/* * Copyright (c) 2010, 2011 Marco Peereboom * Copyright (c) 2011 Stevan Andjelkovic * Copyright (c) 2010, 2011, 2012 Edd Barrett * Copyright (c) 2011 Todd T. Fries * Copyright (c) 2011 Raphael Graf * Copyright (c) 2011 Michal Mazurek * Copyright (c) 2012 Josh Rickmar * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ #include /* * xombrero "protocol" (xtp) * We use this for managing stuff like downloads and favorites. They * make magical HTML pages in memory which have xxxt:// links in order * to communicate with xombrero's internals. These links take the format: * xxxt://class/session_key/action/arg * * Don't begin xtp class/actions as 0. atoi returns that on error. * * Typically we have not put addition of items in this framework, as * adding items is either done via an ex-command or via a keybinding instead. */ #define XT_HTML_TAG "\n" #define XT_DOCTYPE "\n" #define XT_PAGE_STYLE "\n" int js_show_wl(struct tab *, struct karg *); int pl_show_wl(struct tab *, struct karg *); int https_show_wl(struct tab *, struct karg *); int xtp_page_set(struct tab *, struct karg *); int xtp_page_rt(struct tab *, struct karg *); int marco(struct tab *, struct karg *); int startpage(struct tab *, struct karg *); const char * marco_message(int *); void update_cookie_tabs(struct tab *apart_from); int about_webkit(struct tab *, struct karg *); int allthethings(struct tab *, struct karg *); extern SoupSession *session; struct about_type about_list[] = { { XT_URI_ABOUT_ABOUT, xtp_page_ab }, { XT_URI_ABOUT_ALLTHETHINGS, allthethings }, { XT_URI_ABOUT_BLANK, blank }, { XT_URI_ABOUT_CERTS, ca_cmd }, { XT_URI_ABOUT_COOKIEWL, cookie_show_wl }, { XT_URI_ABOUT_COOKIEJAR, xtp_page_cl }, { XT_URI_ABOUT_DOWNLOADS, xtp_page_dl }, { XT_URI_ABOUT_FAVORITES, xtp_page_fl }, { XT_URI_ABOUT_HELP, help }, { XT_URI_ABOUT_HISTORY, xtp_page_hl }, { XT_URI_ABOUT_JSWL, js_show_wl }, { XT_URI_ABOUT_SET, xtp_page_set }, { XT_URI_ABOUT_STATS, stats }, { XT_URI_ABOUT_MARCO, marco }, { XT_URI_ABOUT_STARTPAGE, startpage }, { XT_URI_ABOUT_PLUGINWL, pl_show_wl }, { XT_URI_ABOUT_HTTPS, https_show_wl }, { XT_URI_ABOUT_WEBKIT, about_webkit }, { XT_URI_ABOUT_SEARCH, xtp_page_sl }, { XT_URI_ABOUT_RUNTIME, xtp_page_rt }, { XT_URI_ABOUT_SECVIOLATION, NULL }, }; struct search_type { const char *name; const char *url; } search_list[] = { { "Google (SSL)", "https://encrypted.google.com/search?q=%s&&client=xombrero" }, { "Bing", "http://www.bing.com/search?q=%s" }, { "Yahoo", "http://search.yahoo.com/search?p=%s" }, { "DuckDuckGo", "https://duckduckgo.com/?q=%s" }, { "DuckDuckGo (HTML)", "https://duckduckgo.com/html?q=%s" }, { "DuckDuckGo (Lite)", "https://duckduckgo.com/lite?q=%s" }, { "Ixquick", "https://ixquick.com/do/search?q=%s" }, { "Startpage", "https://startpage.com/do/search?q=%s" }, }; /* * Session IDs. * We use these to prevent people putting xxxt:// URLs on * websites in the wild. We generate 8 bytes and represent in hex (16 chars) */ #define XT_XTP_SES_KEY_SZ 8 #define XT_XTP_SES_KEY_HEX_FMT \ "%02" PRIx8 "%02" PRIx8 "%02" PRIx8 "%02" PRIx8 "%02" PRIx8 "%02" PRIx8 "%02" PRIx8 "%02" PRIx8 char *dl_session_key; /* downloads */ char *hl_session_key; /* history list */ char *cl_session_key; /* cookie list */ char *fl_session_key; /* favorites list */ char *sl_session_key; /* search */ char *ab_session_key; /* about */ char *sv_session_key; /* secviolation */ char *rt_session_key; /* set */ int updating_ab_tabs = 0; int updating_fl_tabs = 0; int updating_dl_tabs = 0; int updating_hl_tabs = 0; int updating_cl_tabs = 0; int updating_sl_tabs = 0; int updating_sv_tabs = 0; int updating_set_tabs = 0; struct download_list downloads; size_t about_list_size(void) { return (LENGTH(about_list)); } gchar * get_html_page(gchar *title, gchar *body, gchar *head, bool addstyles) { gchar *r; r = g_strdup_printf(XT_DOCTYPE XT_HTML_TAG "\n" "%s\n" "%s" "%s" "\n" "\n" "

%s

\n" "%s\n\n" "", title, addstyles ? XT_PAGE_STYLE : "", head, title, body); return (r); } /* * Display a web page from a HTML string in memory, rather than from a URL */ void load_webkit_string(struct tab *t, const char *str, gchar *title) { char file[PATH_MAX]; int i; /* we set this to indicate we want to manually do navaction */ if (t->bfl) t->item = webkit_web_back_forward_list_get_current_item(t->bfl); t->xtp_meaning = XT_XTP_TAB_MEANING_NORMAL; if (title) { /* set t->xtp_meaning */ for (i = 0; i < LENGTH(about_list); i++) if (!strcmp(title, about_list[i].name)) { t->xtp_meaning = i; break; } webkit_web_view_load_string(t->wv, str, NULL, encoding, XT_XTP_STR); #if GTK_CHECK_VERSION(2, 20, 0) gtk_spinner_stop(GTK_SPINNER(t->spinner)); gtk_widget_hide(t->spinner); #endif snprintf(file, sizeof file, "%s" PS "%s", resource_dir, icons[0]); xt_icon_from_file(t, file); } } int blank(struct tab *t, struct karg *args) { if (t == NULL) show_oops(NULL, "blank invalid parameters"); load_webkit_string(t, "", XT_URI_ABOUT_BLANK); return (0); } int help(struct tab *t, struct karg *args) { char *page, *head, *body; if (t == NULL) show_oops(NULL, "help invalid parameters"); head = "" "\n"; body = "xombrero man page http://opensource.conformal.com/" "cgi-bin/man-cgi?xombrero"; page = get_html_page(XT_NAME, body, head, FALSE); load_webkit_string(t, page, XT_URI_ABOUT_HELP); g_free(page); return (0); } int stats(struct tab *t, struct karg *args) { char *page, *body, *s, line[64 * 1024]; uint64_t line_count = 0; FILE *r_cookie_f; if (t == NULL) show_oops(NULL, "stats invalid parameters"); line[0] = '\0'; if (save_rejected_cookies) { if ((r_cookie_f = fopen(rc_fname, "r"))) { for (;;) { s = fgets(line, sizeof line, r_cookie_f); if (s == NULL || feof(r_cookie_f) || ferror(r_cookie_f)) break; line_count++; } fclose(r_cookie_f); snprintf(line, sizeof line, "
Cookies blocked(*) total: %" PRIu64, line_count); } else show_oops(t, "Can't open blocked cookies file: %s", strerror(errno)); } body = g_strdup_printf( "Cookies blocked(*) this session: %" PRIu64 "%s" "

