1 ;;; secrets.el --- Client interface to gnome-keyring and kwallet.
3 ;; Copyright (C) 2010-2014 Free Software Foundation, Inc.
5 ;; Author: Michael Albinus <michael.albinus@gmx.de>
6 ;; Keywords: comm password passphrase
8 ;; This file is part of GNU Emacs.
10 ;; GNU Emacs is free software: you can redistribute it and/or modify
11 ;; it under the terms of the GNU General Public License as published by
12 ;; the Free Software Foundation, either version 3 of the License, or
13 ;; (at your option) any later version.
15 ;; GNU Emacs is distributed in the hope that it will be useful,
16 ;; but WITHOUT ANY WARRANTY; without even the implied warranty of
17 ;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 ;; GNU General Public License for more details.
20 ;; You should have received a copy of the GNU General Public License
21 ;; along with GNU Emacs. If not, see <http://www.gnu.org/licenses/>.
25 ;; This package provides an implementation of the Secret Service API
26 ;; <http://www.freedesktop.org/wiki/Specifications/secret-storage-spec>.
27 ;; This API is meant to make GNOME-Keyring- and KWallet-like daemons
28 ;; available under a common D-BUS interface and thus increase
29 ;; interoperability between GNOME, KDE and other applications having
30 ;; the need to securely store passwords and other confidential
33 ;; In order to activate this package, you must add the following code
38 ;; Afterwards, the variable `secrets-enabled' is non-nil when there is
39 ;; a daemon providing this interface.
41 ;; The atomic objects to be managed by the Secret Service API are
42 ;; secret items, which are something an application wishes to store
43 ;; securely. A good example is a password that an application needs
44 ;; to save and use at a later date.
46 ;; Secret items are grouped in collections. A collection is similar
47 ;; in concept to the terms 'keyring' or 'wallet'. A common collection
48 ;; is called "login". A collection is stored permanently under the
49 ;; user's permissions, and can be accessed in a user session context.
51 ;; A collection can have an alias name. The use case for this is to
52 ;; set the alias "default" for a given collection, making it
53 ;; transparent for clients, which collection is used. Other aliases
54 ;; are not supported (yet). Since an alias is visible to all
55 ;; applications, this setting shall be performed with care.
57 ;; A list of all available collections is available by
59 ;; (secrets-list-collections)
60 ;; => ("session" "login" "ssh keys")
62 ;; The "default" alias could be set to the "login" collection by
64 ;; (secrets-set-alias "login" "default")
66 ;; An alias can also be dereferenced
68 ;; (secrets-get-alias "default")
71 ;; Collections can be created and deleted. As already said,
72 ;; collections are used by different applications. Therefore, those
73 ;; operations shall also be performed with care. Common collections,
74 ;; like "login", shall not be changed except adding or deleting secret
77 ;; (secrets-delete-collection "my collection")
78 ;; (secrets-create-collection "my collection")
80 ;; There exists a special collection called "session", which has the
81 ;; lifetime of the corresponding client session (aka Emacs's
82 ;; lifetime). It is created automatically when Emacs uses the Secret
83 ;; Service interface, and it is deleted when Emacs is killed.
84 ;; Therefore, it can be used to store and retrieve secret items
85 ;; temporarily. This shall be preferred over creation of a persistent
86 ;; collection, when the information shall not live longer than Emacs.
87 ;; The session collection can be addressed either by the string
88 ;; "session", or by `nil', whenever a collection parameter is needed.
90 ;; As already said, a collection is a group of secret items. A secret
91 ;; item has a label, the "secret" (which is a string), and a set of
92 ;; lookup attributes. The attributes can be used to search and
93 ;; retrieve a secret item at a later date.
95 ;; A list of all available secret items of a collection is available by
97 ;; (secrets-list-items "my collection")
98 ;; => ("this item" "another item")
100 ;; Secret items can be added or deleted to a collection. In the
101 ;; following examples, we use the special collection "session", which
102 ;; is bound to Emacs's lifetime.
