blob: 6d7f60ba8d4711cfa1210fce43061890bdb4b435 [file] [log] [blame]
/****************************************************************************
**
** Copyright (C) 2017 The Qt Company Ltd.
** Contact: https://www.qt.io/licensing/
**
** This file is part of the QtNetwork module of the Qt Toolkit.
**
** $QT_BEGIN_LICENSE:LGPL$
** Commercial License Usage
** Licensees holding valid commercial Qt licenses may use this file in
** accordance with the commercial license agreement provided with the
** Software or, alternatively, in accordance with the terms contained in
** a written agreement between you and The Qt Company. For licensing terms
** and conditions see https://www.qt.io/terms-conditions. For further
** information use the contact form at https://www.qt.io/contact-us.
**
** GNU Lesser General Public License Usage
** Alternatively, this file may be used under the terms of the GNU Lesser
** General Public License version 3 as published by the Free Software
** Foundation and appearing in the file LICENSE.LGPL3 included in the
** packaging of this file. Please review the following information to
** ensure the GNU Lesser General Public License version 3 requirements
** will be met: https://www.gnu.org/licenses/lgpl-3.0.html.
**
** GNU General Public License Usage
** Alternatively, this file may be used under the terms of the GNU
** General Public License version 2.0 or (at your option) the GNU General
** Public license version 3 or any later version approved by the KDE Free
** Qt Foundation. The licenses are as published by the Free Software
** Foundation and appearing in the file LICENSE.GPL2 and LICENSE.GPL3
** included in the packaging of this file. Please review the following
** information to ensure the GNU General Public License requirements will
** be met: https://www.gnu.org/licenses/gpl-2.0.html and
** https://www.gnu.org/licenses/gpl-3.0.html.
**
** $QT_END_LICENSE$
**
****************************************************************************/
#include "qhstsstore_p.h"
#include "qhstspolicy.h"
#include "qstandardpaths.h"
#include "qdatastream.h"
#include "qbytearray.h"
#include "qdatetime.h"
#include "qvariant.h"
#include "qstring.h"
#include "qdir.h"
#include <utility>
QT_BEGIN_NAMESPACE
static QString host_name_to_settings_key(const QString &hostName)
{
const QByteArray hostNameAsHex(hostName.toUtf8().toHex());
return QString::fromLatin1(hostNameAsHex);
}
static QString settings_key_to_host_name(const QString &key)
{
const QByteArray hostNameAsUtf8(QByteArray::fromHex(key.toLatin1()));
return QString::fromUtf8(hostNameAsUtf8);
}
QHstsStore::QHstsStore(const QString &dirName)
: store(absoluteFilePath(dirName), QSettings::IniFormat)
{
// Disable fallbacks, we do not want to use anything but our own ini file.
store.setFallbacksEnabled(false);
}
QHstsStore::~QHstsStore()
{
synchronize();
}
QVector<QHstsPolicy> QHstsStore::readPolicies()
{
// This function only attempts to read policies, making no decision about
// expired policies. It's up to a user (QHstsCache) to mark these policies
// for deletion and sync the store later. But we immediately remove keys/values
// (if the store isWritable) for the policies that we fail to read.
QVector<QHstsPolicy> policies;
beginHstsGroups();
const QStringList keys = store.childKeys();
for (const auto &key : keys) {
QHstsPolicy restoredPolicy;
if (deserializePolicy(key, restoredPolicy)) {
restoredPolicy.setHost(settings_key_to_host_name(key));
policies.push_back(std::move(restoredPolicy));
} else if (isWritable()) {
evictPolicy(key);
}
}
endHstsGroups();
return policies;
}
void QHstsStore::addToObserved(const QHstsPolicy &policy)
{
observedPolicies.push_back(policy);
}
void QHstsStore::synchronize()
{
if (!isWritable())
return;
if (observedPolicies.size()) {
beginHstsGroups();
for (const QHstsPolicy &policy : qAsConst(observedPolicies)) {
const QString key(host_name_to_settings_key(policy.host()));
// If we fail to write a new, updated policy, we also remove the old one.
if (policy.isExpired() || !serializePolicy(key, policy))
evictPolicy(key);
}
observedPolicies.clear();
endHstsGroups();
}
store.sync();
}
bool QHstsStore::isWritable() const
{
return store.isWritable();
}
QString QHstsStore::absoluteFilePath(const QString &dirName)
{
const QDir dir(dirName.isEmpty() ? QStandardPaths::writableLocation(QStandardPaths::CacheLocation)
: dirName);
return dir.absoluteFilePath(QLatin1String("hstsstore"));
}
void QHstsStore::beginHstsGroups()
{
store.beginGroup(QLatin1String("StrictTransportSecurity"));
store.beginGroup(QLatin1String("Policies"));
}
void QHstsStore::endHstsGroups()
{
store.endGroup();
store.endGroup();
}
bool QHstsStore::deserializePolicy(const QString &key, QHstsPolicy &policy)
{
Q_ASSERT(store.contains(key));
const QVariant data(store.value(key));
if (data.isNull() || !data.canConvert<QByteArray>())
return false;
const QByteArray serializedData(data.toByteArray());
QDataStream streamer(serializedData);
qint64 expiryInMS = 0;
streamer >> expiryInMS;
if (streamer.status() != QDataStream::Ok)
return false;
bool includesSubDomains = false;
streamer >> includesSubDomains;
if (streamer.status() != QDataStream::Ok)
return false;
policy.setExpiry(QDateTime::fromMSecsSinceEpoch(expiryInMS));
policy.setIncludesSubDomains(includesSubDomains);
return true;
}
bool QHstsStore::serializePolicy(const QString &key, const QHstsPolicy &policy)
{
Q_ASSERT(store.isWritable());
QByteArray serializedData;
QDataStream streamer(&serializedData, QIODevice::WriteOnly);
streamer << policy.expiry().toMSecsSinceEpoch();
streamer << policy.includesSubDomains();
if (streamer.status() != QDataStream::Ok)
return false;
store.setValue(key, serializedData);
return true;
}
void QHstsStore::evictPolicy(const QString &key)
{
Q_ASSERT(store.isWritable());
if (store.contains(key))
store.remove(key);
}
QT_END_NAMESPACE