* results vary based on settings

", blocked_cookies, line); page = get_html_page("Statistics", body, "", 0); g_free(body); load_webkit_string(t, page, XT_URI_ABOUT_STATS); g_free(page); return (0); } void show_certs(struct tab *t, gnutls_x509_crt_t *certs, size_t cert_count, char *title) { gnutls_datum_t cinfo; char *tmp, *body; int i; body = g_strdup(""); for (i = 0; i < cert_count; i++) { if (gnutls_x509_crt_print(certs[i], GNUTLS_CRT_PRINT_FULL, &cinfo)) return; tmp = body; body = g_strdup_printf("%s

Cert #%d

%s
", body, i, cinfo.data); gnutls_free(cinfo.data); g_free(tmp); } tmp = get_html_page(title, body, "", 0); g_free(body); load_webkit_string(t, tmp, XT_URI_ABOUT_CERTS); g_free(tmp); } int ca_cmd(struct tab *t, struct karg *args) { FILE *f = NULL; int rv = 1, certs = 0, certs_read; struct stat sb; gnutls_datum_t dt; gnutls_x509_crt_t *c = NULL; char *certs_buf = NULL, *s; if ((f = fopen(ssl_ca_file, "r")) == NULL) { show_oops(t, "Can't open CA file: %s", ssl_ca_file); return (1); } if (fstat(fileno(f), &sb) == -1) { show_oops(t, "Can't stat CA file: %s", ssl_ca_file); goto done; } certs_buf = g_malloc(sb.st_size + 1); if (fread(certs_buf, 1, sb.st_size, f) != sb.st_size) { show_oops(t, "Can't read CA file: %s", strerror(errno)); goto done; } certs_buf[sb.st_size] = '\0'; s = certs_buf; while ((s = strstr(s, "BEGIN CERTIFICATE"))) { certs++; s += strlen("BEGIN CERTIFICATE"); } bzero(&dt, sizeof dt); dt.data = (unsigned char *)certs_buf; dt.size = sb.st_size; c = g_malloc(sizeof(gnutls_x509_crt_t) * certs); certs_read = gnutls_x509_crt_list_import(c, (unsigned int *)&certs, &dt, GNUTLS_X509_FMT_PEM, 0); if (certs_read <= 0) { show_oops(t, "No cert(s) available"); goto done; } show_certs(t, c, certs_read, "Certificate Authority Certificates"); done: if (c) g_free(c); if (certs_buf) g_free(certs_buf); if (f) fclose(f); return (rv); } int cookie_show_wl(struct tab *t, struct karg *args) { args->i = XT_SHOW | XT_WL_PERSISTENT | XT_WL_SESSION; wl_show(t, args, "Cookie White List", &c_wl); return (0); } int js_show_wl(struct tab *t, struct karg *args) { args->i = XT_SHOW | XT_WL_PERSISTENT | XT_WL_SESSION; wl_show(t, args, "JavaScript White List", &js_wl); return (0); } int cookie_cmd(struct tab *t, struct karg *args) { if (args->i & XT_SHOW) wl_show(t, args, "Cookie White List", &c_wl); else if (args->i & XT_WL_TOGGLE) { args->i |= XT_WL_RELOAD; toggle_cwl(t, args); } else if (args->i & XT_SAVE) { args->i |= XT_WL_RELOAD; wl_save(t, args, XT_WL_COOKIE); } else if (args->i & XT_DELETE) { remove_cookie_all(); update_cookie_tabs(NULL); } return (0); } int js_cmd(struct tab *t, struct karg *args) { if (args->i & XT_SHOW) wl_show(t, args, "JavaScript White List", &js_wl); else if (args->i & XT_SAVE) { args->i |= XT_WL_RELOAD; wl_save(t, args, XT_WL_JAVASCRIPT); } else if (args->i & XT_WL_TOGGLE) { args->i |= XT_WL_RELOAD; toggle_js(t, args); } else if (args->i & XT_DELETE) show_oops(t, "'js delete' currently unimplemented"); return (0); } int pl_show_wl(struct tab *t, struct karg *args) { args->i = XT_SHOW | XT_WL_PERSISTENT | XT_WL_SESSION; wl_show(t, args, "Plugin White List", &pl_wl); return (0); } int pl_cmd(struct tab *t, struct karg *args) { if (args->i & XT_SHOW) wl_show(t, args, "Plugin White List", &pl_wl); else if (args->i & XT_SAVE) { args->i |= XT_WL_RELOAD; wl_save(t, args, XT_WL_PLUGIN); } else if (args->i & XT_WL_TOGGLE) { args->i |= XT_WL_RELOAD; toggle_pl(t, args); } else if (args->i & XT_DELETE) show_oops(t, "'plugin delete' currently unimplemented"); return (0); } int https_show_wl(struct tab *t, struct karg *args) { args->i = XT_SHOW | XT_WL_PERSISTENT | XT_WL_SESSION; wl_show(t, args, "HTTPS Force List", &force_https); return (0); } int https_cmd(struct tab *t, struct karg *args) { if (args->i & XT_SHOW) wl_show(t, args, "HTTPS Force List", &force_https); else if (args->i & XT_SAVE) { args->i |= XT_WL_RELOAD; wl_save(t, args, XT_WL_HTTPS); } else if (args->i & XT_WL_TOGGLE) { args->i |= XT_WL_RELOAD; toggle_force_https(t, args); } else if (args->i & XT_DELETE) show_oops(t, "https delete' currently unimplemented"); return (0); } /* * cancel, remove, etc. downloads */ void xtp_handle_dl(struct tab *t, uint8_t cmd, int id, const char *query) { struct download find, *d = NULL; #ifndef __MINGW32__ char *file = NULL; const char *uri = NULL; #endif DNPRINTF(XT_D_DOWNLOAD, "download control: cmd %d, id %d\n", cmd, id); /* some commands require a valid download id */ if (cmd != XT_XTP_DL_LIST) { /* lookup download in question */ find.id = id; d = RB_FIND(download_list, &downloads, &find); if (d == NULL) { show_oops(t, "%s: no such download", __func__); return; } } /* decide what to do */ switch (cmd) { case XT_XTP_DL_START: /* our downloads always needs to be * restarted if called from here */ download_start(t, d, XT_DL_RESTART); break; case XT_XTP_DL_CANCEL: webkit_download_cancel(d->download); g_object_unref(d->download); RB_REMOVE(download_list, &downloads, d); break; case