mirror of
https://github.com/keepassxreboot/keepassxc.git
synced 2025-02-18 05:14:16 -05:00
569 lines
21 KiB
C++
569 lines
21 KiB
C++
/**
|
|
***************************************************************************
|
|
* @file Service.cpp
|
|
*
|
|
* @brief
|
|
*
|
|
* Copyright (C) 2013
|
|
*
|
|
* @author Francois Ferrand
|
|
* @date 4/2013
|
|
***************************************************************************
|
|
*/
|
|
|
|
#include <QtGui/QInputDialog>
|
|
#include <QtGui/QMessageBox>
|
|
#include <QtGui/QProgressDialog>
|
|
#include <QtCore/QDebug>
|
|
|
|
#include "Service.h"
|
|
#include "Protocol.h"
|
|
#include "EntryConfig.h"
|
|
#include "AccessControlDialog.h"
|
|
#include "HttpSettings.h"
|
|
|
|
#include "core/Database.h"
|
|
#include "core/Entry.h"
|
|
#include "core/Group.h"
|
|
#include "core/Metadata.h"
|
|
#include "core/Uuid.h"
|
|
#include "core/PasswordGenerator.h"
|
|
|
|
static const unsigned char KEEPASSHTTP_UUID_DATA[] = {
|
|
0x34, 0x69, 0x7a, 0x40, 0x8a, 0x5b, 0x41, 0xc0,
|
|
0x9f, 0x36, 0x89, 0x7d, 0x62, 0x3e, 0xcb, 0x31
|
|
};
|
|
static const Uuid KEEPASSHTTP_UUID = Uuid(QByteArray::fromRawData(reinterpret_cast<const char *>(KEEPASSHTTP_UUID_DATA), sizeof(KEEPASSHTTP_UUID_DATA)));
|
|
static const char KEEPASSHTTP_NAME[] = "KeePassHttp Settings";
|
|
static const char ASSOCIATE_KEY_PREFIX[] = "AES Key: ";
|
|
static const char KEEPASSHTTP_GROUP_NAME[] = "KeePassHttp Passwords"; //Group where new KeePassHttp password are stored
|
|
static int KEEPASSHTTP_DEFAULT_ICON = 1;
|
|
//private const int DEFAULT_NOTIFICATION_TIME = 5000;
|
|
|
|
Service::Service(DatabaseTabWidget* parent) :
|
|
KeepassHttpProtocol::Server(parent),
|
|
m_dbTabWidget(parent)
|
|
{
|
|
if (HttpSettings::isEnabled())
|
|
start();
|
|
}
|
|
|
|
Entry* Service::getConfigEntry(bool create)
|
|
{
|
|
if (DatabaseWidget * dbWidget = m_dbTabWidget->currentDatabaseWidget())
|
|
if (Database * db = dbWidget->database()) {
|
|
Entry* entry = db->resolveEntry(KEEPASSHTTP_UUID);
|
|
if (!entry && create) {
|
|
entry = new Entry();
|
|
entry->setTitle(QLatin1String(KEEPASSHTTP_NAME));
|
|
entry->setUuid(KEEPASSHTTP_UUID);
|
|
entry->setAutoTypeEnabled(false);
|
|
entry->setGroup(db->rootGroup());
|
|
} else if (entry && entry->group() == db->metadata()->recycleBin()) {
|
|
if (create)
|
|
entry->setGroup(db->rootGroup());
|
|
else
|
|
entry = NULL;
|
|
}
|
|
return entry;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
bool Service::isDatabaseOpened() const
|
|
{
|
|
if (DatabaseWidget* dbWidget = m_dbTabWidget->currentDatabaseWidget())
|
|
switch(dbWidget->currentMode()) {
|
|
case DatabaseWidget::None:
|
|
case DatabaseWidget::LockedMode:
|
|
break;
|
|
|
|
case DatabaseWidget::ViewMode:
|
|
case DatabaseWidget::EditMode:
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool Service::openDatabase()
|
|
{
|
|
if (!HttpSettings::unlockDatabase())
|
|
return false;
|
|
if (DatabaseWidget * dbWidget = m_dbTabWidget->currentDatabaseWidget()) {
|
|
switch(dbWidget->currentMode()) {
|
|
case DatabaseWidget::None:
|
|
case DatabaseWidget::LockedMode:
|
|
break;
|
|
|
|
case DatabaseWidget::ViewMode:
|
|
case DatabaseWidget::EditMode:
|
|
return true;
|
|
}
|
|
}
|
|
//if (HttpSettings::showNotification()
|
|
// && !ShowNotification(QString("%0: %1 is requesting access, click to allow or deny")
|
|
// .arg(id).arg(submitHost.isEmpty() ? host : submithost));
|
|
// return false;
|
|
m_dbTabWidget->activateWindow();
|
|
//Wait a bit for DB to be open... (w/ asynchronous reply?)
