mirror of
https://github.com/yuezk/GlobalProtect-openconnect.git
synced 2025-04-02 18:31:50 -04:00
upgrade gpauth
This commit is contained in:
parent
f474ab36c0
commit
07e325e467
36
Cargo.lock
generated
36
Cargo.lock
generated
@ -1562,6 +1562,27 @@ dependencies = [
|
|||||||
"whoami",
|
"whoami",
|
||||||
]
|
]
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "gpauth"
|
||||||
|
version = "2.3.9"
|
||||||
|
dependencies = [
|
||||||
|
"anyhow",
|
||||||
|
"clap",
|
||||||
|
"compile-time",
|
||||||
|
"env_logger",
|
||||||
|
"gpapi",
|
||||||
|
"html-escape",
|
||||||
|
"log",
|
||||||
|
"regex",
|
||||||
|
"serde_json",
|
||||||
|
"tauri",
|
||||||
|
"tauri-build",
|
||||||
|
"tempfile",
|
||||||
|
"tokio",
|
||||||
|
"tokio-util",
|
||||||
|
"webkit2gtk",
|
||||||
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "gpclient"
|
name = "gpclient"
|
||||||
version = "2.3.9"
|
version = "2.3.9"
|
||||||
@ -1733,6 +1754,15 @@ dependencies = [
|
|||||||
"windows-sys 0.52.0",
|
"windows-sys 0.52.0",
|
||||||
]
|
]
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "html-escape"
|
||||||
|
version = "0.2.13"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "6d1ad449764d627e22bfd7cd5e8868264fc9236e07c752972b4080cd351cb476"
|
||||||
|
dependencies = [
|
||||||
|
"utf8-width",
|
||||||
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "html5ever"
|
name = "html5ever"
|
||||||
version = "0.26.0"
|
version = "0.26.0"
|
||||||
@ -4942,6 +4972,12 @@ version = "1.0.5"
|
|||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "c8232dd3cdaed5356e0f716d285e4b40b932ac434100fe9b7e0e8e935b9e6246"
|
checksum = "c8232dd3cdaed5356e0f716d285e4b40b932ac434100fe9b7e0e8e935b9e6246"
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "utf8-width"
|
||||||
|
version = "0.1.7"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "86bd8d4e895da8537e5315b8254664e6b769c4ff3db18321b297a1e7004392e3"
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "utf8_iter"
|
name = "utf8_iter"
|
||||||
version = "1.0.4"
|
version = "1.0.4"
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
[workspace]
|
[workspace]
|
||||||
resolver = "2"
|
resolver = "2"
|
||||||
|
|
||||||
members = ["crates/*", "apps/gpclient", "apps/gpservice", "apps/gpgui-helper/src-tauri"]
|
members = ["crates/*", "apps/gpclient", "apps/gpservice", "apps/gpauth", "apps/gpgui-helper/src-tauri"]
|
||||||
|
|
||||||
[workspace.package]
|
[workspace.package]
|
||||||
rust-version = "1.70"
|
rust-version = "1.70"
|
||||||
|
@ -6,7 +6,7 @@ edition.workspace = true
|
|||||||
license.workspace = true
|
license.workspace = true
|
||||||
|
|
||||||
[build-dependencies]
|
[build-dependencies]
|
||||||
tauri-build = { version = "1.5", features = [] }
|
tauri-build = { version = "2", features = [] }
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
gpapi = { path = "../../crates/gpapi", features = [
|
gpapi = { path = "../../crates/gpapi", features = [
|
||||||
@ -14,6 +14,9 @@ gpapi = { path = "../../crates/gpapi", features = [
|
|||||||
"clap",
|
"clap",
|
||||||
"browser-auth",
|
"browser-auth",
|
||||||
] }
|
] }
|
||||||
|
|
||||||
|
tauri = { workspace = true }
|
||||||
|
|
||||||
anyhow.workspace = true
|
anyhow.workspace = true
|
||||||
clap.workspace = true
|
clap.workspace = true
|
||||||
env_logger.workspace = true
|
env_logger.workspace = true
|
||||||
@ -24,6 +27,7 @@ tokio.workspace = true
|
|||||||
tokio-util.workspace = true
|
tokio-util.workspace = true
|
||||||
tempfile.workspace = true
|
tempfile.workspace = true
|
||||||
html-escape = "0.2.13"
|
html-escape = "0.2.13"
|
||||||
webkit2gtk = "0.18.2"
|
|
||||||
tauri = { workspace = true, features = ["http-all"] }
|
|
||||||
compile-time.workspace = true
|
compile-time.workspace = true
|
||||||
|
|
||||||
|
[target.'cfg(not(target_os = "macos"))'.dependencies]
|
||||||
|
webkit2gtk = "2"
|
||||||
|
1
apps/gpauth/gen/schemas/acl-manifests.json
Normal file
1
apps/gpauth/gen/schemas/acl-manifests.json
Normal file
File diff suppressed because one or more lines are too long
1
apps/gpauth/gen/schemas/capabilities.json
Normal file
1
apps/gpauth/gen/schemas/capabilities.json
Normal file
@ -0,0 +1 @@
|
|||||||
|
{}
|
1756
apps/gpauth/gen/schemas/desktop-schema.json
Normal file
1756
apps/gpauth/gen/schemas/desktop-schema.json
Normal file
File diff suppressed because it is too large
Load Diff
1756
apps/gpauth/gen/schemas/linux-schema.json
Normal file
1756
apps/gpauth/gen/schemas/linux-schema.json
Normal file
File diff suppressed because it is too large
Load Diff
52
apps/gpauth/src/auth_messenger.rs
Normal file
52
apps/gpauth/src/auth_messenger.rs
Normal file
@ -0,0 +1,52 @@
|
|||||||
|
use gpapi::auth::SamlAuthData;
|
||||||
|
use log::error;
|
||||||
|
use tokio::sync::{mpsc, RwLock};
|
||||||
|
|
||||||
|
pub enum AuthError {
|
||||||
|
/// Failed to load page due to TLS error
|
||||||
|
TlsError,
|
||||||
|
/// 1. Found auth data in headers/body but it's invalid
|
||||||
|
/// 2. Loaded an empty page, failed to load page. etc.
|
||||||
|
Invalid,
|
||||||
|
/// No auth data found in headers/body
|
||||||
|
NotFound,
|
||||||
|
/// Other errors
|
||||||
|
Other,
|
||||||
|
}
|
||||||
|
|
||||||
|
pub type AuthResult = anyhow::Result<SamlAuthData, AuthError>;
|
||||||
|
|
||||||
|
pub struct AuthMessenger {
|
||||||
|
tx: mpsc::UnboundedSender<AuthResult>,
|
||||||
|
rx: RwLock<mpsc::UnboundedReceiver<AuthResult>>,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl AuthMessenger {
|
||||||
|
pub fn new() -> Self {
|
||||||
|
let (tx, rx) = mpsc::unbounded_channel();
|
||||||
|
|
||||||
|
Self {
|
||||||
|
tx,
|
||||||
|
rx: RwLock::new(rx),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub async fn recv_auth_data(&self) -> AuthResult {
|
||||||
|
let mut rx = self.rx.write().await;
|
||||||
|
rx.recv().await.unwrap_or_else(|| Err(AuthError::Other))
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn send_auth_result(&self, result: AuthResult) {
|
||||||
|
if let Err(err) = self.tx.send(result) {
|
||||||
|
error!("Failed to send auth result: {}", err);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn send_auth_error(&self, err: AuthError) {
|
||||||
|
self.send_auth_result(Err(err));
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn send_auth_data(&self, data: SamlAuthData) {
|
||||||
|
self.send_auth_result(Ok(data));
|
||||||
|
}
|
||||||
|
}
|
@ -1,288 +1,186 @@
|
|||||||
use std::{
|
use std::{sync::Arc, time::Instant};
|
||||||
rc::Rc,
|
|
||||||
sync::Arc,
|
|
||||||
time::{Duration, Instant},
|
|
||||||
};
|
|
||||||
|
|
||||||
use anyhow::bail;
|
use anyhow::bail;
|
||||||
use gpapi::{
|
use gpapi::{
|
||||||
auth::SamlAuthData,
|
auth::SamlAuthData,
|
||||||
error::AuthDataParseError,
|
error::PortalError,
|
||||||
gp_params::GpParams,
|
gp_params::GpParams,
|
||||||
portal::{prelogin, Prelogin},
|
portal::{prelogin, Prelogin},
|
||||||
utils::{redact::redact_uri, window::WindowExt},
|
|
||||||
};
|
};
|
||||||
use log::{info, warn};
|
use log::{info, warn};
|
||||||
use regex::Regex;
|
use tauri::{AppHandle, WebviewUrl, WebviewWindow};
|
||||||
use tauri::{AppHandle, Window, WindowEvent, WindowUrl};
|
use tokio::sync::oneshot;
|
||||||
use tokio::sync::{mpsc, oneshot, RwLock};
|
|
||||||
use tokio_util::sync::CancellationToken;
|
use tokio_util::sync::CancellationToken;
|
||||||
use webkit2gtk::{
|
|
||||||
gio::Cancellable,
|
use crate::{
|
||||||
glib::{GString, TimeSpan},
|
auth_messenger::{AuthError, AuthMessenger},
|
||||||
LoadEvent, SettingsExt, TLSErrorsPolicy, URIResponse, URIResponseExt, WebContextExt, WebResource, WebResourceExt,
|
common::{AuthRequest, AuthSettings},
|
||||||
WebView, WebViewExt, WebsiteDataManagerExtManual, WebsiteDataTypes,
|
platform_impl,
|
||||||
};
|
};
|
||||||
|
|
||||||
enum AuthDataError {
|
pub struct AuthWindow<'a> {
|
||||||
/// Failed to load page due to TLS error
|
app_handle: &'a AppHandle,
|
||||||
TlsError,
|
|
||||||
/// 1. Found auth data in headers/body but it's invalid
|
|
||||||
/// 2. Loaded an empty page, failed to load page. etc.
|
|
||||||
Invalid,
|
|
||||||
/// No auth data found in headers/body
|
|
||||||
NotFound,
|
|
||||||
}
|
|
||||||
|
|
||||||
type AuthResult = Result<SamlAuthData, AuthDataError>;
|
|
||||||
|
|
||||||
pub(crate) struct AuthWindow<'a> {
|
|
||||||
app_handle: AppHandle,
|
|
||||||
server: &'a str,
|
server: &'a str,
|
||||||
saml_request: &'a str,
|
gp_params: Option<&'a GpParams>,
|
||||||
user_agent: &'a str,
|
saml_request: Option<&'a str>,
|
||||||
gp_params: Option<GpParams>,
|
|
||||||
clean: bool,
|
clean: bool,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl<'a> AuthWindow<'a> {
|
impl<'a> AuthWindow<'a> {
|
||||||
pub fn new(app_handle: AppHandle) -> Self {
|
pub fn new(app_handle: &'a AppHandle, server: &'a str) -> Self {
|
||||||
Self {
|
Self {
|
||||||
app_handle,
|
app_handle,
|
||||||
server: "",
|
server,
|
||||||
saml_request: "",
|
|
||||||
user_agent: "",
|
|
||||||
gp_params: None,
|
gp_params: None,
|
||||||
|
saml_request: None,
|
||||||
clean: false,
|
clean: false,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn server(mut self, server: &'a str) -> Self {
|
pub fn with_gp_params(mut self, gp_params: &'a GpParams) -> Self {
|
||||||
self.server = server;
|
self.gp_params = Some(gp_params);
|
||||||
self
|
self
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn saml_request(mut self, saml_request: &'a str) -> Self {
|
pub fn with_saml_request(mut self, saml_request: &'a str) -> Self {
|
||||||
self.saml_request = saml_request;
|
self.saml_request = Some(saml_request);
|
||||||
self
|
self
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn user_agent(mut self, user_agent: &'a str) -> Self {
|
pub fn with_clean(mut self, clean: bool) -> Self {
|
||||||
self.user_agent = user_agent;
|
|
||||||
self
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn gp_params(mut self, gp_params: GpParams) -> Self {
|
|
||||||
self.gp_params.replace(gp_params);
|
|
||||||
self
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn clean(mut self, clean: bool) -> Self {
|
|
||||||
self.clean = clean;
|
self.clean = clean;
|
||||||
self
|
self
|
||||||
}
|
}
|
||||||
|
|
||||||
pub async fn open(&self) -> anyhow::Result<SamlAuthData> {
|
pub async fn authenticate(&self) -> anyhow::Result<SamlAuthData> {
|
||||||
info!("Open auth window, user_agent: {}", self.user_agent);
|
let auth_window = WebviewWindow::builder(self.app_handle, "auth_window", WebviewUrl::default())
|
||||||
|
|
||||||
let window = Window::builder(&self.app_handle, "auth_window", WindowUrl::default())
|
|
||||||
.title("GlobalProtect Login")
|
.title("GlobalProtect Login")
|
||||||
// .user_agent(self.user_agent)
|
|
||||||
.focused(true)
|
.focused(true)
|
||||||
.visible(false)
|
.visible(true)
|
||||||
.center()
|
.center()
|
||||||
.build()?;
|
.build()?;
|
||||||
|
|
||||||
let window = Arc::new(window);
|
|
||||||
|
|
||||||
