mirror of
https://github.com/yuezk/GlobalProtect-openconnect.git
synced 2025-04-02 18:31:50 -04:00
feat: gpauth support Windows
This commit is contained in:
parent
fe3d3df662
commit
3175d1083a
4
Cargo.lock
generated
4
Cargo.lock
generated
@ -188,6 +188,7 @@ dependencies = [
|
|||||||
"objc2-web-kit",
|
"objc2-web-kit",
|
||||||
"open",
|
"open",
|
||||||
"regex",
|
"regex",
|
||||||
|
"serde_json",
|
||||||
"tauri",
|
"tauri",
|
||||||
"tiny_http",
|
"tiny_http",
|
||||||
"tokio",
|
"tokio",
|
||||||
@ -195,7 +196,10 @@ dependencies = [
|
|||||||
"uuid",
|
"uuid",
|
||||||
"webbrowser",
|
"webbrowser",
|
||||||
"webkit2gtk",
|
"webkit2gtk",
|
||||||
|
"webview2-com",
|
||||||
"which",
|
"which",
|
||||||
|
"windows 0.58.0",
|
||||||
|
"windows-core 0.58.0",
|
||||||
]
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
|
@ -28,15 +28,21 @@ regex = { workspace = true, optional = true }
|
|||||||
tokio-util = { workspace = true, optional = true }
|
tokio-util = { workspace = true, optional = true }
|
||||||
html-escape = { version = "0.2.13", optional = true }
|
html-escape = { version = "0.2.13", optional = true }
|
||||||
|
|
||||||
[target.'cfg(not(target_os = "macos"))'.dependencies]
|
[target.'cfg(not(any(target_os="macos", target_os="windows")))'.dependencies]
|
||||||
webkit2gtk = { version = "2", optional = true }
|
webkit2gtk = { version = "2", optional = true }
|
||||||
|
|
||||||
[target.'cfg(target_os = "macos")'.dependencies]
|
[target.'cfg(target_os="macos")'.dependencies]
|
||||||
block2 = { version = "0.5", optional = true }
|
block2 = { version = "0.5", optional = true }
|
||||||
objc2 = { version = "0.5", optional = true }
|
objc2 = { version = "0.5", optional = true }
|
||||||
objc2-foundation = { version = "0.2", optional = true }
|
objc2-foundation = { version = "0.2", optional = true }
|
||||||
objc2-web-kit = { version = "0.2", optional = true }
|
objc2-web-kit = { version = "0.2", optional = true }
|
||||||
|
|
||||||
|
[target.'cfg(target_os="windows")'.dependencies]
|
||||||
|
webview2-com = { version = "0.34", optional = true }
|
||||||
|
windows-core = { version = "0.58", optional = true }
|
||||||
|
windows = { version = "0.58", optional = true }
|
||||||
|
serde_json = { workspace = true, optional = true }
|
||||||
|
|
||||||
[features]
|
[features]
|
||||||
browser-auth = [
|
browser-auth = [
|
||||||
"dep:webbrowser",
|
"dep:webbrowser",
|
||||||
@ -56,4 +62,8 @@ webview-auth = [
|
|||||||
"dep:objc2",
|
"dep:objc2",
|
||||||
"dep:objc2-foundation",
|
"dep:objc2-foundation",
|
||||||
"dep:objc2-web-kit",
|
"dep:objc2-web-kit",
|
||||||
|
"dep:webview2-com",
|
||||||
|
"dep:windows-core",
|
||||||
|
"dep:windows",
|
||||||
|
"dep:serde_json",
|
||||||
]
|
]
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
use std::{env::temp_dir, fs, os::unix::fs::PermissionsExt};
|
use std::{env::temp_dir, fs};
|
||||||
|
|
||||||
use gpapi::{auth::SamlAuthData, GP_CALLBACK_PORT_FILENAME};
|
use gpapi::{auth::SamlAuthData, GP_CALLBACK_PORT_FILENAME};
|
||||||
use log::info;
|
use log::info;
|
||||||