XT_XTP_DL_UNLINK: #ifdef __MINGW32__ /* XXX uri's aren't handled properly on windows? */ unlink(webkit_download_get_destination_uri(d->download)); #else uri = webkit_download_get_destination_uri(d->download); if ((file = g_filename_from_uri(uri, NULL, NULL)) != NULL) { unlink(file); g_free(file); } #endif /* FALLTHROUGH */ case XT_XTP_DL_REMOVE: webkit_download_cancel(d->download); /* just incase */ g_object_unref(d->download); RB_REMOVE(download_list, &downloads, d); break; case XT_XTP_DL_LIST: /* Nothing */ break; default: show_oops(t, "%s: unknown command", __func__); break; }; xtp_page_dl(t, NULL); } void xtp_handle_hl(struct tab *t, uint8_t cmd, int id, const char *query) { struct history *h, *next, *ht; int i = 1; switch (cmd) { case XT_XTP_HL_REMOVE: /* walk backwards, as listed in reverse */ for (h = RB_MAX(history_list, &hl); h != NULL; h = next) { next = RB_PREV(history_list, &hl, h); if (id == i) { RB_REMOVE(history_list, &hl, h); g_free((gpointer) h->title); g_free((gpointer) h->uri); g_free(h); break; } i++; } break; case XT_XTP_HL_REMOVE_ALL: RB_FOREACH_SAFE(h, history_list, &hl, ht) RB_REMOVE(history_list, &hl, h); break; case XT_XTP_HL_LIST: /* Nothing - just xtp_page_hl() below */ break; default: show_oops(t, "%s: unknown command", __func__); break; }; xtp_page_hl(t, NULL); } /* remove a favorite */ void remove_favorite(struct tab *t, int index) { char file[PATH_MAX], *title, *uri = NULL; char *new_favs, *tmp; FILE *f; int i; size_t len, lineno; /* open favorites */ snprintf(file, sizeof file, "%s" PS "%s", work_dir, XT_FAVS_FILE); if ((f = fopen(file, "r")) == NULL) { show_oops(t, "%s: can't open favorites: %s", __func__, strerror(errno)); return; } /* build a string which will become the new favroites file */ new_favs = g_strdup(""); for (i = 1;;) { if ((title = fparseln(f, &len, &lineno, NULL, 0)) == NULL) if (feof(f) || ferror(f)) break; /* XXX THIS IS NOT THE RIGHT HEURISTIC */ if (len == 0) { free(title); title = NULL; continue; } if ((uri = fparseln(f, &len, &lineno, NULL, 0)) == NULL) { if (feof(f) || ferror(f)) { show_oops(t, "%s: can't parse favorites %s", __func__, strerror(errno)); goto clean; } } /* as long as this isn't the one we are deleting add to file */ if (i != index) { tmp = new_favs; new_favs = g_strdup_printf("%s%s\n%s\n", new_favs, title, uri); g_free(tmp); } free(uri); uri = NULL; free(title); title = NULL; i++; } fclose(f); /* write back new favorites file */ if ((f = fopen(file, "w")) == NULL) { show_oops(t, "%s: can't open favorites: %s", __func__, strerror(errno)); goto clean; } if (fwrite(new_favs, strlen(new_favs), 1, f) != 1) show_oops(t, "%s: can't fwrite", __func__); fclose(f); clean: if (uri) free(uri); if (title) free(title); g_free(new_favs); } int add_favorite(struct tab *t, struct karg *args) { char file[PATH_MAX]; FILE *f; char *line = NULL; size_t urilen, linelen; const gchar *uri, *title; if (t == NULL) return (1); /* don't allow adding of xtp pages to favorites */ if (t->xtp_meaning != XT_XTP_TAB_MEANING_NORMAL) { show_oops(t, "%s: can't add xtp pages to favorites", __func__); return (1); } snprintf(file, sizeof file, "%s" PS "%s", work_dir, XT_FAVS_FILE); if ((f = fopen(file, "r+")) == NULL) { show_oops(t, "Can't open favorites file: %s", strerror(errno)); return (1); } title = get_title(t, FALSE); uri = get_uri(t); if (title == NULL || uri == NULL) { show_oops(t, "can't add page to favorites"); goto done; } urilen = strlen(uri); for (;;) { if ((line = fparseln(f, &linelen, NULL, NULL, 0)) == NULL) if (feof(f) || ferror(f)) break; if (linelen == urilen && !strcmp(line, uri)) goto done; free(line); line = NULL; } fprintf(f, "\n%s\n%s", title, uri); done: if (line) free(line); fclose(f); update_favorite_tabs(NULL); return (0); } char * search_engine_add(char *body, const char *name, const char *url, int select) { char *b = body; body = g_strdup_printf("%s" "%s" "%s" "" "[ Select ]" "\n", body, name, url, XT_XTP_STR, XT_XTP_SL, sl_session_key, XT_XTP_SL_SET, select); g_free(b); return (body); } void xtp_handle_ab(struct tab *t, uint8_t cmd, int arg, const char *query) { char config[PATH_MAX]; char *cmdstr; char **sv; switch (cmd) { case XT_XTP_AB_EDIT_CONF: if (external_editor == NULL || strlen(external_editor) == 0) { show_oops(t, "external_editor is unset"); break; } snprintf(config, sizeof config, "%s" PS ".