let cancel_token = CancellationToken::new();
|
let cancel_token = CancellationToken::new();
|
||||||
let cancel_token_clone = cancel_token.clone();
|
|
||||||
|
|
||||||
window.on_window_event(move |event| {
|
|
||||||
if let WindowEvent::CloseRequested { .. } = event {
|
|
||||||
cancel_token_clone.cancel();
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
let window_clone = Arc::clone(&window);
|
|
||||||
let timeout_secs = 15;
|
|
||||||
tokio::spawn(async move {
|
|
||||||
tokio::time::sleep(Duration::from_secs(timeout_secs)).await;
|
|
||||||
let visible = window_clone.is_visible().unwrap_or(false);
|
|
||||||
if !visible {
|
|
||||||
info!("Try to raise auth window after {} seconds", timeout_secs);
|
|
||||||
raise_window(&window_clone);
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
tokio::select! {
|
tokio::select! {
|
||||||
_ = cancel_token.cancelled() => {
|
_ = cancel_token.cancelled() => bail!("Authentication cancelled"),
|
||||||
bail!("Auth cancelled");
|
result = self.auth_loop(&auth_window, &cancel_token) => {
|
||||||
}
|
auth_window.close()?;
|
||||||
saml_result = self.auth_loop(&window) => {
|
result
|
||||||
window.close()?;
|
|
||||||
saml_result
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn auth_loop(&self, window: &Arc<Window>) -> anyhow::Result<SamlAuthData> {
|
async fn auth_loop(
|
||||||
let saml_request = self.saml_request.to_string();
|
&self,
|
||||||
let (auth_result_tx, mut auth_result_rx) = mpsc::unbounded_channel::<AuthResult>();
|
auth_window: &WebviewWindow,
|
||||||
let raise_window_cancel_token: Arc<RwLock<Option<CancellationToken>>> = Default::default();
|
cancel_token: &CancellationToken,
|
||||||
let gp_params = self.gp_params.as_ref().unwrap();
|
) -> anyhow::Result<SamlAuthData> {
|
||||||
let tls_err_policy = if gp_params.ignore_tls_errors() {
|
|
||||||
TLSErrorsPolicy::Ignore
|
|
||||||
} else {
|
|
||||||
TLSErrorsPolicy::Fail
|
|
||||||
};
|
|
||||||
|
|
||||||
if self.clean {
|
if self.clean {
|
||||||
clear_webview_cookies(window).await?;
|
self.clear_webview_data(&auth_window).await?;
|
||||||
}
|
}
|
||||||
|
|
||||||
let raise_window_cancel_token_clone = Arc::clone(&raise_window_cancel_token);
|
let auth_messenger = self.setup_auth_window(&auth_window, cancel_token).await?;
|
||||||
window.with_webview(move |wv| {
|
|
||||||
let wv = wv.inner();
|
|
||||||
|
|
||||||
if let Some(context) = wv.context() {
|
|
||||||
context.set_tls_errors_policy(tls_err_policy);
|
|
||||||
}
|
|
||||||
|
|
||||||
if let Some(settings) = wv.settings() {
|
|
||||||
let ua = settings.user_agent().unwrap_or("".into());
|
|
||||||
info!("Auth window user agent: {}", ua);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Load the initial SAML request
|
|
||||||
load_saml_request(&wv, &saml_request);
|
|
||||||
|
|
||||||
let auth_result_tx_clone = auth_result_tx.clone();
|
|
||||||
wv.connect_load_changed(move |wv, event| {
|
|
||||||
if event == LoadEvent::Started {
|
|
||||||
let Ok(mut cancel_token) = raise_window_cancel_token_clone.try_write() else {
|
|
||||||
return;
|
|
||||||
};
|
|
||||||
|
|
||||||
// Cancel the raise window task
|
|
||||||
if let Some(cancel_token) = cancel_token.take() {
|
|
||||||
cancel_token.cancel();
|
|
||||||
}
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
if event != LoadEvent::Finished {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
if let Some(main_resource) = wv.main_resource() {
|
|
||||||
let uri = main_resource.uri().unwrap_or("".into());
|
|
||||||
|
|
||||||
if uri.is_empty() {
|
|
||||||
warn!("Loaded an empty uri");
|
|
||||||
send_auth_result(&auth_result_tx_clone, Err(AuthDataError::Invalid));
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
info!("Loaded uri: {}", redact_uri(&uri));
|
|
||||||
if uri.starts_with("globalprotectcallback:") {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
read_auth_data(&main_resource, auth_result_tx_clone.clone());
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
let auth_result_tx_clone = auth_result_tx.clone();
|
|
||||||
wv.connect_load_failed_with_tls_errors(move |_wv, uri, cert, err| {
|
|
||||||
let redacted_uri = redact_uri(uri);
|
|
||||||
warn!(
|
|
||||||
"Failed to load uri: {} with error: {}, cert: {}",
|
|
||||||
redacted_uri, err, cert
|
|
||||||
);
|
|
||||||
|
|
||||||
send_auth_result(&auth_result_tx_clone, Err(AuthDataError::TlsError));
|
|
||||||
true
|
|
||||||
});
|
|
||||||
|
|
||||||
wv.connect_load_failed(move |_wv, _event, uri, err| {
|
|
||||||
let redacted_uri = redact_uri(uri);
|
|
||||||
if !uri.starts_with("globalprotectcallback:") {
|
|
||||||
warn!("Failed to load uri: {} with error: {}", redacted_uri, err);
|
|
||||||
}
|
|
||||||
// NOTE: Don't send error here, since load_changed event will be triggered after this
|
|
||||||
// send_auth_result(&auth_result_tx, Err(AuthDataError::Invalid));
|
|
||||||
// true to stop other handlers from being invoked for the event. false to propagate the event further.
|
|
||||||
true
|
|
||||||
});
|
|
||||||
})?;
|
|
||||||
|
|
||||||
let portal = self.server.to_string();
|
|
||||||
|
|
||||||
loop {
|
loop {
|
||||||
if let Some(auth_result) = auth_result_rx.recv().await {
|
match auth_messenger.recv_auth_data().await {
|
||||||
match auth_result {
|
|
||||||
Ok(auth_data) => return Ok(auth_data),
|
Ok(auth_data) => return Ok(auth_data),
|
||||||
Err(AuthDataError::TlsError) => bail!("TLS error: certificate verify failed"),
|
Err(AuthError::TlsError) => bail!(PortalError::TlsError),
|
||||||
Err(AuthDataError::NotFound) => {
|
Err(AuthError::NotFound) => self.handle_not_found(auth_window).await,
|
||||||
info!("No auth data found, it may not be the /SAML20/SP/ACS endpoint");
|
Err(AuthError::Invalid) => self.retry_auth(auth_window).await?,
|
||||||
|
Err(AuthError::Other) => bail!("Unknown error"),
|
||||||
// The user may need to interact with the auth window, raise it in 3 seconds
|
|
||||||
if !window.is_visible().unwrap_or(false) {
|
|
||||||
let window = Arc::clone(window);
|
|
||||||
let cancel_token = CancellationToken::new();
|
|
||||||
|
|
||||||
raise_window_cancel_token.write().await.replace(cancel_token.clone());
|
|
||||||
|
|
||||||
tokio::spawn(async move {
|
|
||||||
let delay_secs = 1;
|
|
||||||
|
|
||||||
info!("Raise window in {} second(s)", delay_secs);
|
|
||||||
tokio::select! {
|
|
||||||
_ = tokio::time::sleep(Duration::from_secs(delay_secs)) => {
|
|
||||||
raise_window(&window);
|
|
||||||
}
|
}
|
||||||
_ = cancel_token.cancelled() => {
|
|
||||||
info!("Raise window cancelled");
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
async fn clear_webview_data(&self, auth_window: &WebviewWindow) -> anyhow::Result<()> {
|
||||||
|
info!("Clearing webview data...");
|
||||||
|
|
||||||
|
let (tx, rx) = oneshot::channel::<anyhow::Result<()>>();
|
||||||
|
let now = Instant::now();
|
||||||
|
auth_window.with_webview(|webview| {
|
||||||
|
platform_impl::clear_data(&webview.inner(), |result| {
|
||||||
|
if let Err(result) = tx.send(result) {
|
||||||
|
warn!("Failed to send clear data result: {:?}", result);
|
||||||
|
}
|
||||||
|
})
|
||||||
|
})?;
|
||||||
|
|
||||||
|
rx.await??;
|
||||||
|
info!("Webview data cleared in {:?}", now.elapsed());
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn setup_auth_window(
|
||||||
|
&self,
|
||||||
|
auth_window: &WebviewWindow,
|
||||||
|
cancel_token: &CancellationToken,
|
||||||
|
) -> anyhow::Result<Arc<AuthMessenger>> {
|
||||||
|
info!("Setting up auth window...");
|
||||||
|
|
||||||
|
let cancel_token = cancel_token.clone();
|
||||||
|
auth_window.on_window_event(move |event| {
|
||||||
|
if let tauri::WindowEvent::CloseRequested { .. } = event {
|
||||||
|
cancel_token.cancel();
|
||||||
|
}
|
||||||
});
|
});
|
||||||
}
|
|
||||||
}
|
|
||||||
Err(AuthDataError::Invalid) => {
|
|
||||||
info!("Got invalid auth data, retrying...");
|
|
||||||
|
|
||||||
window.with_webview(|wv| {
|
let saml_request = self.saml_request.expect("SAML request not set").to_string();
|
||||||
let wv = wv.inner();
|
let gp_params = self.gp_params.expect("GP params not set");
|
||||||
wv.run_javascript(r#"
|
|
||||||
|
let auth_messenger = Arc::new(AuthMessenger::new());
|
||||||
|
let auth_messenger_clone = Arc::clone(&auth_messenger);
|
||||||
|
let ignore_tls_errors = gp_params.ignore_tls_errors();
|
||||||
|
|
||||||
|
let (tx, rx) = oneshot::channel::<anyhow::Result<()>>();
|
||||||
|
auth_window.with_webview(move |webview| {
|
||||||
|
let auth_settings = AuthSettings {
|
||||||
|
auth_request: AuthRequest::new(&saml_request),
|
||||||
|
auth_messenger: auth_messenger_clone,
|
||||||
|
ignore_tls_errors,
|
||||||
|
};
|
||||||
|
let result = platform_impl::setup_webview(&webview.inner(), auth_settings);
|
||||||
|
if let Err(result) = tx.send(result) {
|
||||||
|
warn!("Failed to send setup auth window result: {:?}", result);
|
||||||
|
}
|
||||||
|
})?;
|
||||||
|
|
||||||
|
rx.await??;
|
||||||
|
info!("Auth window setup completed");
|
||||||
|
|
||||||
|
Ok(auth_messenger)
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn handle_not_found(&self, auth_window: &WebviewWindow) {
|
||||||
|
info!("No auth data found, it may not be the /SAML20/SP/ACS endpoint");
|
||||||
|
|
||||||
|
let visible = auth_window.is_visible().unwrap_or(false);
|
||||||
|
if visible {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
info!("Displaying the window in 3 seconds");
|
||||||
|
|
||||||
|
// todo!("Display the window in 3 seconds")
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn retry_auth(&self, auth_window: &WebviewWindow) -> anyhow::Result<()> {
|
||||||
|
info!("Retrying authentication...");
|
||||||
|
|
||||||
|
auth_window.eval( r#"
|
||||||
var loading = document.createElement("div");
|
var loading = document.createElement("div");
|
||||||
loading.innerHTML = '<div style="position: absolute; width: 100%; text-align: center; font-size: 20px; font-weight: bold; top: 50%; left: 50%; transform: translate(-50%, -50%);">Got invalid token, retrying...</div>';
|
loading.innerHTML = '<div style="position: absolute; width: 100%; text-align: center; font-size: 20px; font-weight: bold; top: 50%; left: 50%; transform: translate(-50%, -50%);">Got invalid token, retrying...</div>';
|
||||||
loading.style = "position: fixed; top: 0; left: 0; width: 100%; height: 100%; background: rgba(255, 255, 255, 0.85); z-index: 99999;";
|
loading.style = "position: fixed; top: 0; left: 0; width: 100%; height: 100%; background: rgba(255, 255, 255, 0.85); z-index: 99999;";
|
||||||
document.body.appendChild(loading);
|
document.body.appendChild(loading);
|
||||||
"#,
|
"#)?;
|
||||||
Cancellable::NONE,
|
|
||||||
|_| info!("Injected loading element successfully"),
|
let saml_request = portal_prelogin(&self.server, self.gp_params.unwrap()).await?;
|
||||||
);
|
auth_window.with_webview(move |webview| {
|
||||||
|
let auth_request = AuthRequest::new(&saml_request);
|
||||||
|