|
|
return false;
|
|
}
|
|
|
|
QString Service::getDatabaseRootUuid()
|
|
{
|
|
if (DatabaseWidget* dbWidget = m_dbTabWidget->currentDatabaseWidget())
|
|
if (Database* db = dbWidget->database())
|
|
if (Group* rootGroup = db->rootGroup())
|
|
return rootGroup->uuid().toHex();
|
|
return QString();
|
|
}
|
|
|
|
QString Service::getDatabaseRecycleBinUuid()
|
|
{
|
|
if (DatabaseWidget* dbWidget = m_dbTabWidget->currentDatabaseWidget())
|
|
if (Database* db = dbWidget->database())
|
|
if (Group* recycleBin = db->metadata()->recycleBin())
|
|
return recycleBin->uuid().toHex();
|
|
return QString();
|
|
}
|
|
|
|
QString Service::getKey(const QString &id)
|
|
{
|
|
if (Entry* config = getConfigEntry())
|
|
return config->attributes()->value(QLatin1String(ASSOCIATE_KEY_PREFIX) + id);
|
|
return QString();
|
|
}
|
|
|
|
QString Service::storeKey(const QString &key)
|
|
{
|
|
QString id;
|
|
if (Entry* config = getConfigEntry(true)) {
|
|
|
|
//ShowNotification("New key association requested")
|
|
|
|
do {
|
|
bool ok;
|
|
//Indicate who wants to associate, and request user to enter the 'name' of association key
|
|
id = QInputDialog::getText(0, tr("KeyPassX/Http: New key association request"),
|
|
tr("You have received an association request for the above key. If you would like to "
|
|
"allow it access to your KeePassX database give it a unique name to identify and"
|
|
"accept it."),
|
|
QLineEdit::Normal, QString(), &ok);
|
|
if (!ok || id.isEmpty())
|
|
return QString();
|
|
|
|
//Warn if association key already exists
|
|
} while(config->attributes()->contains(QLatin1String(ASSOCIATE_KEY_PREFIX) + id) &&
|
|
QMessageBox::warning(0, tr("KeyPassX/Http: Overwrite existing key?"),
|
|
tr("A shared encryption-key with the name \"%1\" already exists.\nDo you want to overwrite it?").arg(id),
|
|
QMessageBox::Yes | QMessageBox::No) == QMessageBox::No);
|
|
|
|
config->attributes()->set(QLatin1String(ASSOCIATE_KEY_PREFIX) + id, key, true);
|
|
}
|
|
return id;
|
|
}
|
|
|
|
bool Service::matchUrlScheme(const QString & url)
|
|
{
|
|
QString str = url.left(8).toLower();
|
|
return str.startsWith("http://") ||
|
|
str.startsWith("https://") ||
|
|
str.startsWith("ftp://") ||
|
|
str.startsWith("ftps://");
|
|
}
|
|
|
|
bool Service::removeFirstDomain(QString & hostname)
|
|
{
|
|
int pos = hostname.indexOf(".");
|
|
if (pos < 0)
|
|
return false;
|
|
hostname = hostname.mid(pos + 1);
|
|
return !hostname.isEmpty();
|
|
}
|
|
|
|
QList<Entry*> Service::searchEntries(Database* db, const QString& hostname)
|
|
{
|
|
QList<Entry*> entries;
|
|
if (Group* rootGroup = db->rootGroup())
|
|
Q_FOREACH (Entry* entry, rootGroup->search(hostname, Qt::CaseInsensitive)) {
|
|
QString title = entry->title();
|
|
QString url = entry->url();
|
|
|
|
//Filter to match hostname in Title and Url fields
|
|
if ( (!title.isEmpty() && hostname.contains(title))
|
|
|| (!url.isEmpty() && hostname.contains(url))
|
|
|| (matchUrlScheme(title) && hostname.endsWith(QUrl(title).host()))
|
|
|| (matchUrlScheme(url) && hostname.endsWith(QUrl(url).host())) )
|
|
entries.append(entry);
|
|
}
|
|
return entries;
|
|
}
|
|
|
|
QList<Entry*> Service::searchEntries(const QString& text)
|
|
{
|
|
//Get the list of databases to search