104 ;; (secrets-delete-item "session" "my item")
105 ;; (secrets-create-item "session" "my item" "geheim"
106 ;; :user "joe" :host "remote-host")
108 ;; The string "geheim" is the secret of the secret item "my item".
109 ;; The secret string can be retrieved from items:
111 ;; (secrets-get-secret "session" "my item")
114 ;; The lookup attributes, which are specified during creation of a
115 ;; secret item, must be a key-value pair. Keys are keyword symbols,
116 ;; starting with a colon; values are strings. They can be retrieved
117 ;; from a given secret item:
119 ;; (secrets-get-attribute "session" "my item" :host)
122 ;; (secrets-get-attributes "session" "my item")
123 ;; => ((:user . "joe") (:host ."remote-host"))
125 ;; The lookup attributes can be used for searching of items. If you,
126 ;; for example, are looking for all secret items for the user "joe",
129 ;; (secrets-search-items "session" :user "joe")
130 ;; => ("my item" "another item")
132 ;; Interactively, collections, items and their attributes could be
133 ;; inspected by the command `secrets-show-secrets'.
137 ;; It has been tested with GNOME Keyring 2.29.92. An implementation
138 ;; for KWallet will be available at
139 ;; svn://anonsvn.kde.org/home/kde/trunk/playground/base/ksecretservice;
142 ;; Pacify byte-compiler. D-Bus support in the Emacs core can be
143 ;; disabled with configuration option "--without-dbus". Declare used
144 ;; subroutines and variables of `dbus' therefore.
145 (eval-when-compile (require 'cl-lib
))
151 (autoload 'tree-widget-set-theme
"tree-widget")
152 (autoload 'widget-create-child-and-convert
"wid-edit")
153 (autoload 'widget-default-value-set
"wid-edit")
154 (autoload 'widget-field-end
"wid-edit")
155 (autoload 'widget-member
"wid-edit")
156 (defvar tree-widget-after-toggle-functions
)
158 (defvar secrets-enabled nil
159 "Whether there is a daemon offering the Secret Service API.")
161 (defvar secrets-debug t
162 "Write debug messages")
164 (defconst secrets-service
"org.freedesktop.secrets"
165 "The D-Bus name used to talk to Secret Service.")
167 (defconst secrets-path
"/org/freedesktop/secrets"
168 "The D-Bus root object path used to talk to Secret Service.")
170 (defconst secrets-empty-path
"/"
171 "The D-Bus object path representing an empty object.")
173 (defsubst secrets-empty-path
(path)
174 "Check, whether PATH is a valid object path.
175 It returns t if not."
176 (or (not (stringp path
))
177 (string-equal path secrets-empty-path
)))
179 (defconst secrets-interface-service
"org.freedesktop.Secret.Service"
180 "The D-Bus interface managing sessions and collections.")
182 ;; <interface name="org.freedesktop.Secret.Service">
183 ;; <property name="Collections" type="ao" access="read"/>
184 ;; <method name="OpenSession">
185 ;; <arg name="algorithm" type="s" direction="in"/>
186 ;; <arg name="input" type="v" direction="in"/>
187 ;; <arg name="output" type="v" direction="out"/>
188 ;; <arg name="result" type="o" direction="out"/>
190 ;; <method name="CreateCollection">
191 ;; <arg name="props" type="a{sv}" direction="in"/>
192 ;; <arg name="alias" type="s" direction="in"/> ;; Added 2011/3/1
193 ;; <arg name="collection" type="o" direction="out"/>
194 ;; <arg name="prompt" type="o" direction="out"/>
196 ;; <method name="SearchItems">
197 ;; <arg name="attributes" type="a{ss}" direction="in"/>
198 ;; <arg name="unlocked" type="ao" direction="out"/>
199 ;; <arg name="locked" type="ao" direction="out"/>
201 ;; <method name="Unlock">
202 ;; <arg name="objects" type="ao" direction="in"/>
203 ;; <arg name="unlocked" type="ao" direction="out"/>
204 ;; <arg name="prompt" type="o" direction="out"/>
206 ;; <method name="Lock">
207 ;; <arg name="objects" type="ao" direction="in"/>
208 ;; <arg name="locked" type="ao" direction="out"/>
209 ;; <arg name="Prompt" type="o" direction="out"/>
211 ;; <method name="GetSecrets">
212 ;; <arg name="items" type="ao" direction="in"/>
213 ;; <arg name="session" type="o" direction="in"/>
214 ;; <arg name="secrets" type="a{o(oayays)}" direction="out"/>
216 ;; <method name="ReadAlias">
217 ;; <arg name="name" type="s" direction="in"/>
218 ;; <arg name="collection" type="o" direction="out"/>
220 ;; <method name="SetAlias">
221 ;; <arg name="name" type="s" direction="in"/>
222 ;; <arg name="collection" type="o" direction="in"/>
224 ;; <signal name="CollectionCreated">
225 ;; <arg name="collection" type="o"/>
227 ;; <signal name="CollectionDeleted">
228 ;; <arg name="collection" type="o"/>
232 (defconst secrets-interface-collection
"org.freedesktop.Secret.Collection"
233 "A collection of items containing secrets.")