platform_impl::load_auth_request(&webview.inner(), &auth_request);
|
||||||
})?;
|
})?;
|
||||||
|
|
||||||
let saml_request = portal_prelogin(&portal, gp_params).await?;
|
Ok(())
|
||||||
window.with_webview(move |wv| {
|
|
||||||
let wv = wv.inner();
|
|
||||||
load_saml_request(&wv, &saml_request);
|
|
||||||
})?;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
fn raise_window(window: &Arc<Window>) {
|
|
||||||
let visible = window.is_visible().unwrap_or(false);
|
|
||||||
if !visible {
|
|
||||||
if let Err(err) = window.raise() {
|
|
||||||
warn!("Failed to raise window: {}", err);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -292,232 +190,3 @@ pub async fn portal_prelogin(portal: &str, gp_params: &GpParams) -> anyhow::Resu
|
|||||||
Prelogin::Standard(_) => bail!("Received non-SAML prelogin response"),
|
Prelogin::Standard(_) => bail!("Received non-SAML prelogin response"),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
fn send_auth_result(auth_result_tx: &mpsc::UnboundedSender<AuthResult>, auth_result: AuthResult) {
|
|
||||||
if let Err(err) = auth_result_tx.send(auth_result) {
|
|
||||||
warn!("Failed to send auth event: {}", err);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
fn load_saml_request(wv: &Rc<WebView>, saml_request: &str) {
|
|
||||||
if saml_request.starts_with("http") {
|
|
||||||
info!("Load the SAML request as URI...");
|
|
||||||
wv.load_uri(saml_request);
|
|
||||||
} else {
|
|
||||||
info!("Load the SAML request as HTML...");
|
|
||||||
wv.load_html(saml_request, None);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
fn read_auth_data_from_headers(response: &URIResponse) -> AuthResult {
|
|
||||||
response.http_headers().map_or_else(
|
|
||||||
|| {
|
|
||||||
info!("No headers found in response");
|
|
||||||
Err(AuthDataError::NotFound)
|
|
||||||
},
|
|
||||||
|mut headers| match headers.get("saml-auth-status") {
|
|
||||||
Some(status) if status == "1" => {
|
|
||||||
let username = headers.get("saml-username").map(GString::into);
|
|
||||||
let prelogin_cookie = headers.get("prelogin-cookie").map(GString::into);
|
|
||||||
let portal_userauthcookie = headers.get("portal-userauthcookie").map(GString::into);
|
|
||||||
|
|
||||||
if SamlAuthData::check(&username, &prelogin_cookie, &portal_userauthcookie) {
|
|
||||||
return Ok(SamlAuthData::new(
|
|
||||||
username.unwrap(),
|
|
||||||
prelogin_cookie,
|
|
||||||
portal_userauthcookie,
|
|
||||||
));
|
|
||||||
}
|
|
||||||
|
|
||||||
info!("Found invalid auth data in headers");
|
|
||||||
Err(AuthDataError::Invalid)
|
|
||||||
}
|
|
||||||
Some(status) => {
|
|
||||||
info!("Found invalid SAML status: {} in headers", status);
|
|
||||||
Err(AuthDataError::Invalid)
|
|
||||||
}
|
|
||||||
None => {
|
|
||||||
info!("No saml-auth-status header found");
|
|
||||||
Err(AuthDataError::NotFound)
|
|
||||||
}
|
|
||||||
},
|
|
||||||
)
|
|
||||||
}
|
|
||||||
|
|
||||||
fn read_auth_data_from_body<F>(main_resource: &WebResource, callback: F)
|
|
||||||
where
|
|
||||||
F: FnOnce(Result<SamlAuthData, AuthDataParseError>) + Send + 'static,
|
|
||||||
{
|
|
||||||
main_resource.data(Cancellable::NONE, |data| match data {
|
|
||||||
Ok(data) => {
|
|
||||||
let html = String::from_utf8_lossy(&data);
|
|
||||||
callback(read_auth_data_from_html(&html));
|
|
||||||
}
|
|
||||||
Err(err) => {
|
|
||||||
info!("Failed to read response body: {}", err);
|
|
||||||
callback(Err(AuthDataParseError::Invalid))
|
|
||||||
}
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
fn read_auth_data_from_html(html: &str) -> Result<SamlAuthData, AuthDataParseError> {
|
|
||||||
if html.contains("Temporarily Unavailable") {
|
|
||||||
info!("Found 'Temporarily Unavailable' in HTML, auth failed");
|
|
||||||
return Err(AuthDataParseError::Invalid);
|
|
||||||
}
|
|
||||||
|
|
||||||
SamlAuthData::from_html(html).or_else(|err| {
|
|
||||||
if let Some(gpcallback) = extract_gpcallback(html) {
|
|
||||||
info!("Found gpcallback from html...");
|
|
||||||
SamlAuthData::from_gpcallback(&gpcallback)
|
|
||||||
} else {
|
|
||||||
Err(err)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
fn extract_gpcallback(html: &str) -> Option<String> {
|
|
||||||
let re = Regex::new(r#"globalprotectcallback:[^"]+"#).unwrap();
|
|
||||||
re.captures(html)
|
|
||||||
.and_then(|captures| captures.get(0))
|
|
||||||
.map(|m| html_escape::decode_html_entities(m.as_str()).to_string())
|
|
||||||
}
|
|
||||||
|
|
||||||
fn read_auth_data(main_resource: &WebResource, auth_result_tx: mpsc::UnboundedSender<AuthResult>) {
|
|
||||||
let Some(response) = main_resource.response() else {
|
|
||||||
info!("No response found in main resource");
|
|
||||||
send_auth_result(&auth_result_tx, Err(AuthDataError::Invalid));
|
|
||||||
return;
|
|
||||||
};
|
|
||||||
|
|
||||||
info!("Trying to read auth data from response headers...");
|
|
||||||
|
|
||||||
match read_auth_data_from_headers(&response) {
|
|
||||||
Ok(auth_data) => {
|
|
||||||
info!("Got auth data from headers");
|
|
||||||
send_auth_result(&auth_result_tx, Ok(auth_data));
|
|
||||||
}
|
|
||||||
Err(AuthDataError::Invalid) => {
|
|
||||||
info!("Found invalid auth data in headers, trying to read from body...");
|
|
||||||
read_auth_data_from_body(main_resource, move |auth_result| {
|
|
||||||
// Since we have already found invalid auth data in headers, which means this could be the `/SAML20/SP/ACS` endpoint
|
|
||||||
// any error result from body should be considered as invalid, and trigger a retry
|
|
||||||
let auth_result = auth_result.map_err(|err| {
|
|
||||||
info!("Failed to read auth data from body: {}", err);
|
|
||||||
AuthDataError::Invalid
|
|
||||||
});
|
|
||||||
send_auth_result(&auth_result_tx, auth_result);
|
|
||||||
});
|
|
||||||
}
|
|
||||||
Err(AuthDataError::NotFound) => {
|
|
||||||
info!("No auth data found in headers, trying to read from body...");
|
|
||||||
|
|
||||||
let is_acs_endpoint = main_resource.uri().map_or(false, |uri| uri.contains("/SAML20/SP/ACS"));
|
|
||||||
|
|
||||||
read_auth_data_from_body(main_resource, move |auth_result| {
|
|
||||||
// If the endpoint is `/SAML20/SP/ACS` and no auth data found in body, it should be considered as invalid
|
|
||||||
let auth_result = auth_result.map_err(|err| {
|
|
||||||
info!("Failed to read auth data from body: {}", err);
|
|
||||||
|
|
||||||
if !is_acs_endpoint && matches!(err, AuthDataParseError::NotFound) {
|
|
||||||
AuthDataError::NotFound
|
|
||||||
} else {
|
|
||||||
AuthDataError::Invalid
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
send_auth_result(&auth_result_tx, auth_result)
|
|
||||||
});
|
|
||||||
}
|
|
||||||
Err(AuthDataError::TlsError) => {
|
|
||||||
// NOTE: This is unreachable
|
|
||||||
info!("TLS error found in headers, trying to read from body...");
|
|
||||||
send_auth_result(&auth_result_tx, Err(AuthDataError::TlsError));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub(crate) async fn clear_webview_cookies(window: &Window) -> anyhow::Result<()> {
|
|
||||||
let (tx, rx) = oneshot::channel::<Result<(), String>>();
|
|
||||||
|
|
||||||
window.with_webview(|wv| {
|
|
||||||
let send_result = move |result: Result<(), String>| {
|
|
||||||
if let Err(err) = tx.send(result) {
|
|
||||||
info!("Failed to send result: {:?}", err);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
let wv = wv.inner();
|
|
||||||
let context = match wv.context() {
|
|
||||||
Some(context) => context,
|
|
||||||
None => {
|
|
||||||
send_result(Err("No webview context found".into()));
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
let data_manager = match context.website_data_manager() {
|
|
||||||
Some(manager) => manager,
|
|
||||||
None => {
|
|
||||||
send_result(Err("No data manager found".into()));
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
let now = Instant::now();
|
|
||||||
data_manager.clear(
|
|
||||||
WebsiteDataTypes::COOKIES,
|
|
||||||
TimeSpan(0),
|
|
||||||
Cancellable::NONE,
|
|
||||||
move |result| match result {
|
|
||||||
Err(err) => {
|
|
||||||
send_result(Err(err.to_string()));
|
|
||||||
}
|
|
||||||
Ok(_) => {
|
|
||||||
info!("Cookies cleared in {} ms", now.elapsed().as_millis());
|
|
||||||
send_result(Ok(()));
|
|
||||||
}
|
|
||||||
},
|
|
||||||
);
|
|
||||||
})?;
|
|
||||||
|
|
||||||
rx.await?.map_err(|err| anyhow::anyhow!(err))
|
|
||||||
}
|
|
||||||
|
|
||||||
#[cfg(test)]
|
|
||||||
mod tests {
|
|
||||||
use super::*;
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn extract_gpcallback_some() {
|
|
||||||
let html = r#"
|
|
||||||
<meta http-equiv="refresh" content="0; URL=globalprotectcallback:PGh0bWw+PCEtLSA8c">
|
|
||||||
<meta http-equiv="refresh" content="0; URL=globalprotectcallback:PGh0bWw+PCEtLSA8c">
|
|
||||||
"#;
|
|
||||||
|
|
||||||
assert_eq!(
|
|
||||||
extract_gpcallback(html).as_deref(),
|
|
||||||
Some("globalprotectcallback:PGh0bWw+PCEtLSA8c")
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn extract_gpcallback_cas() {
|
|
||||||
let html = r#"
|
|
||||||
<meta http-equiv="refresh" content="0; URL=globalprotectcallback:cas-as=1&un=xyz@email.com&token=very_long_string">
|
|
||||||
"#;
|
|
||||||
|
|
||||||
assert_eq!(
|
|
||||||
extract_gpcallback(html).as_deref(),
|
|
||||||
Some("globalprotectcallback:cas-as=1&un=xyz@email.com&token=very_long_string")
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
fn extract_gpcallback_none() {
|
|
||||||
let html = r#"
|
|
||||||
<meta http-equiv="refresh" content="0; URL=PGh0bWw+PCEtLSA8c">
|
|
||||||
"#;
|
|
||||||
|
|
||||||
assert_eq!(extract_gpcallback(html), None);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
523
apps/gpauth/src/auth_window1.rs
Normal file
523
apps/gpauth/src/auth_window1.rs
Normal file
@ -0,0 +1,523 @@
|
|||||||
|
use std::{
|
||||||
|
rc::Rc,
|
||||||
|
sync::Arc,
|
||||||
|
time::{Duration, Instant},
|
||||||
|
};
|
||||||
|
|
||||||
|
use anyhow::bail;
|
||||||
|
use gpapi::{
|
||||||
|
auth::SamlAuthData,
|
||||||
|
error::AuthDataParseError,
|
||||||
|
gp_params::GpParams,
|
||||||
|
portal::{prelogin, Prelogin},
|
||||||
|
utils::{redact::redact_uri, window::WindowExt},
|
||||||
|
};
|
||||||
|
use log::{info, warn};
|
||||||
|
use regex::Regex;
|
||||||
|
use tauri::{AppHandle, Window, WindowEvent, WindowUrl};
|
||||||
|
use tokio::sync::{mpsc, oneshot, RwLock};
|
||||||
|
use tokio_util::sync::CancellationToken;
|
||||||
|
use webkit2gtk::{
|
||||||
|
gio::Cancellable,
|
||||||
|
glib::{GString, TimeSpan},
|
||||||
|
LoadEvent, SettingsExt, TLSErrorsPolicy, URIResponse, URIResponseExt, WebContextExt, WebResource, WebResourceExt,
|
||||||
|
WebView, WebViewExt, WebsiteDataManagerExtManual, WebsiteDataTypes,
|
||||||
|
};
|
||||||
|
|
||||||
|
enum AuthDataError {
|
||||||
|
/// Failed to load page due to TLS error
|
||||||
|
TlsError,
|
||||||
|
/// 1. Found auth data in headers/body but it's invalid
|
||||||
|
/// 2. Loaded an empty page, failed to load page. etc.