%s", pwd->pw_dir, XT_CONF_FILE); sv = g_strsplit(external_editor, "", -1); cmdstr = g_strjoinv(config, sv); g_strfreev(sv); sv = g_strsplit_set(cmdstr, " \t", -1); if (!g_spawn_async(NULL, sv, NULL, G_SPAWN_SEARCH_PATH, NULL, NULL, NULL, NULL)) show_oops(t, "%s: could not spawn process", __func__); g_strfreev(sv); g_free(cmdstr); break; default: show_oops(t, "%s, invalid about command", __func__); break; }; xtp_page_ab(t, NULL); } void xtp_handle_fl(struct tab *t, uint8_t cmd, int arg, const char *query) { switch (cmd) { case XT_XTP_FL_LIST: /* nothing, just the below call to xtp_page_fl() */ break; case XT_XTP_FL_REMOVE: remove_favorite(t, arg); break; default: show_oops(t, "%s: invalid favorites command", __func__); break; }; xtp_page_fl(t, NULL); } void xtp_handle_cl(struct tab *t, uint8_t cmd, int arg, const char *query) { switch (cmd) { case XT_XTP_CL_LIST: /* nothing, just xtp_page_cl() */ break; case XT_XTP_CL_REMOVE: remove_cookie(arg); break; case XT_XTP_CL_REMOVE_DOMAIN: remove_cookie_domain(arg); break; case XT_XTP_CL_REMOVE_ALL: remove_cookie_all(); break; default: show_oops(t, "%s: unknown cookie xtp command", __func__); break; }; xtp_page_cl(t, NULL); } void xtp_handle_sl(struct tab *t, uint8_t cmd, int arg, const char *query) { const char *search; char *enc_search, *uri; char **sv; switch (cmd) { case XT_XTP_SL_SET: set_search_string((char *)search_list[arg].url); if (save_runtime_setting("search_string", search_list[arg].url)) show_oops(t, "could not set search_string in runtime"); break; default: show_oops(t, "%s: unknown search xtp command", __func__); break; }; search = gtk_entry_get_text(GTK_ENTRY(t->search_entry)); /* static */ enc_search = soup_uri_encode(search, XT_RESERVED_CHARS); sv = g_strsplit(search_string, "%s", 2); uri = g_strjoinv(enc_search, sv); load_uri(t, uri); g_free(enc_search); g_strfreev(sv); g_free(uri); } void xtp_handle_sv(struct tab *t, uint8_t cmd, int id, const char *query) { SoupURI *soupuri = NULL; struct karg args = {0}; struct secviolation find, *sv; struct sv_ignore *svi = NULL; find.xtp_arg = id; if ((sv = RB_FIND(secviolation_list, &svl, &find)) == NULL) return; args.ptr = (void *)sv->t; args.s = sv->uri; switch (cmd) { case XT_XTP_SV_SHOW_CERT: args.i = XT_SHOW; cert_cmd(t, &args); break; case XT_XTP_SV_ALLOW_SESSION: soupuri = soup_uri_new(sv->uri); svi = malloc(sizeof(struct sv_ignore)); svi->domain = g_strdup(soupuri->host); RB_INSERT(sv_ignore_list, &svil, svi); load_uri(t, sv->uri); focus_webview(t); break; case XT_XTP_SV_CACHE: args.i = XT_CACHE; cert_cmd(t, &args); load_uri(t, sv->uri); focus_webview(t); break; default: show_oops(t, "%s: invalid secviolation command", __func__); break; }; g_free(sv->uri); if (soupuri) soup_uri_free(soupuri); RB_REMOVE(secviolation_list, &svl, sv); } void xtp_handle_rt(struct tab *t, uint8_t cmd, int id, const char *query) { struct set_reject *sr; GHashTable *new_settings = NULL; int modify; char *val, *curval, *s; int i = 0; switch (cmd) { case XT_XTP_RT_SAVE: if (query == NULL) break; new_settings = soup_form_decode(query); for (i = 0; i < get_settings_size(); ++i) { if (!rs[i].activate) continue; sr = g_malloc(sizeof *sr); val = (char *)g_hash_table_lookup(new_settings, rs[i].name); modify = 0; switch (rs[i].type) { case XT_S_INT: /* FALLTHROUGH */ case XT_S_BOOL: if (atoi(val) != *rs[i].ival) modify = 1; break; case XT_S_FLOAT: if (atof(val) != *rs[i].fval) modify = 1; break; case XT_S_STR: s = (rs[i].sval == NULL || *rs[i].sval == NULL) ? "" : *rs[i].sval; if (rs[i].sval && g_strcmp0(val, s)) modify = 1; else if (rs[i].s && rs[i].s->get) { curval = rs[i].s->get(NULL); if (g_strcmp0(val, curval)) modify = 1; g_free(curval); } break; case XT_S_INVALID: /* FALLTHROUGH */ default: break; } if (rs[i].activate(val)) { sr->name = g_strdup(rs[i].name); sr->value = g_strdup(val); TAILQ_INSERT_TAIL(&srl, sr, entry); continue; } if (modify) if (save_runtime_setting(rs[i].name, val)) show_oops(t, "error"); } break; default: show_oops(t, "%s: invalid set command", __func__); break; } if (new_settings) g_hash_table_destroy(new_settings); xtp_page_rt(t, NULL); } /* link an XTP class to it's session key and handler function */ struct xtp_despatch { uint8_t xtp_class; char **session_key; void (*handle_func)(struct tab *, uint8_t, int, const char *query); }; struct xtp_despatch xtp_despatches[] = { { XT_XTP_DL, &dl_session_key, xtp_handle_dl }, { XT_XTP_HL, &hl_session_key, xtp_handle_hl }, { XT_XTP_FL, &fl_session_key, xtp_handle_fl }, { XT_XTP_CL, &cl_session_key, xtp_handle_cl }, { XT_XTP_SL, &sl_session_key, xtp_handle_sl }, { XT_XTP_AB, &ab_session_key, xtp_handle_ab }, { XT_XTP_SV, &sv_session_key, xtp_handle_sv }, { XT_XTP_RT, &rt_session_key, xtp_handle_rt }, { XT_XTP_INVALID, NULL, NULL } }; /* * generate a session key to secure xtp commands. * pass in a ptr to the key in question and it will * be modified in place. */ void generate_xtp_session_key(char **key) { uint8_t rand_bytes[XT_XTP_SES_KEY_SZ]; /* free old key */ if (*key) g_free(*key); /* make a new one */ arc4random_buf(rand_bytes, XT_XTP_SES_KEY_SZ); *key = g_strdup_printf(XT_XTP_SES_KEY_HEX_FMT, rand_bytes[0], rand_bytes[1], rand_bytes[2], rand_bytes[3], rand_bytes[4], rand_bytes[5], rand_bytes[6], rand_bytes[7]); DNPRINTF(XT_D_DOWNLOAD, "%s: new session key '%s'\n", __func__, *key); } void xtp_generate_keys(void) { /* generate session keys for xtp pages */ generate_xtp_session_key(&dl_session_key); generate_xtp_session_key(&hl_session_key); generate_xtp_session_key(&cl_session_key); generate_xtp_session_key(&fl_session_key); generate_xtp_session_key(&ab_session_key); generate_xtp_session_key(&sv_session_key); } /* * validate