|
|
QList<Database*> databases;
|
|
if (HttpSettings::searchInAllDatabases()) {
|
|
for (int i = 0; i < m_dbTabWidget->count(); i++)
|
|
if (DatabaseWidget* dbWidget = qobject_cast<DatabaseWidget*>(m_dbTabWidget->widget(i)))
|
|
if (Database* db = dbWidget->database())
|
|
databases << db;
|
|
}
|
|
else if (DatabaseWidget* dbWidget = m_dbTabWidget->currentDatabaseWidget()) {
|
|
if (Database* db = dbWidget->database())
|
|
databases << db;
|
|
}
|
|
|
|
//Search entries matching the hostname
|
|
QString hostname = QUrl(text).host();
|
|
QList<Entry*> entries;
|
|
do {
|
|
Q_FOREACH (Database* db, databases)
|
|
entries << searchEntries(db, hostname);
|
|
} while(entries.isEmpty() && removeFirstDomain(hostname));
|
|
|
|
return entries;
|
|
}
|
|
|
|
Service::Access Service::checkAccess(const Entry *entry, const QString & host, const QString & submitHost, const QString & realm)
|
|
{
|
|
EntryConfig config;
|
|
if (!config.load(entry))
|
|
return Unknown; //not configured
|
|
if ((config.isAllowed(host)) && (submitHost.isEmpty() || config.isAllowed(submitHost)))
|
|
return Allowed; //allowed
|
|
if ((config.isDenied(host)) || (!submitHost.isEmpty() && config.isDenied(submitHost)))
|
|
return Denied; //denied
|
|
if (!realm.isEmpty() && config.realm() != realm)
|
|
return Denied;
|
|
return Unknown; //not configured for this host
|
|
}
|
|
|
|
KeepassHttpProtocol::Entry Service::prepareEntry(const Entry* entry)
|
|
{
|
|
KeepassHttpProtocol::Entry res(entry->title(), entry->username(), entry->password(), entry->uuid().toHex());
|
|
if (HttpSettings::supportKphFields()) {
|
|
const EntryAttributes * attr = entry->attributes();
|
|
Q_FOREACH (const QString& key, attr->keys())
|
|
if (key.startsWith(QLatin1String("KPH: ")))
|
|
res.addStringField(key, attr->value(key));
|
|
}
|
|
return res;
|
|
}
|
|
|
|
int Service::sortPriority(const Entry* entry, const QString& host, const QString& submitUrl, const QString& baseSubmitUrl) const
|
|
{
|
|
QUrl url(entry->url());
|
|
if (url.scheme().isEmpty())
|
|
url.setScheme("http");
|
|
const QString entryURL = url.toString(QUrl::StripTrailingSlash);
|
|
const QString baseEntryURL = url.toString(QUrl::StripTrailingSlash | QUrl::RemovePath | QUrl::RemoveQuery | QUrl::RemoveFragment);
|
|
|
|
if (submitUrl == entryURL)
|
|
return 100;
|
|
if (submitUrl.startsWith(entryURL) && entryURL != host && baseSubmitUrl != entryURL)
|
|
return 90;
|
|
if (submitUrl.startsWith(baseEntryURL) && entryURL != host && baseSubmitUrl != baseEntryURL)
|
|
return 80;
|
|
if (entryURL == host)
|
|
return 70;
|
|
if (entryURL == baseSubmitUrl)
|
|
return 60;
|
|
if (entryURL.startsWith(submitUrl))
|
|
return 50;
|
|
if (entryURL.startsWith(baseSubmitUrl) && baseSubmitUrl != host)
|
|
return 40;
|
|
if (submitUrl.startsWith(entryURL))
|
|
return 30;
|
|
if (submitUrl.startsWith(baseEntryURL))
|
|
return 20;
|
|
if (entryURL.startsWith(host))
|
|
return 10;
|
|
if (host.startsWith(entryURL))
|
|
return 5;
|
|
return 0;
|
|
}
|
|
|
|
class Service::SortEntries
|
|
{
|
|
public:
|
|
SortEntries(const QHash<const Entry*, int>& priorities, const QString & field):
|
|
m_priorities(priorities), m_field(field)
|
|
{}
|
|
|
|
bool operator()(const Entry* left, const Entry* right) const
