mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
943 lines
31 KiB
JavaScript
943 lines
31 KiB
JavaScript
/* ***** BEGIN LICENSE BLOCK *****
|
|
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
|
|
*
|
|
* The contents of this file are subject to the Mozilla Public License Version
|
|
* 1.1 (the "License"); you may not use this file except in compliance with
|
|
* the License. You may obtain a copy of the License at
|
|
* http://www.mozilla.org/MPL/
|
|
*
|
|
* Software distributed under the License is distributed on an "AS IS" basis,
|
|
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
|
* for the specific language governing rights and limitations under the
|
|
* License.
|
|
*
|
|
* The Original Code is Bookmarks Sync.
|
|
*
|
|
* The Initial Developer of the Original Code is Mozilla.
|
|
* Portions created by the Initial Developer are Copyright (C) 2007
|
|
* the Initial Developer. All Rights Reserved.
|
|
*
|
|
* Contributor(s):
|
|
* Dan Mills <thunder@mozilla.com>
|
|
*
|
|
* Alternatively, the contents of this file may be used under the terms of
|
|
* either the GNU General Public License Version 2 or later (the "GPL"), or
|
|
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
|
|
* in which case the provisions of the GPL or the LGPL are applicable instead
|
|
* of those above. If you wish to allow use of your version of this file only
|
|
* under the terms of either the GPL or the LGPL, and not to allow others to
|
|
* use your version of this file under the terms of the MPL, indicate your
|
|
* decision by deleting the provisions above and replace them with the notice
|
|
* and other provisions required by the GPL or the LGPL. If you do not delete
|
|
* the provisions above, a recipient may use your version of this file under
|
|
* the terms of any one of the MPL, the GPL or the LGPL.
|
|
*
|
|
* ***** END LICENSE BLOCK ***** */
|
|
|
|
const EXPORTED_SYMBOLS = ['Engine', 'BookmarksEngine', 'HistoryEngine', 'CookieEngine'];
|
|
|
|
const Cc = Components.classes;
|
|
const Ci = Components.interfaces;
|
|
const Cr = Components.results;
|
|
const Cu = Components.utils;
|
|
|
|
Cu.import("resource://gre/modules/XPCOMUtils.jsm");
|
|
Cu.import("resource://weave/log4moz.js");
|
|
Cu.import("resource://weave/constants.js");
|
|
Cu.import("resource://weave/util.js");
|
|
Cu.import("resource://weave/crypto.js");
|
|
Cu.import("resource://weave/dav.js");
|
|
Cu.import("resource://weave/identity.js");
|
|
Cu.import("resource://weave/stores.js");
|
|
Cu.import("resource://weave/syncCores.js");
|
|
Cu.import("resource://weave/async.js");
|
|
|
|
Function.prototype.async = Async.sugar;
|
|
|
|
function Engine(davCollection, pbeId) {
|
|
//this._init(davCollection, pbeId);
|
|
}
|
|
Engine.prototype = {
|
|
// "default-engine";
|
|
get name() { throw "name property must be overridden in subclasses"; },
|
|
|
|
// "DefaultEngine";
|
|
get logName() { throw "logName property must be overridden in subclasses"; },
|
|
|
|
// "user-data/default-engine/";
|
|
get serverPrefix() { throw "serverPrefix property must be overridden in subclasses"; },
|
|
|
|
// These can be overridden in subclasses, but don't need to be (assuming
|
|
// serverPrefix is not shared with anything else)
|
|
get statusFile() { return this.serverPrefix + "status.json"; },
|
|
get keysFile() { return this.serverPrefix + "keys.json"; },
|
|
get snapshotFile() { return this.serverPrefix + "snapshot.json"; },
|
|
get deltasFile() { return this.serverPrefix + "deltas.json"; },
|
|
|
|
__os: null,
|
|
get _os() {
|
|
if (!this.__os)
|
|
this.__os = Cc["@mozilla.org/observer-service;1"]
|
|
.getService(Ci.nsIObserverService);
|
|
return this.__os;
|
|
},
|
|
|
|
__json: null,
|
|
get _json() {
|
|
if (!this.__json)
|
|
this.__json = Cc["@mozilla.org/dom/json;1"].