|
||||||
|
Invalid,
|
||||||
|
/// No auth data found in headers/body
|
||||||
|
NotFound,
|
||||||
|
}
|
||||||
|
|
||||||
|
type AuthResult = Result<SamlAuthData, AuthDataError>;
|
||||||
|
|
||||||
|
pub(crate) struct AuthWindow<'a> {
|
||||||
|
app_handle: AppHandle,
|
||||||
|
server: &'a str,
|
||||||
|
saml_request: &'a str,
|
||||||
|
user_agent: &'a str,
|
||||||
|
gp_params: Option<GpParams>,
|
||||||
|
clean: bool,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<'a> AuthWindow<'a> {
|
||||||
|
pub fn new(app_handle: AppHandle) -> Self {
|
||||||
|
Self {
|
||||||
|
app_handle,
|
||||||
|
server: "",
|
||||||
|
saml_request: "",
|
||||||
|
user_agent: "",
|
||||||
|
gp_params: None,
|
||||||
|
clean: false,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn server(mut self, server: &'a str) -> Self {
|
||||||
|
self.server = server;
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn saml_request(mut self, saml_request: &'a str) -> Self {
|
||||||
|
self.saml_request = saml_request;
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn user_agent(mut self, user_agent: &'a str) -> Self {
|
||||||
|
self.user_agent = user_agent;
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn gp_params(mut self, gp_params: GpParams) -> Self {
|
||||||
|
self.gp_params.replace(gp_params);
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn clean(mut self, clean: bool) -> Self {
|
||||||
|
self.clean = clean;
|
||||||
|
self
|
||||||
|
}
|
||||||
|
|
||||||
|
pub async fn open(&self) -> anyhow::Result<SamlAuthData> {
|
||||||
|
info!("Open auth window, user_agent: {}", self.user_agent);
|
||||||
|
|
||||||
|
let window = Window::builder(&self.app_handle, "auth_window", WindowUrl::default())
|
||||||
|
.title("GlobalProtect Login")
|
||||||
|
// .user_agent(self.user_agent)
|
||||||
|
.focused(true)
|
||||||
|
.visible(false)
|
||||||
|
.center()
|
||||||
|
.build()?;
|
||||||
|
|
||||||
|
let window = Arc::new(window);
|
||||||
|
|
||||||
|
let cancel_token = CancellationToken::new();
|
||||||
|
let cancel_token_clone = cancel_token.clone();
|
||||||
|
|
||||||
|
window.on_window_event(move |event| {
|
||||||
|
if let WindowEvent::CloseRequested { .. } = event {
|
||||||
|
cancel_token_clone.cancel();
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
let window_clone = Arc::clone(&window);
|
||||||
|
let timeout_secs = 15;
|
||||||
|
tokio::spawn(async move {
|
||||||
|
tokio::time::sleep(Duration::from_secs(timeout_secs)).await;
|
||||||
|
let visible = window_clone.is_visible().unwrap_or(false);
|
||||||
|
if !visible {
|
||||||
|
info!("Try to raise auth window after {} seconds", timeout_secs);
|
||||||
|
raise_window(&window_clone);
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
tokio::select! {
|
||||||
|
_ = cancel_token.cancelled() => {
|
||||||
|
bail!("Auth cancelled");
|
||||||
|
}
|
||||||
|
saml_result = self.auth_loop(&window) => {
|
||||||
|
window.close()?;
|
||||||
|
saml_result
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn auth_loop(&self, window: &Arc<Window>) -> anyhow::Result<SamlAuthData> {
|
||||||
|
let saml_request = self.saml_request.to_string();
|
||||||
|
let (auth_result_tx, mut auth_result_rx) = mpsc::unbounded_channel::<AuthResult>();
|
||||||
|
let raise_window_cancel_token: Arc<RwLock<Option<CancellationToken>>> = Default::default();
|
||||||
|
let gp_params = self.gp_params.as_ref().unwrap();
|
||||||
|
let tls_err_policy = if gp_params.ignore_tls_errors() {
|
||||||
|
TLSErrorsPolicy::Ignore
|
||||||
|
} else {
|
||||||
|
TLSErrorsPolicy::Fail
|
||||||
|
};
|
||||||
|
|
||||||
|
if self.clean {
|
||||||
|
clear_webview_cookies(window).await?;
|
||||||
|
}
|
||||||
|
|
||||||
|
let raise_window_cancel_token_clone = Arc::clone(&raise_window_cancel_token);
|
||||||
|
window.with_webview(move |wv| {
|
||||||
|
let wv = wv.inner();
|
||||||
|
|
||||||
|
if let Some(context) = wv.context() {
|
||||||
|
context.set_tls_errors_policy(tls_err_policy);
|
||||||
|
}
|
||||||
|
|
||||||
|
if let Some(settings) = wv.settings() {
|
||||||
|
let ua = settings.user_agent().unwrap_or("".into());
|
||||||
|
info!("Auth window user agent: {}", ua);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Load the initial SAML request
|
||||||
|
load_saml_request(&wv, &saml_request);
|
||||||
|
|
||||||
|
let auth_result_tx_clone = auth_result_tx.clone();
|
||||||
|
wv.connect_load_changed(move |wv, event| {
|
||||||
|
if event == LoadEvent::Started {
|
||||||
|
let Ok(mut cancel_token) = raise_window_cancel_token_clone.try_write() else {
|
||||||
|
return;
|
||||||
|
};
|
||||||
|
|
||||||
|
// Cancel the raise window task
|
||||||
|
if let Some(cancel_token) = cancel_token.take() {
|
||||||
|
cancel_token.cancel();
|
||||||
|
}
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
if event != LoadEvent::Finished {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
if let Some(main_resource) = wv.main_resource() {
|
||||||
|
let uri = main_resource.uri().unwrap_or("".into());
|
||||||
|
|
||||||
|
if uri.is_empty() {
|
||||||
|
warn!("Loaded an empty uri");
|
||||||
|
send_auth_result(&auth_result_tx_clone, Err(AuthDataError::Invalid));
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
info!("Loaded uri: {}", redact_uri(&uri));
|
||||||
|
if uri.starts_with("globalprotectcallback:") {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
read_auth_data(&main_resource, auth_result_tx_clone.clone());
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
let auth_result_tx_clone = auth_result_tx.clone();
|
||||||
|
wv.connect_load_failed_with_tls_errors(move |_wv, uri, cert, err| {
|
||||||
|
let redacted_uri = redact_uri(uri);
|
||||||
|
warn!(
|
||||||
|
"Failed to load uri: {} with error: {}, cert: {}",
|
||||||
|
redacted_uri, err, cert
|
||||||
|
);
|
||||||
|
|
||||||
|
send_auth_result(&auth_result_tx_clone, Err(AuthDataError::TlsError));
|
||||||
|
true
|
||||||
|
});
|
||||||
|
|
||||||
|
wv.connect_load_failed(move |_wv, _event, uri, err| {
|
||||||
|
let redacted_uri = redact_uri(uri);
|
||||||
|
if !uri.starts_with("globalprotectcallback:") {
|
||||||
|
warn!("Failed to load uri: {} with error: {}", redacted_uri, err);
|
||||||
|
}
|
||||||
|
// NOTE: Don't send error here, since load_changed event will be triggered after this
|
||||||
|
// send_auth_result(&auth_result_tx, Err(AuthDataError::Invalid));
|
||||||
|
// true to stop other handlers from being invoked for the event. false to propagate the event further.
|
||||||
|
true
|
||||||
|
});
|
||||||
|
})?;
|
||||||
|
|
||||||
|
let portal = self.server.to_string();
|
||||||
|
|
||||||
|
loop {
|
||||||
|
if let Some(auth_result) = auth_result_rx.recv().await {
|
||||||
|
match auth_result {
|
||||||
|
Ok(auth_data) => return Ok(auth_data),
|
||||||
|
Err(AuthDataError::TlsError) => bail!("TLS error: certificate verify failed"),
|
||||||
|
Err(AuthDataError::NotFound) => {
|
||||||
|
info!("No auth data found, it may not be the /SAML20/SP/ACS endpoint");
|
||||||
|
|
||||||
|
// The user may need to interact with the auth window, raise it in 3 seconds
|
||||||
|
if !window.is_visible().unwrap_or(false) {
|
||||||
|
let window = Arc::clone(window);
|
||||||
|
let cancel_token = CancellationToken::new();
|
||||||
|
|
||||||
|
raise_window_cancel_token.write().await.replace(cancel_token.clone());
|
||||||
|
|
||||||
|
tokio::spawn(async move {
|
||||||
|
let delay_secs = 1;
|
||||||
|
|
||||||
|
info!("Raise window in {} second(s)", delay_secs);
|
||||||
|
tokio::select! {
|
||||||
|
_ = tokio::time::sleep(Duration::from_secs(delay_secs)) => {
|
||||||
|
raise_window(&window);
|
||||||
|
}
|
||||||
|
_ = cancel_token.cancelled() => {
|
||||||
|
info!("Raise window cancelled");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Err(AuthDataError::Invalid) => {
|
||||||
|
info!("Got invalid auth data, retrying...");
|
||||||
|
|
||||||
|
window.with_webview(|wv| {
|
||||||
|
let wv = wv.inner();
|
||||||
|
wv.run_javascript(r#"
|
||||||
|
var loading = document.createElement("div");
|
||||||
|
loading.innerHTML = '<div style="position: absolute; width: 100%; text-align: center; font-size: 20px; font-weight: bold; top: 50%; left: 50%; transform: translate(-50%, -50%);">Got invalid token, retrying...</div>';
|
||||||
|
loading.style = "position: fixed; top: 0; left: 0; width: 100%; height: 100%; background: rgba(255, 255, 255, 0.85); z-index: 99999;";
|
||||||
|
document.body.appendChild(loading);
|
||||||
|
"#,
|
||||||
|
Cancellable::NONE,
|
||||||
|
|_| info!("Injected loading element successfully"),
|
||||||
|
);
|
||||||
|
})?;
|
||||||
|
|
||||||
|
let saml_request = portal_prelogin(&portal, gp_params).await?;
|
||||||
|
window.with_webview(move |wv| {
|
||||||
|
let wv = wv.inner();
|
||||||
|
load_saml_request(&wv, &saml_request);
|
||||||
|
})?;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn raise_window(window: &Arc<Window>) {
|
||||||
|
let visible = window.is_visible().unwrap_or(false);
|
||||||
|
if !visible {
|
||||||
|
if let Err(err) = window.raise() {
|
||||||
|
warn!("Failed to raise window: {}", err);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub async fn portal_prelogin(portal: &str, gp_params: &GpParams) -> anyhow::Result<String> {
|
||||||
|
match prelogin(portal, gp_params).await? {
|
||||||
|
Prelogin::Saml(prelogin) => Ok(prelogin.saml_request().to_string()),
|
||||||
|
Prelogin::Standard(_) => bail!("Received non-SAML prelogin response"),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn send_auth_result(auth_result_tx: &mpsc::UnboundedSender<AuthResult>, auth_result: AuthResult) {
|
||||||
|
if let Err(err) = auth_result_tx.send(auth_result) {
|
||||||
|
warn!("Failed to send auth event: {}", err);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn load_saml_request(wv: &Rc<WebView>, saml_request: &str) {
|
||||||
|
if saml_request.starts_with("http") {
|
||||||
|
info!("Load the SAML request as URI...");
|
||||||
|
wv.load_uri(saml_request);
|
||||||
|
} else {
|
||||||
|
info!("Load the SAML request as HTML...");
|
||||||
|
wv.load_html(saml_request, None);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn read_auth_data_from_headers(response: &URIResponse) -> AuthResult {
|
||||||
|
response.http_headers().map_or_else(
|
||||||
|
|| {
|
||||||
|
info!("No headers found in response");
|
||||||
|
Err(AuthDataError::NotFound)
|
||||||
|
},
|
||||||
|
|mut headers| match headers.get("saml-auth-status") {
|
||||||
|
Some(status) if status == "1" => {
|
||||||
|
let username = headers.get("saml-username").map(GString::into);
|
||||||
|
let prelogin_cookie = headers.get("prelogin-cookie").map(GString::into);
|
||||||
|
let portal_userauthcookie = headers.get("portal-userauthcookie").map(GString::into);
|
||||||
|
|
||||||
|
if SamlAuthData::check(&username, &prelogin_cookie, &portal_userauthcookie) {
|
||||||
|
return Ok(SamlAuthData::new(
|
||||||
|
username.unwrap(),
|
||||||
|
prelogin_cookie,
|
||||||
|
portal_userauthcookie,
|
||||||
|
));
|
||||||
|
}
|
||||||
|
|
||||||
|
info!("Found invalid auth data in headers");
|
||||||
|
Err(AuthDataError::Invalid)
|
||||||
|
}
|
||||||
|
Some(status) => {
|
||||||
|
info!("Found invalid SAML status: {} in headers", status);
|
||||||
|
Err(AuthDataError::Invalid)
|
||||||
|
}
|
||||||
|
None => {
|
||||||
|
info!("No saml-auth-status header found");
|
||||||
|
Err(AuthDataError::NotFound)
|
||||||
|
}
|
||||||
|
},
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
fn read_auth_data_from_body<F>(main_resource: &WebResource, callback: F)
|
||||||
|
where
|
||||||
|
F: FnOnce(Result<SamlAuthData, AuthDataParseError>) + Send + 'static,
|
||||||
|
{
|
||||||
|
main_resource.data(Cancellable::NONE, |data| match data {
|
||||||
|
Ok(data) => {
|
||||||
|
let html = String::from_utf8_lossy(&data);
|
||||||
|
callback(read_auth_data_from_html(&html));
|
||||||
|
}
|
||||||
|
Err(err) => {
|
||||||
|
info!("Failed to read response body: {}", err);
|
||||||
|
callback(Err(AuthDataParseError::Invalid))
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
fn read_auth_data_from_html(html: &str) -> Result<SamlAuthData, AuthDataParseError> {
|
||||||
|
if html.contains("Temporarily Unavailable") {
|
||||||
|
info!("Found 'Temporarily Unavailable' in HTML, auth failed");
|
||||||
|
return Err(AuthDataParseError::Invalid);
|
||||||
|
}
|
||||||
|
|
||||||
|
SamlAuthData::from_html(html).or_else(|err| {
|
||||||
|
if let Some(gpcallback) = extract_gpcallback(html) {
|
||||||
|
info!("Found gpcallback from html...");
|
||||||
|
SamlAuthData::from_gpcallback(&gpcallback)
|
||||||
|
} else {
|
||||||
|
Err(err)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
fn extract_gpcallback(html: &str) -> Option<String> {
|
||||||
|
let re = Regex::new(r#"globalprotectcallback:[^"]+"#).unwrap();
|
||||||
|
re.captures(html)
|
||||||
|
.and_then(|captures| captures.get(0))
|
||||||
|
.map(|m| html_escape::decode_html_entities(m.as_str()).to_string())
|
||||||
|
}
|
||||||
|
|
||||||
|
fn read_auth_data(main_resource: &WebResource, auth_result_tx: mpsc::UnboundedSender<AuthResult>) {
|
||||||
|
let Some(response) = main_resource.response() else {
|
||||||
|
info!("No response found in main resource");
|
||||||
|
send_auth_result(&auth_result_tx, Err(AuthDataError::Invalid));
|
||||||
|
return;
|
||||||
|
};
|
||||||
|
|
||||||
|
info!("Trying to read auth data from response headers...");
|
||||||
|
|
||||||
|
match read_auth_data_from_headers(&response) {
|
||||||
|
Ok(auth_data) => {
|
||||||
|
info!("Got auth data from headers");
|
||||||
|
send_auth_result(&auth_result_tx, Ok(auth_data));
|
||||||
|
}
|
||||||
|
Err(AuthDataError::Invalid) => {
|
||||||
|
info!("Found invalid auth data in headers, trying to read from body...");
|
||||||
|
read_auth_data_from_body(main_resource, move |auth_result| {
|
||||||
|
// Since we have already found invalid auth data in headers, which means this could be the `/SAML20/SP/ACS` endpoint
|
||||||
|
// any error result from body should be considered as invalid, and trigger a retry
|
||||||
|
let auth_result = auth_result.map_err(|err| {
|
||||||
|
info!("Failed to read auth data from body: {}", err);
|
||||||
|
AuthDataError::Invalid
|
||||||
|
});
|
||||||
|
send_auth_result(&auth_result_tx, auth_result);
|
||||||
|
});
|
||||||
|
}
|
||||||
|
Err(AuthDataError::NotFound) => {
|
||||||
|
info!("No auth data found in headers, trying to read from body...");
|
||||||
|
|
||||||
|
let is_acs_endpoint = main_resource.uri().map_or(false, |uri| uri.contains("/SAML20/SP/ACS"));
|
||||||
|
|
||||||
|
read_auth_data_from_body(main_resource, move |auth_result| {
|
||||||
|
// If the endpoint is `/SAML20/SP/ACS` and no auth data found in body, it should be considered as invalid
|
||||||
|
let auth_result = auth_result.map_err(|err| {
|
||||||
|
info!("Failed to read auth data from body: {}", err);