@ -96,7 +96,11 @@ async fn wait_auth_data() -> anyhow::Result<SamlAuthData> {
|
|||||||
|
|
||||||
// Write the port to a file
|
// Write the port to a file
|
||||||
fs::write(&port_file, port.to_string())?;
|
fs::write(&port_file, port.to_string())?;
|
||||||
|
#[cfg(unix)]
|
||||||
|
{
|
||||||
|
use os::unix::fs::PermissionsExt;
|
||||||
fs::set_permissions(&port_file, fs::Permissions::from_mode(0o600))?;
|
fs::set_permissions(&port_file, fs::Permissions::from_mode(0o600))?;
|
||||||
|
}
|
||||||
|
|
||||||
// Remove the previous log file
|
// Remove the previous log file
|
||||||
let callback_log = temp_dir().join("gpcallback.log");
|
let callback_log = temp_dir().join("gpcallback.log");
|
||||||
|
@ -1,8 +1,9 @@
|
|||||||
mod auth_messenger;
|
mod auth_messenger;
|
||||||
mod webview_auth;
|
mod webview_auth;
|
||||||
|
|
||||||
#[cfg_attr(not(target_os = "macos"), path = "webview/unix.rs")]
|
#[cfg_attr(not(any(target_os = "macos", target_os = "windows")), path = "webview/unix.rs")]
|
||||||
#[cfg_attr(target_os = "macos", path = "webview/macos.rs")]
|
#[cfg_attr(target_os = "macos", path = "webview/macos.rs")]
|
||||||
|
#[cfg_attr(windows, path = "webview/windows.rs")]
|
||||||
mod platform_impl;
|
mod platform_impl;
|
||||||
|
|
||||||
pub use webview_auth::WebviewAuthenticator;
|
pub use webview_auth::WebviewAuthenticator;
|
||||||
|
@ -15,7 +15,7 @@ pub(crate) enum AuthDataLocation {
|
|||||||
#[derive(Debug)]
|
#[derive(Debug)]
|
||||||
pub(crate) enum AuthError {
|
pub(crate) enum AuthError {
|
||||||
/// Failed to load page due to TLS error
|
/// Failed to load page due to TLS error
|
||||||
#[cfg(not(target_os = "macos"))]
|
#[cfg(not(any(target_os = "macos", target_os = "windows")))]
|
||||||
TlsError,
|
TlsError,
|
||||||
/// 1. Found auth data in headers/body but it's invalid
|
/// 1. Found auth data in headers/body but it's invalid
|
||||||
/// 2. Loaded an empty page, failed to load page. etc.
|
/// 2. Loaded an empty page, failed to load page. etc.
|
||||||
|
@ -115,7 +115,7 @@ impl<'a> WebviewAuthenticator<'a> {
|
|||||||
match auth_messenger.subscribe().await? {
|
match auth_messenger.subscribe().await? {
|
||||||
AuthEvent::Close => bail!("Authentication cancelled"),
|
AuthEvent::Close => bail!("Authentication cancelled"),
|
||||||
AuthEvent::RaiseWindow => self.raise_window(&auth_window),
|
AuthEvent::RaiseWindow => self.raise_window(&auth_window),
|
||||||
#[cfg(not(target_os = "macos"))]
|
#[cfg(not(any(target_os = "macos", target_os = "windows")))]
|
||||||
AuthEvent::Error(AuthError::TlsError) => bail!(gpapi::error::PortalError::TlsError),
|
AuthEvent::Error(AuthError::TlsError) => bail!(gpapi::error::PortalError::TlsError),
|
||||||
AuthEvent::Error(AuthError::NotFound(location)) => {
|
AuthEvent::Error(AuthError::NotFound(location)) => {
|
||||||
info!(
|
info!(
|
||||||
@ -261,10 +261,10 @@ impl<'a> WebviewAuthenticator<'a> {
|
|||||||
|
|
||||||
info!("Raising auth window...");
|
info!("Raising auth window...");
|
||||||
|
|
||||||
#[cfg(target_os = "macos")]
|
#[cfg(any(target_os = "macos", target_os = "windows"))]
|
||||||