|
|
{
|
|
int res = m_priorities.value(left) - m_priorities.value(right);
|
|
if (res == 0)
|
|
return QString::localeAwareCompare(left->attributes()->value(m_field), right->attributes()->value(m_field)) < 0;
|
|
return res < 0;
|
|
}
|
|
|
|
private:
|
|
const QHash<const Entry*, int>& m_priorities;
|
|
const QString m_field;
|
|
};
|
|
|
|
QList<KeepassHttpProtocol::Entry> Service::findMatchingEntries(const QString& /*id*/, const QString& url, const QString& submitUrl, const QString& realm)
|
|
{
|
|
const bool alwaysAllowAccess = HttpSettings::alwaysAllowAccess();
|
|
const QString host = QUrl(url).host();
|
|
const QString submitHost = QUrl(submitUrl).host();
|
|
|
|
//Check entries for authorization
|
|
QList<Entry*> pwEntriesToConfirm;
|
|
QList<Entry*> pwEntries;
|
|
Q_FOREACH (Entry * entry, searchEntries(url)) {
|
|
switch(checkAccess(entry, host, submitHost, realm)) {
|
|
case Denied:
|
|
continue;
|
|
|
|
case Unknown:
|
|
if (alwaysAllowAccess)
|
|
pwEntries.append(entry);
|
|
else
|
|
pwEntriesToConfirm.append(entry);
|
|
break;
|
|
|
|
case Allowed:
|
|
pwEntries.append(entry);
|
|
break;
|
|
}
|
|
}
|
|
|
|
//If unsure, ask user for confirmation
|
|
//if (!pwEntriesToConfirm.isEmpty()
|
|
// && HttpSettings::showNotification()
|
|
// && !ShowNotification(QString("%0: %1 is requesting access, click to allow or deny")
|
|
// .arg(id).arg(submitHost.isEmpty() ? host : submithost));
|
|
// pwEntriesToConfirm.clear(); //timeout --> do not request confirmation
|
|
|
|
if (!pwEntriesToConfirm.isEmpty()) {
|
|
|
|
AccessControlDialog dlg;
|
|
dlg.setUrl(url);
|
|
dlg.setItems(pwEntriesToConfirm);
|
|
//dlg.setRemember(); //TODO: setting!
|
|
|
|
int res = dlg.exec();
|
|
if (dlg.remember()) {
|
|
Q_FOREACH (Entry * entry, pwEntriesToConfirm) {
|
|
EntryConfig config;
|
|
config.load(entry);
|
|
if (res == QDialog::Accepted) {
|
|
config.allow(host);
|
|
if (!submitHost.isEmpty() && host != submitHost)
|
|
config.allow(submitHost);
|
|
} else if (res == QDialog::Rejected) {
|
|
config.deny(host);
|
|
if (!submitHost.isEmpty() && host != submitHost)
|
|
config.deny(submitHost);
|
|
}
|
|
if (!realm.isEmpty())
|
|
config.setRealm(realm);
|
|
config.save(entry);
|
|
}
|
|
}
|
|
if (res == QDialog::Accepted)
|
|
pwEntries.append(pwEntriesToConfirm);
|
|
}
|
|
|
|
//Sort results
|
|
const bool sortSelection = true;
|
|
if (sortSelection) {
|
|
QUrl url(submitUrl);
|
|
if (url.scheme().isEmpty())
|
|
url.setScheme("http");
|
|
const QString submitUrl = url.toString(QUrl::StripTrailingSlash);
|
|
const QString baseSubmitURL = url.toString(QUrl::StripTrailingSlash | QUrl::RemovePath | QUrl::RemoveQuery | QUrl::RemoveFragment);
|
|
|
|
//Cache priorities
|
|
QHash<const Entry *, int> priorities;
|
|
priorities.reserve(pwEntries.size());
|
|
Q_FOREACH (const Entry * entry, pwEntries)
|
|
priorities.insert(entry, sortPriority(entry, host, submitUrl, baseSubmitURL));
|
|
|
|
//Sort by priorities
|
|
qSort(pwEntries.begin(), pwEntries.end(), SortEntries(priorities, HttpSettings::sortByTitle() ? "Title" : "UserName"));
|
|
}
|
|
|
|
//if (pwEntries.count() > 0)
|
|
//{
|
|
// var names = (from e in resp.Entries select e.Name).Distinct<string>();
|
|
// var n = String.Join("\n ", names.ToArray<string>());