|
||||||
|
|
||||||
|
if !is_acs_endpoint && matches!(err, AuthDataParseError::NotFound) {
|
||||||
|
AuthDataError::NotFound
|
||||||
|
} else {
|
||||||
|
AuthDataError::Invalid
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
send_auth_result(&auth_result_tx, auth_result)
|
||||||
|
});
|
||||||
|
}
|
||||||
|
Err(AuthDataError::TlsError) => {
|
||||||
|
// NOTE: This is unreachable
|
||||||
|
info!("TLS error found in headers, trying to read from body...");
|
||||||
|
send_auth_result(&auth_result_tx, Err(AuthDataError::TlsError));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub(crate) async fn clear_webview_cookies(window: &Window) -> anyhow::Result<()> {
|
||||||
|
let (tx, rx) = oneshot::channel::<Result<(), String>>();
|
||||||
|
|
||||||
|
window.with_webview(|wv| {
|
||||||
|
let send_result = move |result: Result<(), String>| {
|
||||||
|
if let Err(err) = tx.send(result) {
|
||||||
|
info!("Failed to send result: {:?}", err);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
let wv = wv.inner();
|
||||||
|
let context = match wv.context() {
|
||||||
|
Some(context) => context,
|
||||||
|
None => {
|
||||||
|
send_result(Err("No webview context found".into()));
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
let data_manager = match context.website_data_manager() {
|
||||||
|
Some(manager) => manager,
|
||||||
|
None => {
|
||||||
|
send_result(Err("No data manager found".into()));
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
let now = Instant::now();
|
||||||
|
data_manager.clear(
|
||||||
|
WebsiteDataTypes::COOKIES,
|
||||||
|
TimeSpan(0),
|
||||||
|
Cancellable::NONE,
|
||||||
|
move |result| match result {
|
||||||
|
Err(err) => {
|
||||||
|
send_result(Err(err.to_string()));
|
||||||
|
}
|
||||||
|
Ok(_) => {
|
||||||
|
info!("Cookies cleared in {} ms", now.elapsed().as_millis());
|
||||||
|
send_result(Ok(()));
|
||||||
|
}
|
||||||
|
},
|
||||||
|
);
|
||||||
|
})?;
|
||||||
|
|
||||||
|
rx.await?.map_err(|err| anyhow::anyhow!(err))
|
||||||
|
}
|
||||||
|
|
||||||
|
#[cfg(test)]
|
||||||
|
mod tests {
|
||||||
|
use super::*;
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn extract_gpcallback_some() {
|
||||||
|
let html = r#"
|
||||||
|
<meta http-equiv="refresh" content="0; URL=globalprotectcallback:PGh0bWw+PCEtLSA8c">
|
||||||
|
<meta http-equiv="refresh" content="0; URL=globalprotectcallback:PGh0bWw+PCEtLSA8c">
|
||||||
|
"#;
|
||||||
|
|
||||||
|
assert_eq!(
|
||||||
|
extract_gpcallback(html).as_deref(),
|
||||||
|
Some("globalprotectcallback:PGh0bWw+PCEtLSA8c")
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn extract_gpcallback_cas() {
|
||||||
|
let html = r#"
|
||||||
|
<meta http-equiv="refresh" content="0; URL=globalprotectcallback:cas-as=1&un=xyz@email.com&token=very_long_string">
|
||||||
|
"#;
|
||||||
|
|
||||||
|
assert_eq!(
|
||||||
|
extract_gpcallback(html).as_deref(),
|
||||||
|
Some("globalprotectcallback:cas-as=1&un=xyz@email.com&token=very_long_string")
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn extract_gpcallback_none() {
|
||||||
|
let html = r#"
|
||||||
|
<meta http-equiv="refresh" content="0; URL=PGh0bWw+PCEtLSA8c">
|
||||||
|
"#;
|
||||||
|
|
||||||
|
assert_eq!(extract_gpcallback(html), None);
|
||||||
|
}
|
||||||
|
}
|
@ -1,21 +1,17 @@
|
|||||||
use std::{env::temp_dir, fs, os::unix::fs::PermissionsExt};
|
|
||||||
|
|
||||||
use clap::Parser;
|
use clap::Parser;
|
||||||
use gpapi::{
|
use gpapi::{
|
||||||
auth::{SamlAuthData, SamlAuthResult},
|
auth::SamlAuthResult,
|
||||||
clap::args::Os,
|
clap::{args::Os, handle_error, Args},
|
||||||
gp_params::{ClientOs, GpParams},
|
gp_params::{ClientOs, GpParams},
|
||||||
process::browser_authenticator::BrowserAuthenticator,
|
process::browser_authenticator::BrowserAuthenticator,
|
||||||
utils::{env_utils, normalize_server, openssl},
|
utils::{env_utils, normalize_server, openssl},
|
||||||
GP_USER_AGENT,
|
GP_USER_AGENT,
|
||||||
};
|
};
|
||||||
|
use gpauth::auth_window::{portal_prelogin, AuthWindow};
|
||||||
use log::{info, LevelFilter};
|
use log::{info, LevelFilter};
|
||||||
use serde_json::json;
|
use serde_json::json;
|
||||||
use tauri::{App, AppHandle, RunEvent};
|
use tauri::RunEvent;
|
||||||
use tempfile::NamedTempFile;
|
use tempfile::NamedTempFile;
|
||||||
use tokio::{io::AsyncReadExt, net::TcpListener};
|
|
||||||
|
|
||||||
use crate::auth_window::{portal_prelogin, AuthWindow};
|
|
||||||
|
|
||||||
const VERSION: &str = concat!(env!("CARGO_PKG_VERSION"), " (", compile_time::date_str!(), ")");
|
const VERSION: &str = concat!(env!("CARGO_PKG_VERSION"), " (", compile_time::date_str!(), ")");
|
||||||
|
|
||||||
@ -78,65 +74,17 @@ struct Cli {
|
|||||||
browser: Option<String>,
|
browser: Option<String>,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
impl Args for Cli {
|
||||||
|
fn fix_openssl(&self) -> bool {
|
||||||
|
self.fix_openssl
|
||||||
|
}
|
||||||
|
|
||||||
|
fn ignore_tls_errors(&self) -> bool {
|
||||||
|
self.ignore_tls_errors
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
impl Cli {
|
impl Cli {
|
||||||
async fn run(&mut self) -> anyhow::Result<()> {
|
|
||||||
if self.ignore_tls_errors {
|
|
||||||
info!("TLS errors will be ignored");
|
|
||||||
}
|
|
||||||
|
|
||||||
let mut openssl_conf = self.prepare_env()?;
|
|
||||||
|
|
||||||
self.server = normalize_server(&self.server)?;
|
|
||||||
let gp_params = self.build_gp_params();
|
|
||||||
|
|
||||||
// Get the initial SAML request
|
|
||||||
let saml_request = match self.saml_request {
|
|
||||||
Some(ref saml_request) => saml_request.clone(),
|
|
||||||
None => portal_prelogin(&self.server, &gp_params).await?,
|
|
||||||
};
|
|
||||||
|
|
||||||
let browser_auth = if let Some(browser) = &self.browser {
|
|
||||||
Some(BrowserAuthenticator::new_with_browser(&saml_request, browser))
|
|
||||||
} else if self.default_browser {
|
|
||||||
Some(BrowserAuthenticator::new(&saml_request))
|
|
||||||
} else {
|
|
||||||
None
|
|
||||||
};
|
|
||||||
|
|
||||||
if let Some(browser_auth) = browser_auth {
|
|
||||||
browser_auth.authenticate()?;
|
|
||||||
|
|
||||||
info!("Please continue the authentication process in the default browser");
|
|
||||||
|
|
||||||
let auth_result = match wait_auth_data().await {
|
|
||||||
Ok(auth_data) => SamlAuthResult::Success(auth_data),
|
|
||||||
Err(err) => SamlAuthResult::Failure(format!("{}", err)),
|
|
||||||
};
|
|
||||||
|
|
||||||
info!("Authentication completed");
|
|
||||||
|
|
||||||
println!("{}", json!(auth_result));
|
|
||||||
|
|
||||||
return Ok(());
|
|
||||||
}
|
|
||||||
|
|
||||||
self.saml_request.replace(saml_request);
|
|
||||||
|
|
||||||
let app = create_app(self.clone())?;
|
|
||||||
|
|
||||||
app.run(move |_app_handle, event| {
|
|
||||||
if let RunEvent::Exit = event {
|
|
||||||
if let Some(file) = openssl_conf.take() {
|
|
||||||
if let Err(err) = file.close() {
|
|
||||||
info!("Error closing OpenSSL config file: {}", err);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
Ok(())
|
|
||||||
}
|
|
||||||
|
|
||||||
fn prepare_env(&self) -> anyhow::Result<Option<NamedTempFile>> {
|
fn prepare_env(&self) -> anyhow::Result<Option<NamedTempFile>> {
|
||||||
env_utils::patch_gui_runtime_env(self.hidpi);
|
env_utils::patch_gui_runtime_env(self.hidpi);
|
||||||
|
|
||||||
@ -150,6 +98,68 @@ impl Cli {
|
|||||||
Ok(None)
|
Ok(None)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
async fn run(&self) -> anyhow::Result<()> {
|
||||||
|
if self.ignore_tls_errors {
|
||||||
|
info!("TLS errors will be ignored");
|
||||||
|
}
|
||||||
|
|
||||||
|
let mut openssl_conf = self.prepare_env()?;
|
||||||
|
|
||||||
|
let server = normalize_server(&self.server)?;
|
||||||
|
let gp_params = self.build_gp_params();
|
||||||
|
|
||||||
|
let saml_request = match &self.saml_request {
|
||||||
|
Some(saml_request) => saml_request.to_string(),
|
||||||
|
None => portal_prelogin(&server, &gp_params).await?,
|
||||||
|
};
|
||||||
|
|
||||||
|
let browser_auth = if let Some(browser) = &self.browser {
|
||||||
|
Some(BrowserAuthenticator::new_with_browser(&saml_request, browser))
|
||||||
|
} else if self.default_browser {
|
||||||
|
Some(BrowserAuthenticator::new(&saml_request))
|
||||||
|
} else {
|
||||||
|
None
|
||||||
|
};
|
||||||
|
|
||||||
|
if let Some(browser_auth) = browser_auth {
|
||||||
|
return Ok(());
|
||||||
|
}
|
||||||
|
|
||||||
|
let clean = self.clean;
|
||||||
|
tauri::Builder::default()
|
||||||
|
.setup(move |app| {
|
||||||
|
let app_handle = app.handle().clone();
|
||||||
|
|
||||||
|
tauri::async_runtime::spawn(async move {
|
||||||
|
let auth_window = AuthWindow::new(&app_handle, &server)
|
||||||
|
.with_gp_params(&gp_params)
|
||||||
|
.with_saml_request(&saml_request)
|
||||||
|
.with_clean(clean);
|
||||||
|
|
||||||
|
let auth_result = match auth_window.authenticate().await {
|
||||||
|
Ok(auth_data) => SamlAuthResult::Success(auth_data),
|
||||||
|
Err(err) => SamlAuthResult::Failure(format!("{}", err)),
|
||||||
|
};
|
||||||
|
|
||||||
|
println!("{}", json!(auth_result));
|
||||||
|
});
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
})
|
||||||
|
.build(tauri::generate_context!())?
|
||||||
|
.run(move |_app_handle, event| {
|
||||||
|
if let RunEvent::Exit = event {
|
||||||
|
if let Some(file) = openssl_conf.take() {
|
||||||
|
if let Err(err) = file.close() {
|
||||||
|
info!("Error closing OpenSSL config file: {}", err);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
fn build_gp_params(&self) -> GpParams {
|
fn build_gp_params(&self) -> GpParams {
|
||||||
let gp_params = GpParams::builder()
|
let gp_params = GpParams::builder()
|
||||||
.user_agent(&self.user_agent)
|
.user_agent(&self.user_agent)
|
||||||
@ -161,37 +171,6 @@ impl Cli {
|
|||||||
|
|
||||||
gp_params
|
gp_params
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn saml_auth(&self, app_handle: AppHandle) -> anyhow::Result<SamlAuthData> {
|
|
||||||
let auth_window = AuthWindow::new(app_handle)
|
|
||||||
.server(&self.server)
|
|
||||||
.user_agent(&self.user_agent)
|
|
||||||
.gp_params(self.build_gp_params())
|
|
||||||
.saml_request(self.saml_request.as_ref().unwrap())
|
|
||||||
.clean(self.clean);
|
|
||||||
|
|
||||||
auth_window.open().await
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
fn create_app(cli: Cli) -> anyhow::Result<App> {
|
|
||||||
let app = tauri::Builder::default()
|
|
||||||
.setup(|app| {
|
|
||||||
let app_handle = app.handle();
|
|
||||||
|
|
||||||
tauri::async_runtime::spawn(async move {
|
|
||||||
let auth_result = match cli.saml_auth(app_handle.clone()).await {
|
|
||||||
Ok(auth_data) => SamlAuthResult::Success(auth_data),
|
|
||||||
Err(err) => SamlAuthResult::Failure(format!("{}", err)),
|
|
||||||
};
|
|
||||||
|
|
||||||
println!("{}", json!(auth_result));
|
|
||||||
});
|
|
||||||
Ok(())
|
|
||||||
})
|
|
||||||
.build(tauri::generate_context!())?;
|
|
||||||
|
|
||||||
Ok(app)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
fn init_logger() {
|
fn init_logger() {
|
||||||
@ -199,53 +178,13 @@ fn init_logger() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
pub async fn run() {
|
pub async fn run() {
|
||||||
let mut cli = Cli::parse();
|
let cli = Cli::parse();
|
||||||
|
|
||||||
init_logger();
|
init_logger();
|
||||||
info!("gpauth started: {}", VERSION);
|
info!("gpauth started: {}", VERSION);
|
||||||
|
|
||||||
if let Err(err) = cli.run().await {
|
if let Err(err) = cli.run().await {
|
||||||
eprintln!("\nError: {}", err);
|
handle_error(err, &cli);
|
||||||
|
|
||||||
if err.to_string().contains("unsafe legacy renegotiation") && !cli.fix_openssl {
|
|
||||||
eprintln!("\nRe-run it with the `--fix-openssl` option to work around this issue, e.g.:\n");
|
|
||||||
// Print the command
|
|
||||||
let args = std::env::args().collect::<Vec<_>>();
|
|
||||||
eprintln!("{} --fix-openssl {}\n", args[0], args[1..].join(" "));
|
|
||||||
}
|
|
||||||
|
|
||||||
std::process::exit(1);
|
std::process::exit(1);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn wait_auth_data() -> anyhow::Result<SamlAuthData> {
|
|
||||||
// Start a local server to receive the browser authentication data
|
|
||||||
let listener = TcpListener::bind("127.0.0.1:0").await?;
|
|
||||||
let port = listener.local_addr()?.port();
|
|
||||||
let port_file = temp_dir().join("gpcallback.port");
|
|
||||||
|
|
||||||
// Write the port to a file
|
|
||||||
fs::write(&port_file, port.to_string())?;
|
|
||||||
fs::set_permissions(&port_file, fs::Permissions::from_mode(0o600))?;
|
|
||||||
|
|
||||||
// Remove the previous log file
|
|
||||||
let callback_log = temp_dir().join("gpcallback.log");
|
|
||||||
let _ = fs::remove_file(&callback_log);
|
|
||||||
|
|
||||||
info!("Listening authentication data on port {}", port);
|
|
||||||
info!(
|
|
||||||
"If it hangs, please check the logs at `{}` for more information",
|
|
||||||
callback_log.display()
|
|
||||||
);
|
|
||||||
let (mut socket, _) = listener.accept().await?;
|
|
||||||
|
|
||||||
info!("Received the browser authentication data from the socket");
|
|
||||||
let mut data = String::new();
|
|
||||||
socket.read_to_string(&mut data).await?;
|
|
||||||
|
|
||||||
// Remove the port file
|
|
||||||
fs::remove_file(&port_file)?;
|
|
||||||
|
|
||||||
let auth_data = SamlAuthData::from_gpcallback(&data)?;
|
|
||||||
Ok(auth_data)
|
|
||||||
}
|
|
||||||
|
251
apps/gpauth/src/cli1.rs
Normal file
251
apps/gpauth/src/cli1.rs
Normal file
@ -0,0 +1,251 @@
|
|||||||
|
use std::{env::temp_dir, fs, os::unix::fs::PermissionsExt};
|
||||||
|
|
||||||
|
use clap::Parser;
|
||||||
|
use gpapi::{
|
||||||
|
auth::{SamlAuthData, SamlAuthResult},
|
||||||
|
clap::args::Os,
|
||||||
|
gp_params::{ClientOs, GpParams},
|
||||||
|
process::browser_authenticator::BrowserAuthenticator,
|
||||||
|
utils::{env_utils, normalize_server, openssl},
|
||||||
|
GP_USER_AGENT,
|
||||||
|
};
|
||||||
|
use log::{info, LevelFilter};
|
||||||
|
use serde_json::json;
|
||||||
|
use tauri::{App, AppHandle, RunEvent};
|
||||||
|
use tempfile::NamedTempFile;
|
||||||
|
use tokio::{io::AsyncReadExt, net::TcpListener};
|
||||||
|
|
||||||
|
use crate::auth_window::{portal_prelogin, AuthWindow};
|
||||||
|
|
||||||
|
const VERSION: &str = concat!(env!("CARGO_PKG_VERSION"), " (", compile_time::date_str!(), ")");
|
||||||
|
|
||||||
|
#[derive(Parser, Clone)]
|
||||||
|
#[command(
|
||||||
|
version = VERSION,
|
||||||
|
author,
|
||||||
|
about = "The authentication component for the GlobalProtect VPN client, supports the SSO authentication method.",
|
||||||
|
help_template = "\
|
||||||
|
{before-help}{name} {version}
|
||||||
|
{author}
|
||||||
|
|
||||||
|
{about}
|
||||||
|
|
||||||
|
{usage-heading} {usage}
|
||||||
|
|
||||||
|
{all-args}{after-help}
|
||||||
|
|
||||||
|
See 'gpauth -h' for more information.