a xtp session key. * return (1) if OK */ int validate_xtp_session_key(struct tab *t, char *trusted, char *untrusted) { if (strcmp(trusted, untrusted) != 0) { show_oops(t, "%s: xtp session key mismatch possible spoof", __func__); return (0); } return (1); } /* * is the url xtp protocol? (xxxt://) * if so, parse and despatch correct bahvior */ int parse_xtp_url(struct tab *t, const char *uri_str) { SoupURI *uri = NULL; struct xtp_despatch *dsp, *dsp_match = NULL; int ret = FALSE; int class = 0; char **sv = NULL; /* * uri->host = class * sv[0] = session key * sv[1] = command * sv[2] = optional argument */ DNPRINTF(XT_D_URL, "%s: url %s\n", __func__, url); if ((uri = soup_uri_new(uri_str)) == NULL) goto clean; if (strncmp(uri->scheme, XT_XTP_SCHEME, strlen(XT_XTP_SCHEME))) goto clean; if (uri->host == NULL || strlen(uri->host) == 0) goto clean; else class = atoi(uri->host); if ((sv = g_strsplit(uri->path + 1, "/", 3)) == NULL) goto clean; if (sv[0] == NULL || sv[1] == NULL) goto clean; dsp = xtp_despatches; class = atoi(uri->host); while (dsp->xtp_class) { if (dsp->xtp_class == class) { dsp_match = dsp; break; } dsp++; } /* did we find one atall? */ if (dsp_match == NULL) { show_oops(t, "%s: no matching xtp despatch found", __func__); goto clean; } /* check session key and call despatch function */ if (validate_xtp_session_key(t, *(dsp_match->session_key), sv[0])) { ret = TRUE; /* all is well, this was a valid xtp request */ if (sv[2]) dsp_match->handle_func(t, atoi(sv[1]), atoi(sv[2]), uri->query); else dsp_match->handle_func(t, atoi(sv[1]), 0, uri->query); } clean: if (uri) soup_uri_free(uri); if (sv) g_strfreev(sv); return (ret); } /* * update all favorite tabs apart from one. Pass NULL if * you want to update all. */ void update_favorite_tabs(struct tab *apart_from) { struct tab *t; if (!updating_fl_tabs) { updating_fl_tabs = 1; /* stop infinite recursion */ TAILQ_FOREACH(t, &tabs, entry) if ((t->xtp_meaning == XT_XTP_TAB_MEANING_FL) && (t != apart_from)) xtp_page_fl(t, NULL); updating_fl_tabs = 0; } } /* * update all download tabs apart from one. Pass NULL if * you want to update all. */ void update_download_tabs(struct tab *apart_from) { struct tab *t; if (!updating_dl_tabs) { updating_dl_tabs = 1; /* stop infinite recursion */ TAILQ_FOREACH(t, &tabs, entry) if ((t->xtp_meaning == XT_XTP_TAB_MEANING_DL) && (t != apart_from)) xtp_page_dl(t, NULL); updating_dl_tabs = 0; } } /* * update all cookie tabs apart from one. Pass NULL if * you want to update all. */ void update_cookie_tabs(struct tab *apart_from) { struct tab *t; if (!updating_cl_tabs) { updating_cl_tabs = 1; /* stop infinite recursion */ TAILQ_FOREACH(t, &tabs, entry) if ((t->xtp_meaning == XT_XTP_TAB_MEANING_CL) && (t != apart_from)) xtp_page_cl(t, NULL); updating_cl_tabs = 0; } } /* * update all history tabs apart from one. Pass NULL if * you want to update all. */ void update_history_tabs(struct tab *apart_from) { struct tab *t; if (!updating_hl_tabs) { updating_hl_tabs = 1; /* stop infinite recursion */ TAILQ_FOREACH(t, &tabs, entry) if ((t->xtp_meaning == XT_XTP_TAB_MEANING_HL) && (t != apart_from)) xtp_page_hl(t, NULL); updating_hl_tabs = 0; } } /* * update all search tabs apart from one. Pass NULL if * you want to update all. */ void update_search_tabs(struct tab *apart_from) { struct tab *t; if (!updating_sl_tabs) { updating_sl_tabs = 1; /* stop infinite recursion */ TAILQ_FOREACH(t, &tabs, entry) if ((t->xtp_meaning == XT_XTP_TAB_MEANING_SL) && (t != apart_from)) xtp_page_sl(t, NULL); updating_sl_tabs = 0; } } /* * update all about tabs apart from one. Pass NULL if * you want to update all. */ void update_about_tabs(struct tab *apart_from) { struct tab *t; if (!updating_ab_tabs) { updating_ab_tabs = 1; /* stop infinite recursion */ TAILQ_FOREACH(t, &tabs, entry) if ((t->xtp_meaning == XT_XTP_TAB_MEANING_AB) && (t != apart_from)) xtp_page_ab(t, NULL); updating_ab_tabs = 0; } } /* * update all secviolation tabs apart from one. Pass NULL if * you want to update all. */ void update_secviolation_tabs(struct tab *apart_from) { struct tab *t; if (!updating_sv_tabs) { updating_sv_tabs = 1; /* stop infinite recursion */ TAILQ_FOREACH(t, &tabs, entry) if ((t->xtp_meaning == XT_XTP_TAB_MEANING_SV) && (t != apart_from)) xtp_page_sv(t, NULL); updating_sv_tabs = 0; } } int xtp_page_ab(struct tab *t, struct karg *args) { char *page, *body; if (t == NULL) show_oops(NULL, "about invalid parameters"); /* * Generate a new session key for next page instance. * This only happens for the top level call to xtp_page_ab() * in which case updating_sl_tabs is 0. */ if (!updating_ab_tabs) generate_xtp_session_key(&ab_session_key); body = g_strdup_printf("Version: %s" #ifdef XOMBRERO_BUILDSTR "
Build: %s" #endif "
WebKit: %d.%d.%d" "
User Agent: %d.%d" #ifdef WEBKITGTK_API_VERSION "
WebKit API: %.1f" #endif "
Configuration: %s" PS ".%s" " (remember to restart the browser after any changes)" "