let result = auth_window.show();
|
let result = auth_window.show();
|
||||||
|
|
||||||
#[cfg(not(target_os = "macos"))]
|
#[cfg(not(any(target_os = "macos", target_os = "windows")))]
|
||||||
let result = {
|
let result = {
|
||||||
use gpapi::utils::window::WindowExt;
|
use gpapi::utils::window::WindowExt;
|
||||||
auth_window.raise()
|
auth_window.raise()
|
||||||
|
142
crates/auth/src/webview/windows.rs
Normal file
142
crates/auth/src/webview/windows.rs
Normal file
@ -0,0 +1,142 @@
|
|||||||
|
use log::warn;
|
||||||
|
use tauri::webview::PlatformWebview;
|
||||||
|
use webview2_com::{
|
||||||
|
pwstr_from_str, take_pwstr, ExecuteScriptCompletedHandler,
|
||||||
|
Microsoft::Web::WebView2::Win32::{
|
||||||
|
ICoreWebView2WebResourceResponseView, ICoreWebView2_14, ICoreWebView2_2,
|
||||||
|
COREWEBVIEW2_SERVER_CERTIFICATE_ERROR_ACTION_ALWAYS_ALLOW,
|
||||||
|
},
|
||||||
|
ServerCertificateErrorDetectedEventHandler, WebResourceResponseReceivedEventHandler,
|
||||||
|
};
|
||||||
|
use windows_core::{Interface, PWSTR};
|
||||||
|
|
||||||
|
use super::{
|
||||||
|
auth_messenger::AuthError,
|
||||||
|
webview_auth::{GetHeader, PlatformWebviewExt},
|
||||||
|
};
|
||||||
|
|
||||||
|
impl PlatformWebviewExt for PlatformWebview {
|
||||||
|
fn ignore_tls_errors(&self) -> anyhow::Result<()> {
|
||||||
|
unsafe {
|
||||||
|
let wv = self.controller().CoreWebView2()?.cast::<ICoreWebView2_14>()?;
|
||||||
|
let handler = ServerCertificateErrorDetectedEventHandler::create(Box::new(|_, e| {
|
||||||
|
if let Some(e) = e {
|
||||||
|
let _ = e.SetAction(COREWEBVIEW2_SERVER_CERTIFICATE_ERROR_ACTION_ALWAYS_ALLOW);
|
||||||
|
}
|
||||||
|
Ok(())
|
||||||
|
}));
|
||||||
|
|
||||||
|
wv.add_ServerCertificateErrorDetected(&handler, &mut Default::default())?;
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
fn load_url(&self, url: &str) -> anyhow::Result<()> {
|
||||||
|
let url = pwstr_from_str(url);
|
||||||
|
|
||||||
|
unsafe { self.controller().CoreWebView2()?.Navigate(url)? }
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
fn load_html(&self, html: &str) -> anyhow::Result<()> {
|
||||||
|
let html = pwstr_from_str(html);
|
||||||
|
|
||||||
|
unsafe { self.controller().CoreWebView2()?.NavigateToString(html)? }
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
fn get_html(&self, callback: Box<dyn Fn(anyhow::Result<String>) + 'static>) {
|
||||||
|
unsafe {
|
||||||
|
match self.controller().CoreWebView2() {
|
||||||
|
Ok(wv) => {
|
||||||
|
let js = "document.documentElement.outerHTML";
|
||||||
|
let js = pwstr_from_str(js);
|
||||||
|
|
||||||
|
let handler = ExecuteScriptCompletedHandler::create(Box::new(move |err, html| {
|
||||||
|
if let Err(err) = err {
|
||||||
|
callback(Err(anyhow::anyhow!(err)));
|
||||||
|
return Ok(());
|
||||||
|
}
|
||||||
|
|
||||||
|
// The returned HTML is JSON.stringify'd string, so we need to parse it
|
||||||
|
let res = match serde_json::from_str(&html) {
|
||||||
|
Ok(Some(html)) => Ok(html),
|
||||||
|
Ok(None) => Err(anyhow::anyhow!("No HTML returned")),
|
||||||
|
Err(err) => Err(anyhow::anyhow!(err)),
|
||||||