|
||||||
|
"
|
||||||
|
)]
|
||||||
|
struct Cli {
|
||||||
|
#[arg(help = "The portal server to authenticate")]
|
||||||
|
server: String,
|
||||||
|
|
||||||
|
#[arg(long, help = "Treating the server as a gateway")]
|
||||||
|
gateway: bool,
|
||||||
|
|
||||||
|
#[arg(long, help = "The SAML authentication request")]
|
||||||
|
saml_request: Option<String>,
|
||||||
|
|
||||||
|
#[arg(long, default_value = GP_USER_AGENT, help = "The user agent to use")]
|
||||||
|
user_agent: String,
|
||||||
|
|
||||||
|
#[arg(long, default_value = "Linux")]
|
||||||
|
os: Os,
|
||||||
|
|
||||||
|
#[arg(long)]
|
||||||
|
os_version: Option<String>,
|
||||||
|
|
||||||
|
#[arg(long, help = "The HiDPI mode, useful for high-resolution screens")]
|
||||||
|
hidpi: bool,
|
||||||
|
|
||||||
|
#[arg(long, help = "Get around the OpenSSL `unsafe legacy renegotiation` error")]
|
||||||
|
fix_openssl: bool,
|
||||||
|
|
||||||
|
#[arg(long, help = "Ignore TLS errors")]
|
||||||
|
ignore_tls_errors: bool,
|
||||||
|
|
||||||
|
#[arg(long, help = "Clean the cache of the embedded browser")]
|
||||||
|
clean: bool,
|
||||||
|
|
||||||
|
#[arg(long, help = "Use the default browser for authentication")]
|
||||||
|
default_browser: bool,
|
||||||
|
|
||||||
|
#[arg(
|
||||||
|
long,
|
||||||
|
help = "The browser to use for authentication, e.g., `default`, `firefox`, `chrome`, `chromium`, or the path to the browser executable"
|
||||||
|
)]
|
||||||
|
browser: Option<String>,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Cli {
|
||||||
|
async fn run(&mut self) -> anyhow::Result<()> {
|
||||||
|
if self.ignore_tls_errors {
|
||||||
|
info!("TLS errors will be ignored");
|
||||||
|
}
|
||||||
|
|
||||||
|
let mut openssl_conf = self.prepare_env()?;
|
||||||
|
|
||||||
|
self.server = normalize_server(&self.server)?;
|
||||||
|
let gp_params = self.build_gp_params();
|
||||||
|
|
||||||
|
// Get the initial SAML request
|
||||||
|
let saml_request = match self.saml_request {
|
||||||
|
Some(ref saml_request) => saml_request.clone(),
|
||||||
|
None => portal_prelogin(&self.server, &gp_params).await?,
|
||||||
|
};
|
||||||
|
|
||||||
|
let browser_auth = if let Some(browser) = &self.browser {
|
||||||
|
Some(BrowserAuthenticator::new_with_browser(&saml_request, browser))
|
||||||
|
} else if self.default_browser {
|
||||||
|
Some(BrowserAuthenticator::new(&saml_request))
|
||||||
|
} else {
|
||||||
|
None
|
||||||
|
};
|
||||||
|
|
||||||
|
if let Some(browser_auth) = browser_auth {
|
||||||
|
browser_auth.authenticate()?;
|
||||||
|
|
||||||
|
info!("Please continue the authentication process in the default browser");
|
||||||
|
|
||||||
|
let auth_result = match wait_auth_data().await {
|
||||||
|
Ok(auth_data) => SamlAuthResult::Success(auth_data),
|
||||||
|
Err(err) => SamlAuthResult::Failure(format!("{}", err)),
|
||||||
|
};
|
||||||
|
|
||||||
|
info!("Authentication completed");
|
||||||
|
|
||||||
|
println!("{}", json!(auth_result));
|
||||||
|
|
||||||
|
return Ok(());
|
||||||
|
}
|
||||||
|
|
||||||
|
self.saml_request.replace(saml_request);
|
||||||
|
|
||||||
|
let app = create_app(self.clone())?;
|
||||||
|
|
||||||
|
app.run(move |_app_handle, event| {
|
||||||
|
if let RunEvent::Exit = event {
|
||||||
|
if let Some(file) = openssl_conf.take() {
|
||||||
|
if let Err(err) = file.close() {
|
||||||
|
info!("Error closing OpenSSL config file: {}", err);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
fn prepare_env(&self) -> anyhow::Result<Option<NamedTempFile>> {
|
||||||
|
env_utils::patch_gui_runtime_env(self.hidpi);
|
||||||
|
|
||||||
|
if self.fix_openssl {
|
||||||
|
info!("Fixing OpenSSL environment");
|
||||||
|
let file = openssl::fix_openssl_env()?;
|
||||||
|
|
||||||
|
return Ok(Some(file));
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(None)
|
||||||
|
}
|
||||||
|
|
||||||
|
fn build_gp_params(&self) -> GpParams {
|
||||||
|
let gp_params = GpParams::builder()
|
||||||
|
.user_agent(&self.user_agent)
|
||||||
|
.client_os(ClientOs::from(&self.os))
|
||||||
|
.os_version(self.os_version.clone())
|
||||||
|
.ignore_tls_errors(self.ignore_tls_errors)
|
||||||
|
.is_gateway(self.gateway)
|
||||||
|
.build();
|
||||||
|
|
||||||
|
gp_params
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn saml_auth(&self, app_handle: AppHandle) -> anyhow::Result<SamlAuthData> {
|
||||||
|
let auth_window = AuthWindow::new(app_handle)
|
||||||
|
.server(&self.server)
|
||||||
|
.user_agent(&self.user_agent)
|
||||||
|
.gp_params(self.build_gp_params())
|
||||||
|
.saml_request(self.saml_request.as_ref().unwrap())
|
||||||
|
.clean(self.clean);
|
||||||
|
|
||||||
|
auth_window.open().await
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn create_app(cli: Cli) -> anyhow::Result<App> {
|
||||||
|
let app = tauri::Builder::default()
|
||||||
|
.setup(|app| {
|
||||||
|
let app_handle = app.handle();
|
||||||
|
|
||||||
|
tauri::async_runtime::spawn(async move {
|
||||||
|
let auth_result = match cli.saml_auth(app_handle.clone()).await {
|
||||||
|
Ok(auth_data) => SamlAuthResult::Success(auth_data),
|
||||||
|
Err(err) => SamlAuthResult::Failure(format!("{}", err)),
|
||||||
|
};
|
||||||
|
|
||||||
|
println!("{}", json!(auth_result));
|
||||||
|
});
|
||||||
|
Ok(())
|
||||||
|
})
|
||||||
|
.build(tauri::generate_context!())?;
|
||||||
|
|
||||||
|
Ok(app)
|
||||||
|
}
|
||||||
|
|
||||||
|
fn init_logger() {
|
||||||
|
env_logger::builder().filter_level(LevelFilter::Info).init();
|
||||||
|
}
|
||||||
|
|
||||||
|
pub async fn run() {
|
||||||
|
let mut cli = Cli::parse();
|
||||||
|
|
||||||
|
init_logger();
|
||||||
|
info!("gpauth started: {}", VERSION);
|
||||||
|
|
||||||
|
if let Err(err) = cli.run().await {
|
||||||
|
eprintln!("\nError: {}", err);
|
||||||
|
|
||||||
|
if err.to_string().contains("unsafe legacy renegotiation") && !cli.fix_openssl {
|
||||||
|
eprintln!("\nRe-run it with the `--fix-openssl` option to work around this issue, e.g.:\n");
|
||||||
|
// Print the command
|
||||||
|
let args = std::env::args().collect::<Vec<_>>();
|
||||||
|
eprintln!("{} --fix-openssl {}\n", args[0], args[1..].join(" "));
|
||||||
|
}
|
||||||
|
|
||||||
|
std::process::exit(1);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn wait_auth_data() -> anyhow::Result<SamlAuthData> {
|
||||||
|
// Start a local server to receive the browser authentication data
|
||||||
|
let listener = TcpListener::bind("127.0.0.1:0").await?;
|
||||||
|
let port = listener.local_addr()?.port();
|
||||||
|
let port_file = temp_dir().join("gpcallback.port");
|
||||||
|
|
||||||
|
// Write the port to a file
|
||||||
|
fs::write(&port_file, port.to_string())?;
|
||||||
|
fs::set_permissions(&port_file, fs::Permissions::from_mode(0o600))?;
|
||||||
|
|
||||||
|
// Remove the previous log file
|
||||||
|
let callback_log = temp_dir().join("gpcallback.log");
|
||||||
|
let _ = fs::remove_file(&callback_log);
|
||||||
|
|
||||||
|
info!("Listening authentication data on port {}", port);
|
||||||
|
info!(
|
||||||
|
"If it hangs, please check the logs at `{}` for more information",
|
||||||
|
callback_log.display()
|
||||||
|
);
|
||||||
|
let (mut socket, _) = listener.accept().await?;
|
||||||
|
|
||||||
|
info!("Received the browser authentication data from the socket");
|
||||||
|
let mut data = String::new();
|
||||||
|
socket.read_to_string(&mut data).await?;
|
||||||
|
|
||||||
|
// Remove the port file
|
||||||
|
fs::remove_file(&port_file)?;
|
||||||
|
|
||||||
|
let auth_data = SamlAuthData::from_gpcallback(&data)?;
|
||||||
|
Ok(auth_data)
|
||||||
|
}
|
135
apps/gpauth/src/common.rs
Normal file
135
apps/gpauth/src/common.rs
Normal file
@ -0,0 +1,135 @@
|
|||||||
|
use std::sync::Arc;
|
||||||
|
|
||||||
|
use gpapi::{
|
||||||
|
auth::{AuthDataParseResult, SamlAuthData},
|
||||||
|
error::AuthDataParseError,
|
||||||
|
};
|
||||||
|
use log::{info, warn};
|
||||||
|
use regex::Regex;
|
||||||
|
|
||||||
|
use crate::auth_messenger::{AuthError, AuthMessenger};
|
||||||
|
|
||||||
|
pub struct AuthSettings<'a> {
|
||||||
|
pub auth_request: AuthRequest<'a>,
|
||||||
|
pub auth_messenger: Arc<AuthMessenger>,
|
||||||
|
pub ignore_tls_errors: bool,
|
||||||
|
}
|
||||||
|
|
||||||
|
pub struct AuthRequest<'a>(&'a str);
|
||||||
|
|
||||||
|
impl<'a> AuthRequest<'a> {
|
||||||
|
pub fn new(auth_request: &'a str) -> Self {
|
||||||
|
Self(auth_request)
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn is_url(&self) -> bool {
|
||||||
|
self.0.starts_with("http")
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn as_str(&self) -> &str {
|
||||||
|
self.0
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Trait for handling authentication response
|
||||||
|
pub trait AuthResponse {
|
||||||
|
fn get_header(&self, key: &str) -> Option<String>;
|
||||||
|
fn get_body<F>(&self, cb: F)
|
||||||
|
where
|
||||||
|
F: FnOnce(anyhow::Result<Vec<u8>>) + 'static;
|
||||||
|
|
||||||
|
fn url(&self) -> Option<String>;
|
||||||
|
|
||||||
|
fn is_acs_endpoint(&self) -> bool {
|
||||||
|
self.url().map_or(false, |url| url.ends_with("/SAML20/SP/ACS"))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn read_auth_data(auth_response: &impl AuthResponse, auth_messenger: &Arc<AuthMessenger>) {
|
||||||
|
let auth_messenger = Arc::clone(auth_messenger);
|
||||||
|
|
||||||
|
match read_from_headers(auth_response) {
|
||||||
|
Ok(auth_data) => {
|
||||||
|
info!("Found auth data in headers");
|
||||||
|
auth_messenger.send_auth_data(auth_data);
|
||||||
|
}
|
||||||
|
Err(header_err) => {
|
||||||
|
info!("Failed to read auth data from headers: {}", header_err);
|
||||||
|
|
||||||
|
let is_acs_endpoint = auth_response.is_acs_endpoint();
|
||||||
|
read_from_body(auth_response, move |auth_result| {
|
||||||
|
// If the endpoint is `/SAML20/SP/ACS` and no auth data found in body, it should be considered as invalid
|
||||||
|
let auth_result = auth_result.map_err(move |e| {
|
||||||
|
info!("Failed to read auth data from body: {}", e);
|
||||||
|
if is_acs_endpoint || e.is_invalid() || header_err.is_invalid() {
|
||||||
|
AuthError::Invalid
|
||||||
|
