KeyringAttribute.py 3.7 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394
  1. # Copyright (c) 2021 Ultimaker B.V.
  2. # Cura is released under the terms of the LGPLv3 or higher.
  3. from typing import Type, TYPE_CHECKING, Optional, List, Union
  4. import keyring
  5. from keyring.backend import KeyringBackend
  6. from keyring.errors import NoKeyringError, PasswordSetError, KeyringError
  7. from UM.Logger import Logger
  8. if TYPE_CHECKING:
  9. from cura.OAuth2.Models import BaseModel
  10. # Need to do some extra workarounds on windows:
  11. import sys
  12. from UM.Platform import Platform
  13. class _KeychainDenied(Exception):
  14. pass
  15. if Platform.isWindows() and hasattr(sys, "frozen"):
  16. import win32timezone
  17. from keyring.backends.Windows import WinVaultKeyring
  18. keyring.set_keyring(WinVaultKeyring())
  19. if Platform.isOSX() and hasattr(sys, "frozen"):
  20. from keyring.backends.macOS import Keyring
  21. from keyring.backends.macOS.api import KeychainDenied as _KeychainDeniedMacOS
  22. KeychainDenied: Union[Type[_KeychainDenied], Type[_KeychainDeniedMacOS]] = _KeychainDeniedMacOS
  23. keyring.set_keyring(Keyring())
  24. else:
  25. KeychainDenied = _KeychainDenied
  26. # Even if errors happen, we don't want this stored locally:
  27. DONT_EVER_STORE_LOCALLY: List[str] = ["refresh_token"]
  28. class KeyringAttribute:
  29. """
  30. Descriptor for attributes that need to be stored in the keyring. With Fallback behaviour to the preference cfg file
  31. """
  32. def __get__(self, instance: "BaseModel", owner: type) -> Optional[str]:
  33. if self._store_secure: # type: ignore
  34. try:
  35. value = keyring.get_password("cura", self._keyring_name)
  36. return value if value != "" else None
  37. except NoKeyringError:
  38. self._store_secure = False
  39. Logger.logException("w", "No keyring backend present")
  40. return getattr(instance, self._name)
  41. except KeychainDenied:
  42. self._store_secure = False
  43. Logger.log("i", "Access to the keyring was denied.")
  44. return getattr(instance, self._name)
  45. else:
  46. return getattr(instance, self._name)
  47. def __set__(self, instance: "BaseModel", value: Optional[str]):
  48. if self._store_secure:
  49. setattr(instance, self._name, None)
  50. if value is not None:
  51. try:
  52. keyring.set_password("cura", self._keyring_name, value)
  53. except PasswordSetError:
  54. self._store_secure = False
  55. if self._name not in DONT_EVER_STORE_LOCALLY:
  56. setattr(instance, self._name, value)
  57. Logger.logException("w", "Keyring access denied")
  58. except NoKeyringError:
  59. self._store_secure = False
  60. if self._name not in DONT_EVER_STORE_LOCALLY:
  61. setattr(instance, self._name, value)
  62. Logger.logException("w", "No keyring backend present")
  63. except BaseException as e:
  64. # A BaseException can occur in Windows when the keyring attempts to write a token longer than 1024
  65. # characters in the Windows Credentials Manager.
  66. self._store_secure = False
  67. if self._name not in DONT_EVER_STORE_LOCALLY:
  68. setattr(instance, self._name, value)
  69. Logger.log("w", "Keyring failed: {}".format(e))
  70. else:
  71. setattr(instance, self._name, value)
  72. def __set_name__(self, owner: type, name: str):
  73. self._name = "_{}".format(name)
  74. self._keyring_name = name
  75. self._store_secure = False
  76. try:
  77. self._store_secure = KeyringBackend.viable
  78. except NoKeyringError:
  79. Logger.logException("w", "Could not use keyring")
  80. setattr(owner, self._name, None)