235 ;; <interface name="org.freedesktop.Secret.Collection">
236 ;; <property name="Items" type="ao" access="read"/>
237 ;; <property name="Label" type="s" access="readwrite"/>
238 ;; <property name="Locked" type="b" access="read"/>
239 ;; <property name="Created" type="t" access="read"/>
240 ;; <property name="Modified" type="t" access="read"/>
241 ;; <method name="Delete">
242 ;; <arg name="prompt" type="o" direction="out"/>
244 ;; <method name="SearchItems">
245 ;; <arg name="attributes" type="a{ss}" direction="in"/>
246 ;; <arg name="results" type="ao" direction="out"/>
248 ;; <method name="CreateItem">
249 ;; <arg name="props" type="a{sv}" direction="in"/>
250 ;; <arg name="secret" type="(oayays)" direction="in"/>
251 ;; <arg name="replace" type="b" direction="in"/>
252 ;; <arg name="item" type="o" direction="out"/>
253 ;; <arg name="prompt" type="o" direction="out"/>
255 ;; <signal name="ItemCreated">
256 ;; <arg name="item" type="o"/>
258 ;; <signal name="ItemDeleted">
259 ;; <arg name="item" type="o"/>
261 ;; <signal name="ItemChanged">
262 ;; <arg name="item" type="o"/>
266 (defconst secrets-session-collection-path
267 "/org/freedesktop/secrets/collection/session"
268 "The D-Bus temporary session collection object path.")
270 (defconst secrets-interface-prompt
"org.freedesktop.Secret.Prompt"
271 "A session tracks state between the service and a client application.")
273 ;; <interface name="org.freedesktop.Secret.Prompt">
274 ;; <method name="Prompt">
275 ;; <arg name="window-id" type="s" direction="in"/>
277 ;; <method name="Dismiss"></method>
278 ;; <signal name="Completed">
279 ;; <arg name="dismissed" type="b"/>
280 ;; <arg name="result" type="v"/>
284 (defconst secrets-interface-item
"org.freedesktop.Secret.Item"
285 "A collection of items containing secrets.")
287 ;; <interface name="org.freedesktop.Secret.Item">
288 ;; <property name="Locked" type="b" access="read"/>
289 ;; <property name="Attributes" type="a{ss}" access="readwrite"/>
290 ;; <property name="Label" type="s" access="readwrite"/>
291 ;; <property name="Created" type="t" access="read"/>
292 ;; <property name="Modified" type="t" access="read"/>
293 ;; <method name="Delete">
294 ;; <arg name="prompt" type="o" direction="out"/>
296 ;; <method name="GetSecret">
297 ;; <arg name="session" type="o" direction="in"/>
298 ;; <arg name="secret" type="(oayays)" direction="out"/>
300 ;; <method name="SetSecret">
301 ;; <arg name="secret" type="(oayays)" direction="in"/>
306 ;; OBJECT PATH session
307 ;; ARRAY BYTE parameters
309 ;; STRING content_type ;; Added 2011/2/9
311 (defconst secrets-interface-item-type-generic
"org.freedesktop.Secret.Generic"
312 "The default item type we are using.")