|
|
// if (HttpSettings::receiveCredentialNotification())
|
|
// ShowNotification(QString("%0: %1 is receiving credentials for:\n%2").arg(Id).arg(host).arg(n)));
|
|
//}
|
|
|
|
//Fill the list
|
|
QList<KeepassHttpProtocol::Entry> result;
|
|
result.reserve(pwEntries.count());
|
|
Q_FOREACH (Entry * entry, pwEntries)
|
|
result << prepareEntry(entry);
|
|
return result;
|
|
}
|
|
|
|
int Service::countMatchingEntries(const QString &, const QString &url, const QString &, const QString &)
|
|
{
|
|
return searchEntries(url).count();
|
|
}
|
|
|
|
QList<KeepassHttpProtocol::Entry> Service::searchAllEntries(const QString &)
|
|
{
|
|
QList<KeepassHttpProtocol::Entry> result;
|
|
if (DatabaseWidget * dbWidget = m_dbTabWidget->currentDatabaseWidget())
|
|
if (Database * db = dbWidget->database())
|
|
if (Group * rootGroup = db->rootGroup())
|
|
Q_FOREACH (Entry * entry, rootGroup->entriesRecursive())
|
|
if (!entry->url().isEmpty() || QUrl(entry->title()).isValid())
|
|
result << KeepassHttpProtocol::Entry(entry->title(), entry->username(), QString(), entry->uuid().toHex());
|
|
return result;
|
|
}
|
|
|
|
Group * Service::findCreateAddEntryGroup()
|
|
{
|
|
if (DatabaseWidget * dbWidget = m_dbTabWidget->currentDatabaseWidget())
|
|
if (Database * db = dbWidget->database())
|
|
if (Group * rootGroup = db->rootGroup()) {
|
|
const QString groupName = QLatin1String(KEEPASSHTTP_GROUP_NAME);//TODO: setting to decide where new keys are created
|
|
|
|
Q_FOREACH (const Group * g, rootGroup->groupsRecursive(true))
|
|
if (g->name() == groupName)
|
|
return db->resolveGroup(g->uuid());
|
|
|
|
Group * group;
|
|
group = new Group();
|
|
group->setUuid(Uuid::random());
|
|
group->setName(groupName);
|
|
group->setIcon(KEEPASSHTTP_DEFAULT_ICON);
|
|
group->setParent(rootGroup);
|
|
return group;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
void Service::addEntry(const QString &, const QString &login, const QString &password, const QString &url, const QString &submitUrl, const QString &realm)
|
|
{
|
|
if (Group * group = findCreateAddEntryGroup()) {
|
|
Entry * entry = new Entry();
|
|
entry->setUuid(Uuid::random());
|
|
entry->setTitle(QUrl(url).host());
|
|
entry->setUrl(url);
|
|
entry->setIcon(KEEPASSHTTP_DEFAULT_ICON);
|
|
entry->setUsername(login);
|
|
entry->setPassword(password);
|
|
entry->setGroup(group);
|
|
|
|
const QString host = QUrl(url).host();
|
|
const QString submitHost = QUrl(submitUrl).host();
|
|
EntryConfig config;
|
|
config.allow(host);
|
|
if (!submitHost.isEmpty())
|
|
config.allow(submitHost);
|
|
if (!realm.isEmpty())
|
|
config.setRealm(realm);
|
|
config.save(entry);
|
|
}
|
|
}
|
|
|
|
void Service::updateEntry(const QString &, const QString &uuid, const QString &login, const QString &password, const QString &url)
|
|
{
|
|
if (DatabaseWidget * dbWidget = m_dbTabWidget->currentDatabaseWidget())
|
|
if (Database * db = dbWidget->database())
|
|
if (Entry * entry = db->resolveEntry(Uuid::fromHex(uuid))) {
|
|
QString u = entry->username();
|
|
if (u != login || entry->password() != password) {
|
|
//ShowNotification(QString("%0: You have an entry change prompt waiting, click to activate").arg(requestId));
|
|
if ( HttpSettings::alwaysAllowUpdate()