|
|
createInstance(Ci.nsIJSON);
|
|
return this.__json;
|
|
},
|
|
|
|
// _core, and _store need to be overridden in subclasses
|
|
__core: null,
|
|
get _core() {
|
|
if (!this.__core)
|
|
this.__core = new SyncCore();
|
|
return this.__core;
|
|
},
|
|
|
|
__store: null,
|
|
get _store() {
|
|
if (!this.__store)
|
|
this.__store = new Store();
|
|
return this.__store;
|
|
},
|
|
|
|
__snapshot: null,
|
|
get _snapshot() {
|
|
if (!this.__snapshot)
|
|
this.__snapshot = new SnapshotStore(this.name);
|
|
return this.__snapshot;
|
|
},
|
|
set _snapshot(value) {
|
|
this.__snapshot = value;
|
|
},
|
|
|
|
_init: function Engine__init(davCollection, pbeId) {
|
|
this._pbeId = pbeId;
|
|
this._engineId = new Identity(pbeId.realm + " - " + this.logName,
|
|
pbeId.username);
|
|
this._log = Log4Moz.Service.getLogger("Service." + this.logName);
|
|
this._log.level =
|
|
Log4Moz.Level[Utils.prefs.getCharPref("log.logger.service.engine")];
|
|
this._osPrefix = "weave:" + this.name + ":";
|
|
this._snapshot.load();
|
|
},
|
|
|
|
_getSymKey: function Engine__getSymKey() {
|
|
let self = yield;
|
|
|
|
DAV.GET(this.keysFile, self.cb);
|
|
let keysResp = yield;
|
|
Utils.ensureStatus(keysResp.status,
|
|
"Could not get keys file.", [[200,300]]);
|
|
let keys = this._json.decode(keysResp.responseText);
|
|
|
|
if (!keys || !keys.ring || !keys.ring[this._engineId.userHash])
|
|
throw "Keyring does not contain a key for this user";
|
|
|
|
Crypto.RSAdecrypt.async(Crypto, self.cb,
|
|
keys.ring[this._engineId.userHash], this._pbeId);
|
|
let symkey = yield;
|
|
this._engineId.setTempPassword(symkey);
|
|
|
|
self.done(true);
|
|
},
|
|
|
|
_serializeCommands: function Engine__serializeCommands(commands) {
|
|
let json = this._json.encode(commands);
|
|
//json = json.replace(/ {action/g, "\n {action");
|
|
return json;
|
|
},
|
|
|
|
_serializeConflicts: function Engine__serializeConflicts(conflicts) {
|
|
let json = this._json.encode(conflicts);
|
|
//json = json.replace(/ {action/g, "\n {action");
|
|
return json;
|
|
},
|
|
|
|
_resetServer: function Engine__resetServer() {
|
|
let self = yield;
|
|
let done = false;
|
|
|
|
try {
|
|
this._log.debug("Resetting server data");
|
|
this._os.notifyObservers(null, this._osPrefix + "reset-server:start", "");
|
|
|
|
// try to delete all 3, check status after
|
|
DAV.DELETE(this.statusFile, self.cb);
|
|
let statusResp = yield;
|
|
DAV.DELETE(this.snapshotFile, self.cb);
|
|
let snapshotResp = yield;
|
|
DAV.DELETE(this.deltasFile, self.cb);
|
|
let deltasResp = yield;
|
|
|
|
Utils.ensureStatus(statusResp.status,
|
|
"Could not delete status file.", [[200,300],404]);
|
|
Utils.ensureStatus(snapshotResp.status,
|
|
"Could not delete snapshot file.", [[200,300],404]);
|
|
Utils.ensureStatus(deltasResp.status,
|
|
"Could not delete deltas file.", [[200,300],404]);
|
|
|
|
this._log.debug("Server files deleted");
|
|
done = true;
|
|
this._os.notifyObservers(null, this._osPrefix + "reset-server:success", "");
|
|
|
|
} catch (e) {
|
|
this._log.error("Could not delete server files");
|
|
this._os.notifyObservers(null, this._osPrefix + "reset-server:error", "");
|
|
throw e;
|
|
}
|
|
|
|
self.done(done)
|
|
},
|
|
|
|
_resetClient: function Engine__resetClient() {
|
|
let self = yield;
|
|
let done = false;
|
|
|
|
try {
|
|
this._log.debug("Resetting client state");
|
|
this._os.notifyObservers(null, this._osPrefix + "reset-client:start", "");
|
|
|
|
this._snapshot.wipe();
|
|
this._store.wipe();
|
|
done = true;
|
|
|
|
} catch (e) {
|
|
throw e;
|
|
|
|
} finally {
|
|
if (done) {
|
|
this._log.debug("Client reset completed successfully");
|
|
this._os.notifyObservers(null, this._osPrefix + "reset-client:success", "");
|
|
} else {
|
|
this._log.debug("Client reset failed");
|
|
this._os.notifyObservers(null, this._osPrefix + "reset-client:error", "");
|
|
}
|
|
self.done(done);
|
|
}
|
|
},
|
|
|
|
// original
|
|
// / \
|
|
// A / \ B
|
|
// / \
|
|
// client --C-> server
|
|
// \ /
|
|
// D \ / C
|
|
// \ /
|
|
// final
|
|
|
|
// If we have a saved snapshot, original == snapshot. Otherwise,
|
|
// it's the empty set {}.
|
|
|
|
// C is really the diff between server -> final, so if we determine
|
|
// D we can calculate C from that. In the case where A and B have
|
|
// no conflicts, C == A and D == B.