314 ;; We cannot use introspection, because some servers, like
315 ;; mate-keyring-daemon, don't provide relevant data. Once the dust
316 ;; has settled, we shall assume the new interface, and get rid of the test.
317 (defconst secrets-struct-secret-content-type
319 (let ((content-type "text/plain")
322 :session secrets-service secrets-path
323 secrets-interface-service
324 "OpenSession" "plain" '(:variant
""))))
326 ;; Create a dummy item.
329 :session secrets-service secrets-session-collection-path
330 secrets-interface-collection
"CreateItem"
333 (:dict-entry
,(concat secrets-interface-item
".Label")
335 (:dict-entry
,(concat secrets-interface-item
".Type")
336 (:variant
,secrets-interface-item-type-generic
)))
338 `(:struct
:object-path
,path
339 (:array
:signature
"y")
340 ,(dbus-string-to-byte-array " ")
341 :string
,content-type
)
346 :session secrets-service
(car result
)
347 secrets-interface-item
"Delete")
350 "The content_type of a secret struct.
351 It must be wrapped as list, because we add it via `append'. This
352 is an interface introduced in 2011.")
354 (defconst secrets-interface-session
"org.freedesktop.Secret.Session"
355 "A session tracks state between the service and a client application.")
357 ;; <interface name="org.freedesktop.Secret.Session">
358 ;; <method name="Close"></method>
363 (defvar secrets-session-path secrets-empty-path
364 "The D-Bus session path of the active session.
365 A session path `secrets-empty-path' indicates there is no open session.")
367 (defun secrets-close-session ()
368 "Close the secret service session, if any."
371 :session secrets-service secrets-session-path
372 secrets-interface-session
"Close"))
373 (setq secrets-session-path secrets-empty-path
))
375 (defun secrets-open-session (&optional reopen
)
376 "Open a new session with \"plain\" algorithm.
377 If there exists another active session, and REOPEN is nil, that
378 session will be used. The object path of the session will be
379 returned, and it will be stored in `secrets-session-path'."
380 (when reopen
(secrets-close-session))
381 (when (secrets-empty-path secrets-session-path
)
382 (setq secrets-session-path
385 :session secrets-service secrets-path
386 secrets-interface-service
"OpenSession" "plain" '(:variant
"")))))
388 (message "Secret Service session: %s" secrets-session-path
))
389 secrets-session-path
)
393 (defvar secrets-prompt-signal nil
394 "Internal variable to catch signals from `secrets-interface-prompt'.")
396 (defun secrets-prompt (prompt)
397 "Handle the prompt identified by object path PROMPT."
398 (unless (secrets-empty-path prompt
)
400 (dbus-register-signal
401 :session secrets-service prompt
402 secrets-interface-prompt
"Completed" 'secrets-prompt-handler
)))
404 :session secrets-service prompt
405 secrets-interface-prompt
"Prompt" (frame-parameter nil
'window-id
))
408 ;; Wait until the returned prompt signal has put the
409 ;; result into `secrets-prompt-signal'.
410 (while (null secrets-prompt-signal
)
411 (read-event nil nil
0.1))
412 ;; Return the object(s). It is a variant, so we must use a car.
413 (car secrets-prompt-signal
))
415 (setq secrets-prompt-signal nil
)
416 (dbus-unregister-object object
)))))
418 (defun secrets-prompt-handler (&rest args
)
419 "Handler for signals emitted by `secrets-interface-prompt'."
420 ;; An empty object path is always identified as `secrets-empty-path'
421 ;; or `nil'. Either we set it explicitly, or it is returned by the
422 ;; "Completed" signal.
423 (if (car args
) ;; dismissed
424 (setq secrets-prompt-signal
(list secrets-empty-path
))
425 (setq secrets-prompt-signal
(cadr args
))))
429 (defvar secrets-collection-paths nil
430 "Cached D-Bus object paths of available collections.")
432 (defun secrets-collection-handler (&rest args
)
433 "Handler for signals emitted by `secrets-interface-service'."