} else {
|
||||||
|
AuthError::NotFound
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
auth_messenger.send_auth_result(auth_result);
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn read_from_headers(auth_response: &impl AuthResponse) -> AuthDataParseResult {
|
||||||
|
let Some(status) = auth_response.get_header("saml-auth-status") else {
|
||||||
|
info!("No SAML auth status found in headers");
|
||||||
|
return Err(AuthDataParseError::NotFound);
|
||||||
|
};
|
||||||
|
|
||||||
|
if status != "1" {
|
||||||
|
info!("Found invalid auth status: {}", status);
|
||||||
|
return Err(AuthDataParseError::Invalid);
|
||||||
|
}
|
||||||
|
|
||||||
|
let username = auth_response.get_header("saml-username");
|
||||||
|
let prelogin_cookie = auth_response.get_header("prelogin-cookie");
|
||||||
|
let portal_userauthcookie = auth_response.get_header("portal-userauthcookie");
|
||||||
|
|
||||||
|
SamlAuthData::new(username, prelogin_cookie, portal_userauthcookie).map_err(|e| {
|
||||||
|
warn!("Found invalid auth data: {}", e);
|
||||||
|
AuthDataParseError::Invalid
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
fn read_from_body<F>(auth_response: &impl AuthResponse, cb: F)
|
||||||
|
where
|
||||||
|
F: FnOnce(AuthDataParseResult) + 'static,
|
||||||
|
{
|
||||||
|
auth_response.get_body(|body| match body {
|
||||||
|
Ok(body) => {
|
||||||
|
let html = String::from_utf8_lossy(&body);
|
||||||
|
cb(read_from_html(&html))
|
||||||
|
}
|
||||||
|
Err(err) => {
|
||||||
|
info!("Failed to read body: {}", err);
|
||||||
|
cb(Err(AuthDataParseError::Invalid))
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
fn read_from_html(html: &str) -> AuthDataParseResult {
|
||||||
|
if html.contains("Temporarily Unavailable") {
|
||||||
|
info!("Found 'Temporarily Unavailable' in HTML, auth failed");
|
||||||
|
return Err(AuthDataParseError::Invalid);
|
||||||
|
}
|
||||||
|
|
||||||
|
SamlAuthData::from_html(html).or_else(|err| {
|
||||||
|
if let Some(gpcallback) = extract_gpcallback(html) {
|
||||||
|
info!("Found gpcallback from html...");
|
||||||
|
SamlAuthData::from_gpcallback(&gpcallback)
|
||||||
|
} else {
|
||||||
|
Err(err)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
fn extract_gpcallback(html: &str) -> Option<String> {
|
||||||
|
let re = Regex::new(r#"globalprotectcallback:[^"]+"#).unwrap();
|
||||||
|
re.captures(html)
|
||||||
|
.and_then(|captures| captures.get(0))
|
||||||
|
.map(|m| html_escape::decode_html_entities(m.as_str()).to_string())
|
||||||
|
}
|
7
apps/gpauth/src/lib.rs
Normal file
7
apps/gpauth/src/lib.rs
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
mod auth_messenger;
|
||||||
|
mod common;
|
||||||
|
|
||||||
|
pub mod auth_window;
|
||||||
|
|
||||||
|
#[cfg_attr(not(target_os = "macos"), path = "unix.rs")]
|
||||||
|
mod platform_impl;
|
@ -1,6 +1,5 @@
|
|||||||
#![cfg_attr(not(debug_assertions), windows_subsystem = "windows")]
|
#![cfg_attr(not(debug_assertions), windows_subsystem = "windows")]
|
||||||
|
|
||||||
mod auth_window;
|
|
||||||
mod cli;
|
mod cli;
|
||||||
|
|
||||||
#[tokio::main]
|
#[tokio::main]
|
||||||
|
133
apps/gpauth/src/unix.rs
Normal file
133
apps/gpauth/src/unix.rs
Normal file
@ -0,0 +1,133 @@
|
|||||||
|
use std::sync::Arc;
|
||||||
|
|
||||||
|
use anyhow::bail;
|
||||||
|
use gpapi::utils::redact::redact_uri;
|
||||||
|
use log::{info, warn};
|
||||||
|
use webkit2gtk::{
|
||||||
|
gio::Cancellable,
|
||||||
|
glib::{GString, TimeSpan},
|
||||||
|
LoadEvent, TLSErrorsPolicy, URIResponseExt, WebResource, WebResourceExt, WebView, WebViewExt, WebsiteDataManagerExt,
|
||||||
|
WebsiteDataManagerExtManual, WebsiteDataTypes,
|
||||||
|
};
|
||||||
|
|
||||||
|
use crate::{
|
||||||
|
auth_messenger::AuthError,
|
||||||
|
common::{read_auth_data, AuthRequest, AuthResponse, AuthSettings},
|
||||||
|
};
|
||||||
|
|
||||||
|
impl AuthResponse for WebResource {
|
||||||
|
fn get_header(&self, key: &str) -> Option<String> {
|
||||||
|
self
|
||||||
|
.response()
|
||||||
|
.and_then(|response| response.http_headers())
|
||||||
|
.and_then(|headers| headers.one(key))
|
||||||
|
.map(GString::into)
|
||||||
|
}
|
||||||
|
|
||||||
|
fn get_body<F>(&self, cb: F)
|
||||||
|
where
|
||||||
|
F: FnOnce(anyhow::Result<Vec<u8>>) + 'static,
|
||||||
|
{
|
||||||
|
let cancellable = Cancellable::NONE;
|
||||||
|
self.data(cancellable, |data| cb(data.map_err(|e| anyhow::anyhow!(e))));
|
||||||
|
}
|
||||||
|
|
||||||
|
fn url(&self) -> Option<String> {
|
||||||
|
self.uri().map(GString::into)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn clear_data<F>(wv: &WebView, cb: F)
|
||||||
|
where
|
||||||
|
F: FnOnce(anyhow::Result<()>) + Send + 'static,
|
||||||
|
{
|
||||||
|
let Some(data_manager) = wv.website_data_manager() else {
|
||||||
|
cb(Err(anyhow::anyhow!("Failed to get website data manager")));
|
||||||
|
return;
|
||||||
|
};
|
||||||
|
|
||||||
|
data_manager.clear(
|
||||||
|
WebsiteDataTypes::COOKIES,
|
||||||
|
TimeSpan(0),
|
||||||
|
Cancellable::NONE,
|
||||||
|
move |result| {
|
||||||
|
cb(result.map_err(|e| anyhow::anyhow!(e)));
|
||||||
|
},
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn setup_webview(wv: &WebView, auth_settings: AuthSettings) -> anyhow::Result<()> {
|
||||||
|
let AuthSettings {
|
||||||
|
auth_request,
|
||||||
|
auth_messenger,
|
||||||
|
ignore_tls_errors,
|
||||||
|
} = auth_settings;
|
||||||
|
let auth_messenger_clone = Arc::clone(&auth_messenger);
|
||||||
|
|
||||||
|
let Some(data_manager) = wv.website_data_manager() else {
|
||||||
|
bail!("Failed to get website data manager");
|
||||||
|
};
|
||||||
|
|
||||||
|
if ignore_tls_errors {
|
||||||
|
data_manager.set_tls_errors_policy(TLSErrorsPolicy::Ignore);
|
||||||
|
}
|
||||||
|
|
||||||
|
wv.connect_load_changed(move |wv, event| {
|
||||||
|
if event == LoadEvent::Started {
|
||||||
|
// TODO:
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
if event != LoadEvent::Finished {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
let Some(main_resource) = wv.main_resource() else {
|
||||||
|
return;
|
||||||
|
};
|
||||||
|
|
||||||
|
let uri = main_resource.uri().unwrap_or("".into());
|
||||||
|
if uri.is_empty() {
|
||||||
|
warn!("Loaded an empty URI");
|
||||||
|
auth_messenger_clone.send_auth_error(AuthError::Invalid);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
read_auth_data(&main_resource, &auth_messenger_clone);
|
||||||
|
});
|
||||||
|
|
||||||
|
wv.connect_load_failed_with_tls_errors(move |_wv, uri, cert, err| {
|
||||||
|
let redacted_uri = redact_uri(uri);
|
||||||
|
warn!(
|
||||||
|
"Failed to load uri: {} with error: {}, cert: {}",
|
||||||
|
redacted_uri, err, cert
|
||||||
|
);
|
||||||
|
|
||||||
|
auth_messenger.send_auth_error(AuthError::TlsError);
|
||||||
|
true
|
||||||
|
});
|
||||||
|
|
||||||
|
wv.connect_load_failed(move |_wv, _event, uri, err| {
|
||||||
|
let redacted_uri = redact_uri(uri);
|
||||||
|
if !uri.starts_with("globalprotectcallback:") {
|
||||||
|
warn!("Failed to load uri: {} with error: {}", redacted_uri, err);
|
||||||
|
}
|
||||||
|
// NOTE: Don't send error here, since load_changed event will be triggered after this
|
||||||
|
// true to stop other handlers from being invoked for the event. false to propagate the event further.
|
||||||
|
true
|
||||||
|
});
|
||||||
|
|
||||||
|
load_auth_request(wv, &auth_request);
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn load_auth_request(wv: &WebView, auth_request: &AuthRequest) {
|
||||||
|
if auth_request.is_url() {
|
||||||
|
info!("Loading auth request as URI...");
|
||||||
|
wv.load_uri(auth_request.as_str());
|
||||||
|
} else {
|
||||||
|
info!("Loading auth request as HTML...");
|
||||||
|
wv.load_html(auth_request.as_str(), None);
|
||||||
|
}
|
||||||
|
}
|
@ -1,47 +1,16 @@
|
|||||||
{
|
{
|
||||||
"$schema": "https://cdn.jsdelivr.net/gh/tauri-apps/tauri@tauri-v1.5.0/tooling/cli/schema.json",
|
"$schema": "https://cdn.jsdelivr.net/gh/tauri-apps/tauri@tauri-v2.1.1/crates/tauri-cli/config.schema.json",
|
||||||
"build": {
|
"build": {
|
||||||
"distDir": [
|
"frontendDist": ["index.html"],
|
||||||
"index.html"
|
|
||||||
],
|
|
||||||
"devPath": [
|
|
||||||
"index.html"
|
|
||||||
],
|
|
||||||
"beforeDevCommand": "",
|
"beforeDevCommand": "",
|
||||||
"beforeBuildCommand": "",
|
"beforeBuildCommand": ""
|
||||||
"withGlobalTauri": false
|
|
||||||
},
|
},
|
||||||
"package": {
|
|
||||||
"productName": "gpauth",
|
|
||||||
"version": "0.0.0"
|
|
||||||
},
|
|
||||||
"tauri": {
|
|
||||||
"allowlist": {
|
|
||||||
"all": false,
|
|
||||||
"http": {
|
|
||||||
"all": true,
|
|
||||||
"request": true,
|
|
||||||
"scope": [
|
|
||||||
"http://*",
|
|
||||||
"https://*"
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"bundle": {
|
|
||||||
"active": true,
|
|
||||||
"targets": "deb",
|
|
||||||
"identifier": "com.yuezk.gpauth",
|
"identifier": "com.yuezk.gpauth",
|
||||||
"icon": [
|
"productName": "gpauth",
|
||||||
"icons/32x32.png",
|
"app": {
|
||||||
"icons/128x128.png",
|
"withGlobalTauri": false,
|
||||||
"icons/128x128@2x.png",
|
|
||||||
"icons/icon.icns",
|
|
||||||
"icons/icon.ico"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"security": {
|
"security": {
|
||||||
"csp": null
|
"csp": null
|
||||||
},
|
}
|
||||||
"windows": []
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,7 +1,10 @@
|
|||||||
use std::{env::temp_dir, fs::File};
|
use std::{env::temp_dir, fs::File};
|
||||||
|
|
||||||
use clap::{Parser, Subcommand};
|
use clap::{Parser, Subcommand};
|
||||||
use gpapi::utils::openssl;
|
use gpapi::{
|
||||||
|
clap::{handle_error, Args},
|
||||||
|
utils::openssl,
|
||||||
|
};
|
||||||
use log::{info, LevelFilter};
|
use log::{info, LevelFilter};
|
||||||
use tempfile::NamedTempFile;
|
use tempfile::NamedTempFile;
|
||||||
|
|
||||||
@ -50,12 +53,25 @@ struct Cli {
|
|||||||
#[command(subcommand)]
|
#[command(subcommand)]
|
||||||
command: CliCommand,
|
command: CliCommand,
|
||||||
|
|
||||||
#[arg(long, help = "Uses extended compatibility mode for OpenSSL operations to support a broader range of systems and formats.")]