|
|
|
|
// Sync flow:
|
|
// 1) Fetch server deltas
|
|
// 1.1) Construct current server status from snapshot + server deltas
|
|
// 1.2) Generate single delta from snapshot -> current server status ("B")
|
|
// 2) Generate local deltas from snapshot -> current client status ("A")
|
|
// 3) Reconcile client/server deltas and generate new deltas for them.
|
|
// Reconciliation won't generate C directly, we will simply diff
|
|
// server->final after step 3.1.
|
|
// 3.1) Apply local delta with server changes ("D")
|
|
// 3.2) Append server delta to the delta file and upload ("C")
|
|
|
|
_sync: function BmkEngine__sync() {
|
|
let self = yield;
|
|
|
|
this._log.info("Beginning sync");
|
|
|
|
// Before we get started, make sure we have a remote directory to play in
|
|
DAV.MKCOL(this.serverPrefix, self.cb);
|
|
let ret = yield;
|
|
if (!ret)
|
|
throw "Could not create remote folder";
|
|
|
|
// 1) Fetch server deltas
|
|
this._getServerData.async(this, self.cb);
|
|
let server = yield;
|
|
|
|
this._log.info("Local snapshot version: " + this._snapshot.version);
|
|
this._log.info("Server status: " + server.status);
|
|
this._log.info("Server maxVersion: " + server.maxVersion);
|
|
this._log.info("Server snapVersion: " + server.snapVersion);
|
|
|
|
if (server.status != 0) {
|
|
this._log.fatal("Sync error: could not get server status, " +
|
|
"or initial upload failed. Aborting sync.");
|
|
return;
|
|
}
|
|
|
|
// 2) Generate local deltas from snapshot -> current client status
|
|
|
|
let localJson = new SnapshotStore();
|
|
localJson.data = this._store.wrap();
|
|
this._core.detectUpdates(self.cb, this._snapshot.data, localJson.data);
|
|
let localUpdates = yield;
|
|
|
|
this._log.trace("local json:\n" + localJson.serialize());
|
|
this._log.trace("Local updates: " + this._serializeCommands(localUpdates));
|
|
this._log.trace("Server updates: " + this._serializeCommands(server.updates));
|
|
|
|
if (server.updates.length == 0 && localUpdates.length == 0) {
|
|
this._snapshot.version = server.maxVersion;
|
|
this._log.info("Sync complete: no changes needed on client or server");
|
|
self.done(true);
|
|
return;
|
|
}
|
|
|
|
// 3) Reconcile client/server deltas and generate new deltas for them.
|
|
|
|
this._log.info("Reconciling client/server updates");
|
|
this._core.reconcile(self.cb, localUpdates, server.updates);
|
|
ret = yield;
|
|
|
|
let clientChanges = ret.propagations[0];
|
|
let serverChanges = ret.propagations[1];
|
|
let clientConflicts = ret.conflicts[0];
|
|
let serverConflicts = ret.conflicts[1];
|
|
|
|
this._log.info("Changes for client: " + clientChanges.length);
|
|
this._log.info("Predicted changes for server: " + serverChanges.length);
|
|
this._log.info("Client conflicts: " + clientConflicts.length);
|
|
this._log.info("Server conflicts: " + serverConflicts.length);
|
|
this._log.trace("Changes for client: " + this._serializeCommands(clientChanges));
|
|
this._log.trace("Predicted changes for server: " + this._serializeCommands(serverChanges));
|
|
this._log.trace("Client conflicts: " + this._serializeConflicts(clientConflicts));
|
|
this._log.trace("Server conflicts: " + this._serializeConflicts(serverConflicts));
|
|
|
|
if (!(clientChanges.length || serverChanges.length ||
|
|
clientConflicts.length || serverConflicts.length)) {
|
|
this._log.info("Sync complete: no changes needed on client or server");
|
|
this._snapshot.data = localJson.data;
|
|
this._snapshot.version = server.maxVersion;
|
|
this._snapshot.save();
|
|
self.done(true);
|
|
return;
|
|
}
|
|
|
|
if (clientConflicts.length || serverConflicts.length) {
|
|
this._log.warn("Conflicts found! Discarding server changes");
|
|
}
|
|
|
|
let savedSnap = Utils.deepCopy(this._snapshot.data);
|
|
let savedVersion = this._snapshot.version;
|
|
let newSnapshot;
|
|
|
|
// 3.1) Apply server changes to local store
|
|
if (clientChanges.length) {
|
|
this._log.info("Applying changes locally");
|
|
// Note that we need to need to apply client changes to the
|
|
// current tree, not the saved snapshot
|
|
|
|
localJson.applyCommands.async(localJson, self.cb, clientChanges);
|
|
yield;
|
|
this._snapshot.data = localJson.data;
|
|
this._snapshot.version = server.maxVersion;
|
|
this._store.applyCommands.async(this._store, self.cb, clientChanges);
|
|
yield;
|
|
newSnapshot = this._store.wrap();
|
|
|
|
this._core.detectUpdates(self.cb, this._snapshot.data, newSnapshot);
|
|
let diff = yield;
|
|
if (diff.length != 0) {
|
|
this._log.warn("Commands did not apply correctly");
|
|
this._log.debug("Diff from snapshot+commands -> " +
|
|
"new snapshot after commands:\n" +
|
|
this._serializeCommands(diff));
|
|
// FIXME: do we really want to revert the snapshot here?