435 ((string-equal (dbus-event-member-name last-input-event
) "CollectionCreated")
436 (add-to-list 'secrets-collection-paths
(car args
)))
437 ((string-equal (dbus-event-member-name last-input-event
) "CollectionDeleted")
438 (setq secrets-collection-paths
439 (delete (car args
) secrets-collection-paths
)))))
441 (defun secrets-get-collections ()
442 "Return the object paths of all available collections."
443 (setq secrets-collection-paths
444 (or secrets-collection-paths
446 :session secrets-service secrets-path
447 secrets-interface-service
"Collections"))))
449 (defun secrets-get-collection-properties (collection-path)
450 "Return all properties of collection identified by COLLECTION-PATH."
451 (unless (secrets-empty-path collection-path
)
452 (dbus-get-all-properties
453 :session secrets-service collection-path
454 secrets-interface-collection
)))
456 (defun secrets-get-collection-property (collection-path property
)
457 "Return property PROPERTY of collection identified by COLLECTION-PATH."
458 (unless (or (secrets-empty-path collection-path
) (not (stringp property
)))
460 :session secrets-service collection-path
461 secrets-interface-collection property
)))
463 (defun secrets-list-collections ()
464 "Return a list of collection names."
466 (lambda (collection-path)
467 (if (string-equal collection-path secrets-session-collection-path
)
469 (secrets-get-collection-property collection-path
"Label")))
470 (secrets-get-collections)))
472 (defun secrets-collection-path (collection)
473 "Return the object path of collection labeled COLLECTION.
474 If COLLECTION is nil, return the session collection path.
475 If there is no such COLLECTION, return nil."
477 ;; The "session" collection.
478 (if (or (null collection
) (string-equal "session" collection
))
479 secrets-session-collection-path
)
480 ;; Check for an alias.
481 (let ((collection-path
483 :session secrets-service secrets-path
484 secrets-interface-service
"ReadAlias" collection
)))
485 (unless (secrets-empty-path collection-path
)
487 ;; Check the collections.
488 (catch 'collection-found
489 (dolist (collection-path (secrets-get-collections) nil
)
492 (secrets-get-collection-property collection-path
"Label"))
493 (throw 'collection-found collection-path
))))))
495 (defun secrets-create-collection (collection &optional alias
)
496 "Create collection labeled COLLECTION if it doesn't exist.
497 Set ALIAS as alias of the collection. Return the D-Bus object
498 path for collection."
499 (let ((collection-path (secrets-collection-path collection
)))
500 ;; Create the collection.
501 (when (secrets-empty-path collection-path
)
502 (setq collection-path
505 ;; "CreateCollection" returns the prompt path as second arg.
507 :session secrets-service secrets-path
508 secrets-interface-service
"CreateCollection"
510 (:dict-entry
,(concat secrets-interface-collection
".Label")
511 (:variant
,collection
)))
513 ;; Return object path of the collection.
516 (defun secrets-get-alias (alias)
517 "Return the collection name ALIAS is referencing to.
518 For the time being, only the alias \"default\" is supported."
519 (secrets-get-collection-property
521 :session secrets-service secrets-path
522 secrets-interface-service
"ReadAlias" alias
)
525 (defun secrets-set-alias (collection alias
)
526 "Set ALIAS as alias of collection labeled COLLECTION.
527 For the time being, only the alias \"default\" is supported."
528 (let ((collection-path (secrets-collection-path collection
)))
529 (unless (secrets-empty-path collection-path
)
531 :session secrets-service secrets-path
532 secrets-interface-service
"SetAlias"
533 alias
:object-path collection-path
))))
535 (defun secrets-delete-alias (alias)
536 "Delete ALIAS, referencing to a collection."
538 :session secrets-service secrets-path
539 secrets-interface-service
"SetAlias"
540 alias
:object-path secrets-empty-path
))
542 (defun secrets-unlock-collection (collection)
543 "Unlock collection labeled COLLECTION.