|
|
|| QMessageBox::warning(0, tr("KeyPassX/Http: Update Entry"),
|
|
tr("Do you want to update the information in %1 - %2?").arg(QUrl(url).host()).arg(u),
|
|
QMessageBox::Yes|QMessageBox::No) == QMessageBox::Yes ) {
|
|
entry->beginUpdate();
|
|
entry->setUsername(login);
|
|
entry->setPassword(password);
|
|
entry->endUpdate();
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
QString Service::generatePassword()
|
|
{
|
|
return QString("nonrandompassword");
|
|
}
|
|
|
|
void Service::removeSharedEncryptionKeys()
|
|
{
|
|
if (!isDatabaseOpened()) {
|
|
QMessageBox::critical(0, tr("KeyPassX/Http: Database locked!"),
|
|
tr("The active database is locked!\n"
|
|
"Please unlock the selected database or choose another one which is unlocked."),
|
|
QMessageBox::Ok);
|
|
} else if (Entry* entry = getConfigEntry()) {
|
|
QStringList keysToRemove;
|
|
Q_FOREACH (const QString& key, entry->attributes()->keys())
|
|
if (key.startsWith(ASSOCIATE_KEY_PREFIX))
|
|
keysToRemove << key;
|
|
|
|
if(keysToRemove.count()) {
|
|
entry->beginUpdate();
|
|
Q_FOREACH (const QString& key, keysToRemove)
|
|
entry->attributes()->remove(key);
|
|
entry->endUpdate();
|
|
|
|
const int count = keysToRemove.count();
|
|
QMessageBox::information(0, tr("KeyPassX/Http: Removed keys from database"),
|
|
tr("Successfully removed %1 encryption-%2 from KeePassX/Http Settings.").arg(count).arg(count ? "keys" : "key"),
|
|
QMessageBox::Ok);
|
|
} else {
|
|
QMessageBox::information(0, tr("KeyPassX/Http: No keys found"),
|
|
tr("No shared encryption-keys found in KeePassHttp Settings."),
|
|
QMessageBox::Ok);
|
|
}
|
|
} else {
|
|
QMessageBox::information(0, tr("KeyPassX/Http: Settings not available!"),
|
|
tr("The active database does not contain an entry of KeePassHttp Settings."),
|
|
QMessageBox::Ok);
|
|
}
|
|
}
|
|
|
|
void Service::removeStoredPermissions()
|
|
{
|
|
if (!isDatabaseOpened()) {
|
|
QMessageBox::critical(0, tr("KeyPassX/Http: Database locked!"),
|
|
tr("The active database is locked!\n"
|
|
"Please unlock the selected database or choose another one which is unlocked."),
|
|
QMessageBox::Ok);
|
|
} else {
|
|
Database * db = m_dbTabWidget->currentDatabaseWidget()->database();
|
|
QList<Entry*> entries = db->rootGroup()->entriesRecursive();
|
|
|
|
QProgressDialog progress(tr("Removing stored permissions..."), tr("Abort"), 0, entries.count());
|
|
progress.setWindowModality(Qt::WindowModal);
|
|
|
|
uint counter = 0;
|
|
Q_FOREACH (Entry* entry, entries) {
|
|
if (progress.wasCanceled())
|
|
return;
|
|
if (entry->attributes()->contains(KEEPASSHTTP_NAME)) {
|
|
entry->beginUpdate();
|
|
entry->attributes()->remove(KEEPASSHTTP_NAME);
|
|
entry->endUpdate();
|
|
counter ++;
|
|
}
|
|
progress.setValue(progress.value() + 1);
|
|
}
|
|
progress.reset();
|
|
|
|
if (counter > 0) {
|
|
QMessageBox::information(0, tr("KeyPassX/Http: Removed permissions"),
|
|
tr("Successfully removed permissions from %1 %2.").arg(counter).arg(counter ? "entries" : "entry"),
|
|
QMessageBox::Ok);
|
|
} else {
|
|
QMessageBox::information(0, tr("KeyPassX/Http: No entry with permissions found!"),
|
|
tr("The active database does not contain an entry with permissions."),
|
|
QMessageBox::Ok);
|
|
}
|
|
}
|
|
}
|