|
|
this._snapshot.data = Utils.deepCopy(savedSnap);
|
|
this._snapshot.version = savedVersion;
|
|
}
|
|
this._snapshot.save();
|
|
}
|
|
|
|
// 3.2) Append server delta to the delta file and upload
|
|
|
|
// Generate a new diff, from the current server snapshot to the
|
|
// current client snapshot. In the case where there are no
|
|
// conflicts, it should be the same as what the resolver returned
|
|
|
|
newSnapshot = this._store.wrap();
|
|
this._core.detectUpdates(self.cb, server.snapshot, newSnapshot);
|
|
let serverDelta = yield;
|
|
|
|
// Log an error if not the same
|
|
if (!(serverConflicts.length ||
|
|
Utils.deepEquals(serverChanges, serverDelta)))
|
|
this._log.warn("Predicted server changes differ from " +
|
|
"actual server->client diff (can be ignored in many cases)");
|
|
|
|
this._log.info("Actual changes for server: " + serverDelta.length);
|
|
this._log.debug("Actual changes for server: " +
|
|
this._serializeCommands(serverDelta));
|
|
|
|
if (serverDelta.length) {
|
|
this._log.info("Uploading changes to server");
|
|
|
|
this._snapshot.data = newSnapshot;
|
|
this._snapshot.version = ++server.maxVersion;
|
|
|
|
server.deltas.push(serverDelta);
|
|
|
|
if (server.formatVersion != ENGINE_STORAGE_FORMAT_VERSION ||
|
|
this._encryptionChanged) {
|
|
this._fullUpload.async(this, self.cb);
|
|
let status = yield;
|
|
if (!status)
|
|
this._log.error("Could not upload files to server"); // eep?
|
|
|
|
} else {
|
|
Crypto.PBEencrypt.async(Crypto, self.cb,
|
|
this._serializeCommands(server.deltas),
|
|
this._engineId);
|
|
let data = yield;
|
|
DAV.PUT(this.deltasFile, data, self.cb);
|
|
let deltasPut = yield;
|
|
|
|
let c = 0;
|
|
for (GUID in this._snapshot.data)
|
|
c++;
|
|
|
|
DAV.PUT(this.statusFile,
|
|
this._json.encode(
|
|
{GUID: this._snapshot.GUID,
|
|
formatVersion: ENGINE_STORAGE_FORMAT_VERSION,
|
|
snapVersion: server.snapVersion,
|
|
maxVersion: this._snapshot.version,
|
|
snapEncryption: server.snapEncryption,
|
|
deltasEncryption: Crypto.defaultAlgorithm,
|
|
itemCount: c}), self.cb);
|
|
let statusPut = yield;
|
|
|
|
if (deltasPut.status >= 200 && deltasPut.status < 300 &&
|
|
statusPut.status >= 200 && statusPut.status < 300) {
|
|
this._log.info("Successfully updated deltas and status on server");
|
|
this._snapshot.save();
|
|
} else {
|
|
// FIXME: revert snapshot here? - can't, we already applied
|
|
// updates locally! - need to save and retry
|
|
this._log.error("Could not update deltas on server");
|
|
}
|
|
}
|
|
}
|
|
|
|
this._log.info("Sync complete");
|
|
self.done(true);
|
|
},
|
|
|
|
/* Get the deltas/combined updates from the server
|
|
* Returns:
|
|
* status:
|
|
* -1: error
|
|
* 0: ok
|
|
* These fields may be null when status is -1:
|
|
* formatVersion:
|
|
* version of the data format itself. For compatibility checks.
|
|
* maxVersion:
|
|
* the latest version on the server
|
|
* snapVersion:
|
|
* the version of the current snapshot on the server (deltas not applied)
|
|
* snapEncryption:
|
|
* encryption algorithm currently used on the server-stored snapshot
|
|
* deltasEncryption:
|
|
* encryption algorithm currently used on the server-stored deltas
|
|
* snapshot:
|
|
* full snapshot of the latest server version (deltas applied)
|
|
* deltas:
|
|
* all of the individual deltas on the server
|
|
* updates:
|
|
* the relevant deltas (from our snapshot version to current),
|
|
* combined into a single set.