544 If successful, return the object path of the collection."
545 (let ((collection-path (secrets-collection-path collection
)))
546 (unless (secrets-empty-path collection-path
)
550 :session secrets-service secrets-path secrets-interface-service
551 "Unlock" `(:array
:object-path
,collection-path
)))))
554 (defun secrets-delete-collection (collection)
555 "Delete collection labeled COLLECTION."
556 (let ((collection-path (secrets-collection-path collection
)))
557 (unless (secrets-empty-path collection-path
)
560 :session secrets-service collection-path
561 secrets-interface-collection
"Delete")))))
565 (defun secrets-get-items (collection-path)
566 "Return the object paths of all available items in COLLECTION-PATH."
567 (unless (secrets-empty-path collection-path
)
568 (secrets-open-session)
570 :session secrets-service collection-path
571 secrets-interface-collection
"Items")))
573 (defun secrets-get-item-properties (item-path)
574 "Return all properties of item identified by ITEM-PATH."
575 (unless (secrets-empty-path item-path
)
576 (dbus-get-all-properties
577 :session secrets-service item-path
578 secrets-interface-item
)))
580 (defun secrets-get-item-property (item-path property
)
581 "Return property PROPERTY of item identified by ITEM-PATH."
582 (unless (or (secrets-empty-path item-path
) (not (stringp property
)))
584 :session secrets-service item-path
585 secrets-interface-item property
)))
587 (defun secrets-list-items (collection)
588 "Return a list of all item labels of COLLECTION."
589 (let ((collection-path (secrets-unlock-collection collection
)))
590 (unless (secrets-empty-path collection-path
)
593 (secrets-get-item-property item-path
"Label"))
594 (secrets-get-items collection-path
)))))
596 (defun secrets-search-items (collection &rest attributes
)
597 "Search items in COLLECTION with ATTRIBUTES.
598 ATTRIBUTES are key-value pairs. The keys are keyword symbols,
599 starting with a colon. Example:
601 \(secrets-create-item \"Tramp collection\" \"item\" \"geheim\"
602 :method \"sudo\" :user \"joe\" :host \"remote-host\"\)
604 The object paths of the found items are returned as list."
605 (let ((collection-path (secrets-unlock-collection collection
))
607 (unless (secrets-empty-path collection-path
)
608 ;; Create attributes list.
609 (while (consp (cdr attributes
))
610 (unless (keywordp (car attributes
))
611 (error 'wrong-type-argument
(car attributes
)))
612 (setq props
(add-to-list
615 (substring (symbol-name (car attributes
)) 1)
618 attributes
(cddr attributes
)))
619 ;; Search. The result is a list of two lists, the object paths
620 ;; of the unlocked and the locked items.
623 :session secrets-service collection-path
624 secrets-interface-collection
"SearchItems"
627 '(:array
:signature
"{ss}"))))
628 ;; Return the found items.
630 (lambda (item-path) (secrets-get-item-property item-path
"Label"))
631 (append (car result
) (cadr result
))))))
633 (defun secrets-create-item (collection item password
&rest attributes
)
634 "Create a new item in COLLECTION with label ITEM and password PASSWORD.
635 ATTRIBUTES are key-value pairs set for the created item. The
636 keys are keyword symbols, starting with a colon. Example:
638 \(secrets-create-item \"Tramp collection\" \"item\" \"geheim\"
639 :method \"sudo\" :user \"joe\" :host \"remote-host\"\)
641 The object path of the created item is returned."
642 (unless (member item
(secrets-list-items collection
))
643 (let ((collection-path (secrets-unlock-collection collection
))
645 (unless (secrets-empty-path collection-path
)
646 ;; Create attributes list.
647 (while (consp (cdr attributes
))
648 (unless (keywordp (car attributes
))
649 (error 'wrong-type-argument
(car attributes
)))
650 (setq props
(add-to-list
653 (substring (symbol-name (car attributes
)) 1)
656 attributes
(cddr attributes
)))
660 :session secrets-service collection-path
661 secrets-interface-collection
"CreateItem"
665 (:dict-entry
,(concat secrets-interface-item
".Label")
667 (:dict-entry
,(concat secrets-interface-item
".Type")
668 (:variant
,secrets-interface-item-type-generic
)))
670 `((:dict-entry
,(concat secrets-interface-item
".Attributes")
671 (:variant
,(append '(:array
) props
))))))
674 `(:struct
:object-path
,secrets-session-path
675 (:array
:signature
"y") ;; No parameters.
