-secrets' only on systems with D-Bus support.
;;;###autoload(when (featurep 'dbusbind)
;;;###autoload (autoload 'secrets-show-secrets "secrets" nil t))
(defun secrets-show-secrets ()
"Display a list of collections from the Secret Service API.
The collections are in tree view, that means they can be expanded
to the corresponding secret items, which could also be expanded
to their attributes."
(interactive)
;; Check, whether the Secret Service API is enabled.
(if (null secrets-enabled)
(message "Secret Service not available")
;; Create the search buffer.
(with-current-buffer (get-buffer-create "*Secrets*")
(switch-to-buffer-other-window (current-buffer))
;; Initialize buffer with `secrets-mode'.
(secrets-mode)
(secrets-show-collections))))
(defun secrets-show-collections (&optional _ignore _noconfirm)
"Show all available collections."
(let ((inhibit-read-only t))
(erase-buffer)
(tree-widget-set-theme "folder")
(dolist (coll (secrets-list-collections))
(widget-create
`(tree-widget
:tag ,coll
:collection ,coll
:open nil
:sample-face bold
:expander secrets-expand-collection)))))
(defun secrets-expand-collection (widget)
"Expand items of collection shown as WIDGET."
(let ((coll (widget-get widget :collection)))
(mapcar
(lambda (item)
`(tree-widget
:tag ,item
:collection ,coll
:item ,item
:open nil
:sample-face bold
:expander secrets-expand-item))
(secrets-list-items coll))))
(defun secrets-expand-item (widget)
"Expand password and attributes of item shown as WIDGET."
(let* ((coll (widget-get widget :collection))
(item (widget-get widget :item))
(attributes (secrets-get-attributes coll item))
;; padding is needed to format attribute names.
(padding
(apply
#'max
(cons
(1+ (length "password"))
(mapcar
;; Attribute names have a leading ":", which will be suppressed.
(lambda (attribute) (length (symbol-name (car attribute))))
attributes)))))
(cons
;; The password widget.
`(editable-field :tag "password"
:secret ?*
:value ,(secrets-get-secret coll item)
:sample-face widget-button-pressed
;; We specify :size in order to limit the field.
:size 0
:format ,(concat
"%{%t%}:"
(make-string (- padding (length "password")) ? )
"%v\n"))
(mapcar
(lambda (attribute)
(let ((name (substring (symbol-name (car attribute)) 1))
(value (cdr attribute)))
;; The attribute widget.
`(editable-field :tag ,name
:value ,value
:sample-face widget-documentation
;; We specify :size in order to limit the field.
:size 0
:format ,(concat
"%{%t%}:"
(make-string (- padding (length name)) ? )
"%v\n"))))
attributes))))
(defun secrets-tree-widget-after-toggle-function (widget &rest _ignore)
"Add a temporary widget to show the password."
(dolist (child (widget-get widget :children))
(when (widget-member child :secret)
(goto-char (widget-field-end child))
(widget-insert " ")
(widget-create-child-and-convert
child 'push-button
:notify 'secrets-tree-widget-show-password
"Show password")))
(widget-setup))
(defun secrets-tree-widget-show-password (widget &rest _ignore)
"Show password, and remove temporary widget."
(let ((parent (widget-get widget :parent)))
(widget-put parent :secret nil)
(widget-default-value-set parent (widget-get parent :value))
(widget-setup)))
;;; Initialization.
(when (dbus-ping :session secrets-service 100)
(secrets-open-session)
;; We must reset all variables, when there is a new instance of the
;; "org.freedesktop.secrets" service.
(dbus-register-signal
:session dbus-service-dbus dbus-path-dbus
dbus-interface-dbus "NameOwnerChanged"
(lambda (&rest args)
(when secrets-debug (message "Secret Service has changed: %S" args))
(setq secrets-session-path secrets-empty-path
secrets-prompt-signal nil
secrets-collection-paths nil))
secrets-service)
;; We want to refresh our cache, when there is a change in
;; collections.
(dbus-register-signal
:session secrets-service secrets-path
secrets-interface-service "CollectionCreated"
'secrets-collection-handler)
(dbus-register-signal
:session secrets-service secrets-path
secrets-interface-service "CollectionDeleted"
'secrets-collection-handler)
;; We shall inform, that the secret service is enabled on this
;; machine.
(setq secrets-enabled t))
(provide 'secrets)
;;; TODO:
;; * secrets-debug should be structured like auth-source-debug to
;; prevent leaking sensitive information. Right now I don't see
;; anything sensitive though.
;; * Check, whether the dh-ietf1024-aes128-cbc-pkcs7 algorithm can be
;; used for the transfer of the secrets. Currently, we use the
;; plain algorithm.
;;; secrets.el ends here