|
|
*/
|
|
_getServerData: function BmkEngine__getServerData() {
|
|
let self = yield;
|
|
let ret = {status: -1,
|
|
formatVersion: null, maxVersion: null, snapVersion: null,
|
|
snapEncryption: null, deltasEncryption: null,
|
|
snapshot: null, deltas: null, updates: null};
|
|
|
|
this._log.debug("Getting status file from server");
|
|
DAV.GET(this.statusFile, self.cb);
|
|
let resp = yield;
|
|
let status = resp.status;
|
|
|
|
switch (status) {
|
|
case 200: {
|
|
this._log.info("Got status file from server");
|
|
|
|
let status = this._json.decode(resp.responseText);
|
|
let deltas, allDeltas;
|
|
let snap = new SnapshotStore();
|
|
|
|
// Bail out if the server has a newer format version than we can parse
|
|
if (status.formatVersion > ENGINE_STORAGE_FORMAT_VERSION) {
|
|
this._log.error("Server uses storage format v" + status.formatVersion +
|
|
", this client understands up to v" + ENGINE_STORAGE_FORMAT_VERSION);
|
|
break;
|
|
}
|
|
|
|
this._getSymKey.async(this, self.cb);
|
|
yield;
|
|
|
|
if (status.formatVersion == 0) {
|
|
ret.snapEncryption = status.snapEncryption = "none";
|
|
ret.deltasEncryption = status.deltasEncryption = "none";
|
|
}
|
|
|
|
if (status.GUID != this._snapshot.GUID) {
|
|
this._log.info("Remote/local sync GUIDs do not match. " +
|
|
"Forcing initial sync.");
|
|
this._log.debug("Remote: " + status.GUID);
|
|
this._log.debug("Local: " + this._snapshot.GUID);
|
|
this._store.resetGUIDs();
|
|
this._snapshot.data = {};
|
|
this._snapshot.version = -1;
|
|
this._snapshot.GUID = status.GUID;
|
|
}
|
|
|
|
if (this._snapshot.version < status.snapVersion) {
|
|
this._log.trace("Local snapshot version < server snapVersion");
|
|
|
|
if (this._snapshot.version >= 0)
|
|
this._log.info("Local snapshot is out of date");
|
|
|
|
this._log.info("Downloading server snapshot");
|
|
DAV.GET(this.snapshotFile, self.cb);
|
|
resp = yield;
|
|
Utils.ensureStatus(resp.status, "Could not download snapshot.");
|
|
Crypto.PBEdecrypt.async(Crypto, self.cb,
|
|
resp.responseText,
|
|
this._engineId,
|
|
status.snapEncryption);
|
|
let data = yield;
|
|
snap.data = this._json.decode(data);
|
|
|
|
this._log.info("Downloading server deltas");
|
|
DAV.GET(this.deltasFile, self.cb);
|
|
resp = yield;
|
|
Utils.ensureStatus(resp.status, "Could not download deltas.");
|
|
Crypto.PBEdecrypt.async(Crypto, self.cb,
|
|
resp.responseText,
|
|
this._engineId,
|
|
status.deltasEncryption);
|
|
data = yield;
|
|
allDeltas = this._json.decode(data);
|
|
deltas = this._json.decode(data);
|
|
|
|
} else if (this._snapshot.version >= status.snapVersion &&
|
|
this._snapshot.version < status.maxVersion) {
|
|
this._log.trace("Server snapVersion <= local snapshot version < server maxVersion");
|
|
snap.data = Utils.deepCopy(this._snapshot.data);
|
|
|
|
this._log.info("Downloading server deltas");
|
|
DAV.GET(this.deltasFile, self.cb);
|
|
resp = yield;
|
|
Utils.ensureStatus(resp.status, "Could not download deltas.");
|
|
Crypto.PBEdecrypt.async(Crypto, self.cb,
|
|
resp.responseText,
|
|
this._engineId,
|
|
status.deltasEncryption);
|
|
let data = yield;
|
|
allDeltas = this._json.decode(data);
|
|
deltas = allDeltas.slice(this._snapshot.version - status.snapVersion);
|
|
|
|
} else if (this._snapshot.version == status.maxVersion) {
|
|
this._log.trace("Local snapshot version == server maxVersion");
|
|
snap.data = Utils.deepCopy(this._snapshot.data);
|
|
|
|
// FIXME: could optimize this case by caching deltas file
|
|
this._log.info("Downloading server deltas");
|
|
DAV.GET(this.deltasFile, self.cb);
|
|
resp = yield;
|
|
Utils.ensureStatus(resp.status, "Could not download deltas.");
|
|
Crypto.PBEdecrypt.async(Crypto, self.cb,
|
|
resp.responseText,
|
|
this._engineId,
|
|
status.deltasEncryption);
|
|
let data = yield;
|
|
allDeltas = this._json.decode(data);
|
|
deltas = [];
|
|
|
|
} else { // this._snapshot.version > status.maxVersion
|
|