" "Authors:" "

    " "
  • Marco Peereboom <marco@peereboom.us>
  • " "
  • Stevan Andjelkovic <stevan@student.chalmers.se>
  • " "
  • Edd Barrett <vext01@gmail.com>
  • " "
  • Todd T. Fries <todd@fries.net>
  • " "
  • Raphael Graf <r@undefined.ch>
  • " "
  • Michal Mazurek <akfaew@jasminek.net>
  • " "
  • Josh Rickmar <jrick@devio.us>
  • " "
" "Copyrights and licenses can be found on the xombrero " "website" "

", #ifdef XOMBRERO_BUILDSTR version, XOMBRERO_BUILDSTR, #else version, #endif WEBKIT_MAJOR_VERSION, WEBKIT_MINOR_VERSION, WEBKIT_MICRO_VERSION, WEBKIT_USER_AGENT_MAJOR_VERSION, WEBKIT_USER_AGENT_MINOR_VERSION #ifdef WEBKITGTK_API_VERSION ,WEBKITGTK_API_VERSION #endif ,pwd->pw_dir, XT_XTP_STR, XT_XTP_AB, ab_session_key, XT_XTP_AB_EDIT_CONF, XT_CONF_FILE ); page = get_html_page("About", body, "", 0); g_free(body); load_webkit_string(t, page, XT_URI_ABOUT_ABOUT); update_about_tabs(t); g_free(page); return (0); } /* show a list of favorites (bookmarks) */ int xtp_page_fl(struct tab *t, struct karg *args) { char file[PATH_MAX]; FILE *f; char *uri = NULL, *title = NULL; size_t len, lineno = 0; int i, failed = 0; char *body, *tmp, *page = NULL; const char delim[3] = {'\\', '\\', '\0'}; DNPRINTF(XT_D_FAVORITE, "%s:", __func__); if (t == NULL) warn("%s: bad param", __func__); /* new session key */ if (!updating_fl_tabs) generate_xtp_session_key(&fl_session_key); /* open favorites */ snprintf(file, sizeof file, "%s" PS "%s", work_dir, XT_FAVS_FILE); if ((f = fopen(file, "r")) == NULL) { show_oops(t, "Can't open favorites file: %s", strerror(errno)); return (1); } /* body */ body = g_strdup_printf("" "" "\n"); for (i = 1;;) { if ((title = fparseln(f, &len, &lineno, delim, 0)) == NULL) break; if (strlen(title) == 0) { free(title); title = NULL; continue; } if ((uri = fparseln(f, &len, &lineno, delim, 0)) == NULL) if (feof(f) || ferror(f)) { show_oops(t, "favorites file corrupt"); failed = 1; break; } tmp = body; body = g_strdup_printf("%s" "" "" "" "\n", body, i, uri, title, XT_XTP_STR, XT_XTP_FL, fl_session_key, XT_XTP_FL_REMOVE, i); g_free(tmp); free(uri); uri = NULL; free(title); title = NULL; i++; } fclose(f); /* if none, say so */ if (i == 1) { tmp = body; body = g_strdup_printf("%s" "", body); g_free(tmp); } tmp = body; body = g_strdup_printf("%s
#LinkRm
%d%s" "X
" "No favorites - To add one use the 'favadd' command." "
", body); g_free(tmp); if (uri) free(uri); if (title) free(title); /* render */ if (!failed) { page = get_html_page("Favorites", body, "", 1); load_webkit_string(t, page, XT_URI_ABOUT_FAVORITES); g_free(page); } update_favorite_tabs(t); if (body) g_free(body); return (failed); } /* * Return a new string with a download row (in html) * appended. Old string is freed. */ char * xtp_page_dl_row(struct tab *t, char *html, struct download *dl) { WebKitDownloadStatus stat; const gchar *destination; char *status_html = NULL, *cmd_html = NULL, *new_html; gdouble progress; char cur_sz[FMT_SCALED_STRSIZE]; char tot_sz[FMT_SCALED_STRSIZE]; char *xtp_prefix; DNPRINTF(XT_D_DOWNLOAD, "%s: dl->id %d\n", __func__, dl->id); /* All actions wil take this form: * xxxt://class/seskey */ xtp_prefix = g_strdup_printf("%s%d/%s/", XT_XTP_STR, XT_XTP_DL, dl_session_key); stat = webkit_download_get_status(dl->download); switch (stat) { case WEBKIT_DOWNLOAD_STATUS_FINISHED: status_html = g_strdup_printf("Finished"); cmd_html = g_strdup_printf( "Remove / Unlink", xtp_prefix, XT_XTP_DL_REMOVE, dl->id, xtp_prefix, XT_XTP_DL_UNLINK, dl->id); break; case WEBKIT_DOWNLOAD_STATUS_STARTED: /* gather size info */ progress = 100 * webkit_download_get_progress(dl->download); fmt_scaled( webkit_download_get_current_size(dl->download), cur_sz); fmt_scaled( webkit_download_get_total_size(dl->download), tot_sz); status_html = g_strdup_printf( "
" "
" "
" "
" "
%s of %s (%.2f%%)
", progress, cur_sz, tot_sz, progress); cmd_html = g_strdup_printf("Cancel", xtp_prefix, XT_XTP_DL_CANCEL, dl->id); break; /* LLL */ case WEBKIT_DOWNLOAD_STATUS_CANCELLED: status_html = g_strdup_printf("Cancelled"); cmd_html = g_strdup_printf( "Restart / Remove / Unlink", xtp_prefix, XT_XTP_DL_START, dl->id, xtp_prefix, XT_XTP_DL_REMOVE, dl->id, xtp_prefix, XT_XTP_DL_UNLINK, dl->id); break; case WEBKIT_DOWNLOAD_STATUS_ERROR: status_html = g_strdup_printf("Error!"); cmd_html = g_strdup_printf( "Restart / Remove / Unlink", xtp_prefix, XT_XTP_DL_START, dl->id, xtp_prefix, XT_XTP_DL_REMOVE, dl->id, xtp_prefix, XT_XTP_DL_UNLINK, dl->id); break; case WEBKIT_DOWNLOAD_STATUS_CREATED: cmd_html = g_strdup_printf("Start / Cancel", xtp_prefix, XT_XTP_DL_START, dl->id, xtp_prefix, XT_XTP_DL_CANCEL, dl->id); status_html = g_strdup_printf("Created"); break; default: show_oops(t, "%s: unknown download status", __func__); }; destination = webkit_download_get_destination_uri(dl->download); /* we might not have a destination set yet */ if (!destination) destination = webkit_download_get_suggested_filename(dl->download); new_html = g_strdup_printf( "%s\n%s%s" "%s\n", html, basename((char *)destination), status_html, cmd_html); g_free(html); if (status_html) g_free(status_html); if (cmd_html) g_free(cmd_html); g_free(xtp_prefix); return new_html; } /* cookie management XTP page */ int xtp_page_cl(struct tab *t, struct karg *args) { char *body, *page, *tmp; int i = 1; /* all ids start 1 */ int domain_id = 0; GSList *sc, *pc, *pc_start; SoupCookie *c; char *type, *table_headers, *last_domain; DNPRINTF(XT_D_CMD, "%s", __func__); if (t == NULL) { show_oops(NULL, "%s invalid parameters", __func__); return (1); } /* Generate a new session key */ if (!updating_cl_tabs) generate_xtp_session_key(&cl_session_key); /* table headers */ table_headers = g_strdup_printf("" "" "" "" "" "" "" "" "\n"); sc = soup_cookie_jar_all_cookies(s_cookiejar); pc = soup_cookie_jar_all_cookies(p_cookiejar); pc_start = pc; body = g_strdup_printf("\n", XT_XTP_STR, XT_XTP_CL, cl_session_key, XT_XTP_CL_REMOVE_ALL); last_domain = g_strdup(""); for (; sc; sc = sc->next) { c = sc->data; if (strcmp(last_domain, c->domain) != 0) { /* new domain */ domain_id ++; g_free(last_domain); last_domain = g_strdup(c->domain); if (body != NULL) { tmp = body; body = g_strdup_printf("%s
TypeNameValuePathExpiresSecureHTTP
only
Rm
" "

%s

%s\n", body, c->domain, XT_XTP_STR, XT_XTP_CL, cl_session_key, XT_XTP_CL_REMOVE_DOMAIN, domain_id, table_headers); g_free(tmp); } else { /* first domain */ body = g_strdup_printf("