|
};
|
||||||
|
callback(res);
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}));
|
||||||
|
|
||||||
|
if let Err(err) = wv.ExecuteScript(js, &handler) {
|
||||||
|
warn!("Failed to execute script: {}", err);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Err(err) => callback(Err(anyhow::anyhow!(err))),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl GetHeader for ICoreWebView2WebResourceResponseView {
|
||||||
|
fn get_header(&self, key: &str) -> Option<String> {
|
||||||
|
unsafe {
|
||||||
|
let headers = self.Headers().ok()?;
|
||||||
|
let key = pwstr_from_str(key);
|
||||||
|
|
||||||
|
let mut contains = Default::default();
|
||||||
|
headers.Contains(key, &mut contains).ok()?;
|
||||||
|
|
||||||
|
if contains.as_bool() {
|
||||||
|
let mut value = PWSTR::null();
|
||||||
|
headers.GetHeader(key, &mut value).ok()?;
|
||||||
|
let value = take_pwstr(value);
|
||||||
|
|
||||||
|
Some(value)
|
||||||
|
} else {
|
||||||
|
None
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub trait PlatformWebviewOnResponse {
|
||||||
|
fn on_response(
|
||||||
|
&self,
|
||||||
|
callback: Box<dyn Fn(anyhow::Result<ICoreWebView2WebResourceResponseView, AuthError>) + 'static>,
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
impl PlatformWebviewOnResponse for PlatformWebview {
|
||||||
|
fn on_response(
|
||||||
|
&self,
|
||||||
|
callback: Box<dyn Fn(anyhow::Result<ICoreWebView2WebResourceResponseView, AuthError>) + 'static>,
|
||||||
|
) {
|
||||||
|
unsafe {
|
||||||
|
let _ = self
|
||||||
|
.controller()
|
||||||
|
.CoreWebView2()
|
||||||
|
.and_then(|wv| wv.cast::<ICoreWebView2_2>())
|
||||||
|
.map(|wv| {
|
||||||
|
let handler = WebResourceResponseReceivedEventHandler::create(Box::new(move |_, e| {
|
||||||
|
let Some(e) = e else {
|
||||||
|
return Ok(());
|
||||||
|
};
|
||||||
|
|
||||||
|
match e.Response() {
|
||||||
|
Ok(res) => callback(Ok(res)),
|
||||||
|
Err(err) => warn!("Failed to get response: {}", err),
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}));
|
||||||
|
|
||||||
|
let _ = wv.add_WebResourceResponseReceived(&handler, &mut Default::default());
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
@ -27,7 +27,7 @@ chacha20poly1305 = { version = "0.10", features = ["std"] }
|
|||||||
redact-engine.workspace = true
|
redact-engine.workspace = true
|
||||||
url.workspace = true
|
url.workspace = true
|
||||||
regex.workspace = true
|
regex.workspace = true
|
||||||
uzers.workspace = true
|
|
||||||
serde_urlencoded.workspace = true
|
serde_urlencoded.workspace = true
|
||||||
md5.workspace = true
|
md5.workspace = true
|
||||||
sha256.workspace = true
|
sha256.workspace = true
|
||||||
@ -39,6 +39,9 @@ clap-verbosity-flag = { workspace = true, optional = true }
|
|||||||
env_logger = { workspace = true, optional = true }
|
env_logger = { workspace = true, optional = true }
|
||||||
log-reload = { version = "0.1", optional = true }
|
log-reload = { version = "0.1", optional = true }
|
||||||
|
|
||||||
|
[target.'cfg(target_family="unix")'.dependencies]
|
||||||
|
uzers.workspace = true
|