this._log.error("Server snapshot is older than local snapshot");
|
|
break;
|
|
}
|
|
|
|
for (var i = 0; i < deltas.length; i++) {
|
|
snap.applyCommands.async(snap, self.cb, deltas[i]);
|
|
yield;
|
|
}
|
|
|
|
ret.status = 0;
|
|
ret.formatVersion = status.formatVersion;
|
|
ret.maxVersion = status.maxVersion;
|
|
ret.snapVersion = status.snapVersion;
|
|
ret.snapEncryption = status.snapEncryption;
|
|
ret.deltasEncryption = status.deltasEncryption;
|
|
ret.snapshot = snap.data;
|
|
ret.deltas = allDeltas;
|
|
this._core.detectUpdates(self.cb, this._snapshot.data, snap.data);
|
|
ret.updates = yield;
|
|
} break;
|
|
|
|
case 404: {
|
|
this._log.info("Server has no status file, Initial upload to server");
|
|
|
|
this._snapshot.data = this._store.wrap();
|
|
this._snapshot.version = 0;
|
|
this._snapshot.GUID = null; // in case there are other snapshots out there
|
|
|
|
this._fullUpload.async(this, self.cb);
|
|
let uploadStatus = yield;
|
|
if (!uploadStatus)
|
|
break;
|
|
|
|
this._log.info("Initial upload to server successful");
|
|
this._snapshot.save();
|
|
|
|
ret.status = 0;
|
|
ret.formatVersion = ENGINE_STORAGE_FORMAT_VERSION;
|
|
ret.maxVersion = this._snapshot.version;
|
|
ret.snapVersion = this._snapshot.version;
|
|
ret.snapEncryption = Crypto.defaultAlgorithm;
|
|
ret.deltasEncryption = Crypto.defaultAlgorithm;
|
|
ret.snapshot = Utils.deepCopy(this._snapshot.data);
|
|
ret.deltas = [];
|
|
ret.updates = [];
|
|
} break;
|
|
|
|
default:
|
|
this._log.error("Could not get status file: unknown HTTP status code " +
|
|
status);
|
|
break;
|
|
}
|
|
|
|
self.done(ret)
|
|
},
|
|
|
|
_fullUpload: function Engine__fullUpload() {
|
|
let self = yield;
|
|
let ret = false;
|
|
|
|
Crypto.PBEkeygen.async(Crypto, self.cb);
|
|
let symkey = yield;
|
|
this._engineId.setTempPassword(symkey);
|
|
if (!this._engineId.password)
|
|
throw "Could not generate a symmetric encryption key";
|
|
|
|
Crypto.RSAencrypt.async(Crypto, self.cb,
|
|
this._engineId.password, this._pbeId);
|
|
let enckey = yield;
|
|
if (!enckey)
|
|
throw "Could not encrypt symmetric encryption key";
|
|
|
|
let keys = {ring: {}};
|
|
keys.ring[this._engineId.userHash] = enckey;
|
|
DAV.PUT(this.keysFile, this._json.encode(keys), self.cb);
|
|
let resp = yield;
|
|
Utils.ensureStatus(resp.status, "Could not upload keyring file.");
|
|
|
|
Crypto.PBEencrypt.async(Crypto, self.cb,
|
|
this._snapshot.serialize(),
|
|
this._engineId);
|
|
let data = yield;
|
|
|
|
DAV.PUT(this.snapshotFile, data, self.cb);
|
|
resp = yield;
|
|
Utils.ensureStatus(resp.status, "Could not upload snapshot.");
|
|
|
|
DAV.PUT(this.deltasFile, "[]", self.cb);
|
|
resp = yield;
|
|
Utils.ensureStatus(resp.status, "Could not upload deltas.");
|
|
|
|
let c = 0;
|
|
for (GUID in this._snapshot.data)
|
|
c++;
|
|
|
|
DAV.PUT(this.statusFile,
|
|
this._json.encode(
|
|
{GUID: this._snapshot.GUID,
|
|
formatVersion: ENGINE_STORAGE_FORMAT_VERSION,
|
|
snapVersion: this._snapshot.version,
|
|
maxVersion: this._snapshot.version,
|
|
snapEncryption: Crypto.defaultAlgorithm,
|
|
deltasEncryption: "none",
|
|
itemCount: c}), self.cb);
|
|
resp = yield;
|
|
Utils.ensureStatus(resp.status, "Could not upload status file.");
|
|
|
|
this._log.info("Full upload to server successful");
|
|
ret = true;
|
|
self.done(ret)
|
|
},
|
|
|
|
_share: function Engine__share(username) {
|
|
let self = yield;
|
|
let base = DAV.baseURL;
|
|
|
|
this._log.debug("Sharing bookmarks with " + username);
|
|
|
|
this._getSymKey.async(this, self.cb);
|
|
yield;
|
|
|
|
// copied from getSymKey
|
|
DAV.GET(this.keysFile, self.cb);
|
|
let ret = yield;
|
|
Utils.ensureStatus(ret.status, "Could not get keys file.");
|
|
let keys = this._json.decode(ret.responseText);
|
|
|
|
// get the other user's pubkey
|
|
let hash = Utils.sha1(username);
|
|
let serverURL = Utils.prefs.getCharPref("serverURL");
|
|
|
|
try {
|
|
DAV.baseURL = serverURL + "user/" + hash + "/"; //FIXME: very ugly!