676 ,(dbus-string-to-byte-array password
))
677 ;; We add the content_type. In backward compatibility
678 ;; mode, nil is appended, which means nothing.
679 secrets-struct-secret-content-type
)
680 ;; Do not replace. Replace does not seem to work.
682 (secrets-prompt (cadr result
))
683 ;; Return the object path.
686 (defun secrets-item-path (collection item
)
687 "Return the object path of item labeled ITEM in COLLECTION.
688 If there is no such item, return nil."
689 (let ((collection-path (secrets-unlock-collection collection
)))
691 (dolist (item-path (secrets-get-items collection-path
))
692 (when (string-equal item
(secrets-get-item-property item-path
"Label"))
693 (throw 'item-found item-path
))))))
695 (defun secrets-get-secret (collection item
)
696 "Return the secret of item labeled ITEM in COLLECTION.
697 If there is no such item, return nil."
698 (let ((item-path (secrets-item-path collection item
)))
699 (unless (secrets-empty-path item-path
)
700 (dbus-byte-array-to-string
703 :session secrets-service item-path secrets-interface-item
704 "GetSecret" :object-path secrets-session-path
))))))
706 (defun secrets-get-attributes (collection item
)
707 "Return the lookup attributes of item labeled ITEM in COLLECTION.
708 If there is no such item, or the item has no attributes, return nil."
709 (unless (stringp collection
) (setq collection
"default"))
710 (let ((item-path (secrets-item-path collection item
)))
711 (unless (secrets-empty-path item-path
)
714 (cons (intern (concat ":" (car attribute
))) (cadr attribute
)))
716 :session secrets-service item-path
717 secrets-interface-item
"Attributes")))))
719 (defun secrets-get-attribute (collection item attribute
)
720 "Return the value of ATTRIBUTE of item labeled ITEM in COLLECTION.
721 If there is no such item, or the item doesn't own this attribute, return nil."
722 (cdr (assoc attribute
(secrets-get-attributes collection item
))))
724 (defun secrets-delete-item (collection item
)
725 "Delete ITEM in COLLECTION."
726 (let ((item-path (secrets-item-path collection item
)))
727 (unless (secrets-empty-path item-path
)
730 :session secrets-service item-path
731 secrets-interface-item
"Delete")))))
735 (define-derived-mode secrets-mode nil
"Secrets"
736 "Major mode for presenting password entries retrieved by Security Service.
737 In this mode, widgets represent the search results.
739 \\{secrets-mode-map}"
741 (setq secrets-mode-map
(copy-keymap special-mode-map
))
742 (set-keymap-parent secrets-mode-map widget-keymap
)
743 (define-key secrets-mode-map
"z" 'kill-this-buffer
)
745 ;; When we toggle, we must set temporary widgets.
746 (set (make-local-variable 'tree-widget-after-toggle-functions
)
747 '(secrets-tree-widget-after-toggle-function))
749 (when (not (called-interactively-p 'interactive
))
750 ;; Initialize buffer.
751 (setq buffer-read-only t
)
752 (let ((inhibit-read-only t
))
755 ;; It doesn't make sense to call it interactively.
756 (put 'secrets-mode
'disabled t
)
758 ;; The very first buffer created with `secrets-mode' does not have the
759 ;; keymap etc. So we create a dummy buffer. Stupid.
760 (with-temp-buffer (secrets-mode))
762 ;; We autoload `secrets-show-secrets' only on systems with D-Bus support.
763 ;;;###autoload(when (featurep 'dbusbind)
764 ;;;###autoload (autoload 'secrets-show-secrets "secrets" nil t))
766 (defun secrets-show-secrets ()
767 "Display a list of collections from the Secret Service API.