||||||
|
|
||||||
[features]
|
[features]
|
||||||
tauri = ["dep:tauri"]
|
tauri = ["dep:tauri"]
|
||||||
clap = ["dep:clap", "dep:clap-verbosity-flag"]
|
clap = ["dep:clap", "dep:clap-verbosity-flag"]
|
||||||
|
@ -104,7 +104,7 @@ impl SamlAuthData {
|
|||||||
}
|
}
|
||||||
|
|
||||||
let auth_data = decode_to_string(auth_data).map_err(|e| {
|
let auth_data = decode_to_string(auth_data).map_err(|e| {
|
||||||
warn!("Failed to decode SAML auth data: {}", e);
|
warn!("Failed to decode SAML auth data: {}", auth_data);
|
||||||
AuthDataParseError::Invalid(anyhow::anyhow!(e))
|
AuthDataParseError::Invalid(anyhow::anyhow!(e))
|
||||||
})?;
|
})?;
|
||||||
let auth_data = Self::from_html(&auth_data)?;
|
let auth_data = Self::from_html(&auth_data)?;
|
||||||
|
@ -1,5 +1,7 @@
|
|||||||
mod login;
|
mod login;
|
||||||
mod parse_gateways;
|
mod parse_gateways;
|
||||||
|
|
||||||
|
#[cfg(unix)]
|
||||||
pub mod hip;
|
pub mod hip;
|
||||||
|
|
||||||
pub use login::*;
|
pub use login::*;
|
||||||
|
@ -4,7 +4,10 @@ pub mod error;
|
|||||||
pub mod gateway;
|
pub mod gateway;
|
||||||
pub mod gp_params;
|
pub mod gp_params;
|
||||||
pub mod portal;
|
pub mod portal;
|
||||||
|
|
||||||
|
#[cfg(unix)]
|
||||||
pub mod process;
|
pub mod process;
|
||||||
|
|
||||||
pub mod service;
|
pub mod service;
|
||||||
pub mod utils;
|
pub mod utils;
|
||||||
|
|
||||||
|
@ -1,8 +1,11 @@
|
|||||||
pub(crate) mod command_traits;
|
pub(crate) mod command_traits;
|
||||||
|
|
||||||
pub(crate) mod gui_helper_launcher;
|
pub(crate) mod gui_helper_launcher;
|
||||||
|
|
||||||
pub mod auth_launcher;
|
pub mod auth_launcher;
|
||||||
pub mod gui_launcher;
|
pub mod gui_launcher;
|
||||||
pub mod hip_launcher;
|
pub mod hip_launcher;
|
||||||
pub mod service_launcher;
|
pub mod service_launcher;
|
||||||
|
|
||||||
|
#[cfg(unix)]
|
||||||
pub mod users;
|
pub mod users;
|
||||||
|
@ -9,7 +9,7 @@ pub mod lock_file;
|
|||||||
pub mod openssl;
|
pub mod openssl;
|
||||||
pub mod redact;
|
pub mod redact;
|
||||||
pub mod request;
|
pub mod request;
|
||||||
#[cfg(feature = "tauri")]
|
#[cfg(all(feature = "tauri", not(any(target_os = "macos", target_os = "windows"))))]
|
||||||
pub mod window;
|
pub mod window;
|
||||||
|
|
||||||
mod shutdown_signal;
|
mod shutdown_signal;
|
||||||
|
@ -6,15 +6,21 @@ pub async fn shutdown_signal() {
|
|||||||
};
|
};
|
||||||
|
|
||||||
#[cfg(unix)]
|
#[cfg(unix)]
|
||||||
|
{
|
||||||
let terminate = async {
|
let terminate = async {
|
||||||
signal::unix::signal(signal::unix::SignalKind::terminate())
|
signal::unix::signal(signal::unix::SignalKind::terminate())
|
||||||
.expect("failed to install signal handler")
|
.expect("failed to install signal handler")
|
||||||
.recv()
|
.recv()
|
||||||
.await;
|
.await;
|
||||||
};
|
};
|
||||||
|
|
||||||
tokio::select! {
|
tokio::select! {
|
||||||
_ = ctrl_c => {},
|
_ = ctrl_c => {},
|
||||||
_ = terminate => {},
|
_ = terminate => {},
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[cfg(not(unix))]
|
||||||
|
{
|
||||||
|
ctrl_c.await;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user