This file is indexed.

/usr/include/signon-extension/SignOn/abstract-access-control-manager.h is in signond-dev 8.56+14.04.20140307-0ubuntu2.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
/*
 * This file is part of signon
 *
 * Copyright (C) 2011 Intel Corporation.
 * Copyright (C) 2013 Canonical Ltd.
 *
 * Contact: Elena Reshetova <elena.reshetova@intel.com>
 * Contact: Alberto Mardegan <alberto.mardegan@canonical.com>
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public License
 * version 2.1 as published by the Free Software Foundation.
 *
 * This library is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
 * 02110-1301 USA
 */
/*!
 * @file abstract-access-control-manager.h
 * Definition of the AbstractAccessControlManager object.
 * @ingroup Accounts_and_SSO_Framework
 */

#ifndef SIGNON_ABSTRACT_ACCESS_CONTROL_MANAGER_H
#define SIGNON_ABSTRACT_ACCESS_CONTROL_MANAGER_H

#include <SignOn/extension-interface.h>

#include <QSharedDataPointer>
#include <QString>

class QDBusConnection;
class QDBusMessage;

namespace SignOn {

class AbstractAccessControlManager;
class AccessRequestData;

class SIGNON_EXPORT AccessRequest
{
public:
    explicit AccessRequest();
    AccessRequest(const AccessRequest &other);
    ~AccessRequest();

    /*!
     * Identifies the client requesting the access.
     * @param peerConnection the connection over which the message was sent.
     * @param peerMessage, the request message sent over DBUS by the process.
     */
    void setPeer(const QDBusConnection &connection,
                 const QDBusMessage &message);
    const QDBusConnection &peerConnection() const;
    const QDBusMessage &peerMessage() const;

    /*!
     * Specifies the SignOn::Identity resource being accessed.
     */
    void setIdentity(quint32 id);
    quint32 identity() const;

private:
    QSharedDataPointer<AccessRequestData> d;
};

class AccessReplyPrivate;
class SIGNON_EXPORT AccessReply: public QObject
{
    Q_OBJECT

public:
    ~AccessReply();

    const AccessRequest &request() const;
    bool isAccepted() const;

Q_SIGNALS:
    void finished();

protected:
    explicit AccessReply(const AccessRequest &request, QObject *parent = 0);

protected Q_SLOTS:
    void accept();
    void decline();

private:
    friend class AbstractAccessControlManager;
    AccessReplyPrivate *d_ptr;
    Q_DECLARE_PRIVATE(AccessReply)
};

/*!
 * @class AbstractAccessControlManager
 * Helps filtering incoming Singnon Daemon requests,
 * based on security priviledges of the client processes.
 * @ingroup Accounts_and_SSO_Framework
 */
class SIGNON_EXPORT AbstractAccessControlManager: public QObject
{
    Q_OBJECT

public:
    /*!
     * Constructs a AbstractAccessControlManager object with the given parent.
     * @param parent
     */
    explicit AbstractAccessControlManager(QObject *parent = 0);

    /*!
     * Destructor.
     */
    virtual ~AbstractAccessControlManager();

    /*!
     * Checks if a client process is allowed to access objects with a certain
     * security context.
     * The access type to be checked depends on the concrete implementation of
     * this function.
     * @param peerConnection the connection over which the message was sent.
     * @param peerMessage, the request message sent over DBUS by the process.
     * @param securityContext, the securityContext to be checked against.
     * @returns true, if the peer is allowed, false otherwise.
     */
    virtual bool isPeerAllowedToAccess(const QDBusConnection &peerConnection,
                                       const QDBusMessage &peerMessage,
                                       const QString &securityContext);

    /*!
     * Looks up for the application identifier of a specific client process.
     * @param peerConnection the connection over which the message was sent.
     * @param peerMessage, the request message sent over DBUS by the process.
     * @returns the application identifier of the process, or an empty string
     * if none found.
     */
    virtual QString appIdOfPeer(const QDBusConnection &peerConnection,
                                const QDBusMessage &peerMessage);

    /*!
     * @returns the application identifier of the keychain widget
     */
    virtual QString keychainWidgetAppId();

    /*!
     * Asynchronously handle an access request from a client.
     * @param request, the AccessRequest describing the requested access.
     * @returns an AccessReply object which can be used to obtain the
     * asynchronous reply.
     */
    virtual AccessReply *handleRequest(const AccessRequest &request);
};

} // namespace

#endif // SIGNON_ABSTRACT_ACCESS_CONTROL_MANAGER_H