|
|
DAV.GET("public/pubkey", self.cb);
|
|
ret = yield;
|
|
}
|
|
catch (e) { throw e; }
|
|
finally { DAV.baseURL = base; }
|
|
|
|
Utils.ensureStatus(ret.status, "Could not get public key for " + username);
|
|
|
|
let id = new Identity();
|
|
id.pubkey = ret.responseText;
|
|
|
|
// now encrypt the symkey with their pubkey and upload the new keyring
|
|
Crypto.RSAencrypt.async(Crypto, self.cb, this._engineId.password, id);
|
|
let enckey = yield;
|
|
if (!enckey)
|
|
throw "Could not encrypt symmetric encryption key";
|
|
|
|
keys.ring[hash] = enckey;
|
|
DAV.PUT(this.keysFile, this._json.encode(keys), self.cb);
|
|
ret = yield;
|
|
Utils.ensureStatus(ret.status, "Could not upload keyring file.");
|
|
|
|
this._createShare(username, username);
|
|
|
|
this._log.debug("All done sharing!");
|
|
|
|
self.done(true);
|
|
},
|
|
|
|
// FIXME: EEK bookmarks specific
|
|
_createShare: function Engine__createShare(id, title) {
|
|
let bms = Cc["@mozilla.org/browser/nav-bookmarks-service;1"].
|
|
getService(Ci.nsINavBookmarksService);
|
|
let ans = Cc["@mozilla.org/browser/annotation-service;1"].
|
|
getService(Ci.nsIAnnotationService);
|
|
|
|
let root;
|
|
let a = ans.getItemsWithAnnotation("weave/mounted-shares-folder", {});
|
|
if (a.length == 1)
|
|
root = a[0];
|
|
|
|
if (!root) {
|
|
root = bms.createFolder(bms.toolbarFolder, "Shared Folders",
|
|
bms.DEFAULT_INDEX);
|
|
ans.setItemAnnotation(root, "weave/mounted-shares-folder", true, 0,
|
|
ans.EXPIRE_NEVER);
|
|
}
|
|
|
|
let item
|
|
a = ans.getItemsWithAnnotation("weave/mounted-share-id", {});
|
|
for (let i = 0; i < a.length; i++) {
|
|
if (ans.getItemAnnotation(a[i], "weave/mounted-share-id") == id) {
|
|
item = a[i];
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!item) {
|
|
let newId = bms.createFolder(root, title, bms.DEFAULT_INDEX);
|
|
ans.setItemAnnotation(newId, "weave/mounted-share-id", id, 0,
|
|
ans.EXPIRE_NEVER);
|
|
}
|
|
},
|
|
|
|
sync: function Engine_sync(onComplete) {
|
|
return this._sync.async(this, onComplete);
|
|
},
|
|
|
|
share: function Engine_share(onComplete, username) {
|
|
return this._share.async(this, onComplete, username);
|
|
},
|
|
|
|
resetServer: function Engine_resetServer(onComplete) {
|
|
return this._resetServer.async(this, onComplete);
|
|
},
|
|
|
|
resetClient: function Engine_resetClient(onComplete) {
|
|
return this._resetClient.async(this, onComplete);
|
|
}
|
|
};
|
|
|
|
function BookmarksEngine(davCollection, pbeId) {
|
|
this._init(davCollection, pbeId);
|
|
}
|
|
BookmarksEngine.prototype = {
|
|
get name() { return "bookmarks-engine"; },
|
|
get logName() { return "BmkEngine"; },
|
|
get serverPrefix() { return "user-data/bookmarks/"; },
|
|
|
|
__core: null,
|
|
get _core() {
|
|
if (!this.__core)
|
|
this.__core = new BookmarksSyncCore();
|
|
return this.__core;
|
|
},
|
|
|
|
__store: null,
|
|
get _store() {
|
|
if (!this.__store)
|
|
this.__store = new BookmarksStore();
|
|
return this.__store;
|
|
},
|
|
|
|
syncMounts: function BmkEngine_syncMounts(onComplete) {
|
|
this._syncMounts.async(this, onComplete);
|
|
},
|
|
_syncMounts: function BmkEngine__syncMounts() {
|
|
let self = yield;
|
|
let mounts = this._store.findMounts();
|
|
|
|
for (i = 0; i < mounts.length; i++) {
|
|
try {
|
|
this._syncOneMount.async(this, self.cb, mounts[i]);
|
|
yield;
|
|
} catch (e) {
|
|
this._log.warn("Could not sync shared folder from " + mounts[i].userid);
|
|
this._log.trace(Utils.stackTrace(e));
|
|
}
|
|
}
|
|
},
|
|
|
|
_syncOneMount: function BmkEngine__syncOneMount(mountData) {
|
|
let self = yield;
|
|
let user = mountData.userid;
|
|
let base = DAV.baseURL;
|
|
let serverURL = Utils.prefs.getCharPref("serverURL");
|
|
let snap = new SnapshotStore();
|
|
|
|
this._log.debug("Syncing shared folder from user " + user);
|
|
|
|
try {
|
|
let hash = Utils.sha1(user);
|
|
DAV.baseURL = serverURL + "user/" + hash + "/"; //FIXME: very ugly!