768 The collections are in tree view, that means they can be expanded
769 to the corresponding secret items, which could also be expanded
770 to their attributes."
773 ;; Check, whether the Secret Service API is enabled.
774 (if (null secrets-enabled
)
775 (message "Secret Service not available")
777 ;; Create the search buffer.
778 (with-current-buffer (get-buffer-create "*Secrets*")
779 (switch-to-buffer-other-window (current-buffer))
780 ;; Initialize buffer with `secrets-mode'.
782 (secrets-show-collections))))
784 (defun secrets-show-collections ()
785 "Show all available collections."
786 (let ((inhibit-read-only t
)
787 (alias (secrets-get-alias "default")))
789 (tree-widget-set-theme "folder")
790 (dolist (coll (secrets-list-collections))
797 :expander secrets-expand-collection
)))))
799 (defun secrets-expand-collection (widget)
800 "Expand items of collection shown as WIDGET."
801 (let ((coll (widget-get widget
:collection
)))
810 :expander secrets-expand-item
))
811 (secrets-list-items coll
))))
813 (defun secrets-expand-item (widget)
814 "Expand password and attributes of item shown as WIDGET."
815 (let* ((coll (widget-get widget
:collection
))
816 (item (widget-get widget
:item
))
817 (attributes (secrets-get-attributes coll item
))
818 ;; padding is needed to format attribute names.
823 (1+ (length "password"))
825 ;; Attribute names have a leading ":", which will be suppressed.
826 (lambda (attribute) (length (symbol-name (car attribute
))))
829 ;; The password widget.
830 `(editable-field :tag
"password"
832 :value
,(secrets-get-secret coll item
)
833 :sample-face widget-button-pressed
834 ;; We specify :size in order to limit the field.
838 (make-string (- padding
(length "password")) ?
)
842 (let ((name (substring (symbol-name (car attribute
)) 1))
843 (value (cdr attribute
)))
844 ;; The attribute widget.
845 `(editable-field :tag
,name
847 :sample-face widget-documentation
848 ;; We specify :size in order to limit the field.
852 (make-string (- padding
(length name
)) ?
)
856 (defun secrets-tree-widget-after-toggle-function (widget &rest ignore
)
857 "Add a temporary widget to show the password."
858 (dolist (child (widget-get widget
:children
))
859 (when (widget-member child
:secret
)
860 (goto-char (widget-field-end child
))
862 (widget-create-child-and-convert
864 :notify
'secrets-tree-widget-show-password
868 (defun secrets-tree-widget-show-password (widget &rest ignore
)
869 "Show password, and remove temporary widget."
870 (let ((parent (widget-get widget
:parent
)))
871 (widget-put parent
:secret nil
)
872 (widget-default-value-set parent
(widget-get parent
:value
))
877 (when (dbus-ping :session secrets-service
100)
879 ;; We must reset all variables, when there is a new instance of the
880 ;; "org.freedesktop.secrets" service.
881 (dbus-register-signal
882 :session dbus-service-dbus dbus-path-dbus
883 dbus-interface-dbus
"NameOwnerChanged"
885 (when secrets-debug
(message "Secret Service has changed: %S" args
))
886 (setq secrets-session-path secrets-empty-path
887 secrets-prompt-signal nil
888 secrets-collection-paths nil
))
891 ;; We want to refresh our cache, when there is a change in
893 (dbus-register-signal
894 :session secrets-service secrets-path
895 secrets-interface-service
"CollectionCreated"
896 'secrets-collection-handler
)
898 (dbus-register-signal
899 :session secrets-service secrets-path
900 secrets-interface-service
"CollectionDeleted"
901 'secrets-collection-handler
)
903 ;; We shall inform, whether the secret service is enabled on this
905 (setq secrets-enabled t
))
911 ;; * secrets-debug should be structured like auth-source-debug to
912 ;; prevent leaking sensitive information. Right now I don't see
913 ;; anything sensitive though.
914 ;; * Check, whether the dh-ietf1024-aes128-cbc-pkcs7 algorithm can be
915 ;; used for the transfer of the secrets. Currently, we use the