%s

" "%s\n", c->domain, XT_XTP_STR, XT_XTP_CL, cl_session_key, XT_XTP_CL_REMOVE_DOMAIN, domain_id, table_headers); } } type = "Session"; for (pc = pc_start; pc; pc = pc->next) if (soup_cookie_equal(pc->data, c)) { type = "Session + Persistent"; break; } tmp = body; body = g_strdup_printf( "%s\n" "%s" "%s" "" " " "" "%s" "%s" "%d" "%d" "" "X\n", body, type, c->name, c->value, c->path, c->expires ? soup_date_to_string(c->expires, SOUP_DATE_COOKIE) : "", c->secure, c->http_only, XT_XTP_STR, XT_XTP_CL, cl_session_key, XT_XTP_CL_REMOVE, i ); g_free(tmp); i++; } soup_cookies_free(sc); soup_cookies_free(pc); /* small message if there are none */ if (i == 1) { body = g_strdup_printf("%s\nNo Cookies\n", table_headers); } tmp = body; body = g_strdup_printf("%s", body); g_free(tmp); page = get_html_page("Cookie Jar", body, "", TRUE); g_free(body); g_free(table_headers); g_free(last_domain); load_webkit_string(t, page, XT_URI_ABOUT_COOKIEJAR); update_cookie_tabs(t); g_free(page); return (0); } int xtp_page_hl(struct tab *t, struct karg *args) { char *body, *page, *tmp; struct history *h; int i = 1; /* all ids start 1 */ DNPRINTF(XT_D_CMD, "%s", __func__); if (t == NULL) { show_oops(NULL, "%s invalid parameters", __func__); return (1); } /* Generate a new session key */ if (!updating_hl_tabs) generate_xtp_session_key(&hl_session_key); /* body */ body = g_strdup_printf("" "" "" "\n", XT_XTP_STR, XT_XTP_HL, hl_session_key, XT_XTP_HL_REMOVE_ALL); RB_FOREACH_REVERSE(h, history_list, &hl) { tmp = body; body = g_strdup_printf( "%s\n" "" "" "" "\n", body, h->uri, h->uri, h->title, ctime(&h->time), XT_XTP_STR, XT_XTP_HL, hl_session_key, XT_XTP_HL_REMOVE, i); g_free(tmp); i++; } /* small message if there are none */ if (i == 1) { tmp = body; body = g_strdup_printf("%s\n\n", body); g_free(tmp); } tmp = body; body = g_strdup_printf("%s
URITitleLast visitedRm
%s%s%s" "X
No History
", body); g_free(tmp); page = get_html_page("History", body, "", TRUE); g_free(body); /* * update all history manager tabs as the xtp session * key has now changed. No need to update the current tab. * Already did that above. */ update_history_tabs(t); load_webkit_string(t, page, XT_URI_ABOUT_HISTORY); g_free(page); return (0); } /* * Generate a web page detailing the status of any downloads */ int xtp_page_dl(struct tab *t, struct karg *args) { struct download *dl; char *body, *page, *tmp; char *ref; int n_dl = 1; DNPRINTF(XT_D_DOWNLOAD, "%s", __func__); if (t == NULL) { show_oops(NULL, "%s invalid parameters", __func__); return (1); } /* * Generate a new session key for next page instance. * This only happens for the top level call to xtp_page_dl() * in which case updating_dl_tabs is 0. */ if (!updating_dl_tabs) generate_xtp_session_key(&dl_session_key); /* header - with refresh so as to update */ if (refresh_interval >= 1) ref = g_strdup_printf( "\n", refresh_interval, XT_XTP_STR, XT_XTP_DL, dl_session_key, XT_XTP_DL_LIST); else ref = g_strdup(""); body = g_strdup_printf("
" "

\n\n[ Refresh Downloads ]\n" "

\n\n", XT_XTP_STR, XT_XTP_DL, dl_session_key, XT_XTP_DL_LIST); RB_FOREACH_REVERSE(dl, download_list, &downloads) { body = xtp_page_dl_row(t, body, dl); n_dl++; } /* message if no downloads in list */ if (n_dl == 1) { tmp = body; body = g_strdup_printf("%s\n\n", body); g_free(tmp); } tmp = body; body = g_strdup_printf("%s
" "FileProgressCommand
" "No downloads
", body); g_free(tmp); page = get_html_page("Downloads", body, ref, 1); g_free(ref); g_free(body); /* * update all download manager tabs as the xtp session * key has now changed. No need to update the current tab. * Already did that above. */ update_download_tabs(t); load_webkit_string(t, page, XT_URI_ABOUT_DOWNLOADS); g_free(page); return (0); } int xtp_page_sl(struct tab *t, struct karg *args) { int i; char *page, *body, *tmp; DNPRINTF(XT_D_SEARCH, "%s", __func__); /* * Generate a new session key for next page instance. * This only happens for the top level call to xtp_page_sl() * in which case updating_sl_tabs is 0. */ if (!updating_sl_tabs) generate_xtp_session_key(&sl_session_key); if (t == NULL) { show_oops(NULL, "%s invalid parameters", __func__); return (1); } body = g_strdup_printf("

The xombrero authors will not choose a " "default search engine for you. What follows is a list of search " "engines (in no particular order) you may be interested in. " "To permanently choose a search engine, click [ Select ] to save " "search_string as a runtime setting, or set " "search_string to the appropriate URL in your xombrero " "configuration.

"); tmp = body; body = g_strdup_printf("%s\n" "" "\n", body); g_free(tmp); for (i = 0; i < (sizeof search_list / sizeof (struct search_type)); ++i) body = search_engine_add(body, search_list[i].name, search_list[i].url, i); tmp = body; body = g_strdup_printf("%s
NameURLSelect
", body); g_free(tmp); page = get_html_page("Choose a search engine", body, "", 1); g_free(body); /* * update all search tabs as the xtp session key has now changed. No * need to update the current tab. Already did that above. */ update_search_tabs(t); load_webkit_string(t, page, XT_URI_ABOUT_SEARCH); g_free(page); return (0); } int xtp_page_sv(struct tab *t, struct karg *args) { SoupURI *soupuri; static int arg = 0; struct secviolation find, *sv; char *page, *body; if (t == NULL) show_oops(NULL, "secviolation invalid parameters"); /* * Generate a new session key for next page instance. * This only happens for the top level call to xtp_page_ab() * in which case updating_sv_tabs = 0. */ if (!updating_sv_tabs) generate_xtp_session_key(&sv_session_key); if (args == NULL) { find.xtp_arg = t->xtp_arg; sv = RB_FIND(secviolation_list, &svl, &find); if (sv == NULL) return (-1); } else { sv = g_malloc(sizeof(struct secviolation)); sv->xtp_arg = ++arg; t->xtp_arg = arg; sv->t = t; sv->uri = args->s; RB_INSERT(secviolation_list, &svl, sv); } if (sv->uri == NULL || (soupuri = soup_uri_new(sv->uri)) == NULL) return (-1); body = g_strdup_printf( "The domain of the page you have tried to access, %s, has a " "different remote certificate then the local cached version from a " "previous visit. As a security precaution to help prevent against " "man-in-the-middle attacks, please choose one of the following " "actions to continue, or disable the warn_cert_changes " "setting in your xombrero configuration." "

Choose an action:" "
Show Certificate" "
Allow for this Session" "
Cache new certificate", soupuri->host, XT_XTP_STR, XT_XTP_SV, sv_session_key, XT_XTP_SV_SHOW_CERT, sv->xtp_arg, XT_XTP_STR, XT_XTP_SV, sv_session_key, XT_XTP_SV_ALLOW_SESSION, sv->xtp_arg, XT_XTP_STR, XT_XTP_SV, sv_session_key, XT_XTP_SV_CACHE, sv->xtp_arg); page = get_html_page("Security Violation", body, "", 0); g_free(body); update_secviolation_tabs(t); load_webkit_string(t, page, XT_URI_ABOUT_SECVIOLATION); g_free(page); if (soupuri) soup_uri_free(soupuri); return (0); } int startpage(struct tab *t, struct karg *args) { char *page, *body, *b; struct sp *s; if (t == NULL) show_oops(NULL, "startpage invalid parameters"); body = g_strdup_printf("Startup Exception(s):