|
|
|
|
this._getSymKey.async(this, self.cb);
|
|
yield;
|
|
|
|
this._log.trace("Getting status file for " + user);
|
|
DAV.GET(this.statusFile, self.cb);
|
|
let resp = yield;
|
|
Utils.ensureStatus(resp.status, "Could not download status file.");
|
|
let status = this._json.decode(resp.responseText);
|
|
|
|
this._log.trace("Downloading server snapshot for " + user);
|
|
DAV.GET(this.snapshotFile, self.cb);
|
|
resp = yield;
|
|
Utils.ensureStatus(resp.status, "Could not download snapshot.");
|
|
Crypto.PBEdecrypt.async(Crypto, self.cb, resp.responseText,
|
|
this._engineId, status.snapEncryption);
|
|
let data = yield;
|
|
snap.data = this._json.decode(data);
|
|
|
|
this._log.trace("Downloading server deltas for " + user);
|
|
DAV.GET(this.deltasFile, self.cb);
|
|
resp = yield;
|
|
Utils.ensureStatus(resp.status, "Could not download deltas.");
|
|
Crypto.PBEdecrypt.async(Crypto, self.cb, resp.responseText,
|
|
this._engineId, status.deltasEncryption);
|
|
data = yield;
|
|
deltas = this._json.decode(data);
|
|
}
|
|
catch (e) { throw e; }
|
|
finally { DAV.baseURL = base; }
|
|
|
|
// apply deltas to get current snapshot
|
|
for (var i = 0; i < deltas.length; i++) {
|
|
snap.applyCommands.async(snap, self.cb, deltas[i]);
|
|
yield;
|
|
}
|
|
|
|
// prune tree / get what we want
|
|
for (let guid in snap.data) {
|
|
if (snap.data[guid].type != "bookmark")
|
|
delete snap.data[guid];
|
|
else
|
|
snap.data[guid].parentGUID = mountData.rootGUID;
|
|
}
|
|
|
|
this._log.trace("Got bookmarks fror " + user + ", comparing with local copy");
|
|
this._core.detectUpdates(self.cb, mountData.snapshot, snap.data);
|
|
let diff = yield;
|
|
|
|
// FIXME: should make sure all GUIDs here live under the mountpoint
|
|
this._log.trace("Applying changes to folder from " + user);
|
|
this._store.applyCommands.async(this._store, self.cb, diff);
|
|
yield;
|
|
|
|
this._log.trace("Shared folder from " + user + " successfully synced!");
|
|
}
|
|
};
|
|
BookmarksEngine.prototype.__proto__ = new Engine();
|
|
|
|
function HistoryEngine(davCollection, pbeId) {
|
|
this._init(davCollection, pbeId);
|
|
}
|
|
HistoryEngine.prototype = {
|
|
get name() { return "history-engine"; },
|
|
get logName() { return "HistEngine"; },
|
|
get serverPrefix() { return "user-data/history/"; },
|
|
|
|
__core: null,
|
|
get _core() {
|
|
if (!this.__core)
|
|
this.__core = new HistorySyncCore();
|
|
return this.__core;
|
|
},
|
|
|
|
__store: null,
|
|
get _store() {
|
|
if (!this.__store)
|
|
this.__store = new HistoryStore();
|
|
return this.__store;
|
|
}
|
|
};
|
|
HistoryEngine.prototype.__proto__ = new Engine();
|
|
|
|
// Jono: the following is copy-and-paste code
|
|
function CookieEngine(davCollection, pbeId) {
|
|
this._init(davCollection, pbeId);
|
|
}
|
|
CookieEngine.prototype = {
|
|
get name() { return "cookie-engine"; },
|
|
get logName() { return "CookieEngine"; },
|
|
get serverPrefix() { return "user-data/cookies/"; },
|
|
|
|
__core: null,
|
|
get _core() {
|
|
if (!this.__core)
|
|
this.__core = new CookieSyncCore();
|
|
return this.__core;
|
|
},
|
|
|
|
__store: null,
|
|
get _store() {
|
|
if (!this.__store)
|
|
this.__store = new CookieStore();
|
|
return this.__store;
|
|
}
|
|
};
|
|
CookieEngine.prototype.__proto__ = new Engine();
|