|
#[arg(
|
||||||
|
long,
|
||||||
|
help = "Uses extended compatibility mode for OpenSSL operations to support a broader range of systems and formats."
|
||||||
|
)]
|
||||||
fix_openssl: bool,
|
fix_openssl: bool,
|
||||||
#[arg(long, help = "Ignore the TLS errors")]
|
#[arg(long, help = "Ignore the TLS errors")]
|
||||||
ignore_tls_errors: bool,
|
ignore_tls_errors: bool,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
impl Args for Cli {
|
||||||
|
fn fix_openssl(&self) -> bool {
|
||||||
|
self.fix_openssl
|
||||||
|
}
|
||||||
|
|
||||||
|
fn ignore_tls_errors(&self) -> bool {
|
||||||
|
self.ignore_tls_errors
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
impl Cli {
|
impl Cli {
|
||||||
fn fix_openssl(&self) -> anyhow::Result<Option<NamedTempFile>> {
|
fn fix_openssl(&self) -> anyhow::Result<Option<NamedTempFile>> {
|
||||||
if self.fix_openssl {
|
if self.fix_openssl {
|
||||||
@ -113,24 +129,7 @@ pub(crate) async fn run() {
|
|||||||
info!("gpclient started: {}", VERSION);
|
info!("gpclient started: {}", VERSION);
|
||||||
|
|
||||||
if let Err(err) = cli.run().await {
|
if let Err(err) = cli.run().await {
|
||||||
eprintln!("\nError: {}", err);
|
handle_error(err, &cli);
|
||||||
|
|
||||||
let err = err.to_string();
|
|
||||||
|
|
||||||
if err.contains("unsafe legacy renegotiation") && !cli.fix_openssl {
|
|
||||||
eprintln!("\nRe-run it with the `--fix-openssl` option to work around this issue, e.g.:\n");
|
|
||||||
// Print the command
|
|
||||||
let args = std::env::args().collect::<Vec<_>>();
|
|
||||||
eprintln!("{} --fix-openssl {}\n", args[0], args[1..].join(" "));
|
|
||||||
}
|
|
||||||
|
|
||||||
if err.contains("certificate verify failed") && !cli.ignore_tls_errors {
|
|
||||||
eprintln!("\nRe-run it with the `--ignore-tls-errors` option to ignore the certificate error, e.g.:\n");
|
|
||||||
// Print the command
|
|
||||||
let args = std::env::args().collect::<Vec<_>>();
|
|
||||||
eprintln!("{} --ignore-tls-errors {}\n", args[0], args[1..].join(" "));
|
|
||||||
}
|
|
||||||
|
|
||||||
std::process::exit(1);
|
std::process::exit(1);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,11 +1,14 @@
|
|||||||
use std::borrow::{Borrow, Cow};
|
use std::borrow::{Borrow, Cow};
|
||||||
|
|
||||||
|
use anyhow::bail;
|
||||||
use log::{info, warn};
|
use log::{info, warn};
|
||||||
use regex::Regex;
|
use regex::Regex;
|
||||||
use serde::{Deserialize, Serialize};
|
use serde::{Deserialize, Serialize};
|
||||||
|
|
||||||
use crate::{error::AuthDataParseError, utils::base64::decode_to_string};
|
use crate::{error::AuthDataParseError, utils::base64::decode_to_string};
|
||||||
|
|
||||||
|
pub type AuthDataParseResult = anyhow::Result<SamlAuthData, AuthDataParseError>;
|
||||||
|
|
||||||
#[derive(Debug, Serialize, Deserialize)]
|
#[derive(Debug, Serialize, Deserialize)]
|
||||||
#[serde(rename_all = "camelCase")]
|
#[serde(rename_all = "camelCase")]
|
||||||
pub struct SamlAuthData {
|
pub struct SamlAuthData {
|
||||||
@ -33,33 +36,51 @@ impl SamlAuthResult {
|
|||||||
}
|
}
|
||||||
|
|
||||||
impl SamlAuthData {
|
impl SamlAuthData {
|
||||||
pub fn new(username: String, prelogin_cookie: Option<String>, portal_userauthcookie: Option<String>) -> Self {
|
pub fn new(
|
||||||
Self {
|
username: Option<String>,
|
||||||
username,
|
prelogin_cookie: Option<String>,
|
||||||
prelogin_cookie,
|
portal_userauthcookie: Option<String>,
|
||||||
portal_userauthcookie,
|
) -> anyhow::Result<Self> {
|
||||||
token: None,
|
let username = username.unwrap_or_default();
|
||||||
}
|
if username.is_empty() {
|
||||||
|
bail!("Invalid username: <empty>");
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn from_html(html: &str) -> anyhow::Result<SamlAuthData, AuthDataParseError> {
|
let prelogin_cookie = prelogin_cookie.unwrap_or_default();
|
||||||
|
let portal_userauthcookie = portal_userauthcookie.unwrap_or_default();
|
||||||
|
|
||||||
|
if prelogin_cookie.len() <= 5 && portal_userauthcookie.len() <= 5 {
|
||||||
|
bail!(
|
||||||
|
"Invalid prelogin-cookie: {}, portal-userauthcookie: {}",
|
||||||
|
prelogin_cookie,
|
||||||
|
portal_userauthcookie
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(Self {
|
||||||
|
username,
|
||||||
|
prelogin_cookie: Some(prelogin_cookie),
|
||||||
|
portal_userauthcookie: Some(portal_userauthcookie),
|
||||||
|
token: None,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn from_html(html: &str) -> AuthDataParseResult {
|
||||||
match parse_xml_tag(html, "saml-auth-status") {
|
match parse_xml_tag(html, "saml-auth-status") {
|
||||||
Some(saml_status) if saml_status == "1" => {
|
Some(status) if status == "1" => {
|
||||||
let username = parse_xml_tag(html, "saml-username");
|
let username = parse_xml_tag(html, "saml-username");
|
||||||
let prelogin_cookie = parse_xml_tag(html, "prelogin-cookie");
|
let prelogin_cookie = parse_xml_tag(html, "prelogin-cookie");
|
||||||
let portal_userauthcookie = parse_xml_tag(html, "portal-userauthcookie");
|
let portal_userauthcookie = parse_xml_tag(html, "portal-userauthcookie");
|
||||||
|
|
||||||
if SamlAuthData::check(&username, &prelogin_cookie, &portal_userauthcookie) {
|
SamlAuthData::new(username, prelogin_cookie, portal_userauthcookie).map_err(|e| {
|
||||||
Ok(SamlAuthData::new(
|
warn!("Failed to parse auth data: {}", e);
|
||||||
username.unwrap(),
|
AuthDataParseError::Invalid
|
||||||
prelogin_cookie,
|
})
|
||||||
portal_userauthcookie,
|
}
|
||||||
))
|
Some(status) => {
|
||||||
} else {
|
warn!("Found invalid auth status: {}", status);
|
||||||
Err(AuthDataParseError::Invalid)
|
Err(AuthDataParseError::Invalid)
|
||||||
}
|
}
|
||||||
}
|
|
||||||
Some(_) => Err(AuthDataParseError::Invalid),
|
|
||||||
None => Err(AuthDataParseError::NotFound),
|
None => Err(AuthDataParseError::NotFound),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -105,27 +126,6 @@ impl SamlAuthData {
|
|||||||
pub fn token(&self) -> Option<&str> {
|
pub fn token(&self) -> Option<&str> {
|
||||||
self.token.as_deref()
|
self.token.as_deref()
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn check(
|
|
||||||
username: &Option<String>,
|
|
||||||
prelogin_cookie: &Option<String>,
|
|
||||||
portal_userauthcookie: &Option<String>,
|
|
||||||
) -> bool {
|
|
||||||
let username_valid = username.as_ref().is_some_and(|username| !username.is_empty());
|
|
||||||
let prelogin_cookie_valid = prelogin_cookie.as_ref().is_some_and(|val| val.len() > 5);
|
|
||||||
let portal_userauthcookie_valid = portal_userauthcookie.as_ref().is_some_and(|val| val.len() > 5);
|
|
||||||
|
|
||||||
let is_valid = username_valid && (prelogin_cookie_valid || portal_userauthcookie_valid);
|
|
||||||
|
|
||||||
if !is_valid {
|
|
||||||
warn!(
|
|
||||||
"Invalid SAML auth data: username: {:?}, prelogin-cookie: {:?}, portal-userauthcookie: {:?}",
|
|
||||||
username, prelogin_cookie, portal_userauthcookie
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
is_valid
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn parse_xml_tag(html: &str, tag: &str) -> Option<String> {
|
pub fn parse_xml_tag(html: &str, tag: &str) -> Option<String> {
|
||||||
|
@ -1 +1,28 @@
|
|||||||
|
use crate::error::PortalError;
|
||||||
|
|
||||||
pub mod args;
|
pub mod args;
|
||||||
|
|
||||||
|
pub trait Args {
|
||||||
|
fn fix_openssl(&self) -> bool;
|
||||||
|
fn ignore_tls_errors(&self) -> bool;
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn handle_error(err: anyhow::Error, args: &impl Args) {
|
||||||
|
eprintln!("\nError: {}", err);
|
||||||
|
|
||||||
|
let Some(err) = err.downcast_ref::<PortalError>() else {
|
||||||
|
return;
|
||||||
|
};
|
||||||
|
|
||||||
|
if err.is_legacy_openssl_error() && !args.fix_openssl() {
|
||||||
|
eprintln!("\nRe-run it with the `--fix-openssl` option to work around this issue, e.g.:\n");
|
||||||
|
let args = std::env::args().collect::<Vec<_>>();
|
||||||
|
eprintln!("{} --fix-openssl {}\n", args[0], args[1..].join(" "));
|
||||||
|
}
|
||||||
|
|
||||||
|
if err.is_tls_error() && !args.ignore_tls_errors() {
|
||||||
|
eprintln!("\nRe-run it with the `--ignore-tls-errors` option to ignore the certificate error, e.g.:\n");
|
||||||
|
let args = std::env::args().collect::<Vec<_>>();
|
||||||
|
eprintln!("{} --ignore-tls-errors {}\n", args[0], args[1..].join(" "));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -7,7 +7,19 @@ pub enum PortalError {
|
|||||||
#[error("Portal config error: {0}")]
|
#[error("Portal config error: {0}")]
|
||||||
ConfigError(String),
|
ConfigError(String),
|
||||||
#[error("Network error: {0}")]
|
#[error("Network error: {0}")]
|
||||||
NetworkError(String),
|
NetworkError(#[from] reqwest::Error),
|
||||||
|
#[error("TLS error")]
|
||||||
|
TlsError,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl PortalError {
|
||||||
|
pub fn is_legacy_openssl_error(&self) -> bool {
|
||||||
|
format!("{:?}", self).contains("unsafe legacy renegotiation")
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn is_tls_error(&self) -> bool {
|
||||||
|
matches!(self, PortalError::TlsError) || format!("{:?}", self).contains("certificate verify failed")
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Error, Debug)]
|
#[derive(Error, Debug)]
|
||||||
@ -17,3 +29,9 @@ pub enum AuthDataParseError {
|
|||||||
#[error("Invalid auth data")]
|
#[error("Invalid auth data")]
|
||||||
Invalid,
|
Invalid,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
impl AuthDataParseError {
|
||||||
|
pub fn is_invalid(&self) -> bool {
|
||||||
|
matches!(self, AuthDataParseError::Invalid)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -36,7 +36,7 @@ pub async fn gateway_login(gateway: &str, cred: &Credential, gp_params: &GpParam
|
|||||||
.form(¶ms)
|
.form(¶ms)
|
||||||
.send()
|
.send()
|
||||||
.await
|
.await
|
||||||
.map_err(|e| anyhow::anyhow!(PortalError::NetworkError(e.to_string())))?;
|
.map_err(|e| anyhow::anyhow!(PortalError::NetworkError(e)))?;
|
||||||
|
|
||||||
let res = parse_gp_response(res).await.map_err(|err| {
|
let res = parse_gp_response(res).await.map_err(|err| {
|
||||||
warn!("{err}");
|
warn!("{err}");
|
||||||
|
@ -116,7 +116,7 @@ pub async fn retrieve_config(portal: &str, cred: &Credential, gp_params: &GpPara
|
|||||||
.form(¶ms)
|
.form(¶ms)
|
||||||
.send()
|
.send()
|
||||||
.await
|
.await
|
||||||
.map_err(|e| anyhow::anyhow!(PortalError::NetworkError(e.to_string())))?;
|
.map_err(|e| anyhow::anyhow!(PortalError::NetworkError(e)))?;
|
||||||
|
|
||||||
let res_xml = parse_gp_response(res).await.or_else(|err| {
|
let res_xml = parse_gp_response(res).await.or_else(|err| {
|
||||||
if err.status == StatusCode::NOT_FOUND {
|
if err.status == StatusCode::NOT_FOUND {
|
||||||
|
@ -116,14 +116,12 @@ pub async fn prelogin(portal: &str, gp_params: &GpParams) -> anyhow::Result<Prel
|
|||||||
|
|
||||||
let client = Client::try_from(gp_params)?;
|
let client = Client::try_from(gp_params)?;
|
||||||
|
|
||||||
info!("Perform prelogin, user_agent: {}", gp_params.user_agent());
|
|
||||||
|
|
||||||
let res = client
|
let res = client
|
||||||
.post(&prelogin_url)
|
.post(&prelogin_url)
|
||||||
.form(¶ms)
|
.form(¶ms)
|
||||||
.send()
|
.send()
|
||||||
.await
|
.await
|
||||||
.map_err(|e| anyhow::anyhow!(PortalError::NetworkError(e.to_string())))?;
|
.map_err(|e| anyhow::anyhow!(PortalError::NetworkError(e)))?;
|
||||||
|
|
||||||
let res_xml = parse_gp_response(res).await.or_else(|err| {
|
let res_xml = parse_gp_response(res).await.or_else(|err| {
|
||||||
if err.status == StatusCode::NOT_FOUND {
|
if err.status == StatusCode::NOT_FOUND {
|
||||||
|
Loading…
Reference in New Issue
Block a user