"); TAILQ_FOREACH(s, &spl, entry) { b = body; body = g_strdup_printf("%s%s
", body, s->line); g_free(b); } page = get_html_page("Startup Exception", body, "", 0); g_free(body); load_webkit_string(t, page, XT_URI_ABOUT_STARTPAGE); g_free(page); return (0); } void startpage_add(const char *fmt, ...) { va_list ap; char *msg; struct sp *s; if (fmt == NULL) return; va_start(ap, fmt); if ((msg = g_strdup_vprintf(fmt, ap)) == NULL) errx(1, "startpage_add failed"); va_end(ap); s = g_malloc0(sizeof *s); s->line = msg; TAILQ_INSERT_TAIL(&spl, s, entry); } gchar *show_g_object_settings(GObject *, char *, int); char * xt_g_object_serialize(GValue *value, const gchar *tname, char *str, int recurse) { int typeno = 0; char *valstr, *tmpstr, *tmpsettings; GObject *object; typeno = G_TYPE_FUNDAMENTAL( G_VALUE_TYPE(value) ); switch ( typeno ) { case G_TYPE_ENUM: valstr = g_strdup_printf("%d", g_value_get_enum(value)); break; case G_TYPE_CHAR: valstr = g_strdup_printf("%c", g_value_get_schar(value)); break; case G_TYPE_UCHAR: valstr = g_strdup_printf("%c", g_value_get_uchar(value)); break; case G_TYPE_LONG: valstr = g_strdup_printf("%ld", g_value_get_long(value)); break; case G_TYPE_ULONG: valstr = g_strdup_printf("%ld", g_value_get_ulong(value)); break; case G_TYPE_INT: valstr = g_strdup_printf("%d", g_value_get_int(value)); break; case G_TYPE_INT64: valstr = g_strdup_printf("%" PRIo64, (int64_t) g_value_get_int64(value)); break; case G_TYPE_UINT: valstr = g_strdup_printf("%d", g_value_get_uint(value)); break; case G_TYPE_UINT64: valstr = g_strdup_printf("%" PRIu64, (uint64_t) g_value_get_uint64(value)); break; case G_TYPE_FLAGS: valstr = g_strdup_printf("0x%x", g_value_get_flags(value)); break; case G_TYPE_BOOLEAN: valstr = g_strdup_printf("%s", g_value_get_boolean(value) ? "TRUE" : "FALSE"); break; case G_TYPE_FLOAT: valstr = g_strdup_printf("%f", g_value_get_float(value)); break; case G_TYPE_DOUBLE: valstr = g_strdup_printf("%f", g_value_get_double(value)); break; case G_TYPE_STRING: valstr = g_strdup_printf("\"%s\"", g_value_get_string(value)); break; case G_TYPE_POINTER: valstr = g_strdup_printf("%p", g_value_get_pointer(value)); break; case G_TYPE_OBJECT: object = g_value_get_object(value); if (object != NULL) { if (recurse) { tmpstr = g_strdup_printf("%s ", str); tmpsettings = show_g_object_settings( object, tmpstr, recurse); g_free(tmpstr); if (strrchr(tmpsettings, '\n') != NULL) { valstr = g_strdup_printf("%s%s }", tmpsettings, str); g_free(tmpsettings); } else { valstr = tmpsettings; } } else { valstr = g_strdup_printf("<...>"); } } else { valstr = g_strdup_printf("settings[] = NULL"); } break; default: valstr = g_strdup_printf("type %s unhandled", tname); } return valstr; } gchar * show_g_object_settings(GObject *o, char *str, int recurse) { char *b, *p, *body, *valstr, *tmpstr; guint n_props = 0; int i, typeno = 0; GParamSpec *pspec; const gchar *tname; GValue value; GParamSpec **proplist; const gchar *name; if (!G_IS_OBJECT(o)) { fprintf(stderr, "%s is not a g_object\n", str); return g_strdup(""); } proplist = g_object_class_list_properties( G_OBJECT_GET_CLASS(o), &n_props); if (GTK_IS_WIDGET(o)) { name = gtk_widget_get_name(GTK_WIDGET(o)); } else { name = "settings"; } if (n_props == 0) { body = g_strdup_printf("%s[0] = { }", name); goto end_show_g_objects; } body = g_strdup_printf("%s[%d] = {\n", name, n_props); for (i=0; i < n_props; i++) { pspec = proplist[i]; tname = G_OBJECT_TYPE_NAME(pspec); bzero(&value, sizeof value); valstr = NULL; if (!(pspec->flags & G_PARAM_READABLE)) valstr = g_strdup_printf("not a readable property"); else { g_value_init(&value, G_PARAM_SPEC_VALUE_TYPE(pspec)); g_object_get_property(G_OBJECT(o), pspec->name, &value); typeno = G_TYPE_FUNDAMENTAL( G_VALUE_TYPE(&value) ); } /* based on the type, recurse and display values */ if (valstr == NULL) { valstr = xt_g_object_serialize(&value, tname, str, recurse); } tmpstr = g_strdup_printf("%-13s %s%s%s,", tname, pspec->name, (typeno == G_TYPE_OBJECT) ? "." : " = ", valstr); b = body; #define XT_G_OBJECT_SPACING 50 p = strrchr(tmpstr, '\n'); if (p == NULL && strlen(tmpstr) > XT_G_OBJECT_SPACING) { body = g_strdup_printf( "%s%s %-50s\n%s %50s /* %3d flags=0x%08x */\n", body, str, tmpstr, str, "", i, pspec->flags); } else { char *fmt; int strspaces; if (p == NULL) strspaces = XT_G_OBJECT_SPACING; else strspaces = strlen(tmpstr) - (strlen(p) - strlen(str)) + XT_G_OBJECT_SPACING + 5; fmt = g_strdup_printf("%%s%%s %%-%ds /* %%3d flags=0x%%08x */\n", strspaces); body = g_strdup_printf(fmt, body, str, tmpstr, i, pspec->flags); g_free(fmt); } g_free(tmpstr); g_free(b); g_free(valstr); } end_show_g_objects: g_free(proplist); return (body); } char * xt_append_settings(char *str, GObject *object, char *name, int recurse) { char *newstr, *settings; settings = show_g_object_settings(object, name, recurse); if (str == NULL) { str = g_strdup(""); } newstr = g_strdup_printf("%s%s %s%s };\n", str, name, settings, name); g_free(str); return newstr; } int about_webkit(struct tab *t, struct karg *arg) { char *page, *body, *settingstr; settingstr = xt_append_settings(NULL, G_OBJECT(t->settings), "t->settings", 0); body = g_strdup_printf("

%s
\n", settingstr); g_free(settingstr); page = get_html_page("About Webkit", body, "", 0); g_free(body); load_webkit_string(t, page, XT_URI_ABOUT_WEBKIT); g_free(page); return (0); } int allthethings(struct tab *t, struct karg *arg) { char *page, *body, *b; GList *list, *liter; int toplevelcount = 0; body = xt_append_settings(NULL, G_OBJECT(t->wv), "t->wv", 1); body = xt_append_settings(body, G_OBJECT(t->inspector), "t->inspector", 1); #if 0 /* not until warnings are gone */ body = xt_append_settings(body, G_OBJECT(session), "session", 1); #endif list = gtk_window_list_toplevels(); for(liter = list; liter != NULL; liter = liter->next) { b = g_strdup_printf("toplevel#%x", toplevelcount++); body = xt_append_settings(body, G_OBJECT(liter->data), b, 1); g_free(b); } b = body; body = g_strdup_printf("
%scan paste clipboard = %d\n
", body, webkit_web_view_can_paste_clipboard(t->wv)); g_free(b); page = get_html_page("About All The Things _o/", body, "", 0); g_free(body); load_webkit_string(t, page, XT_URI_ABOUT_ALLTHETHINGS); g_free(page); return (0); }